Name
Top Recommendations for Strengthening Legacy Systems Security
Date & Time
Friday, February 2, 2018, 1:45 PM - 2:35 PM
Sri Bharadwaj Jason Johnson Shawn Savadkohi Chris Joerg
Description
 
Legacy systems, from medical devices, to electronic health records, to billing platforms, each pose a unique security threat if left untested as a potential threat for breach. There are the obvious security risks like Wired Equivalent Privacy (WEP) internet access, but what about additional legacy systems that will be unsupported is patched or upgraded beyond a certain point? One of the biggest influencing factors of the WannaCry ransomware outbreak of May 2017, was this concept of legacy systems remaining unpatched past Windows XP, which opened the door for an exploit and propagation of the virus on a grand scale.
 
In this engaging panel discussion, we visit with a panel of top security experts as they explore the commonalities and risks among legacy systems. Listen in as our panel defined which legacy systems are most at risk, which systems are commonly overlooked in evaluation, and what patching protocols are covered by existing vendor relationships.
 
Panelists: