A large percentage—maybe all—of the identified security events could have been precluded by the appropriate application of currently available good practices and security technology. |
Few legacy systems have simple, easily applied fixes. They normally require assessment, risk evaluation, development of solutions where appropriate, testing, and ongoing attention. |
For those interested and with value to add, we'd like them to participate in the standards work themselves. In addition to all the sessions, we're providing immediate practical how-to stuff. |