Name
Top Recommendations for Strengthening Legacy Systems Security
Date & Time
Thursday, July 12, 2018, 3:45 PM - 4:45 PM
Speakers
Sri Bharadwaj, Director, Information Services and Chief Information Security Officer, UC Irvine Health
Sheryl Rose, Senior Vice President and Chief Information Security Officer, Catholic Health Initiatives
Scott Raymond, Vice Presdient, Information Technology, Centura Health
Sheryl Rose, Senior Vice President and Chief Information Security Officer, Catholic Health Initiatives
Scott Raymond, Vice Presdient, Information Technology, Centura Health
Description
Legacy systems, from medical devices to electronic health records, to billing platforms, each pose a unique security threat if left untested as a potential threat for breach. There are the obvious security risks like Wired Equivalent Privacy (WEP) internet access, but what about additional legacy systems that will be unsupported is patched or upgraded beyond a certain point? One of the biggest influencing factors of the WannaCry ransomware outbreak of May 2017, was this concept of legacy systems remaining unpatched past Windows XP, which opened the door for an exploit and propagation of the virus on a grand scale.
In this engaging panel discussion, we visit with a panel of top security experts as they explore the commonalities and risks among legacy systems. Listen in as our panel defined which legacy systems are most at risk, which systems are commonly overlooked in evaluation, and what patching protocols are covered by existing vendor relationships.