Demystifying CTEM for CISOs
Risk grows while budgets shrink. How do you manage a security program if you’re not measuring it?
Just as business intelligence processes today integrate data across silos for a complete view, security leaders need a holistic way to connect vulnerabilities, threats, and program performance. That’s the promise of Continuous Threat Exposure Management (CTEM) — a new operating model that moves beyond tactical scans or one-off exercises to deliver continuous, business-aligned visibility into risk.
In this session, you’ll learn how CTEM helps CISOs:
CTEM is fast becoming the standard for modern security programs. Where does yours stand today?
Pete Luban
Field Chief Information Security Officer, AttackIQ
Pete has nearly 30 years experience in infrastructure architecture, cybersecurity engineering and operations, and risk management acquired through various roles at many well known organizations such as Citigroup, Yahoo!, Google, Bridgewater Associates and Netflix. Pete has spent the last six years as the Chief Information Security Officer at Dimensional Fund Advisors, an 800 billion dollar asset manager headquartered in Austin Texas, and one of the worlds leading providers of ETFs and Mutual Funds.

Jose Barajas
VP, Global Sales Engineering, AttackIQ
Jose Barajas is VP, Global Sales Engineering at AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security validation programs. Jose has presented at Black Hat, Globaltek Security Conference, and ISACA Security Conference and actively leads research partnership efforts with MITRE Engenuity.

Sign up for the Webinar
By submitting this form you indicate that you have read and agree to the terms of our Privacy Policy.
