Book description
Exposure management is a set of processes that gives enterprises the awareness to continually and consistently evaluate the visibility, accessibility, and vulnerability of their digital assets. Today's organizations must handle a broader range of exposures, including those posed by modern application development. No longer can they rely on the outdated practice of searching for known vulnerabilities.
This report helps prepare security professionals to make that shift. Topics include:
- What are vulnerability management and exposure management, and how are they different?
- Why technological changes in how applications are developed and deployed have outdated the vulnerability management processes that security teams have relied on for the past two decades
- What is continuous threat exposure management (CTEM) and how to put a CTEM program in place?
- A roadmap for implementing exposure management and a framework for measuring the resulting improvements in security maturity
MJ Kaufmann, Founder and Principal Consultant at Write Alchemist, holds a master's degree in Information Security (MSIS). With more than two decades of practical IT expertise, her experience ranges from trailblazing enterprise-level projects to ghostwriting for global tech giants and shaping the next generation of IT professionals.
Table of contents
- 1. Introducing Vulnerability Management
- 2. Introducing Exposure Management
- 3. The CTEM Framework
- 4. Implementing CTEM
- About the Author
Product information
- Title: Moving from Vulnerability Management to Exposure Management
- Author(s):
- Release date: August 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098173234
You might also like
book
Attack Surface Management
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is …
book
Unveiling the NIST Risk Management Framework (RMF)
Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples …
book
Executive’s Cybersecurity Program Handbook
Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits …
article
Three Ways to Sell Value in B2B Markets
As customers face pressure to reduce costs while maintaining profitability, value-based selling (VBS) has become critical …