Using Modern Authentication Methods with Legacy Assets

Logo
Presented by

Brandon Dunlap, Moderator, (ISC)², Jason Garbis, Vice President Cybersecurity Products, Cyxtera

About this talk

There are a large proportion of business critical legacy applications unable to accept modern forms of authentication. Refactoring legacy applications is costly and sometimes virtually impossible. Yet these applications are accessing highly valuable data across networks and they are a data breach ready to happen. Join us as we discuss how to secure legacy applications with modern Zero Trust security. Brandon Dunlap, (ISC)² Moderator and Jason Garbis from Cyxtera will discuss: -Problems with how legacy applications are secured today -Options for security without refactoring these applications -Simplicity and speed to security that reduces operational complexity and scope of audits -A process for gradual end-of-life legacy assets, while still operating day-to-day normal business
Related topics:

More from this channel

Upcoming talks (14)
On-demand talks (392)
Subscribers (93669)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs