Filter By Topic
From Supply Chain to Store: How to Protect Your Retail Operations
Modern devices like beacons, sensors, interactive kiosks, inventory robots, and point of sale devices are transforming the way retailers do business. But they also create an expanded attack surface which attackers can exploit. So, how do you find all these devices across your entire footprint – from your supply chains to stores to corporate offices – so you can secure them? Join The Home Depot CISO Stephen Ward and Armis CISO Curtis Simpson for a discussion of these challenges and how to ensure your entire footprint is secure.
Armis & ServiceNow Close the Managed, Unmanaged, and IoT Device Visibility Gap
Having an asset inventory you can trust is a critical component for any IT or security team’s success. But with so many devices in your environment today, many of which traditional asset management and security products can’t even see, it’s hard to know what’s there–and what’s not. Join us to learn more about how our integration with ServiceNow enables joint customers to deploy comprehensive asset management at scale, easily, and quickly with ServiceNow; leverage Armis to gain visibility to IoT/OT, managed and unmanaged devices, and use ServiceNow to improve their security and operations posture; and monitor device activity to true-up their Service Graph and CMDB with new device details.
How Close to the Internet Is Your Manufacturing Infrastructure?
When connected devices and sensors run from the factory floor to the distribution centers and the board room, we can no longer remain focused on IT and OT systems separately in our security strategy. Managed, unmanaged and IoT devices all connected to the same networks are as little as two hops from the Internet. Coupled with the number of high profile vulnerabilities recently disclosed which impact hundreds of millions of unmanaged and IoT devices, attackers see one large enterprise, with many possible attack vectors and pivot points. Security teams today need the ability to monitor all vectors and all devices that might be used as part of an industrial attack kill chain. Join Curtis Simpson, Chief Information Security Officer at Armis, as he discusses the security challenges faced by modern industrial enterprises, recent vulnerabilities & areas of exposure, and the changes needed to protect the modern OT environment.