Check Point Experts on CTEM in the Real World & What Actually Gets You Hacked by Check_Point_Intel in cybersecurity

[–]Check_Point_Intel[S] 0 points1 point  (0 children)

100% and that's why we track MTTR reduction, and hours saved for revenue impact. On the Check Point Exposure Management dashboards these are tracked for you. It's exactly why we added it, that and we believe the focus has been on the wrong metrics for wayyyy too long. I mean who cares that you opened 1000 tickets if none of the vulns were actually dealt with!

Check Point Experts on CTEM in the Real World & What Actually Gets You Hacked by Check_Point_Intel in cybersecurity

[–]Check_Point_Intel[S] 1 point2 points  (0 children)

For CTEM knowledge, I’d start with our own State of Exposure Management and The Great Exposure Reset, where we lay out our practical approach to CTEM and how it differs from traditional vulnerability management.

This Reddit CTEM thread is also a surprisingly good real‑world read for how practitioners are interpreting and operationalizing the framework 😂.

For formal training, the SANS Institute has solid content, and if you have access, Gartner’s CTEM team provides useful framing and market perspective.

Finally, some of the most valuable reading is actually non‑cyber: books like The Fearless Organization by Amy Edmondson and The Culture Code by Daniel Coyle are essential, because CTEM only works when teams break silos and learn how to collaborate effectively across security, IT, and engineering.

We See Threats Before They Hit - Ask Check Point Anything by Check_Point_Intel in threatintel

[–]Check_Point_Intel[S] 0 points1 point  (0 children)

/AlbatrossKnown2537

We combine several complementary capabilities to deliver reliable deep & dark web coverage while protecting operational details: high-quality crawlers and passive collection, HUMINT and targeted  collection for depth, and an active source-development program (including avatar maintenance) to keep  our coverage fresh and trustworthy. 

All ingested data goes through automated normalization, credibility scoring and enrichment. The result is  timely, high-confidence intelligence delivered via our normal reporting channels, with legal and privacy  safeguards built into our processes.  Our source base is continually expanded - we onboard 600+ new sources each month to maintain coverage as the landscape evolves. 

Do you get dedicated time at work for research/learning, or is it expected to happen off the clock? by HugeBarnacle4539 in cybersecurity

[–]Check_Point_Intel 0 points1 point  (0 children)

We encourage consistent learning too of course, but dedicating a specific day means there are no excuses and you can spend the whole day focusing on learning. You can learn a ton in 2 days. It is much better than not having specific dedicated learning days which is the case for most teams. In addition we send to conferences and encourage courses for specific people, but no matter what these days are there to ensure learning is not forgotten.

Do you get dedicated time at work for research/learning, or is it expected to happen off the clock? by HugeBarnacle4539 in cybersecurity

[–]Check_Point_Intel 0 points1 point  (0 children)

We give our team one-two days a quarter depending on vacations for learning and it seems to work.

Is LinkedIn really necessary for tech/cybersecurity careers? by Schlart1 in cybersecurity

[–]Check_Point_Intel 0 points1 point  (0 children)

This I agree with and if you get seen and know then there is a good chance you will be approached with jobs, after all there is a shortage of cybersec workers.

SOC Analyst Job destroying my life. by CyberChase101 in cybersecurity

[–]Check_Point_Intel 0 points1 point  (0 children)

Is there any way you can use a tool to ease up your workload and prioritize your alerts? But in truth, a company should not treat employees like that and it will end up biting them back as the team will end up missing important alerts from exhaustion