Wednesday, June 18th, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

5:30pm – 8:00pm PT | San Jose, CA

Event Overview

Continuous Threat Exposure Management – it’s the capability to identify, prioritize and manage potential threats to your cyber-attack surface. And it’s one of Gartner’s top strategic technology trends of 2024.

But more than just a buzzword, CTEM begs serious questions about how your enterprise manages vulnerabilities across your expanded attack surface. How do you assess and respond to the ever-increasing vulnerabilities that emerge daily? What are your biggest challenges around patching and remediation? How do you monitor and defend against specific threat actors targeting your enterprise or industry?

Guided by insights from Nathan Rollings, Field CISO of event sponsor Zafran, this session will delve into the practical applications and strategic benefits of Continuous Threat Exposure Management.

Register for this executive roundtable for new insights and discussion about:

  • Asset inventory and risk assessment
  • Identifying, prioritizing and remediating risks
  • Validating the effectiveness of your controls

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Tom Field

SVP Editorial 

ISMG

 

Rick Bosworth

Director of Product

Zafran Security

Speakers

Guided by insights from Rick Bosworth, Director of Product of event sponsor Zafran Security, this session will delve into the practical applications and strategic benefits of Continuous Threat Exposure Management.  

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Rick Bosworth

Director of Product

Zafran Security

A technologist at heart and marketer by choice, Rick brings an analytical perspective to product marketing and business management. With a focus on cybersecurity spanning CSPM, EDR, CWPP, CNAPP, and now CTEM, his point of view is rooted in translating technical minutia into business value. Outside of the office, Rick enjoys endurance athletics and adventurous dining.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Be.Steak.A

1887 S Bascom Ave, Campbell, CA 95008

Underwritten by


The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your hybrid environment.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI