Skip to Content
Moving from Vulnerability Management to Exposure Management
book

Moving from Vulnerability Management to Exposure Management

by MJ Kaufmann
August 2024
Beginner to intermediate content levelBeginner to intermediate
52 pages
1h 19m
English
O'Reilly Media, Inc.
Book available
Content preview from Moving from Vulnerability Management to Exposure Management

Chapter 3. The CTEM Framework

CTEM operates through a sequence of five interconnected phases designed to systematically manage and mitigate risks associated with cyber threats. The CTEM process begins with identifying and assessing vulnerabilities and builds toward prioritization and mitigation strategies optimized for the organization and its threats.

The CTEM phases create a dynamic, iterative process that addresses current security threats and prepares for potential future vulnerabilities. In this chapter, we will discuss the phases of the CTEM framework. We will also examine the CTEM technology stack and look at the technologies that are used for each phase of work.

Understanding the Five Phases of CTEM

Each CTEM phase serves a specific function:

Scoping

Building the scope and defining context

Discovery

Discovering potential threats

Prioritization

Prioritizing risks

Validation

Validating risks

Mobilization

Mobilizing for mitigation

Let’s take a look at each phase in turn.

Scoping

The scoping phase lays the groundwork for the entire threat exposure management initiative, setting out clear objectives and engaging key stakeholders to ensure that the organization’s threat exposure management efforts are well-defined, strategically aligned, and poised for success.

In this phase, organizations identify and define the scope of their CTEM initiative, including which assets, systems, and environments will be included in their overall assessment and mitigation efforts ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Effective Vulnerability Management

Effective Vulnerability Management

Chris Hughes, Nikki Robinson
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9781098173241