Kelvin Tegelaar, CTO, Lime Networks + Amanda Berlin, Lead Incident Detection Engineer + Jeremy Young, Partner Dir, Blumira
Legacy Windows servers and their respective OSes are a necessary evil for many IT admins.
Whether you don’t have the time, resources or the ability to upgrade, legacy systems can easily fly under the radar until an unpatched machine becomes a foothold for cyberattackers. Ransomware attacks like WannaCry and NotPetya took advantage of vulnerabilities of legacy OSes, and there will likely be more.
In this panel discussion, we’ll swap war stories and lessons learned about securing legacy systems. Join Lime Networks’ CTO Kelvin Tegelaar and blogger at TheCyberDrain.com, along with Blumira’s Amanda Berlin, Lead Incident Detection Engineer and Jeremy Young, Director of Partner Strategy, as they discuss how to prevent your legacy Microsoft systems from becoming targets.
- Best practices that make it easier to secure legacy systems
- How to achieve robust logging through free resources like Sysmon and Windows Baseline Configs
- The challenges of security when every user is an admin
- A comparison of then and now, discussing the most commonly exploited pieces of Windows OS (Spoiler Alert? Things haven’t changed much)