Red Team | MEDSHIELD: Threat Modeling for Medical IoT

SANS Institute ยท Intermediate ยท๐Ÿ” Cybersecurity ยท2mo ago
Red Team | MEDSHIELD: Proactive Threat Modeling Framework for Connected IoT Care ๐ŸŽ™๏ธ Dr. Jennifer Schieferle Uhlenbrock, Healthcare Cybersecurity Consultant, Provisio Insights, LLC ๐ŸŽ™๏ธ Dr. Deepti Gupta, Assistant Professor, Texas A&M University-Central Texas ๐Ÿ“ Presented at SANS Hack & Defend Summit 2025 Adversarial exploitation of medical devices, robotics, and smart hospital systems has emerged as a critical challenge as healthcare environments embrace interconnected, IoT enabled equipment. Recent empirical analyses reveal that, on average, medical devices harbor multiple unpatched vulnerabilities for over three years post-purchase, leaving systems exposed to remote compromise. These flaws span firmware defects, insecure network configurations, supply chain vulnerabilities, inadequate use of cryptographic controls, all of which have been demonstrably exploited in red team engagements. In this session, we present a MEDSHIELD methodology for threat modeling of medical devices. We review methods for discovering hidden attack surfaces, such as reverse-engineering proprietary protocols and leveraging IoT firmware analysis, to emulate real-world exploits. Attendees will learn the nine-step MEDSHIELD framework, Mapping their medical IoT landscape, Enumerating and Decomposing device ecosystems, applying STRIDE for threat coverage, Hunting vulnerabilities, Indexing and prioritizing risks, Establishing mitigations, Launching coordinated purple-team validations, and Documenting for continuous improvement. Using this framework, they'll build an enriched medical device inventory with threat intelligence to pinpoint high-risk internals and attack paths, conduct joint offense/defense tests to refine detection and controls, and translate findings into a prioritized defense plan, featuring firmware integrity checks, network micro-segmentation, and ongoing monitoring, that shrinks their attack surface and accelerates response. By integrating these adversarial insights into pr
Watch on YouTube โ†— (saves to browser)
Sign in to unlock AI tutor explanation ยท โšก30

