info.xmcyber.com Open in urlscan Pro
2606:2c40::c73c:67e4  Public Scan

Submitted URL: https://info.xmcyber.com/e3t/Ctc/5B+113/cvpnm04/MWLFdc5hBRLW6gtH5R4f39rqW74N_GZ53qX-9N58csNC5nR32W50kH_H6lZ3p9W4DW4Wj5y8t...
Effective URL: https://info.xmcyber.com/implement-a-continuous-threat-exposure-management-program?utm_campaign=The%20Power%20Of%20Attack...
Submission: On September 14 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4156399/528c683b-b2ad-4c81-948d-770dac7efb70

<form id="hsForm_528c683b-b2ad-4c81-948d-770dac7efb70_5759" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4156399/528c683b-b2ad-4c81-948d-770dac7efb70"
  class="hs-form-private hsForm_528c683b-b2ad-4c81-948d-770dac7efb70 hs-form-528c683b-b2ad-4c81-948d-770dac7efb70 hs-form-528c683b-b2ad-4c81-948d-770dac7efb70_4702a7c1-9e9a-4239-b7c1-b412c7ef58aa hs-form stacked hs-custom-form"
  target="target_iframe_528c683b-b2ad-4c81-948d-770dac7efb70_5759" data-instance-id="4702a7c1-9e9a-4239-b7c1-b412c7ef58aa" data-form-id="528c683b-b2ad-4c81-948d-770dac7efb70" data-portal-id="4156399">
  <fieldset class="form-columns-2">
    <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your "
        for="firstname-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input id="firstname-528c683b-b2ad-4c81-948d-770dac7efb70_5759" name="firstname" required="" placeholder="First name*" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
    </div>
    <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your "
        for="lastname-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input id="lastname-528c683b-b2ad-4c81-948d-770dac7efb70_5759" name="lastname" required="" placeholder="Last name*" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your " for="email-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input id="email-528c683b-b2ad-4c81-948d-770dac7efb70_5759" name="email" required="" placeholder="Business email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_phone hs-phone hs-fieldtype-phonenumber field hs-form-field"><label id="label-phone-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your "
        for="phone-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input id="phone-528c683b-b2ad-4c81-948d-770dac7efb70_5759" name="phone" required="" placeholder="Phone number*" type="tel" class="hs-input" inputmode="tel" autocomplete="tel" value=""></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_video_name hs-video_name hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-video_name-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your "
        for="video_name-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="video_name" class="hs-input" type="hidden" value="Go beyond Log4Shell and see the entire attack path with XM Cyber"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_jobtitle hs-jobtitle hs-fieldtype-text field hs-form-field"><label id="label-jobtitle-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your "
        for="jobtitle-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span></span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input id="jobtitle-528c683b-b2ad-4c81-948d-770dac7efb70_5759" name="jobtitle" required="" placeholder="Job title*" type="text" class="hs-input" inputmode="text" autocomplete="organization-title" value=""></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_demo_request hs-demo_request hs-fieldtype-select field hs-form-field"><label id="label-demo_request-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your Would you like a demo of XM Cyber?"
        for="demo_request-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>Would you like a demo of XM Cyber?</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><select id="demo_request-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="hs-input is-placeholder" name="demo_request">
          <option disabled="" value="">Please Select</option>
          <option value="Yes">Yes</option>
          <option value="Not right now">Not right now</option>
        </select></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your UTM Term"
        for="utm_term-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>UTM Term</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your UTM Campaign"
        for="utm_campaign-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>UTM Campaign</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value="The Power Of Attack Graphs in the Cloud"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your UTM Medium"
        for="utm_medium-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>UTM Medium</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value="email"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your UTM Content"
        for="utm_content-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>UTM Content</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="utm_content" class="hs-input" type="hidden" value="274238204"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="" placeholder="Enter your UTM Source"
        for="utm_source-528c683b-b2ad-4c81-948d-770dac7efb70_5759"><span>UTM Source</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="utm_source" class="hs-input" type="hidden" value="hs_email"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1">
    <div class="legal-consent-container">
      <div>
        <div class="hs-dependent-field">
          <div class="hs_LEGAL_CONSENT.subscription_type_4619099 hs-LEGAL_CONSENT.subscription_type_4619099 hs-fieldtype-booleancheckbox field hs-form-field">
            <legend class="hs-field-desc" style="display: none;"></legend>
            <div class="input">
              <ul class="inputs-list" required="">
                <li class="hs-form-booleancheckbox"><label for="LEGAL_CONSENT.subscription_type_4619099-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="hs-form-booleancheckbox-display"><input
                      id="LEGAL_CONSENT.subscription_type_4619099-528c683b-b2ad-4c81-948d-770dac7efb70_5759" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_4619099" value="true"><span>
                      <p>By signing up you are agreeing to receive occasional marketing, product and event updates from XM Cyber. You can unsubscribe at any time.</p>
                      <p>&nbsp;</p>
                      <p><br>By submitting the form, I acknowledge that I have read the <a href="https://www.xmcyber.com/privacy-policy/" rel="noopener">Privacy Policy</a>.</p><span class="hs-form-required">*</span>
