<?xml version="1.0" encoding="utf-8" ?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:tt="http://teletype.in/" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"><title>Snarky Security</title><subtitle>Trust No One, Especially Not Us… Because We Know That Nothing Is Truly Security</subtitle><author><name>Snarky Security</name></author><id>https://teletype.in/atom/snarky_security</id><link rel="self" type="application/atom+xml" href="https://teletype.in/atom/snarky_security?offset=0"></link><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><link rel="next" type="application/rss+xml" href="https://teletype.in/atom/snarky_security?offset=10"></link><link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></link><updated>2026-04-16T18:45:40.010Z</updated><entry><id>snarky_security:ARBli4R0brJ</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/ARBli4R0brJ?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM Alternatives: Because There's Always a Plan B</title><published>2024-07-25T16:01:04.344Z</published><updated>2024-07-25T16:01:04.344Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">There are alternatives to CTEM that might be better suited to certain organizations or scenarios:</summary><content type="html">
  &lt;p id=&quot;Jfw5&quot;&gt;There are alternatives to CTEM that might be better suited to certain organizations or scenarios:&lt;/p&gt;
  &lt;p id=&quot;9Kn7&quot;&gt;&lt;strong&gt;📌 Open-source Cloud Security Posture Management (CSPM):&lt;/strong&gt; Open-source CSPM tools are cost-effective and flexible solutions for cloud security. They offer the benefits of community support and the potential for customization. However, they can be resource-intensive to deploy and may make an organization dependent on the community for updates and improvements&lt;/p&gt;
  &lt;p id=&quot;UmKU&quot;&gt;&lt;strong&gt;📌 Vanta:&lt;/strong&gt; Vanta is a youth esports development platform that provides expert coaching and mentorship. It has received accreditation from &lt;a href=&quot;http://stem.org/&quot; target=&quot;_blank&quot;&gt;http://STEM.org&lt;/a&gt;, indicating its commitment to developing necessary skills such as innovation, teamwork, and problem-solving in the youth&lt;/p&gt;
  &lt;p id=&quot;iPPL&quot;&gt;&lt;strong&gt;📌 Defense Surface Management (DSM): &lt;/strong&gt;DSM provides a more efficient and effective way to connect Threat Intelligence Data (TID) and CTEM. It helps organizations prioritize and optimize their defenses by identifying strengths and weaknesses and comparing capabilities against adversarial Tactics, Techniques, and Procedures (TTPs)&lt;/p&gt;
  &lt;p id=&quot;SENB&quot;&gt;&lt;strong&gt;📌 CloudBees Jenkins Enterprise and Operations Center: &lt;/strong&gt;These tools provide more features to visualize software delivery pipelines and recover from failures. They offer greater visibility into Jenkins operations and allow for the central management of clusters of Jenkins masters, development, and performance analytics&lt;/p&gt;
  &lt;p id=&quot;OYGB&quot;&gt;&lt;strong&gt;📌 Unifying Remediation: &lt;/strong&gt;This approach leverages automation to streamline the response to security issues, reducing manual intervention and response time. It also includes considering the context of security issues, which helps in identifying the most critical issues, understanding their root causes, and determining effective remediation strategies&lt;/p&gt;
  &lt;p id=&quot;uoWi&quot;&gt;&lt;strong&gt;📌 Pen Testing: &lt;/strong&gt;While CTEM is focused on identifying and preventing as many vulnerabilities as possible, pen testing is a human-driven offensive test that attempts to achieve a specific goal. Using both methodologies increases visibility dramatically and provides a more comprehensive security approach&lt;/p&gt;
  &lt;p id=&quot;awIm&quot;&gt;&lt;strong&gt;📌 Automation in Tax Preparation:&lt;/strong&gt; Automation can help eliminate the risk of human error that can occur with manual data entry, leading to more accurate financial statements. It can streamline audit processes, allowing tax professionals to identify and prioritize high-risk areas&lt;/p&gt;

</content></entry><entry><id>snarky_security:brr3YNj-4MZ</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/brr3YNj-4MZ?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>Vulnerability Density and Time-to-Remediate: A Tale of Two Metrics (CTEM)</title><published>2024-07-25T15:50:31.029Z</published><updated>2024-07-25T15:50:31.029Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Vulnerability Density and Time-to-Remediate are two key metrics that can be used to measure the effectiveness of a CTEM program.</summary><content type="html">
  &lt;p id=&quot;9V8J&quot;&gt;Vulnerability Density and Time-to-Remediate are two key metrics that can be used to measure the effectiveness of a CTEM program.&lt;/p&gt;
