Access Management , Fraud Management & Cybercrime , Video

Attack Surface Management: The Next Generation

Coalfire's Martin Sajon and Jason Hicks on the New Essentials
Martin Sajon, cyber executive adviser; Jason Hicks, cyber executive adviser; Coalfire

There's no question the attack surface has expanded exponentially over the past 20 months. But has attack surface management grown and matured to keep pace? Martin Sajon and Jason Hicks of Coalfire discuss the evolution and essentials of ASM.

See Also: The Evolution of Privileged User Monitoring for Mainframes

In this exclusive video interview with Information Security Media Group, Sajon and Hicks discuss:

  • The shifting attack surface;
  • The emergence of attack surface management;
  • Tangible benefits that can be realized.

Sajon is a cybersecurity executive with hands-on experience in threat and vulnerability management and penetration testing. As a cyber executive adviser at Coalfire, he works with clients on strategies to address threat and vulnerability management and develops new products to help clients tackle the latest threats.

Hicks is a veteran information security and risk management executive with CISO experience in the finance, retail, information security service provider, entertainment, manufacturing, and logistics industries. As a cyber executive adviser at Coalfire, he is responsible for helping clients' CISOs maximize their security investments and program maturity.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.