                    </span></label></li>
              </ul>
            </div>
          </div>
        </div>
        <legend class="hs-field-desc checkbox-desc" style="display: none;"></legend>
      </div>
    </div>
  </fieldset>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1694698398667&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1694676051843&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:4619099,\&quot;label\&quot;:\&quot;<p>By signing up you are agreeing to receive occasional marketing, product and event updates from XM Cyber. You can unsubscribe at any time.</p>\\n<p>&amp;nbsp;</p>\\n<p><br>By submitting the form, I acknowledge that I have read the <a href=\\\&quot;https://www.xmcyber.com/privacy-policy/\\\&quot; rel=\\\&quot;noopener\\\&quot;>Privacy Policy</a>.</p>\&quot;,\&quot;required\&quot;:true}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;<p>By submitting the form, I acknowledge that I have read the <a href=\\\&quot;https://www.xmcyber.com/privacy-policy/\\\&quot; target=\\\&quot;_blank\\\&quot;>Privacy Policy</a>.</p>\&quot;,\&quot;isLegitimateInterest\&quot;:false}&quot;,&quot;clonedFromForm&quot;:&quot;e6e796d0-cf4e-4d07-a8be-2aaa22aa24d9&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.187 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Implement a Continuous Threat Exposure Management (CTEM) Program&quot;,&quot;pageUrl&quot;:&quot;https://info.xmcyber.com/implement-a-continuous-threat-exposure-management-program?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%20Cloud&amp;utm_medium=email&amp;_hsmi=274238266&amp;_hsenc=p2ANqtz-8GyiJzbJqVXd_8kru8GHDo6Gn4-cXFzAhxYbZdgQJjOiA5aV9wEcwIITVMv9-_pXzYVmRErz8s2jhFiIfUz43ZzeZLn3BtwEJBxKbH7LWJnrD-Xy8&amp;utm_content=274238204&amp;utm_source=hs_email&quot;,&quot;pageId&quot;:&quot;125238447225&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;The Power Of Attack Graphs in the Cloud&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;274238266&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-8GyiJzbJqVXd_8kru8GHDo6Gn4-cXFzAhxYbZdgQJjOiA5aV9wEcwIITVMv9-_pXzYVmRErz8s2jhFiIfUz43ZzeZLn3BtwEJBxKbH7LWJnrD-Xy8&quot;,&quot;utm_content&quot;:&quot;274238204&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://info.xmcyber.com/implement-a-continuous-threat-exposure-management-program&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;hutk&quot;:&quot;4c584a6010ea6806f29269c9212dee1f&quot;,&quot;__hsfp&quot;:3827555245,&quot;__hssc&quot;:&quot;7655085.1.1694698400040&quot;,&quot;__hstc&quot;:&quot;7655085.4c584a6010ea6806f29269c9212dee1f.1694698400040.1694698400040.1694698400040.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_widget_1645772628185&quot;,&quot;formInstanceId&quot;:&quot;5759&quot;,&quot;notificationRecipients&quot;:&quot;p2ANqtz-_YYlAG7ONV_JnzkLFq_lGg7Q9comv5u1whVigbBIRyHwgm3vSwggZyvjr_Se8jz6FgP3M9&quot;,&quot;pageName&quot;:&quot;Implement a Continuous Threat Exposure Management (CTEM) Program&quot;,&quot;boolCheckBoxFields&quot;:&quot;LEGAL_CONSENT.subscription_type_4619099&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1694698400054,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;4156399&quot;,&quot;formId&quot;:&quot;528c683b-b2ad-4c81-948d-770dac7efb70&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_widget_1645772628185&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;5759&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;redirectUrl&quot;:&quot;https://www.gartner.com/doc/reprints?id=1-2EJH7XRN&amp;ct=230725&amp;st=sb&quot;,&quot;isMobileResponsive&quot;:true,&quot;notificationRecipients&quot;:&quot;p2ANqtz-_YYlAG7ONV_JnzkLFq_lGg7Q9comv5u1whVigbBIRyHwgm3vSwggZyvjr_Se8jz6FgP3M9&quot;,&quot;pageName&quot;:&quot;Implement a Continuous Threat Exposure Management (CTEM) Program&quot;,&quot;pageId&quot;:&quot;125238447225&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;4702a7c1-9e9a-4239-b7c1-b412c7ef58aa&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;,&quot;phone&quot;,&quot;video_name&quot;,&quot;jobtitle&quot;,&quot;demo_request&quot;,&quot;utm_term&quot;,&quot;utm_campaign&quot;,&quot;utm_medium&quot;,&quot;utm_content&quot;,&quot;utm_source&quot;,&quot;LEGAL_CONSENT.subscription_type_4619099&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3743&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3743&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3743&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;125238447225&quot;,&quot;analyticsPageId&quot;:&quot;125238447225&quot;,&quot;pageContextPageId&quot;:&quot;125238447225&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1694698398773,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1694698398773,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Implement a Continuous Threat Exposure Management (CTEM) Program\&quot;,\&quot;pageUrl\&quot;:\&quot;https://info.xmcyber.com/implement-a-continuous-threat-exposure-management-program?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%20Cloud&amp;utm_medium=email&amp;_hsmi=274238266&amp;_hsenc=p2ANqtz-8GyiJzbJqVXd_8kru8GHDo6Gn4-cXFzAhxYbZdgQJjOiA5aV9wEcwIITVMv9-_pXzYVmRErz8s2jhFiIfUz43ZzeZLn3BtwEJBxKbH7LWJnrD-Xy8&amp;utm_content=274238204&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.187 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;The Power Of Attack Graphs in the Cloud\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;274238266\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-8GyiJzbJqVXd_8kru8GHDo6Gn4-cXFzAhxYbZdgQJjOiA5aV9wEcwIITVMv9-_pXzYVmRErz8s2jhFiIfUz43ZzeZLn3BtwEJBxKbH7LWJnrD-Xy8\&quot;,\&quot;utm_content\&quot;:\&quot;274238204\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;pageId\&quot;:\&quot;125238447225\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1694698398776,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;GB\&quot;&quot;},{&quot;clientTimestamp&quot;:1694698400046,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;4c584a6010ea6806f29269c9212dee1f\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://info.xmcyber.com/implement-a-continuous-threat-exposure-management-program\&quot;,\&quot;contentType\&quot;:\&quot;landing-page\&quot;,\&quot;pageId\&quot;:\&quot;125238447225\&quot;}&quot;}]}"><iframe
    name="target_iframe_528c683b-b2ad-4c81-948d-770dac7efb70_5759" style="display: none;"></iframe>
</form>