  &lt;p id=&quot;ycBn&quot;&gt;📌 Vulnerability Density is a measure of the number of vulnerabilities per unit of code or system. It provides an indication of the overall security health of an organization&amp;#x27;s systems. A lower vulnerability density indicates a more secure system, while a higher vulnerability density suggests a greater potential for exploitation. To use this metric effectively, organizations should track changes in vulnerability density over time. A decreasing trend would indicate that the CTEM program is effectively identifying and remediating vulnerabilities, thereby improving the organization&amp;#x27;s security posture. It is calculated by dividing the total number of vulnerabilities by the total number of systems or applications. This metric can be used to estimate the number of residual vulnerabilities in a newly released software system given its size. A high vulnerability density indicates that there are more vulnerabilities to remediate, which could lead to a higher risk of exploitation. Organizations should aim to keep vulnerability density low to reduce the risk of exploitation&lt;/p&gt;
  &lt;p id=&quot;FjM1&quot;&gt;📌 Time-to-Remediate (also known as Mean Time to Respond or MTTR) is a measure of the average time it takes to respond to and remediate identified vulnerabilities or threats. A lower MTTR indicates efficient response and resolution, suggesting a more effective CTEM program. This metric is crucial because the longer a vulnerability remains unaddressed, the greater the chance it could be exploited by malicious actors. Therefore, a successful CTEM program should help reduce the time between detection and remediation. It is calculated by subtracting the discovery date from the remediation date. In more simple terms, MTTR is the number of days it takes to close a security vulnerability once it has been discovered. MTTR may also be calculated on a case-by-case basis or on a macro level. The macro equation for MTTR is: MTTR = (Total Sum of Detection to Remediation Time) / (Total Number of Incidents). A lower time to remediation indicates that vulnerabilities are being addressed quickly and reduces the risk of exploitation. Organizations should aim for a short time to remediation to reduce risk&lt;/p&gt;
  &lt;p id=&quot;LzI7&quot;&gt;Both metrics provide valuable insights into the effectiveness of a CTEM program. By continuously monitoring these metrics, organizations can identify areas for improvement and take action to enhance their security posture&lt;/p&gt;

</content></entry><entry><id>snarky_security:iMoxGKgEUd-</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/iMoxGKgEUd-?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM Effectiveness: Measuring the Immeasurable</title><published>2024-07-25T15:43:26.448Z</published><updated>2024-07-25T15:43:26.448Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">To measure the effectiveness of a CTEM program, organizations can use several key performance indicators and metrics. By using these metrics and continuously monitoring them, organizations can gain insights into the effectiveness of their CTEM program and make informed decisions to enhance their cybersecurity posture. It's important to note that the effectiveness of a CTEM program is not static and should be evaluated regularly to adapt to the evolving threat landscape and business needs.</summary><content type="html">
  &lt;p id=&quot;mUUE&quot;&gt;To measure the effectiveness of a CTEM program, organizations can use several key performance indicators and metrics. By using these metrics and continuously monitoring them, organizations can gain insights into the effectiveness of their CTEM program and make informed decisions to enhance their cybersecurity posture. It&amp;#x27;s important to note that the effectiveness of a CTEM program is not static and should be evaluated regularly to adapt to the evolving threat landscape and business needs.&lt;/p&gt;
  &lt;p id=&quot;bqgC&quot;&gt;&lt;strong&gt;📌 Risk Reduction: &lt;/strong&gt;Evaluate the reduction in security risks by tracking the number of vulnerabilities identified and remediated over time. A successful CTEM program should demonstrate a downward trend in the number and severity of security risks&lt;/p&gt;
  &lt;p id=&quot;Fwj1&quot;&gt;&lt;strong&gt;📌 Improved Threat Detection: &lt;/strong&gt;Measure the effectiveness of threat detection capabilities by tracking the time it takes to detect new vulnerabilities or threats. A lower Mean Time to Detect (MTTD) indicates a more effective CTEM program&lt;/p&gt;
  &lt;p id=&quot;3t3q&quot;&gt;&lt;strong&gt;📌 Time to Remediate: &lt;/strong&gt;Assess the speed at which identified threats and vulnerabilities are addressed. A successful CTEM program should help reduce the time between detection and remediation, known as Mean Time to Respond (MTTR)&lt;/p&gt;
  &lt;p id=&quot;bS7Q&quot;&gt;&lt;strong&gt;📌 Security Control Effectiveness: &lt;/strong&gt;Use tools like Security Control Validation and Breach and Attack Simulation to test the organization&amp;#x27;s defenses against simulated threats. The results can validate the impact of the implemented controls and the effectiveness of the security measures in place&lt;/p&gt;
  &lt;p id=&quot;G4UE&quot;&gt;&lt;strong&gt;📌 Compliance Metrics: &lt;/strong&gt;For industries with regulatory requirements, achieving and maintaining compliance is a key success indicator. Track compliance violations or issues to gauge the effectiveness of the CTEM program in maintaining regulatory standards&lt;/p&gt;
