Posted on
in Presentations
While every organization would love to use the latest and greatest technologies, updates, and more, legacy systems continue to exist in many environments, especially critical infrastructure. Attendees in this session will learn how to incorporate these legacy systems into a security posture and protect them in unique ways, when modern security practices are unavailable.
Share With Your Community