• Scoping
  • Discovery
  • Prioritization
  • Validation
  • Mobilization
    • Results

    For each attack surface, how complete is your catalog of assets?

    %
    50%
    Laptops, Phones, Hardware / iOT
    50%
    GCP, AWS, Azure
    50%
    Domains, Web & Native Apps , APIs

    Where are you in your scoping journey?

    Scoping Likert
    No
    Not Really
    Maybe
    Somewhat
    Yes
    Have you defined the key players in your organization responsible for cybersecurity?
    Have you set cybersecurity objectives that are meaningful to all stakeholders?
    Can you explain how CTEM will work with your existing security frameworks?