Legacy networks were built as isolated systems creating hidden vulnerabilities as operations digitally transform.