Artwork

Content provided by Searchlight Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Searchlight Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

18. ASM in the Age of CTEM

56:28
 
Share
 

Manage episode 490579832 series 3550088
Content provided by Searchlight Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Searchlight Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

This month's episode of The Dark Dive revisits the topic of Attack Surface Management. In particular, how it relates to a relatively new cybersecurity term, CTEM: Continuous Threat Exposure Management.

In a lively discussion, guests Michael Gianarakis and Ben Jones help define CTEM, a security process that has quickly gained traction thanks to being championed by the analyst firm Gartner. They debate what CTEM adds to cybersecurity, how it builds on previously established concepts, and where ASM and threat intelligence play a role in the process.

Along the way, Michael and Ben give practical advice for how organizations should be implementing CTEM, including common pitfalls to avoid and ways that security teams can measure the success and maturity of their CTEM program.

This episode ties in with the new e-book published by Searchlight Cyber, "ASM in the age of CTEM", which you can download here for free: https://slcyber.io/ebooks/asm-in-the-age-of-ctem/

Want to find out more or have a suggestion for future podcast episodes?

Email: [email protected]

Website: www.slcyber.io

LinkedIn: www.linkedin.com/company/searchlight-cyber

X: www.twitter.com/SLCyberSec

Weekly newsletter: www.slcyber.io/beacon/

  continue reading

19 episodes

Artwork
iconShare
 
Manage episode 490579832 series 3550088
Content provided by Searchlight Cyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Searchlight Cyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

This month's episode of The Dark Dive revisits the topic of Attack Surface Management. In particular, how it relates to a relatively new cybersecurity term, CTEM: Continuous Threat Exposure Management.

In a lively discussion, guests Michael Gianarakis and Ben Jones help define CTEM, a security process that has quickly gained traction thanks to being championed by the analyst firm Gartner. They debate what CTEM adds to cybersecurity, how it builds on previously established concepts, and where ASM and threat intelligence play a role in the process.

Along the way, Michael and Ben give practical advice for how organizations should be implementing CTEM, including common pitfalls to avoid and ways that security teams can measure the success and maturity of their CTEM program.

This episode ties in with the new e-book published by Searchlight Cyber, "ASM in the age of CTEM", which you can download here for free: https://slcyber.io/ebooks/asm-in-the-age-of-ctem/

Want to find out more or have a suggestion for future podcast episodes?

Email: [email protected]

Website: www.slcyber.io

LinkedIn: www.linkedin.com/company/searchlight-cyber

X: www.twitter.com/SLCyberSec

Weekly newsletter: www.slcyber.io/beacon/

  continue reading

19 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play