Select your country

Not finding what you are looking for, select your country from our regional selector:

Søk

Cyber Chitchat: why security pros are transitioning from Vulnerability Management to CTEM

In the ever-evolving world of cybersecurity, vulnerability management is no longer enough. Organizations need a more proactive, continuous approach to identifying and mitigating threats before they can be exploited. That’s where Continuous Threat Exposure Management (CTEM) comes in. To dig into this shift, we sat down with Nicholas King, a cybersecurity expert with over 20 years of experience, to discuss why CTEM is gaining traction and what it means for security teams today.

Introducing Nicholas King

I’m Nicholas King and I’m a Global Product Manager at Orange Cyberdefense, specializing in CTEM. I have over 20 years of experience in security.

Throughout my career, I have been analytical and critical of cybersecurity practices, especially in terms of prioritization. CTEM addresses many issues that have been under-prioritized in the past, which is why I am passionate about its potential to change our customers' approach to security.

How does CTEM differ from traditional vulnerability management, and why is it a natural evolution in modern security strategies?

N.K.: Anyone who has consumed a vulnerability management service or technology knows its limitations. Firstly, you're running scans, most often weekly or monthly. Secondly, you're looking for CVEs (Common Vulnerabilities and Exposures). Thirdly, you're looking at where your assets and infrastructure are. Over the last 10 years, this has shifted dramatically.

Most compromises and breaches now don't always include a CVE; they may involve misconfigurations or other risks. For example, if your credentials were stolen and used to access your Sharepoint or OneDrive, that’s a significant risk.

Traditional vulnerability management often lacks the ability to account for these kinds of exposures. CTEM addresses the need for continuous monitoring, rather than relying solely on periodic scans. This shift to continuous monitoring is transformative, as it ensures that priorities are always current and can adapt swiftly to new threats and changes in the environment.

Furthermore, vulnerability management typically focuses on identifying CVEs and associated risks based on infrequent assessments. CTEM, however, emphasizes the importance of continuous and real-time data analysis. It enables organizations to maintain an up-to-date understanding of their security posture, including configurations and misconfigurations that may pose risks.

How does adopting a CTEM strategy translate into tangible benefits for organizations?

A significant advantage of CTEM is its comprehensive approach to vulnerability prioritization through validation. Using industry-leading scanners and threat feeds, CTEM goes beyond merely identifying theoretical vulnerabilities. It evaluates the practical implications of these vulnerabilities by analyzing the intricate relationships and potential attack paths within an organization's infrastructure.

Validation within CTEM allows security teams to discern whether a vulnerability genuinely poses a risk, leading to more effective prioritization and accurate risk assessments. By comprehensively understanding the context and connections between assets and vulnerabilities, organizations can move beyond the limitations of traditional vulnerability management, which often results in lengthy lists of CVEs without adequate contextual insight.

Vulnerability management often doesn't account for these kinds of exposures. CTEM addresses the need for continuous monitoring, not just periodic scans. “Continuous” changes everything: you're always aware of your priorities, which can shift rapidly. It’s not about just having fewer vulnerabilities; it’s about understanding and mitigating actual threats, which provides peace of mind and a sense of achievement for the team.

Traditional Vulnerability Management focuses on patching vulnerabilities based on severity scores. How does CTEM improve risk-based prioritization?

N.K.: A continuous and proactive approach enables us to confidently inform customers where they need to focus their efforts. Traditional methods involve scanning and reporting vulnerabilities, whereas CTEM examines real-time data and the relationships between exposures. For instance, a vulnerability might not be a risk if isolated from other systems. However, if a network port is opened and exposes the system, CTEM can swiftly identify and notify of this new risk. This facilitates more precise focus and timely remediations, reducing potential exposure beyond just vulnerability patching.

Adopting a CTEM strategy translates into tangible benefits for organizations. CTEM allows organizations to allocate their resources more effectively. Rather than managing endless lists of vulnerabilities, CTEM helps in understanding and prioritizing real risks. This enables security teams to clearly communicate their security posture to the board or CIO. The goal is not merely to have fewer vulnerabilities but to comprehend and mitigate actual threats, which provides peace of mind and a sense of accomplishment for the team.

With CTEM, we can see all the different relationships and attack paths, including configurations and misconfigurations.

CTEM emphasizes a more continuous and proactive approach. Can you share an example of how organizations can reduce exposure beyond just vulnerability patching?

N.K.: CTEM's continuous and proactive approach is pivotal. Traditional methods, which scan and report vulnerabilities, are superseded by CTEM's real-time analysis of data and relationships between exposures. For instance, a vulnerability may pose no risk if isolated from other systems. However, should a network port open and expose the system, CTEM swiftly identifies and informs of the emerging risk, facilitating precise focus and timely remediations.

Transitioning to CTEM involves key steps. Initially, understanding the location of assets and data is crucial. As data moves from on-premises to the cloud, new risks are introduced. CTEM begins with scoping to map out where everything is, followed by discovery to identify risks and exposures. Validation helps prioritize these risks, while mobilization ensures actions are taken to mitigate them. This continuous cycle supports ongoing improvement of the security posture.

However, if a network port is opened and exposes the system, CTEM can quickly identify and inform you of the new risk. This allows for more accurate focus and timely remediations.

With evolving regulations like NIS2 and DORA, how can a CTEM-driven approach help companies stay compliant while improving security posture?

N.K.: That is a very interesting question. It is argued that having a service that delivers a continuous view of your threat exposures through attack paths analysis or breach attack simulation will replace the need for regulatory required pentests. According to Gartner in their 2024 Strategic Roadmap for Managing Threat Exposure report, “Through 2028, validation of threat exposures by implementing or assessments with security controls deployed will be an accepted alternative to penetration testing requirements in regulatory frameworks."

For CISOs looking to adopt CTEM, where should they start?

N.K.: Start by assessing your current security posture. Ask yourself: do we know what our most critical assets are? Are we prioritizing vulnerabilities based on actual exploitability? Do we have visibility into our attack surface beyond what’s covered in traditional vulnerability scans? Once you have these answers, the next step is to bring in the right tools and expertise to transition from a reactive to a proactive security model.

Transitioning to CTEM requires a methodical approach. Initially, comprehending the location of all assets and data is crucial, especially as data migrations from on-premises environments to the cloud present new risks. The process begins with scoping to map out all elements, followed by a discovery phase to identify potential risks and exposures. Validation then helps prioritize these risks based on their significance, and mobilization ensures that appropriate actions are taken to mitigate them. This ongoing cycle of assessment and improvement is key to maintaining and enhancing the security posture over time.

It’s a continuous cycle that helps improve your security posture over time.

Conclusions

CTEM represents a significant evolution in cybersecurity, addressing the limitations of traditional vulnerability management with a more dynamic and continuous approach.

Orange Cyberdefense is ready to guide and support your organization through this critical transition from traditional vulnerability management to CTEM. With our expertise and advanced solutions, we ensure that your security posture is continuously monitored and improved, protecting against emerging threats. Reach out to us to learn more about how we can accompany you in adopting CTEM and transforming your cybersecurity strategy.

Stay tuned for more insights and updates on CTEM from industry experts as we continue to explore the future of cybersecurity.

Nicholas King
Global Product Manager

About the author

Nicholas King is a Global Product Manager at Orange Cyberdefense, specializing in Continuous Threat Exposure Management (CTEM). He has over 20 years of experience in the field of security.

Incident Response Hotline

Står du overfor en cyberhendelse akkurat nå?

 

Kontakt vår globale 24/7/365 tjeneste incident response hotline.