Text Content

GARTNER ® REPORT – IMPLEMENT A CONTINUOUS THREAT EXPOSURE MANAGEMENT (CTEM)
PROGRAM

In the year since it was released, Continuous Threat Exposure Management (CTEM)
framework has enabled organizations across the globe to become better prepared
to efficiently address exposures and improve their security posture.

Now you can download the foundational report, Implement a Continuous Threat
Exposure Management (CTEM) Program, 21 July 2022, here.

In it, you’ll learn all about:

 * Why zero-day threats shouldn’t be the main area of focus
 * Why vulnerability management is no longer sustainable
 * The 5 steps to CTEM – Scoping, Discovery, Prioritization, Validation, and
   Mobilization
 * The benefits of this holistic approach 

Want to learn more about how to build your own CTEM program? Download the report
today!


DOWNLOAD NOW!

Would you like a demo of XM Cyber?
Please SelectYesNot right now
UTM Term

UTM Campaign

UTM Medium

UTM Content

UTM Source


 * By signing up you are agreeing to receive occasional marketing, product and
   event updates from XM Cyber. You can unsubscribe at any time.
   
    
   
   
   By submitting the form, I acknowledge that I have read the Privacy Policy.
   
   *


Gartner, Implement a Continuous Threat Exposure Management (CTEM) Program, 21
July 2022, Jeremy D'Hoinne, et. al.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its
affiliates in the U.S. and internationally and is used herein with permission.
All rights reserved.

 


XM CYBER, 2023