
Implementation of cyber security requirements for legacy systems
Learn about effective measures for securing legacy systems, which are illustrated with concrete examples from industry practice.
Topic
Governance, Riskmanagement and ComplianceIdentity and access managementIndustry 4.0 / IoT / Edge ComputingNetwork Security / Patch ManagementSIEM / Threat Analytics / SOCWebsecurity / VPN
When & Where
Details
Format:
Technology lecture
Session description
Many companies have been productively using a wide variety of systems in diverse infrastructures for many years, if not decades. For a long time, the focus for these systems was on pure operation, less on security.
We will show you which cyber security aspects need to be considered for such systems and how safeguarding measures can look like.
Learn about effective measures for securing legacy systems, which are illustrated with concrete examples from industry practice.
Moderator
