Monday, July 18, 2022, 1:45 PM - 2:15 PM
Now where did that ransomware on the X-Ray come from?

We’ll demonstrate how an attacker searches for wireless medical devices (aka “shadow networks”) over the Internet and uses that knowledge to create an over-the-air attack which results in unauthorized network access, network hijacking, ransomware execution or data exfiltration. 
In this talk you will learn how to:
●    Build a wireless security policy that incorporates all the HDOs networks, including shadow networks
●    Enforce your wireless security policy in an effective and efficient manner
●    Prevent over-the-air attacks without hampering business operations 

Ohad Plotnik