News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS19 The Persistence of Legacy Systems
#IMOS19 The Persistence of Legacy Systems
Webinar
27 Mar 2019
Speakers
Jenn Black
Cybersecurity Executive
Follow @jennrblack
Andrew Hay
CISO, Lares
Follow @andrewmshay
Connect on LinkedIn
Luke McOmie
Director Strategic Services, Coalfire
,
Coalfire
Follow @lmcomie
Dan Raywood
Email Dan
Follow @DanRaywood
Connect on LinkedIn
Why not watch?
#IMOS19 Keynote Address: Retaining and Growing Cybersecurity Talent - A proven Model
27 Mar 2019
#IMOS19 Election Hacking: Why the Threat is Real
27 Mar 2019
#IMOS19 Keynote - What's Lurking in Your Inbox?
26 Mar 2019
#IMOS21 Security in a Cloudy Sky: Establishing Resilience and Reliability
24 Mar 2021
You may also like
Cisco: Ensure Collaboration to Better Survive Remote Working
News
22 Sep 2020
Interview: Cloudflare France Head Warns Healthcare is Falling Behind in Cloud Security
Interview
31 Aug 2022
The Most Important Part of Least Privilege Tactics
Opinion
28 Dec 2017
Spoiler Alert: How Better Access Management and File Auditing Could Change Hollywood History
Opinion
21 Dec 2016
How to Migrate Public Folders to Office 365
Blog
25 Apr 2023
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Most IT Leaders Say Severity of Cyber-Attacks has Increased
News
25 Jul 2024
1
Chinese Espionage Group Upgrades Malware Arsenal to Target All Major OS
News
23 Jul 2024
2
Russia Shifts Cyber Focus to Battlefield Intelligence in Ukraine
News
23 Jul 2024
3
Exclusive: Paris 2024 CISO Reveals Cybersecurity Plans for the Olympics
Interview
23 Jul 2024
4
Prolific DDoS Marketplace Shut Down by UK Law Enforcement
News
23 Jul 2024
5
Cybercriminals Exploit CrowdStrike Outage Chaos
News
22 Jul 2024
6
Fact vs. Fiction: Dispelling Zero Trust Misconceptions
Opinion
18 Jul 2024
1
Cybercriminals Exploit CrowdStrike Outage Chaos
News
22 Jul 2024
2
Exclusive: Paris 2024 CISO Reveals Cybersecurity Plans for the Olympics
Interview
23 Jul 2024
3
CISA's Jack Cable Discusses US Push for More Secure Software
Interview
15 Jul 2024
4
Chinese Espionage Group Upgrades Malware Arsenal to Target All Major OS
News
23 Jul 2024
5
North Korean Hackers Targeted Cybersecurity Firm KnowBe4 with Fake IT Worker
News
24 Jul 2024
6
The Future of Fraud: Defending Against Advanced Account Attacks
Webinar
18 Jul 2024
1
Mastering IP & Data Security in the Industrial Age
Webinar
27 Jun 2024
2
Experiencing a DDoS Simulation to Enhance Defenses
Webinar
2 May 2024
3
How to Unlock Frictionless Security with Device Identity & MFA
Webinar
11 Apr 2024
4
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
5
How to Proactively Remediate Rising Web Application Threats
Webinar
30 May 2024
6
#Infosec2024: Claire Williams on Leadership, Cultivating a High Performing Team and Overcoming Adversity (video)
Interview
6 Jun 2024
1
#Infosec2024: Navigating the Ransomware Toll on Victims with Jason Nurse (video)
Interview
6 Jun 2024
2
#Infosec2024: Experts Share How CISOs Can Manage Change as the Only Constant
News
6 Jun 2024
3
#Infosec2024: 104 EU Laws Have Different Definitions of Cybersecurity
News
5 Jun 2024
4
Infosecurity Magazine Autumn Online Summit 2024: Day Two
Online Summit
10:00
–
15:00 EDT, 11 Sep 2024
5
Infosecurity Magazine Autumn Online Summit 2024: Day One
Online Summit
09:45
–
15:00 BST, 10 Sep 2024
6