Check Point Experts on CTEM in the Real World & What Actually Gets You Hacked

AI Summary4 min read

TL;DR

Check Point experts host a live AMA on CTEM, focusing on real-world application, common pitfalls, and practical advice for cybersecurity professionals. They discuss exposure management, attack surface risks, and how to prioritize effectively.

Key Takeaways

  • CTEM differs from vulnerability management by emphasizing continuous exposure tracking and real-world attack paths.
  • Common issues include wasted time on non-critical findings and failure in prioritization practices.
  • Experts provide insights on attack surface blind spots, exposure chaining, and automation's genuine role in cybersecurity.

Tags

CTEMcybersecuritythreat exposureattack surfaceCheck Point

We’re hosting a live Ask Me Anything on CTEM (Continuous Threat Exposure Management) in the real world.

For 24 hours, we’ll answer questions in real time.

This AMA is about how CTEM actually works (or doesn’t) when it meets reality:

  • What exposures attackers actually exploit
  • Why most “critical” findings never matter
  • Where organizations waste time chasing ghosts
  • How can you make leadership care about attack surface risks without lighting something on fire?

The people answering are the researchers and analysts who track adversaries, exposures, and attack paths every day, and who deal with the gap between theory and practice.

Who’s answering your questions?

You’ll hear from:

  • Senior threat researchers
  • CISOs
  • Check Point Cyber Evangelists
  • External risk and exposure experts
  • Threat intelligence practitioners working across tactical and operational levels

These are the same folks whose research regularly shows up in major media and industry reports.

Topics you can ask about

  • CTEM vs. vulnerability management: what’s actually different
  • Attack surface blind spots teams keep missing
  • Exposure chaining and what really leads to compromise
  • Why “prioritization” usually fails in practice
  • AI hype vs. where automation genuinely helps
  • What cyber sec professionals should stop doing immediately

Drop your questions — the more specific, the better.

Meet the Experts (aka: the people answering your questions so you don’t have to Google for 3 hours)

Jony Fischbein, Global CISO @ Check Point — u/noissues_ciso_chkp

Jony is Check Point’s Global CISO and a Forbes Technology Council member, which basically means he’s spent 25+ years trying to convince people that “security” is not the same as “turning it off and on again.” Former CISO, current CISO, perpetual problem‑solver - he advises global orgs on how not to get pwned.

Pouya Ghotbi, Security Evangelist @ Check Point & Adjunct Professor u/Downtown-Ad-252

Pouya has 25+ years of helping organizations understand risk, prioritize what actually matters, and stop doing cyber things that make everyone sad. Featured in Cyber Daily, Security Brief Australia, AusCERT, AWS Symposiums, CFOtech, and more - he’s basically the cybersecurity version of that friend who explains complicated stuff without making you feel dumb.

Ken Towne, Security Architect & Hands-On Cyber Practitioner u/ken_exmachina

Ken has 15+ years in the trenches of DoD, Federal, and commercial cybersecurity - building SOCs, running incident response, doing threat modeling, breaking into things (legally), and fixing the things he breaks (also legally). Before Check Point, he spent three operational tours in Iraq as a U.S. Marine, then ran an IT consulting firm supporting everything from security architecture to system deployments. He’s spoken at Secure360, SecTor, SecureMiami, and other places people go when they want practical advice instead of buzzwords. TL;DR: if it plugs in, he’s secured it, attacked it, or rebuilt it better.

Tal Samra, Cyber Researcher & World‑Renowned Psytrance DJ u/Confident-Appeal-583

By day, Tal tracks threat actors across all the dark, weird, and sketchy corners of the internet. By night, he’s SAMRA - an internationally acclaimed psytrance DJ with releases on top labels and crowds losing their minds worldwide. Basically: finds threat actors AND drops beats. Multitasking at its finest.

Sergey Shykevich — u/No-Consequence2573

Sergey leads Check Point’s Threat Intelligence Group, monitoring and analyzing global cyber threats at tactical, operational, and strategic levels - which is a polite way of saying he knows what attackers are planning before they do. Before Check Point, he ran cyber intel and defense teams in the Israeli Intelligence Forces and later led threat intel at Q6 Cyber. TL;DR: if cybercrime had a Most Wanted list, he’s probably already read it.

To learn more about Check Point's vision for exposure management please visit: https://www.checkpoint.com/exposure-management/

submitted by /u/Check_Point_Intel
[link] [comments]

Visit Website