  &lt;p id=&quot;bl5C&quot;&gt;&lt;strong&gt;📌 Business Alignment: &lt;/strong&gt;Ensure that the CTEM program aligns with business priorities. This can be measured qualitatively by assessing whether remediation efforts focus on protecting the most critical business assets and align with key business objectives&lt;/p&gt;
  &lt;p id=&quot;vcPN&quot;&gt;&lt;strong&gt;📌 Stakeholder Feedback: &lt;/strong&gt;Collect and analyze feedback from stakeholders involved in the CTEM process. Positive feedback can indicate that the program is meeting its objectives and is well-received by those it affects&lt;/p&gt;

</content></entry><entry><id>snarky_security:9wcvOY1BSxa</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/9wcvOY1BSxa?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM: Miscellaneous Mayhem</title><published>2024-07-25T15:35:50.791Z</published><updated>2024-07-25T15:35:50.791Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">The Prioritization phase is the third stage in the CTEM framework. During this phase, organizations evaluate the potential vulnerabilities identified in the Discovery phase based on how likely they are to be exploited and the potential impact this would have on the organization. Here are the key steps involved in prioritizing threats during CTEM implementation:</summary><content type="html">
  &lt;h2 id=&quot;oYsK&quot;&gt;Prioritization Threats&lt;/h2&gt;
  &lt;p id=&quot;JNkw&quot;&gt;The Prioritization phase is the third stage in the CTEM framework. During this phase, organizations evaluate the potential vulnerabilities identified in the Discovery phase based on how likely they are to be exploited and the potential impact this would have on the organization. Here are the key steps involved in prioritizing threats during CTEM implementation:&lt;/p&gt;
  &lt;p id=&quot;IOcB&quot;&gt;📌 &lt;strong&gt;Assess Severity and Likelihood&lt;/strong&gt;: Businesses often use a risk assessment methodology to analyze the severity and likelihood of each vulnerability. This involves evaluating the potential damage that could be caused if the vulnerability were to be exploited.&lt;/p&gt;
  &lt;p id=&quot;DTTU&quot;&gt;📌 &lt;strong&gt;Consider Business Impact&lt;/strong&gt;: CTEM programs help organizations prioritize threats based on their potential impact on the business. This involves considering factors such as the criticality of the affected system or data, the potential financial impact, and the potential reputational damage.&lt;/p&gt;
  &lt;p id=&quot;MEUA&quot;&gt;📌 &lt;strong&gt;Availability of Compensating Controls&lt;/strong&gt;: The availability of compensating controls, which are alternative measures that can reduce the risk of a vulnerability being exploited, is also a factor in prioritization.&lt;/p&gt;
  &lt;p id=&quot;0tFT&quot;&gt;📌 &lt;strong&gt;Tolerance for Residual Risk&lt;/strong&gt;: The organization&amp;#x27;s tolerance for residual risk, which is the risk that remains after all controls have been applied, is another factor that can influence prioritization.&lt;/p&gt;
  &lt;p id=&quot;RaPE&quot;&gt;📌 &lt;strong&gt;Allocate Resources&lt;/strong&gt;: Based on prioritization, organizations can effectively allocate resources towards the most significant risks. This strategic approach to threat management results in more efficient use of resources and a quicker response to the most potentially damaging threats&lt;/p&gt;
  &lt;h2 id=&quot;YhFk&quot;&gt;Prioritization Methods&lt;/h2&gt;
  &lt;p id=&quot;UXSZ&quot;&gt;Here are some common methods and best practices for prioritizing threats during CTEM implementation:&lt;/p&gt;
  &lt;p id=&quot;827v&quot;&gt;📌 &lt;strong&gt;Business-Aligned Prioritization&lt;/strong&gt;: CTEM aligns its prioritization with business objectives, focusing on the most critical threats and vulnerabilities that could impact the organization&amp;#x27;s most valuable assets. This approach ensures that resources are allocated where they matter the most, aligning the organization&amp;#x27;s efforts with the ever-changing threat landscape&lt;/p&gt;
  &lt;p id=&quot;pBGY&quot;&gt;📌 &lt;strong&gt;Impact Analysis&lt;/strong&gt;: Prioritization should include an analysis of the potential impact of each threat. By evaluating the severity and potential damage of each threat, organizations can effectively allocate resources towards the most significant risks&lt;/p&gt;
  &lt;p id=&quot;JTzb&quot;&gt;📌 &lt;strong&gt;Dynamic Prioritization&lt;/strong&gt;: The threat landscape is dynamic, with new vulnerabilities emerging regularly. Therefore, prioritization strategies need to be adaptable to address evolving threats effectively&lt;/p&gt;
  &lt;p id=&quot;vZsK&quot;&gt;📌 &lt;strong&gt;Resource Allocation&lt;/strong&gt;: Human resources are finite, and security teams must prioritize their efforts. The key is to allocate resources towards impactful vulnerabilities that can significantly impact the organization&lt;/p&gt;
  &lt;p id=&quot;4IkO&quot;&gt;To ensure that threat prioritization is aligned with business goals, organizations should incorporate strategic business goals into their CTEM program. This approach allows organizations to evaluate the severity and damage potential of every threat, and then allocate resources accordingly, ensuring that security measures are focused on protecting the most critical business assets&lt;/p&gt;

</content></entry><entry><id>snarky_security:SyV0cQXUfIc</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/SyV0cQXUfIc?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM Implementation: A Step-by-Step Guide to Madness</title><published>2024-07-25T15:27:43.472Z</published><updated>2024-07-25T15:27:43.472Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Implementing CTEM involves a systematic five-step process that helps organizations proactively manage and mitigate cybersecurity risks. Implementing CTEM is a continuous cycle, as the threat landscape is always evolving. Organizations must regularly revisit each step to adapt to new threats and changes in their digital environment:</summary><content type="html">
  &lt;p id=&quot;nvoG&quot;&gt;Implementing CTEM involves a systematic five-step process that helps organizations proactively manage and mitigate cybersecurity risks. Implementing CTEM is a continuous cycle, as the threat landscape is always evolving. Organizations must regularly revisit each step to adapt to new threats and changes in their digital environment:&lt;/p&gt;
  &lt;p id=&quot;NvXT&quot;&gt;&lt;strong&gt;📌 Scoping: &lt;/strong&gt;This initial phase is about defining what needs to be protected within the organization. It involves understanding the assets, systems, and data that are critical to the business and could be potential targets for cyber threats&lt;/p&gt;
  &lt;p id=&quot;MRHD&quot;&gt;&lt;strong&gt;📌 Discovery: &lt;/strong&gt;In this stage, the organization actively seeks out and identifies vulnerabilities and weaknesses in the scoped assets. This includes using tools and technologies to scan for and analyze potential security issues across the organization&amp;#x27;s attack surface, which encompasses external, internal, and cloud environments&lt;/p&gt;
  &lt;p id=&quot;J5b9&quot;&gt;&lt;strong&gt;📌 Prioritization: &lt;/strong&gt;After discovering vulnerabilities, the next step is to prioritize them based on their potential impact on the business. This involves assessing the severity, exploitability, and the criticality of the potential impact to the business, as well as any compensating security controls&lt;/p&gt;
  &lt;p id=&quot;ovCd&quot;&gt;&lt;strong&gt;📌 Validation: &lt;/strong&gt;This phase is crucial for ensuring that the organization&amp;#x27;s vulnerability to threats has been accurately assessed and that the remediation operations are effective. It typically involves practices like penetration testing and Red Team exercises to simulate attacks and validate the protections in place&lt;/p&gt;
  &lt;p id=&quot;gYUn&quot;&gt;&lt;strong&gt;📌 Mobilization: &lt;/strong&gt;The final step involves operationalizing the findings from the CTEM process. This means putting in place the necessary actions to correct identified risks and ensuring that all teams within the organization are informed and aligned with the security efforts. This may include automating mitigation through integration with SIEM and SOAR platforms, as well as establishing communication standards and documented cross-team workflows&lt;/p&gt;
  &lt;p id=&quot;xCAZ&quot;&gt;&lt;strong&gt;Scoping phase&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yDsW&quot;&gt;📌 The scoping phase is the initial stage in the CTEM framework. It involves defining the scope of the CTEM program, determining which systems, assets, and infrastructure segments will be included, and identifying the stakeholders who will be involved.&lt;/p&gt;
  &lt;p id=&quot;xRyZ&quot;&gt;📌 During this stage, security teams need to understand what matters most to their business in order to define the scope. This includes identifying the key attack surfaces where vulnerabilities can be managed. The scoping process ensures accurate identification of critical and vulnerable systems, which makes it the foundational step in devising security measures.&lt;/p&gt;
  &lt;p id=&quot;CQuy&quot;&gt;📌 The scoping stage forms the foundation of the CTEM program and is essential to its overall success as it establishes the framework for the subsequent stages. It is crucial to include all relevant areas under the scope of CTEM, such as external attack surfaces and cloud environments, to avoid leaving any potential breach points exposed.&lt;/p&gt;
  &lt;p id=&quot;5pvP&quot;&gt;&lt;strong&gt;Discovery phase&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;zmhH&quot;&gt;📌 The Discovery phase is the second stage in the CTEM framework. This phase involves identifying and cataloging all vulnerable resources within the organization, such as hardware, software, databases, and network infrastructure.&lt;/p&gt;
  &lt;p id=&quot;573O&quot;&gt;📌 During the Discovery phase, businesses use a wide variety of IT discovery tools and methods to audit all their IT resources. This often includes conducting vulnerability assessments, penetration testing, and other security audits. The goal is to actively seek out and identify potential vulnerabilities within the organization&amp;#x27;s systems and assets.&lt;/p&gt;
  &lt;p id=&quot;nSnM&quot;&gt;📌 It&amp;#x27;s important to involve a diverse team of experts in the discovery stage, including IT personnel, security personnel, and other employees who may have a unique perspective on potential vulnerabilities. This ensures that all potential threats are identified and evaluated.&lt;/p&gt;
