Sunsetting legacy Cybersecurity Process for Better Optimization and Security Modernization

Patrick Greenwood
5 min readSep 19, 2022

The idea of “if it isn’t broken, don’t fix it” should not apply to cybersecurity. Most organizations develop three to five-year phasing plans for most IT and cyber products to align with the manufacturer’s end-of-development, end-of-support, and end-of-life product life cycles and keep up with the latest security risks.

--

--

Patrick Greenwood

Patrick Greenwood, is a fictional writer, award winning podcaster, blogger, and global cyclist.