CTEM Masterclass:
Beyond the Framework
A Four-Part Series on Operationalizing Exposure Management
Security leaders are under increasing pressure to demonstrate measurable risk reduction.
Continuous Threat Exposure Management (CTEM) offers a framework for doing exactly that. The challenge is turning the model into an operational program.
This series guides security leaders through the CTEM journey, starting with an introduction to CTEM and MITRE INFORM before progressing into its threat-informed foundation, organizational adoption, and a practical approach for launching a 90-day CTEM cycle.
Register to attend the full series and learn how exposure management programs move from concept to execution.
SESSION 1 – ON-DEMAND
CTEM + MITRE INFORM:
The “For Dummies” Guide to Not Feeling Like One
Exposure management is quickly becoming a priority for security programs. But moving from understanding a framework to actually operationalizing it is where many teams get stuck.
In this session, the authors of CTEM + MITRE INFORM For Dummies break down how two complementary frameworks help bridge that gap. Continuous Threat Exposure Management (CTEM) provides a structured cycle for identifying, prioritizing, and validating exposures, while MITRE INFORM offers a maturity model for measuring how threat-informed defense capabilities evolve over time.
Speakers

Jon Baker
VP, Threat-Informed Defense, AttackIQ

Pete Luban
Field CISO, AttackIQ

Keith Wilson
Dir. Cybersecurity Education, AttackIQ

Paul G. Craft
Brigadier General, US Army (Ret), Senior Advisor

Ryan Williams
Lead Security Engineer – Adversarial AI and Cloud, Applied Computing
Session 2
Know Your Enemy: The Threat-Informed Foundation of CTEM
Date: Thursday, April 2, 2026
Time: 10:00 AM PT | 1:00 PM ET
CTEM is built on the principles of threat-informed defense. Rather than treating exposures as isolated vulnerabilities or alerts, this approach focuses on how real adversaries operate and which techniques are most likely to impact your organization. By grounding security priorities in adversary behavior, teams can focus their efforts on the attack paths most likely to impact their environment.
In this session, we explore how adversary insights shape CTEM scoping and validation, how threat intelligence can be translated into testable security outcomes, and where organizations commonly struggle when starting a CTEM program.
Earn up to 1 CPE credit for attending.
Speakers

Jon Baker
VP, Threat-Informed Defense, AttackIQ

Pete Luban
Field CISO, AttackIQ
Session 3
Building the Case for CTEM: Getting Buy-In and Building Momentum
Date: Thursday, April 16, 2026
Time: 10:00 AM PT | 1:00 PM ET
CTEM programs succeed when organizations can clearly demonstrate their impact beyond the security team. Security leaders need to show how exposure management contributes to measurable risk reduction and why CTEM should be treated as a strategic initiative within the broader security program.
In this session, we explore how to build a compelling business case for CTEM by connecting exposure validation to outcomes that resonate with executives and boards. You’ll learn how organizations demonstrate measurable improvement over time and how clear justification helps drive adoption and build lasting momentum for CTEM programs.
Earn up to .75 CPE credits for attending.
Speakers

Jon Baker
VP, Threat-Informed Defense, AttackIQ

Pete Luban
Field CISO, AttackIQ
Session 4
CTEM in 90 Days: Launching Your First CTEM Cycle
Date: Thursday, April 30, 2026
Time: 10:00 AM PT | 1:00 PM ET
Understanding CTEM and building organizational support are important first steps, but execution is where programs succeed or stall. The challenge is turning the framework into a repeatable operational cycle that security teams can run and improve over time.
This session introduces a practical 90-day approach for launching CTEM, including what security teams should prioritize early and how to establish a repeatable CTEM cycle without reorganizing the program. You’ll also learn how CTEM maturity develops over time, from initial validation efforts to operational governance and dedicated leadership.
Earn up to .75 CPE credits for attending.
Speakers

Jon Baker
VP, Threat-Informed Defense, AttackIQ

Pete Luban
Field CISO, AttackIQ
What You’ll Gain:
- Understand the CTEM framework and its threat-informed foundation
- Learn how to adopt CTEM using measurable outcomes
- Align teams and leadership around exposure reduction priorities
- Gain a practical 90-day plan to launch CTEM
- Understand how CTEM programs mature over time
Who Should Attend:
- CISOs and security leaders exploring CTEM adoption
- Security operations and detection engineering leaders
- Security architects and program owners
- Teams moving toward threat-informed or continuous validation approaches
Register Now
By submitting this form, you indicate that you have read and agree to the terms of our Privacy Policy.
