SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsElectronic Medical Record (EMR) System vulnerabilities provide an easy target for hackers to steal valuable personal data. With an average cost to a healthcare provider of $9.23 million per hacking incident (Ponemon Institute, 2021), EMR vendors need to work with security researchers to review, discover, and patch these vulnerabilities before attackers exploit them. While the security community has made some efforts to disclose vulnerabilities, these efforts are often sporadic and rely on niche feature sets to be enabled. Security researchers’ limited time and resources need to be focused on the most used and most likely to be exploited targets in these EMR applications.
This whitepaper utilizes vulnerability exploitation in a popular open-source EMR application to provide specific areas for researchers to focus efforts on securing the applications that protect this valuable data.