  &lt;p id=&quot;nAfw&quot;&gt;📌 The Discovery phase serves as the bridge between the Scoping and Prioritization phases in the CTEM process. After the Scoping phase, where the key attack surfaces and stakeholders are identified, the Discovery phase focuses on the in-detail identification of all assets and vulnerabilities.&lt;/p&gt;
  &lt;p id=&quot;bgzo&quot;&gt;&lt;strong&gt;Prioritization phase&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;s0qK&quot;&gt;📌 The Prioritization phase is the third stage in the CTEM framework. This phase is crucial as it helps organizations identify what high-value assets need to be prioritized, as not everything can be protected at once.&lt;/p&gt;
  &lt;p id=&quot;9Xb1&quot;&gt;📌 During the Prioritization phase, organizations evaluate the potential vulnerabilities identified in the Discovery phase based on how likely they are to be exploited and the potential impact this would have on the organization. This involves assessing the severity, exploitability, and the criticality of the potential impact to the business, as well as any compensating security controls.&lt;/p&gt;
  &lt;p id=&quot;povy&quot;&gt;📌 The primary purpose of prioritization is to create a task list to reduce risk efficiently. This enables organizations to optimally allocate their resources, ensuring effective utilization. Prioritization helps organizations determine which assets are most critical and need the highest level of protection.&lt;/p&gt;
  &lt;p id=&quot;HPid&quot;&gt;📌 The Prioritization phase is an ongoing process that involves continually assessing, ranking, and selecting which assets require immediate attention. This phase is dynamic and needs to be adaptable to address evolving threats effectively.&lt;/p&gt;
  &lt;p id=&quot;ZWQU&quot;&gt;&lt;strong&gt;Validation phase&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2gvd&quot;&gt;📌 The Validation phase is the fourth stage in the CTEM framework. This phase is crucial as it verifies the effectiveness of the organization&amp;#x27;s cybersecurity posture and the measures taken to control and decrease vulnerabilities.&lt;/p&gt;
  &lt;p id=&quot;1gI4&quot;&gt;📌 During the Validation phase, organizations evaluate how they would handle an actual attack and assess their ability to defend against it. This involves using tools like Breach and Attack Simulation (BAS) and Security Control Validation to test the organization&amp;#x27;s defenses against simulated threats.&lt;/p&gt;
  &lt;p id=&quot;7S9t&quot;&gt;📌 The Validation phase ensures that the plans for addressing the vulnerabilities and threats identified in the Prioritization phase are effective. This could involve adding additional safeguards, updating software, or changing security settings&lt;/p&gt;
  &lt;p id=&quot;rJkV&quot;&gt;📌 It&amp;#x27;s also important to involve a wide range of stakeholders in the Validation phase, including IT personnel, security personnel, and other relevant teams. This ensures that the validation process is comprehensive and that the remediation measures are effective across the organization&lt;/p&gt;
  &lt;p id=&quot;uFqJ&quot;&gt;&lt;strong&gt;Mobilization phase&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;SXvF&quot;&gt;📌 The Mobilization phase is the final stage in the CTEM framework. This phase is about operationalizing the findings from the CTEM process and implementing the necessary actions to correct identified risks.&lt;/p&gt;
  &lt;p id=&quot;KZCg&quot;&gt;📌 During the Mobilization phase, organizations put into action the plans for addressing the vulnerabilities and threats identified in the Prioritization phase and validated in the Validation phase. This could involve adding additional safeguards, updating software, or changing security settings.&lt;/p&gt;
  &lt;p id=&quot;llHM&quot;&gt;📌 This phase also involves ensuring that all teams within the organization are informed and aligned with the security efforts. This may include automating mitigation through integration with Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms, as well as establishing communication standards and documented cross-team workflows.&lt;/p&gt;
  &lt;p id=&quot;y16U&quot;&gt;📌 The Mobilization phase is crucial as it drives the message that remediation cannot be entirely automated and requires human intervention. It emphasizes the need for security leaders to mobilize a response and remove exposures from the environment&lt;/p&gt;

</content></entry><entry><id>snarky_security:vlaLpyW7Uc8</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/vlaLpyW7Uc8?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM Unpacking (Video &amp; Audio)‏</title><published>2024-09-04T18:26:01.624Z</published><updated>2024-09-04T18:26:01.624Z</updated><category term="video" label="video"></category><summary type="html">Check ‎out‏ ‎Mave ‎or ‎other ‎audio ‎podcast‏ ‎platform</summary><content type="html">
  &lt;figure id=&quot;XXQ1&quot; class=&quot;m_column&quot;&gt;
    &lt;iframe src=&quot;https://www.youtube.com/embed/reiHeDNNYbc?autoplay=0&amp;loop=0&amp;mute=0&quot;&gt;&lt;/iframe&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;uUN2&quot; class=&quot;m_column&quot;&gt;
