 Hello everyone, welcome back to the managed risk across your extended attack service area with Armus asset intelligence platform. I'm John Furrier, host we're here with the CISO perspective. Alex Shuckman, who is the CISO of Colgate Colgate Palmol of company, Alex, thanks for coming on. Thanks for having me. You know, unified visibility across the enterprise surface area is about knowing what you gotta protect. You can't protect what you can't see. Tell me more about how you guys are able to centralize your view with network assets with Armus. Yeah, I think the most important part of any security program is really visibility. And that's one of kind of the building blocks when you're building a security program. You need to understand what's in your environment, what's, what you control, what is being introduced new into the environment. And that's really what any solution that gives you full visibility to your infrastructure, to your environment, to all the assets that are there, that's really one of your bread and butter pieces to your security program. What's been the impact on your business? You know, I think from an IT point of view, running the security program, you know, our key thing is really enabling the business to do their job better. So if we can give them visibility into all the assets that are available in their individual environments, and we're doing that in an automated fashion with no manual collection, you know, that's yet another thing that they don't have to worry about. And then we're delivering because really IT is an enabler for the business. And then they can focus really on what their job is, which is to deliver product. And a lot of changes in their network, you got infrastructure, you got IoT devices, OT devices. So vulnerability management becomes more important. It's been around for a while, but it's not just IT devices anymore, they're gaps in vulnerability across the OT network. What can you tell us about Colgate's use of Armistice vulnerability management? What can you see now? What couldn't you see before? Can you share your thoughts on this? Yeah, I think what's really interesting about the kind of manufacturing environments today is if you look back a number of years, most of the manufacturing equipment was really disconnected from the internet. It was really running in silos. So it was very easy to protect equipment that isn't internet connected. You could put a firewall, you could segment it off, and it was really on an island on its own. Nowadays, you have a lot of IoT devices, you have a lot of internet connected devices, sensors providing information to multiple different suppliers or vendor solutions. And you have to really then open up your ecosystem more, which of course means you have to change your security posture and you really have to embrace if there's a vulnerability with one of those suppliers, then how do you mitigate the risk associated to vulnerability? Armistice really helps us get a lot of information so that we can then make a decision with our business teams. That whole operational aspect of criticality is huge. How on the assets, knowing what's the key, how does that change the security workload for you guys? Yeah, for us, I mean, it's all about being efficient. If we can have the visibility across our manufacturing environments, then my team can easily consume that information. We spend a lot of time trying to digest the information, trying to process it, trying to prioritize it, that really hurts our efficiency as a team or as a function. What we really like is being able to use technology to help us do that work. We're not an IT shop, we're a manufacturing shop, but we're a very technical shop so that we like to drive everything through automation and not be a bottleneck for any of the actions that take place. You know, the old expression is the juice worth the squeeze. It comes up a lot when people are buying tools around vulnerability management and all this stuff. So SaaS solution is key with no agents to deploy, they have that. Talk about how you operationalize ARMIS in your environment, how quickly did it achieve time to value? Take us through that consumption of the product and what was the experience like? Yeah, I'll definitely say in the security ecosystem that's one of the biggest promises you hear across the industry. And when we started with ARMIS, we started with a very small deployment and we wanted to make sure if it was really worth the lift to your point. We implemented the first set of plants very quickly, actually even quicker than we had put in our project plan which is not typical for implementing complex security solutions. And then we were so successful with that we expanded to cover more of our manufacturing plants and we were able to get really true visibility across our entire manufacturing organization in the first year with the ability to also say that we extended that information, that visibility to our manufacturing organization and they could also consume it just as easily as we could. That's awesome. How many assets did you guys discover? Just curious on the numbers. Oh, that's the really interesting part. Before we started this project, we would have had to do a manual audit of our plants which is typical in our industry. When we started this project and we put in estimates, we really didn't have a great handle on what we were going to find. And what's really nice about the ARMS solution is it's truly giving you full visibility. So you're actually seeing besides the servers and the PLCs and all the equipment that you're familiar with, you're also connecting it to your wireless access points, you're connecting it to see any of those IoT devices as well and then you're really getting full visibility through all the integrations that they offer. You're amazed how many devices you're actually seeing across your entire ecosystem. It's like Google Maps for your infrastructure, you got a little street view, you want to look at it, you have to get the fake tree in there, whatever. But it gives you the picture. That's key. Correct. With a nice visualization and an easy search engine similar to your Google analogy, everything is really at your fingertips. If you want to find something, you just go to the search bar, click a couple entries and boom, you get your list of the associated devices or the associated locations devices. Well, Alfred, I appreciate your time. I know you're super busy at CSIC, a lot of your plate. Thanks for coming on and sharing, appreciate it. No problem, John. Thanks for having me.