Securing Outdated Hospital Operational Technology
Course
Chris Christensen of Honeywell addresses legacy building systems vulnerabilities, common attack vectors against hospital systems, IT-OT collaboration strategies and defense-in-depth frameworks using NIST standards.
Hospital operational technology faces unprecedented cybersecurity threats as attackers shift from data theft to facility disruption. Legacy building systems including HVAC controls, card access, fire systems and medical devices often run on outdated platforms with minimal security controls, creating attractive targets for threat actors. Modern attackers can easily exploit these vulnerabilities using readily available tools and techniques, potentially shutting down critical hospital operations. The disconnect between IT and OT teams compounds these risks, as building systems operate in isolation without proper visibility or security oversight. When facilities are compromised, the impact extends beyond technology - patient care is disrupted, safety systems may fail and recovery can take months to complete properly.
This session, led by Chris Christensen, global cybersecurity expert at Honeywell, will cover:
- Common attack vectors against hospital building systems and medical devices;
- IT-OT collaboration strategies for comprehensive OT visibility and protection;
- Defense-in-depth frameworks using NIST standards for OT resilience.
Here is the course outline:
Securing Outdated Hospital Operational Technology: Building Resilient Systems |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |