chevron-down Created with Sketch Beta.

What’s Lurking Back There: Cybersecurity Risks in Legacy Systems

A legacy system is a system, which may be in use, but is outdated or no longer supported by the developer. Legacy system threats are pervasive across many industries - corporations, infrastructure, government, and financial services. Examples of data breaches that can be traced back to legacy system vulnerabilities include Equifax, Home Depot, and OPM. We will discuss the risks associated with legacy systems, including patching and updates. We will also evaluate best practices for managing legacy system risks while adopting new technology, including due diligence and integration with interconnected systems.

Tsui S. Ng, Jordan Fischer, Candace Jones, Michael Fleming, David Flint, and Lisa Lifshitz

Access Exclusive Benefits

Members unlock unlimited content, networking opportunities, publications and more.

  • Business Law Section
  • CL1804SPR - 2018 Business Law Section Spring Meeting