Moving from Vulnerability Management to Exposure Management
by MJ Kaufmann Released August 2024 Publisher(s): O'Reilly Media, Inc. ISBN: 9781098173234
Exposure management is a set of processes that gives enterprises the awareness to continually and consistently evaluate the visibility, accessibility, and vulnerability of their digital assets. Today's organizations must handle a broader range of exposures, including those posed by modern application development. No longer can they rely on the outdated practice of searching for known vulnerabilities.
This report helps prepare security professionals to make that shift. Topics include:
- What are vulnerability management and exposure management, and how are they different?
- Why technological changes in how applications are developed and deployed have outdated the vulnerability management processes that security teams have relied on for the past two decades
- What is continuous threat exposure management (CTEM) and how to put a CTEM program in place?
- A roadmap for implementing exposure management and a framework for measuring the resulting improvements in security maturity
MJ Kaufmann, Founder and Principal Consultant at Write Alchemist, holds a master's degree in Information Security (MSIS). With more than two decades of practical IT expertise, her experience ranges from trailblazing enterprise-level projects to ghostwriting for global tech giants and shaping the next generation of IT professionals.
1. Introducing Vulnerability Management
- A Brief History of Vulnerability Management
- Tracking Vulnerabilities
- Understanding CVEs
- Understanding CVSS Scores
- Modern Approaches
- The Challenges of Vulnerability Management
- Alert Overflow
- Reliance on Agent-Based or Agentless Solutions
- Limited Visibility
- Challenges Detecting Misconfigurations
- Complexity
- Lack of Timely Updates
2. Introducing Exposure Management
- What Is Exposure Management, and Why Was It Created?
- Contrasting Vulnerability Management and Exposure Management
- What Is Continuous Threat Exposure Management? (CTEM)
- Strategically Defining Cybersecurity Scopes
- Evaluating Your Technology Stack for Optimal CTEM Integration
- Developing a Strategic Plan for Transition
- The Phases of a CTEM Transition Plan
- Building the Ideal Team for CTEM Success
- Embracing a Proactive Future
No Errata Yet!