News

Date: 24-25 June, 2020 Location: Online ​The frist workshop of ECSCI cluster of European Horizon 2020 projects presented the different approaches on integrated (i.e. cyber and physical) security in seven different industrial sectors, such as finance, healthcare, energy, air transport, communications, gas, and water. The peculiarities of critical infrastructure protection in...

Continue from blog entry SPHINX Use Cases: Part VI Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Exploiting Remote Patient Monitoring Services Description: A patient undergoes a...

SPHINX project labels the cybersecurity threats that a healthcare organisation may face as an outcome of either a malicious action (i.e. malware, hijacking, data theft, DoS/DDoS), a human error (configuration error, unauthorized access, BYOD), a system failure (i.e. overload, software and/or firmware failure, outdated systems),...

Accelerating Digital Policy integration in Health Sector in Greece Official website 11 - 12 June Online The third annual greek conference for Informatics and e-Health, HeathIT 2020, was held online and elaborated on strengthening e-Government strategy, e-Health practices and the National Framework for interoperability among healthcare providers. The main...

Continue from blog entry SPHINX Use Cases: Part V Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Intrusion in the Clinical Centre’s Wireless Network Description: As...

Continue from blog entry SPHINX Use Cases: Part IV Through the following classification of use cases, SPHINX aims to better understand how threats, risks and vulnerabilities are manifested, as well as how prevention, recovery and mitigation actions can be improved. Compromised BYOD Enables Stealing of Patient Data Description:...

Much like many other critical infrastructures, Healthcare Sector comprises several human and technological capital which is essential for its function. Subsequently, in such capital a series of critical assets can be recognised. In the context of cybersecurity, assets represent any resource that is worth protecting,...