Name
The Scourge of a Legacy Security Infrastructure
Date & Time
Thursday, May 29, 2025, 10:30 AM
Description

Threat actors continue to prey on organizations with slower technology adoption cycles or legacy infrastructure dependencies. These organizations are prime targets for account takeovers and credential harvesting. During this session, we will examine how implementing a modern cybersecurity infrastructure can be achieved working within the varying budget parameters of the SLED community. Provide context that State, Local Government and Educational organizations often exhibit less mature cybersecurity defenses. These organizations feature environments with high user volumes, legacy technology, and fewer security personnel due to budget constraints, making them ideal targets. Demonstrate the importance of a defense in depth approach to cyber defense. This includes boosting user awareness of potential threat tactics and transitioning to modern platforms for critical functions like secure access. Generate awareness for CIS’s specialized expertise to support U.S. State, Local, Tribal, and Territorial (SLTT) entities to augment a defense-in-depth approach for cybersecurity. Many of these cost-effective solutions include 24x7x365 monitoring and management through CIS's Security Operations Center (SOC) as well as incident response support.

Location Name
Meeting Room 2
Full Address
Palmer Events Center
900 Barton Springs Rd
Austin, TX 78704
United States
Session Type
Breakout