It’s really difficult to facilitate digital transformation with legacy systems. But, sensitive data must be protected, even if it is located on legacy systems. In this sense, IT might have to operate at two speeds. New applications can always be deployed without affecting underlying systems.