Moving from Vulnerability Management to Exposure Management

Book description

Exposure management is a set of processes that gives enterprises the awareness to continually and consistently evaluate the visibility, accessibility, and vulnerability of their digital assets. Today's organizations must handle a broader range of exposures, including those posed by modern application development. No longer can they rely on the outdated practice of searching for known vulnerabilities.

This report helps prepare security professionals to make that shift. Topics include:

  • What are vulnerability management and exposure management, and how are they different?
  • Why technological changes in how applications are developed and deployed have outdated the vulnerability management processes that security teams have relied on for the past two decades
  • What is continuous threat exposure management (CTEM) and how to put a CTEM program in place?
  • A roadmap for implementing exposure management and a framework for measuring the resulting improvements in security maturity

MJ Kaufmann, Founder and Principal Consultant at Write Alchemist, holds a master's degree in Information Security (MSIS). With more than two decades of practical IT expertise, her experience ranges from trailblazing enterprise-level projects to ghostwriting for global tech giants and shaping the next generation of IT professionals.

Table of contents

  1. 1. Introducing Vulnerability Management
    1. A Brief History of Vulnerability Management
    2. Tracking Vulnerabilities
      1. Understanding CVEs
      2. Understanding CVSS Scores
      3. Modern Approaches
    3. The Challenges of Vulnerability Management
      1. Alert Overflow
      2. Reliance on Agent-Based or Agentless Solutions
      3. Limited Visibility
      4. Challenges Detecting Misconfigurations
      5. Complexity
      6. Lack of Timely Updates
  2. 2. Introducing Exposure Management
    1. What Is Exposure Management, and Why Was It Created?
    2. Contrasting Vulnerability Management and Exposure Management
      1. Approach to Analysis
      2. Visibility
      3. Complexity
    3. What Is Continuous Threat Exposure Management? (CTEM)
  3. 3. The CTEM Framework
    1. Understanding the Five Phases of CTEM
      1. Scoping
      2. Discovery
      3. Prioritization
      4. Validation
      5. Mobilization
    2. The CTEM Tech Stack
      1. Technology for Scoping
      2. Technology for Discovery
      3. Technology for Prioritization
      4. Technology for Validation
      5. Technology for Mobilization
    3. Assembling the Pieces
  4. 4. Implementing CTEM
    1. Strategically Defining Cybersecurity Scopes
      1. Essential Steps for Effective Scope Identification
      2. Tailoring Cybersecurity Scopes to Your Organization’s Needs
    2. Evaluating Your Technology Stack for Optimal CTEM Integration
      1. Performing a Comprehensive Analysis of Your Current Cybersecurity State
      2. Conducting Thorough Vulnerability and Compliance Audits
      3. Maximizing CTEM Efficiency Through Strategic Integration
    3. Developing a Strategic Plan for Transition
    4. The Phases of a CTEM Transition Plan
      1. Initial Planning and Assessment Phase
      2. Pilot-Testing Phase
      3. Full-Scale Implementation Phase
      4. Optimization and Continuous Improvement Phase
      5. Managing Organizational Change During CTEM Implementation
    5. Building the Ideal Team for CTEM Success
      1. Defining Key Roles and Responsibilities
      2. Enhancing Skills and Training
      3. Optimizing Team Structure
    6. Embracing a Proactive Future
  5. About the Author

Product information

  • Title: Moving from Vulnerability Management to Exposure Management
  • Author(s): MJ Kaufmann
  • Release date: August 2024
  • Publisher(s): O'Reilly Media, Inc.
  • ISBN: 9781098173234