    &lt;iframe src=&quot;https://rutube.ru/play/embed/c2018ceeb1deea80a4eed38302a76c51&quot;&gt;&lt;/iframe&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;zUb2&quot; class=&quot;m_16x9&quot;&gt;
    &lt;iframe src=&quot;https://vk.com/video_ext.php?oid=-226318988&amp;id=456239063&amp;hd=2&amp;autoplay=1&quot;&gt;&lt;/iframe&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;d643&quot;&gt;&lt;a href=&quot;https://snarkysecurity.mave.digital/ep-21&quot; target=&quot;_blank&quot;&gt;Check ‎out‏ ‎Mave ‎or ‎other ‎audio ‎podcast‏ ‎platform&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;wGew&quot;&gt;Let’s ‎dive‏ ‎into‏ ‎the ‎thrilling ‎world ‎of‏ ‎Continuous ‎Threat‏ ‎Exposure ‎Management ‎(CTEM), ‎shall‏ ‎we?‏ ‎CTEM, ‎in ‎its‏ ‎infinite ‎wisdom,‏ ‎is ‎not ‎just ‎a‏ ‎fancy‏ ‎tool‏ ‎or ‎a ‎magical‏ ‎technology ‎wand‏ ‎you ‎can‏ ‎wave‏ ‎to ‎make ‎all‏ ‎the ‎bad ‎cyber ‎gremlins‏ ‎go ‎away.‏ ‎No,‏ ‎it’s‏ ‎a ‎convoluted ‎five-step ‎program ‎that‏ ‎includes ‎scoping, ‎discovery,‏ ‎prioritization,‏ ‎validation,‏ ‎and ‎mobilization. ‎Because‏ ‎why ‎make ‎things‏ ‎simple ‎when‏ ‎you‏ ‎can ‎turn‏ ‎them ‎into ‎a ‎bureaucratic‏ ‎nightmare?&lt;/p&gt;
  &lt;p id=&quot;BN9L&quot;&gt;Now, ‎let’s‏ ‎talk‏ ‎about‏ ‎the ‎tools‏ ‎and ‎technologies‏ ‎that ‎make‏ ‎CTEM‏ ‎tick. ‎We’ve‏ ‎got ‎CAASM ‎(Cyber ‎Asset ‎Attack‏ ‎Surface ‎Management),‏ ‎EASM‏ ‎(External ‎Attack ‎Surface ‎Management),‏ ‎EM ‎(Exposure‏ ‎Management), ‎and ‎RSAS ‎(Red‏ ‎Team‏ ‎Automation ‎Systems). ‎These‏ ‎acronyms ‎sound‏ ‎like ‎something ‎out ‎of‏ ‎a‏ ‎dystopian‏ ‎sci-fi ‎novel, ‎don’t‏ ‎they? ‎They’re‏ ‎crucial ‎for‏ ‎peeking‏ ‎into ‎every ‎nook‏ ‎and ‎cranny ‎of ‎your‏ ‎organization’s ‎digital‏ ‎environment,‏ ‎including‏ ‎that ‎forgotten ‎server ‎from ‎2003‏ ‎that ‎everyone’s ‎too‏ ‎scared‏ ‎to‏ ‎touch.&lt;/p&gt;
  &lt;p id=&quot;1izq&quot;&gt;Moving ‎on ‎to‏ ‎the ‎methodology, ‎which‏ ‎is ‎as‏ ‎straightforward‏ ‎as ‎assembling‏ ‎IKEA ‎furniture ‎without ‎the‏ ‎manual. ‎First,‏ ‎we‏ ‎have‏ ‎scoping, ‎where‏ ‎you ‎pretend‏ ‎to ‎know‏ ‎what‏ ‎you’re ‎doing‏ ‎by ‎defining ‎the ‎initial ‎exposure‏ ‎scope. ‎Then‏ ‎there’s‏ ‎discovery, ‎where ‎you ‎play‏ ‎digital ‎detective‏ ‎and ‎hunt ‎for ‎vulnerabilities.‏ ‎Prioritization‏ ‎is ‎next, ‎where‏ ‎you ‎decide‏ ‎which ‎digital ‎fires ‎to‏ ‎put‏ ‎out‏ ‎first. ‎Validation ‎is‏ ‎like ‎checking‏ ‎your ‎work‏ ‎to‏ ‎make ‎sure ‎you‏ ‎didn’t ‎just ‎make ‎everything‏ ‎worse. ‎And‏ ‎finally,‏ ‎mobilization,‏ ‎where ‎you ‎rally ‎the ‎troops‏ ‎and ‎hope ‎for‏ ‎the‏ ‎best.&lt;/p&gt;
  &lt;p id=&quot;sfS2&quot;&gt;As‏ ‎for ‎best ‎practices,‏ ‎let’s ‎start ‎with‏ ‎stakeholder ‎engagement.‏ ‎Because‏ ‎nothing ‎gets‏ ‎the ‎blood ‎pumping ‎like‏ ‎a ‎good‏ ‎old‏ ‎meeting‏ ‎with ‎legal,‏ ‎compliance, ‎and‏ ‎IT ‎to‏ ‎discuss‏ ‎cybersecurity. ‎Don’t‏ ‎forget ‎to ‎regularly ‎update ‎your‏ ‎systems, ‎because‏ ‎hackers‏ ‎totally ‎adhere ‎to ‎a‏ ‎schedule ‎and‏ ‎will ‎wait ‎patiently ‎for‏ ‎you‏ ‎to ‎patch ‎things‏ ‎up. ‎An‏ ‎incident ‎response ‎plan ‎is‏ ‎also‏ ‎key,‏ ‎because ‎when ‎things‏ ‎inevitably ‎go‏ ‎south, ‎you’ll‏ ‎need‏ ‎a ‎plan ‎to‏ ‎pretend ‎like ‎you ‎had‏ ‎everything ‎under‏ ‎control‏ ‎all‏ ‎along. ‎Lastly, ‎continuous ‎improvement ‎is‏ ‎crucial. ‎After ‎all,‏ ‎the‏ ‎only‏ ‎constant ‎in ‎cybersecurity‏ ‎is ‎that ‎you’re‏ ‎always ‎one‏ ‎step‏ ‎behind ‎the‏ ‎latest ‎threat.&lt;/p&gt;
  &lt;p id=&quot;Pt4W&quot;&gt;So ‎there ‎you‏ ‎have ‎it,‏ ‎folks.‏ ‎CTEM‏ ‎in ‎all‏ ‎its ‎glory.‏ ‎A ‎strategy‏ ‎so‏ ‎complex, ‎it‏ ‎makes ‎rocket ‎science ‎look ‎like‏ ‎child’s ‎play.‏ ‎But‏ ‎hey, ‎at ‎least ‎we’re‏ ‎all ‎having‏ ‎fun, ‎right? ‎Right?&lt;/p&gt;
  &lt;p id=&quot;gNAq&quot;&gt;&lt;a href=&quot;https://media.sponsr.ru/project/3935/post/53713/file/18387/CTEM%20%5BEN%5D.pdf&quot; target=&quot;_blank&quot;&gt;PDF&lt;/a&gt;&lt;/p&gt;

</content></entry><entry><id>snarky_security:jmNJdbq9pSc</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/jmNJdbq9pSc?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>CTEM: The Struggle is Real</title><published>2024-07-25T15:15:33.167Z</published><updated>2024-07-25T15:15:33.167Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Challenges of Implementing CTEM</summary><content type="html">
  &lt;p id=&quot;ONrD&quot;&gt;Challenges of Implementing CTEM&lt;/p&gt;
  &lt;p id=&quot;U3OU&quot;&gt;&lt;strong&gt;📌 Getting Non-security and Security Teams Aligned: &lt;/strong&gt;IT infrastructure, DevOps, and security teams often have communication gaps, which can pose a challenge when implementing CTEM&lt;/p&gt;
  &lt;p id=&quot;ptql&quot;&gt;&lt;strong&gt;📌 Seeing the Bigger Picture: &lt;/strong&gt;A comprehensive CTEM program covers many areas, each with its own set of tools and unresolved problems. Aggregating all information to understand priorities and responsibilities can be challenging&lt;/p&gt;
  &lt;p id=&quot;ub05&quot;&gt;&lt;strong&gt;📌 Overcoming Diagnostic Overload: &lt;/strong&gt;Each area covered in CTEM has its own tools, which yield alerts. Managing the information stemming from these alerts can be challenging&lt;/p&gt;
  &lt;p id=&quot;MJ4b&quot;&gt;&lt;strong&gt;📌 Adopting a Risk-centric Approach: &lt;/strong&gt;Traditional cybersecurity measures often focus on achieving compliance. However, CTEM emphasizes understanding and managing risks specific to an organization’s unique context, which requires a nuanced understanding of the business landscape&lt;/p&gt;
