Attack Surface Management: Discover and Secure Your Unknown Internet Exposure at Scale

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Exploiting public-facing applications is one of the most common attack vectors to gain initial access and launch cyber-attacks. The average enterprise runs 464 custom applications, driven by accelerated digital transformation during the pandemic. However, the actual number is much higher due to shadow IT, making it difficult for security teams to secure the “unknown” and keep track of their evolving attack surface. 

With more external-facing applications than ever, changing how we think about application security is essential. Traditional application scanning and pen testing are imperative to identify runtime vulnerabilities in ‘known’ web services. Still, there’s one problem – you’re only testing what you know, not what’s actually out there and at risk. A new approach is needed to help security leaders identify, measure and reduce the overall internet exposure - continuous attack surface management.

Attend this webinar to discuss best practices for identifying and managing your external attack surface and explore the benefits of applying a risk-based approach to the application security testing cycle.

Topics include:

  • The dramatic rise of applications and your external attack surface 
  • What is external attack surface management (EASM) and why organizations need it
  • How different attack vectors are contributing to your growing attack surface
  • Understand the most common application attack vectors across retail, finance, manufacturing and healthcare
  • How EASM best practices can help get your house in order and reduce shadow IT risks


Photo of Simon Clark

Simon Clark

Director, FortNet UK

Photo of Benjamin David

Benjamin David

Deputy Editor, Infosecurity Magazine

Photo of Stephane Konarkowski

Stephane Konarkowski

Senior Security Consultant, Outpost24

Photo of John Stock

John Stock

Product Manager, Outpost24

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Outpost24 here: Please see Infosecurity Magazine’s privacy policy for more information.