New: Threat Exposure Validation Impact Report 2025
Learn More
Meet the team at Gartner Security & Risk Management Summit
Book a Meeting
Join our Summer Webinar Series on Threat Exposure Validation
Register Now
Meet the team at Infosecurity Europe 2025
Book a Meeting
Webinar

Pushing New Boundaries for a Threat-Informed Defense for Cloud

Panelists include:
Carolyn Crandall, Nir Loya Dahan, Mike DeNapoli
1 Nov '23
Pushing New Boundaries for a Threat-Informed Defense for Cloud

Cloud security posture management (CSPM) is only a partial solution for cloud exposure management.

Identifying misconfigurations in the cloud is a critical step to discover security weaknesses, but assessment data often includes hundreds of potential weaknesses without context to actual risk.

Join cybersecurity experts Carolyn Crandall, Nir Loya Dahan, Mike DeNapoli as they model the Cymulate Exposure Management Platform to achieve:

  • A risk-based view of cloud security posture.
  • A risk-profiled cloud asset inventory, attack surface, and validated attack paths.
  • Program baselines and executive communication for cloud deployments.