Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by ISACA Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ISACA Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

A View into CTEM Exposure Management: Reducing your Attack Surface 3x

43:00
 
Share
 

Manage episode 399737188 series 1391594
Content provided by ISACA Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ISACA Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included.

In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.

For more ISACA Podcasts, visit www.isaca.org/podcasts

To learn more about Nanitor, please visit https://nanitor.com/

To view the Nanitor article, please click https://nanitor.com/resources/blog/cybersecurity/exploring-continuous-threat-exposure-management-ctem/

  continue reading

174 episodes

Artwork
iconShare
 
Manage episode 399737188 series 1391594
Content provided by ISACA Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ISACA Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included.

In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.

For more ISACA Podcasts, visit www.isaca.org/podcasts

To learn more about Nanitor, please visit https://nanitor.com/

To view the Nanitor article, please click https://nanitor.com/resources/blog/cybersecurity/exploring-continuous-threat-exposure-management-ctem/

  continue reading

174 episodes

Minden epizód

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play