CTEM in Focus: Experts Share Realities of Exposure Management

How Leaders are Operationalizing Continuous Threat Exposure Management to Reduce Breach Risk

  • Cybersecurity leaders emphasized the importance of Continuous Threat Exposure Management (CTEM) in reducing breach risks.
  • Effective CTEM starts with detailed asset inventory and identity management to close common security gaps.
  • Security teams recommended frequent testing—weekly for internal assets and daily for external-facing ones.
  • Success in CTEM is measured by closing exploited attack paths, not just patching vulnerabilities.
  • Clear reporting is required, focusing on risk rather than technical metrics, especially for regulatory compliance and board discussions.

Cybersecurity professionals discussed new approaches to Continuous Threat Exposure Management (CTEM) at the Xposure Summit 2025, focusing on defending complex production environments. Leaders from companies such as IDB Bank, Avidity Biosciences, and Wyndham Hotels and Resorts addressed how operationalizing CTEM can help organizations reduce the risk of breaches.

- Advertisement -

According to research referenced at the event, organizations that put CTEM programs into practice could be three times less likely to experience a security breach by 2026. Experts on the panel stressed, however, that these benefits depend on actually operationalizing CTEM strategies rather than treating them as theoretical solutions.

Panelists highlighted specific steps to make CTEM effective. They recommended starting with asset inventory and identity management, focusing on weak service accounts, over-permissioned users, and outdated logins. They advised weekly checks for internal systems and daily validation for public-facing assets. As Michael Francess from Wyndham Hotels and Resorts noted, "You need to understand your adversaries, simulate their TTPs, and test your defenses against real-world scenarios, not just patching CVEs." This approach shifts the focus from only fixing known vulnerabilities to actively checking whether security controls stop real threats.

In regulated industries such as banking, organizations must answer detailed questions from regulators about their exposure and risk remediation timelines. Alex Delay from IDB Bank said, "You will get challenged on your exposure, your remediation timelines, and your risk treatment. And that’s a good thing. It forces clarity and accountability." Panelists also agreed that boards increasingly want to discuss risk directly, rather than technical scores or vulnerability counts.

For measuring progress, Ben Mead of Avidity Biosciences explained that his team tracks closed attack paths instead of counting vulnerabilities. He shared that exposing and remediating attack paths, such as over-permissioned accounts and forgotten assets, made real risks clearer to senior leaders.

- Advertisement -

Further details from the discussion and the full conversation can be found on the Apple.com/us/podcast/ctem-buzzword-or-reality/id1820920546?i=1000713085733″ rel=”noopener”>Apple Podcast and Spotify platforms.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Hut 8 expands Coinbase credit to $200M, AI deal lifts rally!

Hut 8 expanded a credit facility with Coinbase to $200 million.The company said it...

Warren Buffett Steps Down as CEO; Greg Abel Takes Helm Ahead

Warren Buffett has stepped down as CEO of Berkshire Hathaway, with his final working...

Quantum Solutions posts $4.71M unrealized ETH holdings loss.

Quantum Solutions bought about $20.6 million of Ethereum, holding roughly 5,030 ETH on its...

Phishing losses fall 83% to $83.85M as attacks shift in 2025

Annual phishing losses tied to wallet drainers fell 83% to $83.9 million in 2025.The...

XRP Reality Check: 70% Expect Token to Remain Below $2 in Q1

About 70% of respondents expect XRP to remain under $2 in the near term.Nick...
- Advertisement -

Must Read

Top 8 Best Anonymous Web Hosting Companies That Accept Crypto

Nowadays, there is plenty of information about people online, and malicious people use them to carry out inappropriate activities. If you want to keep...
Bitcoin (BTC) $ 90,290.00 0.64%
Ethereum (ETH) $ 3,112.16 0.21%
XRP (XRP) $ 2.01 1.22%
Bittensor (TAO) $ 251.53 2.72%
Polkadot (DOT) $ 2.13 1.93%
Cardano (ADA) $ 0.387621 0.36%
Chainlink (LINK) $ 13.18 0.38%
Hyperliquid (HYPE) $ 24.74 2.17%
Monero (XMR) $ 435.47 3.79%
Hedera (HBAR) $ 0.119831 0.43%
Toncoin (TON) $ 1.85 2.22%