Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CTEM conversations we all need
Identity

CTEM conversations we all need

userBy userJune 24, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananThreat Exposure Management

There was honor of hosting the first episode of Xposure Podcast Live from Xposure Summit 2025. And we couldn’t ask for a better kickoff panel.

Let me introduce them.

Alex Delay, CISO at IDB Bank, knows what it means to advocate for a highly regulated environment. Ben Mead, director of cybersecurity at Avidity Biosciences, brings a pioneering security perspective that reflects the innovations behind Avidity’s target RNA therapies. Lastly, Michael Fransess, director of cybersecurity advanced threats at Wyndham Hotels and Resorts, is leading the responsibility to protect the franchise. Each of them brought a unique perspective to a common challenge. Apply continuous threat exposure management (CTEM) to complex production environments.

Gartner made waves in 2023 with bold predictions. Organizations that prioritize CTEM are three times less likely to violate by 2026.

Speaking to these veteran defenders, we unraveled the reality and challenges behind the hype of implementing and operating effective exposure management strategies.

What does a good CTEM program look like and what are the typical challenges you need to overcome? How can I optimize cyber and risk reporting to influence board-level decisions? And ultimately, how do you measure the success of your CTEM program?

Issues, priorities, and best practices

CTEM is not plug and play. The panelist’s prescription was clear. Start with asset inventory and identity management. Weak service accounts, authorized users, legacy logins. None of these are small gaps, they are wide open doors that need to be checked frequently. And for all of our panelists, frequency is important. What do you think it is? The enemies are always trying. For internal assets, weekly verification is a rule of thumb. What about external assets? every day. As they see it, it is the only way to maintain a constant handle over their ever-changing environment.

Surprisingly, Michael pointed out threat intelligence as the backbone of his security testing program. “We need to understand the enemy, simulate TTPS and patch CVEs as well as test defenses against real scenarios.” This is the key difference between CTEM and vulnerability management. Vulnerability management is about patching. Exposure management is about understanding whether your control actually works to block threats.

Report: Translate Cyber ​​into risk terminology

In the banking industry, like many other highly regulated industries, Alex couldn’t fully emphasize the need to prepare to answer the harsh questions asked by regulators. “You’re going to be challenging exposure, repair timelines, risk treatment. That’s good. It enforces clarity and accountability.”

But even outside of regulated industries, the conversation is changing. The board doesn’t want to hear about the CVSS score. They want to understand the risks – that’s a completely different argument. Is the company’s risk profile rising? Where are you focused? And what are we doing about it?

Measure progress

Success in CTEM is not about counting vulnerabilities. Ben pinned it when he said he would measure the number of abused attack passes that his team closed. He shared how validation of the attack path revealed dangerous security gaps, such as permitted accounts and forgotten assets. Suddenly, you start to see the risk.

Others took it in a different direction with a tabletop exercise walking real leadership

Attack scenario. It’s not about metrics, it’s about explaining risks and outcomes. Move the discussion from noise to signal and give business clarity about what’s important.

From concept to action

Want to hear how these defenders are running CTEM without being owned by noise?

This episode dives deep into the real questions. Where do you start, how do you stay focused on what is exploitable, and how do you tie it all to business risk? We hear firsthand how security leaders like Alex, Ben and Michael are tackling these challenges head on, and how they tackle some surprises along the way…

Make sure you fully catch conversations on Apple Podcasts and Spotify

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNational BioSecurity Centre to Protect the People from Animal Diseases
Next Article Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers
user
  • Website

Related Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

June 24, 2025

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

June 24, 2025

Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Amazon will spend more than $4 billion to expand its major delivery to rural US communities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.