Roundtable: Security
Roundtable: Security
What if you wore a hacker’s shoes?
Security teams have their work cut out for them. They have sprawling IT estates to patrol, some of which will be composed of legacy systems. Where should they begin, and what should receive priority? As this roundtable of security professionals heard, a risk assessment is probably the best place to start.