Playlist

Uploads from SANS Institute ยท SANS Institute ยท 0 of 60

โ† Previous Next โ†’
1 SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute
2 SANS Institute Cybersecurity Training Customer Stories
SANS Institute Cybersecurity Training Customer Stories
SANS Institute
3 SANS Institute UK Cyber Academy
SANS Institute UK Cyber Academy
SANS Institute
4 SANS Institute UK Cyber Academy
SANS Institute UK Cyber Academy
SANS Institute
5 CISSPยฎ Prep Exam, MGT414, by SANS Institute
CISSPยฎ Prep Exam, MGT414, by SANS Institute
SANS Institute
6 SANS Institute's Rob Lee Discusses The OPM.GOV Hack on CNN
SANS Institute's Rob Lee Discusses The OPM.GOV Hack on CNN
SANS Institute
7 Information Security Training from SANS Institute - Student Testimonials
Information Security Training from SANS Institute - Student Testimonials
SANS Institute
8 SANS NetWars
SANS NetWars
SANS Institute
9 SANS DFIR NetWars
SANS DFIR NetWars
SANS Institute
10 Hack The Drone - SANS Cyber Academy UK
Hack The Drone - SANS Cyber Academy UK
SANS Institute
11 SANS VetSuccess Immersion Academy
SANS VetSuccess Immersion Academy
SANS Institute
12 SANS Cybersecurity Training, Certifications & Placement for Veterans
SANS Cybersecurity Training, Certifications & Placement for Veterans
SANS Institute
13 The 2015 SANS Holiday Hack Challenge
The 2015 SANS Holiday Hack Challenge
SANS Institute
14 SANS VetSuccess Academy: Hands-on Skills
SANS VetSuccess Academy: Hands-on Skills
SANS Institute
15 SANS VetSuccess Academy Overview
SANS VetSuccess Academy Overview
SANS Institute
16 SANS ICS Security Summit & Training 2017
SANS ICS Security Summit & Training 2017
SANS Institute
17 Exploring the Unknown Industrial Control System Threat Landscape โ€“ SANS ICS Security Summit 2017
Exploring the Unknown Industrial Control System Threat Landscape โ€“ SANS ICS Security Summit 2017
SANS Institute
18 WannaCry recap, patches, and analysis
WannaCry recap, patches, and analysis
SANS Institute
19 If Weโ€™re Doing So Well at Cyber Security, Why Are We Still Doing So Poorly?
If Weโ€™re Doing So Well at Cyber Security, Why Are We Still Doing So Poorly?
SANS Institute
20 Graduation Day - SANS HM Gov Cyber Retraining Academy
Graduation Day - SANS HM Gov Cyber Retraining Academy
SANS Institute
21 Incentivizing ICS Security: The Case for Cyber Insurance โ€“ SANS ICS Security Summit 2017
Incentivizing ICS Security: The Case for Cyber Insurance โ€“ SANS ICS Security Summit 2017
SANS Institute
22 SANS Data Breach Summit & Training 2017
SANS Data Breach Summit & Training 2017
SANS Institute
23 SANS Secure DevOps Summit & Training 2017
SANS Secure DevOps Summit & Training 2017
SANS Institute
24 How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017
How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017
SANS Institute
25 SANS Webcast โ€“ Continuous Opportunity: DevOps & Security
SANS Webcast โ€“ Continuous Opportunity: DevOps & Security
SANS Institute
26 SANS Cybersecurity Programs for the Department of Defense
SANS Cybersecurity Programs for the Department of Defense
SANS Institute
27 SANS Pen Test HackFest Summit & Training 2017
SANS Pen Test HackFest Summit & Training 2017
SANS Institute
28 SANS SIEM & Tactical Analytics Summit & Training
SANS SIEM & Tactical Analytics Summit & Training
SANS Institute
29 If Weโ€™re Doing So Well, Why Are We Still Doing So Poorly? โ€“ SANS ICS Security Summit 2017
If Weโ€™re Doing So Well, Why Are We Still Doing So Poorly? โ€“ SANS ICS Security Summit 2017
SANS Institute
30 SANS Institute
SANS Institute
SANS Institute
31 ICS515: ICS Active Defense and Incident Response
ICS515: ICS Active Defense and Incident Response
SANS Institute
32 SANS Institute
SANS Institute
SANS Institute
33 Introducing the NEW SANS Pen Test Poster
Introducing the NEW SANS Pen Test Poster
SANS Institute
34 SANS Institute - An Inside Look at the Newly Updated ICS515 Course
SANS Institute - An Inside Look at the Newly Updated ICS515 Course
SANS Institute
35 SANS ICS Security Training, Munich, Germany
SANS ICS Security Training, Munich, Germany
SANS Institute
36 SANS Automotive Summit Webcast
SANS Automotive Summit Webcast
SANS Institute
37 Privesc Playground - SANS Pen Test HackFest Summit 2017
