We’ll demonstrate how an attacker searches for wireless medical devices (aka “shadow networks”) over the Internet and uses that knowledge to create an over-the-air attack which results in unauthorized network access, network hijacking, ransomware execution or data exfiltration.
In this talk you will learn how to:
● Build a wireless security policy that incorporates all the HDOs networks, including shadow networks
● Enforce your wireless security policy in an effective and efficient manner
● Prevent over-the-air attacks without hampering business operations