The modern threat landscape presents serious challenges to businesses struggling to build their security programs.

While these businesses modernize IT and security programs, the attack surface is proliferating. Security leaders must realize that perimeter defenses no longer cope with the expanded attack surface, leaving gaps in security programs. Only by implementing a new systemic approach can security scale up at a similar pace to ever-growing threats.

For cybersecurity, visibility is critical: security teams must be aware of all risks before they can find a way to reduce them. However, visibility requires a defined strategy and a programmatic approach. That approach should include continuous threat exposure management (CTEM).

What is Continuous Threat Exposure Management?

Gartner defines CTEM as a set of processes and capabilities that enable enterprises to continually evaluate the accessibility, exposure and exploitability of their digital and physical assets.

In short, CTEM is the center that informs governance, risk and compliance (GRC) mandates. Using CTEM, you can build mature, strategic security controls with detection and response capabilities that are always aligned with the business’s risk appetite.

 Figure 1: Continuous Threat Exposure Management (Source: IBM)

The Five Stages of a CTEM Program

A CTEM program is governed by five cyclic stages, where every outcome then repeats the iteration.

Figure 2: Continuous Exposure Management Process Stages (Source: IBM)

1. Scoping

As with any other security program, scoping is the first step. Security teams need to align with different stakeholders on business requirements as well as ultimate impact.

Scoping must address the enterprise’s entire attack surface, both internal and external. Security teams should look beyond vulnerability management programs and consider factors such as external attack surface, digital risk, supply chain, cloud and deep and dark web.

2. Discovery

This step is where security teams inventory assets and risk profiles based on the previous scoping process. During the discovery phase, security teams map assets, vulnerabilities, misconfigurations, technology, logic and risk.

3. Prioritization

The goal of the prioritization is to identify the threats that are most likely to be exploited by adversaries and the level of risk to the enterprise. Security teams should evolve from looking at severity scores to examining exploitability, security controls, topology, risk appetite and overall risk to the enterprise.

4. Validation

During this step, security teams assess exposure by launching controlled simulated or emulated attacks to validate exposure, existing security controls and response and remediation. Testing initial foothold gains, different attack paths and lateral movements are essential.

5. Mobilization

The goal of mobilization is not to find a way to automate remediation but to build a defined process so that teams can operationalize findings with low to no friction. Mobilization also requires merging security automation with IT process automation to maximize efficiency.

In the end, the ultimate goal of the CTEM program stages is to have a clear set of security and risk management programs aligned with business objectives to continuously minimize risk, improve resilience and accelerate collaboration.

CTEM for the Modern Threat Landscape

CTEM is a program that manages increasing threat exposure while considering business priorities. Its iterations allow the enterprise to continuously monitor, prioritize, validate, remediate and optimize its security exposure.

Security teams should take a phased approach to CTEM, leveraging existing and new technology to support it. Ultimately, the ability to mobilize different stakeholders will ensure success.

Looking ahead, Gartner predicts that by 2026, organizations prioritizing their security investments based on a continuous exposure management program will be three times less likely to suffer from a breach.

More from Risk Management

The Role of Human Resources in Cybersecurity

The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their access to employees at the start of employment is an opportunity to lay a foundation for a culture of risk awareness. HR departments do not typically include cybersecurity risk awareness training with new hire onboarding, but it’s something…

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…