News
Magazine Features
Opinions
News Features
Interviews
Editorial
Blogs
Reviews
Slackspace
Next-Gen Infosec
Webinars
White Papers
Podcasts
Industry Events & Training
Magazine Events
Online Summits
Company Directory
Application Security
Automation
Big Data
Business Continuity
Cloud Security
Compliance
Cybercrime
Data Protection
Digital Forensics
Encryption
Human Factor
Identity Access Management
Industry Announcements
Internet Security
Malware
Managed Services
Mobile Security
Network Security
Payment Security
Physical and Information Security Convergence
Privacy
Risk Management
The Internet of Things
News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS19 The Persistence of Legacy Systems
#IMOS19 The Persistence of Legacy Systems
Webinar
27 Mar 2019
Speakers
Jenn Black
Cybersecurity Executive
Follow @jennrblack
Andrew Hay
CISO, Lares
Follow @andrewmshay
Connect on LinkedIn
Luke McOmie
Director Strategic Services, Coalfire
,
Coalfire
Follow @lmcomie
Dan Raywood
Email Dan
Follow @DanRaywood
Connect on LinkedIn
Why not watch?
#IMOS21 Security in a Cloudy Sky: Establishing Resilience and Reliability
24 Mar 2021
#IMOS19 Securing Data in Multi-Cloud Environments
26 Mar 2019
#IMOS19 Keynote Address: Retaining and Growing Cybersecurity Talent - A proven Model
27 Mar 2019
#IMOS19 Election Hacking: Why the Threat is Real
27 Mar 2019
You may also like
Cisco: Ensure Collaboration to Better Survive Remote Working
News
22 Sep 2020
Interview: Cloudflare France Head Warns Healthcare is Falling Behind in Cloud Security
Interview
31 Aug 2022
The Most Important Part of Least Privilege Tactics
Opinion
28 Dec 2017
Cloud Security Risks Surge as 38% of Firms Face Exposures
News
8 Oct 2024
Spoiler Alert: How Better Access Management and File Auditing Could Change Hollywood History
Opinion
21 Dec 2016
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure
News
18 Apr 2025
1
Identity Attacks Now Comprise a Third of Intrusions
News
17 Apr 2025
2
NTLM Hash Exploit Targets Poland and Romania Days After Patch
News
17 Apr 2025
3
Senators Urge Cyber-Threat Sharing Law Extension Before Deadline
News
17 Apr 2025
4
ICO Issues Merseyside-Based Law Firm £60,000 Fine After Cyber-Attack
News
17 Apr 2025
5
92% of Mobile Apps Found to Use Insecure Cryptographic Methods
News
16 Apr 2025
6
Chaos Reigns as MITRE Set to Cease CVE and CWE Operations
News
16 Apr 2025
1
Trump Administration Shakes Up CISA with Staff and Funding Cuts
News
12 Mar 2025
2
Digital Certificate Lifespans to Fall to 47 Days by 2029
News
14 Apr 2025
3
China-Backed Hackers Exploit BRICKSTORM Backdoor to Spy on European Businesses
News
16 Apr 2025
4
NVD Revamps Operations as Vulnerability Reporting Surges
News
11 Apr 2025
5
CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension
News
17 Apr 2025
6
The Evolving Ransomware Landscape: A 2025 Survival Guide
Webinar
15 Apr 2025
1
Proactive Incident Response and Recovery: Navigating Ransomware Attacks
Webinar
15 Apr 2025
2
Fireside Chat: How Initial Access Brokers Fuel the Ransomware-as-a-Service Model
Webinar
15 Apr 2025
3
Ransomware Negotiations: Mastering an Attacker’s Mindset and Minimizing Leverage
Webinar
15 Apr 2025
4
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
5
How to Implement Attack Surface Management in the AI and Cloud Age
Webinar
3 Apr 2025
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6