  &lt;p id=&quot;FFdS&quot;&gt;&lt;strong&gt;📌 Integration of Continuous Monitoring Tools and Technologies:&lt;/strong&gt; As organizations embrace innovations such as the Internet of Things (IoT) and cloud computing, they must adapt their CTEM frameworks to address the unique challenges posed by these technologies&lt;/p&gt;
  &lt;p id=&quot;MJAR&quot;&gt;&lt;strong&gt;📌 Operationalizing a CTEM Strategy: &lt;/strong&gt;Implementing a CTEM strategy requires significant investments in time, budget, personnel, and technology&lt;/p&gt;

</content></entry><entry><id>snarky_security:_zWmkWEg70y</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/_zWmkWEg70y?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>Cyber Insurance benefits </title><published>2024-08-04T18:42:37.653Z</published><updated>2024-08-04T18:42:37.653Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Cyber insurance offers several benefits for businesses:</summary><content type="html">
  &lt;p id=&quot;ZCl2&quot;&gt;Cyber insurance offers several benefits for businesses:&lt;/p&gt;
  &lt;p id=&quot;6ayz&quot;&gt;📌 &lt;strong&gt;Coverage for Data Breaches:&lt;/strong&gt; Cyber insurance can cover the costs associated with data breaches, including litigation, recovery, and identity theft. This is particularly beneficial given that a cyber attack, on average, can cost a company over $1 million.&lt;/p&gt;
  &lt;p id=&quot;XsCx&quot;&gt;&lt;strong&gt;📌 Reimbursement for Business Loss: &lt;/strong&gt;Cyber attacks often interrupt business and cause lost revenue. An effective cyber insurance policy can insulate a company from these costs.&lt;/p&gt;
  &lt;p id=&quot;U6gv&quot;&gt;&lt;strong&gt;📌 Defense Against Cyber Extortion: &lt;/strong&gt;Cyber insurance can provide coverage against cyber extortion, such as ransomware attacks, where critical business data is encrypted and held hostage by cybercriminals until the company pays.&lt;/p&gt;
  &lt;p id=&quot;3Q4A&quot;&gt;&lt;strong&gt;📌 Coverage for Business Interruption Losses: &lt;/strong&gt;Cyber insurance can cover business interruption losses, keeping businesses financially afloat while recovery efforts are underway.&lt;/p&gt;
  &lt;p id=&quot;7LJD&quot;&gt;📌 &lt;strong&gt;Regulatory Compliance: &lt;/strong&gt;Cyber insurance can help cover potential fines and the cost of legal defense associated with non-compliance to data protection regulations.&lt;/p&gt;
  &lt;p id=&quot;pmU2&quot;&gt;&lt;strong&gt;📌 Reputation Management:&lt;/strong&gt; If customer information is hacked or data is held hostage, it can significantly damage an organization&amp;#x27;s reputation. Cyber insurance often provides crisis management and public relations support to manage such situations.&lt;/p&gt;
  &lt;p id=&quot;DyOG&quot;&gt;&lt;strong&gt;📌 Risk Mitigation and Recovery Resources: &lt;/strong&gt;Cyber insurance provides resources for risk mitigation and recovery, helping businesses respond quickly and effectively to cyber incidents.&lt;/p&gt;
  &lt;p id=&quot;TI5L&quot;&gt;&lt;strong&gt;📌 Limited Financial Liability: &lt;/strong&gt;Cyber insurance limits the financial liability of a business in the event of a attack, providing financial compensation to respond.&lt;/p&gt;
  &lt;p id=&quot;Nld8&quot;&gt;&lt;strong&gt;📌 Peace of Mind: &lt;/strong&gt;Cyber insurance provides peace of mind that businesses have taken action to ensure their financial stability in the event of a cyber incident.&lt;/p&gt;
  &lt;p id=&quot;nOjj&quot;&gt;&lt;strong&gt;📌 Competitive Differentiation: &lt;/strong&gt;Having cyber insurance can provide a competitive edge, demonstrating a business&amp;#x27;s commitment to managing cyber risks&lt;/p&gt;

</content></entry><entry><id>snarky_security:CceSW4QH0m9</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/CceSW4QH0m9?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>adapting to the changing cyber landscape</title><published>2024-08-04T18:36:23.123Z</published><updated>2024-08-04T18:36:23.123Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Insurance companies are adapting to the changing cyber landscape through several strategies:</summary><content type="html">
  &lt;p id=&quot;zvim&quot;&gt;Insurance companies are adapting to the changing cyber landscape through several strategies:&lt;/p&gt;
  &lt;p id=&quot;I7Px&quot;&gt;&lt;strong&gt;📌 Stricter Underwriting Practices: &lt;/strong&gt;Insurers are requiring more detailed information about IT systems and security controls from businesses seeking coverage. This helps them better assess the risk and tailor the policies accordingly.&lt;/p&gt;
  &lt;p id=&quot;ASte&quot;&gt;📌 &lt;strong&gt;Higher Deductibles and Coverage Restrictions: &lt;/strong&gt;To manage their risk exposure, insurers are increasing deductibles and placing restrictions on coverage, particularly for systemic risks and technology errors and omissions.&lt;/p&gt;
  &lt;p id=&quot;2XfH&quot;&gt;&lt;strong&gt;📌 Emphasis on Proactive Risk Management: &lt;/strong&gt;Insurers are placing more emphasis on proactive risk management, encouraging businesses to engage in comprehensive risk management practices, including partnering with third-party security providers to identify and mitigate vulnerabilities.&lt;/p&gt;
