Posted on
in Presentations
While every organization would love to use the latest and greatest technologies, updates, and more, legacy systems continue to exist in many environments, especially critical infrastructure. Attendees in this session will learn how to incorporate these legacy systems into a security posture and protect them in unique ways, when modern security practices are unavailable.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community