BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260505T005214Z
DESCRIPTION:Legacy systems continue to power critical operations across industries, but they also represent one of the most exposed and difficult-to-secure parts of the IT environment. When upgrades aren’t feasible, and patching isn’t an option, organizations are left navigating a growing gap between operational continuity and modern cyber threats. In this 20-minute session, Charles Everette, Field CISO at ESET and CISO of Ft. Lauderdale , will cover how organizations can secure legacy and end-of-life systems without disruption.\nYou’ll learn:\n• Why legacy systems are increasingly targeted - and how attackers exploit them\n• Practical approaches to protecting unpatchable and air-gapped environments\n• How long-term support strategies reduce risk while maintaining operational continuity\n
DTSTART:20260528T170000
DTEND:20260528T180000
DTSTAMP:20260505T005214Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: You can’t replace it – so how do you secure it? Cyber resilience for legacy systems
TRANSP:OPAQUE
UID:0b83087a689ea8299077b2b95e90e30f Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
