Article Details
Scrape Timestamp (UTC): 2024-03-12 11:09:35.045
Source: https://thehackernews.com/2024/03/ctem-101-go-beyond-vulnerability.html
Original Article Text
Click to Toggle View
CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management. In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you'd want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security posture, in our opinion, you probably want to consider establishing a Continuous Threat Exposure Management (CTEM) program. CTEM is an approach to cyber risk management that combines attack simulation, risk prioritization, and remediation guidance in one coordinated process. The term Continuous Threat Exposure Management first appeared in the Gartner ® report, Implement a Continuous Threat Exposure Management Program (CTEM) (Gartner, 21 July 2022,). Since then, we have seen that organizations across the globe are seeing the benefits of this integrated, continual approach. Webinar: Why and How to Adopt the CTEM Framework XM Cyber is hosting a webinar featuring Gartner VP Analyst Pete Shoard about adopting the CTEM framework on March 27 and even if you cannot join, we will share an on-demand link, don't miss it! Focus on Areas With the Most Risk But why is CTEM popular, and more importantly, how does it improve upon the already overcrowded world of Vulnerability Management? Central to CTEM is the discovery of real, actionable risk to critical assets. Anyone can identify security improvements in an organization's environment. The issue isn't finding exposures, it's being overwhelmed by them – and being able to know which pose the most risk to critical assets. In our opinion, a CTEM program helps you: With a CTEM program, you can get the "attacker's view", cross referencing flaws in your environment with their likelihood of being used by an attacker. The result is a prioritized list of exposures to address, including ones that can safely be addressed later. The Five Stages of a CTEM Program Rather than a particular product or service, CTEM is a program that reduces cyber security exposures via five stages: CTEM vs. Alternative Approaches There are several alternative approaches to understanding and improving security posture, some of which have been in use for decades. It is our opinion that a CTEM program-based approach offers the advantages of: The Value of CTEM We feel that the CTEM approach has substantial advantages over alternatives, some of which have been in use for decades. Fundamentally, organizations have spent years identifying exposures, adding them to never-ending "to do" lists, expending countless time plugging away at those lists, and yet not getting a clear benefit. With CTEM, a more thoughtful approach to discovery and prioritization adds value by: Getting Started with CTEM Since CTEM is a process rather than a specific service or software solution, getting started is a holistic endeavor. Organizational buy-in is a critical first step. Other considerations include: In our view, with a CTEM program, organizations can foster a common language of risk for Security and IT; and ensure that the level of risk for each exposure becomes clear. This enables the handful of exposures that actually pose risk, among the many thousands that exist, to be addressed in a meaningful and measurable way. For more information on how to get started with your CTEM program, check out XM Cyber's whitepaper, XM Cyber on Operationalizing The Continuous Threat Exposure Management (CTEM) Framework by Gartner®. State of AI in the Cloud 2024 Find out what 150,000+ cloud accounts revealed about the AI surge. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class threat intelligence from Censys Search.
Daily Brief Summary
Continuous Threat Exposure Management (CTEM) is a proposed strategy to effectively manage cyber risks by combining attack simulation, risk assessment, and remediation.
The CTEM framework is becoming increasingly significant as organizations seek an integrated approach to improve security posture and risk management.
XM Cyber highlights the importance of obtaining an "attacker's view" of an environment to prioritize vulnerabilities according to the risk they pose to crucial assets.
A CTEM program operates in five stages to systematically de-escalate cyber threats and is distinguished from other security approaches by its continual, dynamic nature.
Key benefits of CTEM include the ability to effectively prioritize and address the most critical exposures, thereby streamlining and enhancing organizational security efforts.
Establishing a CTEM program requires organizational commitment, a shared understanding of risk, and a prioritization process tailored to an organization's unique needs.
XM Cyber encourages organizations to adopt the CTEM framework and provides further insights in a whitepaper discussing the operationalization of the CTEM framework by Gartner®.