Privesc Playground - SANS Pen Test HackFest Summit 2017
SANS Institute
38 Introduction to Reverse Engineering for Penetration Testers โ€“ SANS Pen Test HackFest Summit 2017
Introduction to Reverse Engineering for Penetration Testers โ€“ SANS Pen Test HackFest Summit 2017
SANS Institute
39 Honey, Please Donโ€™t Burn Down Your Office: Fun with Smart Home Automation
Honey, Please Donโ€™t Burn Down Your Office: Fun with Smart Home Automation
SANS Institute
40 SANS Security Operations Summit & Training 2018
SANS Security Operations Summit & Training 2018
SANS Institute
41 Sh*t Happens!  (But You Still Need to Drink the Water) โ€“ SANS ICS Summit 2018
Sh*t Happens! (But You Still Need to Drink the Water) โ€“ SANS ICS Summit 2018
SANS Institute
42 ICS Threat Intelligence: Moving from the Unknowns to a Defended Landscape โ€“ SANS ICS Summit 2018
ICS Threat Intelligence: Moving from the Unknowns to a Defended Landscape โ€“ SANS ICS Summit 2018
SANS Institute
43 Youโ€™re Probably Not Red Teaming (And Usually Iโ€™m Not, Either) โ€“ SANS ICS Summit 2018
Youโ€™re Probably Not Red Teaming (And Usually Iโ€™m Not, Either) โ€“ SANS ICS Summit 2018
SANS Institute
44 A Sneak Peak at the New ICS410
A Sneak Peak at the New ICS410
SANS Institute
45 Jumping Air Gaps โ€“ SANS ICS Summit 2018
Jumping Air Gaps โ€“ SANS ICS Summit 2018
SANS Institute
46 Introduction to Linux
Introduction to Linux
SANS Institute
47 Introduction to Malware Analysis
Introduction to Malware Analysis
SANS Institute
48 Youโ€™re Probably Not Red Teaming (And Usually Iโ€™m Not, Either) Webcast by Deviant Ollam
Youโ€™re Probably Not Red Teaming (And Usually Iโ€™m Not, Either) Webcast by Deviant Ollam
SANS Institute
49 Hacking your SOEL: SOC Automation and Orchestration โ€“ SANS Security Operations Summit 2018
Hacking your SOEL: SOC Automation and Orchestration โ€“ SANS Security Operations Summit 2018
SANS Institute
50 Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework
Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework
SANS Institute
51 Apples and Oranges?:  A CompariSIEM โ€“ SANS Security Operations Summit 2018
Apples and Oranges?: A CompariSIEM โ€“ SANS Security Operations Summit 2018
SANS Institute
52 SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Institute
53 SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
SANS Institute
54 The Science of Security: The Psychological Impacts of Security Awareness Programs
The Science of Security: The Psychological Impacts of Security Awareness Programs
SANS Institute
55 How I Pulled Off an Edgy Security Campaign โ€“ SANS Security Awareness Summit 2018
How I Pulled Off an Edgy Security Campaign โ€“ SANS Security Awareness Summit 2018
SANS Institute
56 Practical Advice for Submitting to Speak at a Cybersecurity Conference
Practical Advice for Submitting to Speak at a Cybersecurity Conference
SANS Institute
57 SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
SANS Institute
58 SANS Webcast - Zero Trust Architecture
SANS Webcast - Zero Trust Architecture
SANS Institute
59 SANS STX Cyber Range
SANS STX Cyber Range
SANS Institute
60 Part 1 โ€“ SANS Institute and Tenable talk about cloud security
Part 1 โ€“ SANS Institute and Tenable talk about cloud security
SANS Institute

Related AI Lessons

โšก
Inside Consumer DVRs โ€” Hardware, Firmware & Network Security Evaluation
Learn about the hardware, firmware, and network security of consumer DVRs through a reverse engineering analysis of the Hikvision DS-7204HUHI-K
Medium ยท Cybersecurity
โšก
Cรณmo construimos un SOC con honeypot e IA local
Learn how to build a Security Operations Center (SOC) using honeypot and local AI to detect and prevent cyber threats
Dev.to ยท Yoandy Ramirez Delgado
โšก
Credentials in web applications: how to store them properly
Learn how to store credentials properly in web applications to prevent breaches
Dev.to ยท Ian Johnson
โšก
XSS Nedir ve Neden Hรขlรข Tehlikeli? | Bir Siber Gรผvenlik ร–ฤŸrencisinin Notlarฤฑ
Learn about XSS attacks and their ongoing threat to web security
Medium ยท Cybersecurity
Up next
Wireshark Tutorial For Beginners | How Wireshark Works | Packet Analysis Explained | Simplilearn
Simplilearn
Watch โ†’