Trainer

            Dimitris Koutras, University of Piraeus

Session Details

  1. Session Title:
    Navigating Cyber Threats: The Risk of Vulnerable Binaries
  2. Session Description:
    This session will explore the risks associated with vulnerable software and binaries in critical systems. It will cover key topics such as identifying vulnerabilities, assessing risks, and mitigation strategies to protect critical assets.
  3. Key Learning Objectives:
    Understand the role of software in modern critical operations.
    Identify common vulnerabilities in binaries and software systems.
    Learn mitigation strategies to secure software.

Lab Details

  1. Lab Title:
    Vulnerability Tracking and Exploitation: Hands-On
  2. Lab Description:
    This lab provides a practical approach to identifying, tracking, and mitigating vulnerabilities in binaries systems. Participants will engage in hands-on activities to explore real-world scenario
  3. Key Learning Objectives:
    Apply vulnerability identification techniques in binary systems.
    Demonstrate the ability to mitigate common vulnerabilities.
    Develop skills in using debugging and testing tools.
  4. Tools/Software Required:
    Debugging tools like GDB.
    Tools for binary analysis (e.g., objdump, strace).
    Pre-installed virtual machines with necessary software.
Cyber security in healthcare: concepts, technology, services, challenges 
Vulnerabilities and threats in healthcare
Cyber-attack path discovery model
Risk assessment and management in healthcare  
Secure patient data
Policy and best practice

Case study in healthcare