By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Between Buzz and Reality: The CTEM Conversation We All Need
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Between Buzz and Reality: The CTEM Conversation We All Need
Computing

Between Buzz and Reality: The CTEM Conversation We All Need

News Room
Last updated: 2025/06/24 at 9:18 AM
News Room Published 24 June 2025
Share
SHARE

Jun 24, 2025Ravie LakshmananThreat Exposure Management

I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk security, they live it.

Let me introduce them.

Alex Delay, CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead, Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity’s targeted RNA therapeutics. Last but not least, Michael Francess, Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments.

Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here’s the kicker – only if it’s operationalized.

Speaking with these seasoned defenders, we unpacked the realities and challenges behind the hype of implementing and operationalizing an effective Exposure Management strategy, addressing the following tough questions:

  • What does a good CTEM program look like and what are the typical challenges that need to be overcome?
  • How do you optimize cyber and risk reporting to influence board-level decisions?
  • And ultimately, how do you measure the success of your CTEM program?

Challenges, Priorities, and Best Practices

CTEM isn’t plug-and-play. The panelists’ prescription was clear: start with asset inventory and identity management; weak service accounts, over-permissioned users, legacy logins. None of these are small gaps, they’re wide-open doors that need to be checked frequently. And for all of our panelists, frequency matters – a lot. Because guess what? Adversaries are constantly challenging defenses too. For internal assets, weekly validation is the rule of thumb. For external-facing assets? Daily. As they see it, it’s the only way to maintain a constant handle over their constantly changing environments.

Surprisingly, Michael pointed to threat intelligence as the backbone of any security testing program. “You need to understand your adversaries, simulate their TTPs, and test your defenses against real-world scenarios, not just patching CVEs.” That’s the key difference between CTEM and vulnerability management. Vulnerability management is about patching. Exposure management is about figuring out whether your controls actually work to block threats.

Reporting: Translating Cyber to Risk Terms

In the banking industry, like many other highly regulated industries, Alex couldn’t emphasize enough the need to be prepared to answer hard questions asked from regulators. “You will get challenged on your exposure, your remediation timelines, and your risk treatment. And that’s a good thing. It forces clarity and accountability”.

But even outside regulated industries, the conversation is changing. Boards do not want to hear about CVSS scores. They want to understand risk – and that’s a completely different discussion. Is the company’s risk profile going up or down? Where is it concentrated? And what are we doing about it?

Measuring Progress

Success in CTEM isn’t about counting vulnerabilities; Ben pinned it down when he said he measures the number of exploited attack paths his team has closed. He shared how validating attack paths revealed risky security gaps, like over-permissioned accounts and forgotten assets. Suddenly, risk becomes visible.

Others took it in another direction with tabletop exercises that walk leadership through real

attack scenarios. It’s not about metrics, it’s about explaining the risk and the consequences. A shift that moves the discussion from noise to signal, and gives the business clarity on what matters: where we’re exposed, and what we’re doing about it.

From Concept to Action

Want to hear how these defenders are putting CTEM into action without drowning in noise?

This episode dives deep into the real questions: where do you start, how do you stay focused on what’s exploitable, and how do you connect it all to business risk? You’ll hear first-hand how security leaders like Alex, Ben, and Michael are tackling these challenges head-on, with a few surprises along the way…

🎧Make sure to catch the full conversation on Apple Podcast and Spotify

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google could be forced to change UK search as watchdog takes steps
Next Article Kelce splashes out on private helicopter for Hamptons golf day after Swift date
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple’s Invites app just added a lot more backgrounds for your events – 9to5Mac
News
Anthropic wins ruling on AI training in copyright lawsuit but must face trial on pirated books
News
Intel Graphics Compiler 2.12.5 Brings Fixes, C++20 Compatibility Updates
Computing
AI Note-Taking Startup Abridge Raises $300M As Tech To Reduce Physician Burnout Gains Traction
News

You Might also Like

Computing

Intel Graphics Compiler 2.12.5 Brings Fixes, C++20 Compatibility Updates

1 Min Read
Computing

Black Myth: Wukong tops IGN’s 2024 game of the year poll · TechNode

1 Min Read
Computing

The Uprooting of a Community – Knock LA

15 Min Read
Computing

GEAR: The Mental Model That Separates Scalers from Strugglers | HackerNoon

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?