4. THE MODERN ATTACK SURFACE
RAPIDLY GROWING
HIGHLY DYNAMIC
INCREASINGLY INTERCONNECTED
1
2
3
3 attributes make the modern attack surface
more difficult than ever to defend:
Industrial
(OT)
Infrastructure
Web Apps
/APIs
Identity
On Prem &
Remote IT
Internet-
Facing
Assets
Public
Cloud
5. SIGNIFICANT BREACHES TARGET
THE WEAKEST LINK ACROSS
THE ENTIRE ATTACK SURFACE
OT
VULNERABILITIES
OT:ICEFALL
APPLICATION
VULNERABILITIES
PANAMA
PAPERS
ACCESS
PERMISSIONS
LAPSUS$
SOFTWARE
VULNERABILITIES
WANNACRY
LOG4SHELL
EXTERNAL
ATTACK SURFACE
EQUIFAX
PUBLIC CLOUD
CONFIGURATION
CAPITAL ONE
DATA BREACH
Industrial
(OT)
Infrastructure
Web Apps
/APIs
Identity
On Prem &
Remote IT
Internet-
Facing
Assets
Public
Cloud
6. THE PROBLEMS
Lack of
Visibility Into
Expanded
Attack Surface
Solution Silos
Contribute To
Lack of Context
Resource
Limitations
Lack of
Comprehensive
Metrics
Difficult to
Assess &
Communicate
Security Status
9. Putting Exposure Management To Use
● Comprehensive insight and context– threats, assets and privileges
● Reduction in risk and remediation/response resources
● Anticipate attack consequences via a contextual view of assets and users
● Clear, easily communicated key performance indicators (KPIs) and
benchmarks
Director/Manager
• Full visibility and understanding of the entire attack surface
• Unified view of all assets — no more blind spots
• Precise remediation prioritization for all types of vulnerabilities and
exposures
• Clarity for building a baseline for effective risk management
• Improved risk decision making
Analyst/Technician
10. Putting Exposure Management To Use
● Accurate risk assessments to improve decisions regarding investments
and insurability, meet compliance requirements and drive organizational
improvement.
● Actionable metrics to help measure, compare and communicate cyber
risk to IT and security teams, as well as to non-technical executives and
operating teams
● A unified view of cyber risk with clear KPIs to measure progress and
benchmark comparisons against industry peers and within the
organization.
● The ability to answer the question: “How secure are we?”
CISOs, BISOs & Other
Security Executives
11. Quickly understand and manage
risk across entire attack surface
and eliminate blind spots.
TENABLE ONE EXPOSURE
MANAGEMENT PLATFORM:
COMPREHENSIVE VISIBILITY
12. Anticipate consequences of a
cyberattack, prioritize actions
and reduce risk with the least
amount of effort.
TENABLE ONE EXPOSURE
MANAGEMENT PLATFORM:
PREDICTION AND
PRIORITIZATION
13. A centralized, business-aligned view of cyber risk with clear KPIs and benchmarks.
TENABLE ONE EXPOSURE MANAGEMENT PLATFORM:
EFFECTIVE METRICS TO COMMUNICATE CYBER RISK
15. EXPOSURE VIEW: GLOBAL CYBER EXPOSURE SCORE
Global Exposure View answers
questions:
● Where do we stand?
● How is our score trending?
● How effective is our
program maturity?
16. EXPOSURE VIEW: GLOBAL CYBER EXPOSURE SCORE
Tag Performance describes:
● What areas make up this
Exposure View?
● Which areas are driving
the score?
● Which areas require
focus?
17. ASSET INVENTORY
● Full visibility into all assets regardless of data source (VM, WAS,
Active Directory, etc).
● View Asset details
● Create tags for custom Exposure Cards
18. ATTACK PATH ANALYSIS
● Protect your most critical assets
● Visualization and prioritization to mitigate common attack paths from externally
identified points through to critical internal assets long before attackers seek them out.
● Visualize all viable attack paths continuously — both on-premises and in the cloud.
