What is true Attack Surface Management (ASM)? Why it’s time to rethink how you manage your attack surface

Logo
Presented by

Michael Gianarakis, SVP ASM, and Shubham Shah, SVP Engineering & Research Australia - Searchlight Cyber

About this talk

In this session, we're joined by Michael Gianarakis and Shubham Shah, the co-founders of Assetnote, where we'll break down the flaws in traditional ASM and explore how teams can take a more proactive approach that actually helps security teams reduce risk. Topics we'll cover include: - The risks of 'shadow exposure' (the hidden attack surface) where threats are introduced by third-party tools like ServiceNow, Citrix, and Slack - Why IP-based scanning is not enough when managing modern cloud and CDN environments - The importance of proactively closing the time gap between exposure detection and mitigation We'll explore why the traditional concept of network perimeter security is no longer enough to defend against today’s evolving cyber threats. As organizations rapidly adopt cloud tools and shadow architecture, their true attack surface expands exponentially – exposing them to phishing, leaked credentials, and the persistent risk of ransomware attacks. If you’ve ever watched a sci-fi film, you’ll know that no matter how impenetrable an opposition’s defences may seem - there is always a chink in the armor that can be exploited - an opening that can be exploited. Whether it’s the Death Star in Star Wars, the City Destroyer in Independence Day, or The Borg Cube from Star Trek, attackers always find a way in. Similarly, in the world of cybersecurity, today’s perimeter defenses are no longer enough to keep intruders at bay. Register today for your chance to hear from two of the most preeminent minds in Attack Surface Management as they answer: - What are the top threats companies should be monitoring to bolster their ASM programs - How to align this with your security objectives, risk tolerance, and business goals - What strategies and practical steps should security teams take to strengthen their cybersecurity posture
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (28)
Subscribers (1577)
Searchlight Cyber provides organizations with relevant and actionable threat intelligence, to help them identify and prevent criminal activity. Originally
founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web
investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. The company has
expanded and evolved, adding external threat management capabilities to create a Continuous Threat Exposure Management platform for organizations. T…