Header of citema group GmbH

Implementation of cyber security requirements for legacy systems

Learn about effective measures for securing legacy systems, which are illustrated with concrete examples from industry practice.

Topic

Governance, Riskmanagement and ComplianceIdentity and access managementIndustry 4.0 / IoT / Edge ComputingNetwork Security / Patch ManagementSIEM / Threat Analytics / SOCWebsecurity / VPN

When & Where

calendar_month

Wed, 10/11/2023, 12:15 - 12:30

location_on

Forum, Booth 7A-106

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

Many companies have been productively using a wide variety of systems in diverse infrastructures for many years, if not decades. For a long time, the focus for these systems was on pure operation, less on security.

We will show you which cyber security aspects need to be considered for such systems and how safeguarding measures can look like.

Learn about effective measures for securing legacy systems, which are illustrated with concrete examples from industry practice.

Moderator