20. TENABLE ONE
EXPOSURE MANAGEMENT: IN SUMMARY
Visibility Into
Expanded
Attack Surface
Solution Silos
Broken Down
Resource
Allocation
Based On Data
Comprehensive
Metrics
Security Status
Clearly
Communicated
22. TENABLE ONE MESSAGING
Apply context to
anticipate threats and
prioritize efforts to
prevent attacks
Communicate
exposure risk at all levels of
the organization to make
better decisions
Gain visibility
across a growing, dynamic,
interconnected modern
attack surface
TENABLE ONE
The Exposure Management Platform for the modern attack surface
Key challenges:
● Siloed view of the attack surface
● Data overload
● Stuck in reactive mode
● Too many tools
Audience benefits:
● Practitioners - prioritize their efforts
● Managers - optimize resources
● Leaders - improve business decisions
23. Exposure Management - Questions
● Do your tools interoperate?
● Full visibility from endpoints to cloud to on-prem?
● Prioritizing remediation efforts in a predictive manner?
● Leveraging threat intelligence?
● Analyzing attack paths to your most critical assets?
24. Exposure Management - Questions
● Are you remediating issues in a timely, precise, continuous
manner?
● Can you answer the question - “How secure are we?”
● Are you able to clearly communicate security status to
business executives and to your security team?
● Are resource allocations grounded in data?
25. TENABLE ONE: EVOLUTION FROM TENABLE.EP
EXPOSURE VIEW
Aggregated Risk Insights
NOW: Exposure View delivers
risk scores across the entire
platform - web apps, AD, cloud,
and more.
ATTACK PATH
ANALYSIS
Breach & Attack Mitigation
NOW: Attack Path Analysis
and Tenable.asm all part of a
single platform.
ASSET INVENTORY
Centralized View of Assets
NOW: Improved Asset
Inventory capabilities to
manage all assets in a
centralized view.
Tenable One
Exposure Management Platform
Tenable.ep
Tenable.ad
Identity
Tenable.io
WAS
Tenable.cs
Cloud
Tenable.io
VM
Tenable Lumin
RVBM Analytics
Tenable.ad
Identity
Tenable.io
WAS
Tenable.cs
Cloud
Tenable.io
VM
Tenable Lumin
RVBM Analytics
Tenable.asm
Attack Surface Management
26. Tenable One: Standard & Enterprise
EP Customers Free Upgrade To Tenable One Standard On October 11
Enterprise ASM Daily Frequency
Tenable One
Enterprise
Tenable.io
VM
Tenable.io
WAS
Tenable.ad
IDENTITY
Tenable.cs
CLOUD
Tenable One
Standard
Tenable.io
VM
Tenable.io
WAS
Tenable.ad
IDENTITY
Tenable.cs
CLOUD
Exposure View & Asset Inventory
Exposure Risk Analytics
Lumin
RBVM Analytics
Lumin
RBVM Analytics
Attack Path Analysis
Breach & Attack Mitigation
ASM
Attack Surface Management
Exposure View & Asset Inventory
Exposure Risk Analytics
Additional WAS Concurrency with Tenable Cloud Scanners
27. Customer Use Cases - In Their Own Words
27
Reporting & Presentations
Update the SLAs then send this off
as a report on how they are doing
and who needs to do more.
Custom Card by Business
Unit/Region
Helps to track which areas are
doing well, and where to point
fingers, and against set targets.
SLAs
Update the SLAs to use as
tracking and objective data
points
News
Having this incorporated is a time
saver, would really be good down
the road to use this as my
starting point, to be proactive.
28. Customer Quotes
● Great complement to Lumin on fixing things and showing us how
we’ve done and what to fix
● Different regions where we can see where things have gone good and
bad. Can use exposure cards for sharing out how we are doing and
reporting on progress. This makes easier to separate out results
and where things need to be fixed based off tags that we’ve created
previously
● Can use exposure cards for sharing out how they are doing and
reporting on progress
29. Customer Quotes
● Exposure cards are cool, improved upon what Lumin did well
● It is not as condemning as IO, seeing 10,000 vulnerabilities is
overwhelming. This feels more like it is helping me get to a better
place
● I think I could communicate with CISO after looking at this view. I
think they may like this a lot more.
● Rick is always looking for a CISO dashboard, this is going to be good
from a CISO perspective. Something big and something easier to
understand. Easy enough to create a card.
30. EVERY MINUTE
Anatomy Of An External Attack Surface: Microsoft, April 2022
375 New
Threats Are
Released
117,289 New
Hosts
Are Created
613 Domains
Are Created
31. TENABLE HAS EVOLVED
Bringing It All Together
Indegy Alsid Accurics
Innovation and Acquisition…
Cymptom Bit
Discovery