  &lt;p id=&quot;6x4O&quot;&gt;&lt;strong&gt;📌 Collaboration with Cybersecurity Firms: &lt;/strong&gt;Insurers are collaborating with cybersecurity firms to develop comprehensive insurance products that reflect a better understanding of the risks involved.&lt;/p&gt;
  &lt;p id=&quot;qf4P&quot;&gt;&lt;strong&gt;📌 Investment in Cybersecurity Measures:&lt;/strong&gt; Insurers are investing in robust cybersecurity measures, regularly updating their systems, and providing comprehensive training to employees to identify and respond to potential threats.&lt;/p&gt;
  &lt;p id=&quot;y0LZ&quot;&gt;&lt;strong&gt;📌 Tailoring Insurance Products: &lt;/strong&gt;Insurers are tailoring their insurance products to meet the individual needs of clients, recognizing that different businesses have different concerns and risk profiles.&lt;/p&gt;
  &lt;p id=&quot;tirl&quot;&gt;&lt;strong&gt;📌 Building Partnerships Beyond the Insurance Industry:&lt;/strong&gt; Insurers are working with government agencies, academic institutions, and industry associations to navigate emerging risks and develop a more comprehensive understanding of the cyber threat landscape.&lt;/p&gt;
  &lt;p id=&quot;MW3l&quot;&gt;&lt;strong&gt;📌 Adjusting to Market Volatility: &lt;/strong&gt;Experienced insurers are using their historical knowledge to navigate market fluctuations and provide stable, effective solutions for clients.&lt;/p&gt;

</content></entry><entry><id>snarky_security:JWZ2DLbYjfd</id><link rel="alternate" type="text/html" href="https://teletype.in/@snarky_security/JWZ2DLbYjfd?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=snarky_security"></link><title>Growth factors of cyber insurance market</title><published>2024-08-04T18:31:25.352Z</published><updated>2024-08-04T18:31:25.352Z</updated><category term="keypoints" label="keypoints"></category><summary type="html">Several key factors are driving the growth of the cyber insurance market:</summary><content type="html">
  &lt;p id=&quot;2kAp&quot;&gt;Several key factors are driving the growth of the cyber insurance market:&lt;/p&gt;
  &lt;p id=&quot;Ol6Q&quot;&gt;&lt;strong&gt;📌 Increasing Cyber Threats: &lt;/strong&gt;The rise in cyber attacks and data breaches has led to an increased awareness of the risks and the need for protection, driving demand for cyber insurance.&lt;/p&gt;
  &lt;p id=&quot;YmeZ&quot;&gt;📌&lt;strong&gt; Growing Awareness:&lt;/strong&gt; More businesses are understanding the need for cyber insurance as they become more aware of the potential financial and reputational damage that can result from cyber threats.&lt;/p&gt;
  &lt;p id=&quot;CPb3&quot;&gt;&lt;strong&gt;📌 Regulatory Environment: &lt;/strong&gt;The regulatory environment is also driving growth. As data protection regulations become stricter, businesses are increasingly seeking cyber insurance to help manage their regulatory risk.&lt;/p&gt;
  &lt;p id=&quot;cplI&quot;&gt;&lt;strong&gt;📌 Digital Transformation: &lt;/strong&gt;The shift in business models towards more digital and e-commerce capabilities has increased the exposure to cyber threats, driving the demand for cyber insurance.&lt;/p&gt;
  &lt;p id=&quot;6EVU&quot;&gt;📌&lt;strong&gt; Data-Driven Policies: &lt;/strong&gt;The use of data to drive policy underwriting is becoming more prevalent. This allows cyber insurance companies to offer more accurately priced premiums, which can lead to lower loss ratios and higher profitability for the industry, thereby driving growth.&lt;/p&gt;
  &lt;p id=&quot;dxBb&quot;&gt;&lt;strong&gt;📌 Limited Supply: &lt;/strong&gt;Demand for cyber insurance has been increasing, but limited capacity on the supply side has led to adjustments in coverage, terms, and conditions, which has contributed to market growth&lt;/p&gt;
  &lt;p id=&quot;vlYw&quot;&gt;&lt;strong&gt;📌 Risk Awareness and Preparedness: &lt;/strong&gt;Increased awareness of cyber risks among businesses and the recognition of the need to protect themselves against these risks are contributing to market growth.&lt;/p&gt;
  &lt;p id=&quot;ZdFq&quot;&gt;&lt;strong&gt;📌 Advancements in Underwriting and Risk Assessment Models:&lt;/strong&gt; Insurers are working to better understand and quantify cyber risks, which is helping to fuel market growth.&lt;/p&gt;
  &lt;p id=&quot;7thI&quot;&gt;Emerging technologies are expected to shape the future of cyber insurance in several ways:&lt;/p&gt;
  &lt;p id=&quot;VVsp&quot;&gt;&lt;strong&gt;📌 Artificial Intelligence and the Metaverse&lt;/strong&gt;: Future cyberattacks will be increasingly influenced by key technology trends such as artificial intelligence and the so-called &amp;quot;metaverse&amp;quot;.&lt;/p&gt;
  &lt;p id=&quot;VqyC&quot;&gt;&lt;strong&gt;📌 Internet of Things (IoT) and Operational Technology (OT): &lt;/strong&gt;The expanding worlds of IoT and OT offer great opportunities but also create new attack surfaces, vulnerabilities, and systemic risks.&lt;/p&gt;
  &lt;p id=&quot;N5Np&quot;&gt;&lt;strong&gt;📌 Crypto Insurance Services: &lt;/strong&gt;The rising adoption of crypto insurance services is expected to drive market expansion, reflecting the increasing digitization of financial services&lt;/p&gt;

</content></entry></feed>