Attack Surface Management: Discover and Secure Your Unknown Internet Exposure at Scale

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Exploiting public-facing applications is one of the most common attack vectors to gain initial access and launch cyber-attacks. The average enterprise runs 464 custom applications, driven by accelerated digital transformation during the pandemic. However, the actual number is much higher due to shadow IT, making it difficult for security teams to secure the “unknown” and keep track of their evolving attack surface. 

With more external-facing applications than ever, changing how we think about application security is essential. Traditional application scanning and pen testing are imperative to identify runtime vulnerabilities in ‘known’ web services. Still, there’s one problem – you’re only testing what you know, not what’s actually out there and at risk. A new approach is needed to help security leaders identify, measure and reduce the overall internet exposure - continuous attack surface management.

Attend this webinar to discuss best practices for identifying and managing your external attack surface and explore the benefits of applying a risk-based approach to the application security testing cycle.

Topics include:

  • The dramatic rise of applications and your external attack surface 
  • What is external attack surface management (EASM) and why organizations need it
  • How different attack vectors are contributing to your growing attack surface
  • Understand the most common application attack vectors across retail, finance, manufacturing and healthcare
  • How EASM best practices can help get your house in order and reduce shadow IT risks


Simon Clark

Director, FortNet UK

Benjamin David

Deputy Editor, Infosecurity Magazine

Stephane Konarkowski

Senior Security Consultant, Outpost24

Brad LaPorte

Partner, High Tide Advisors, former Gartner analyst and Ordr advisor

Simon Roe

Application Security Product Manager, Outpost24

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Outpost24's privacy policy here: Please see Infosecurity Magazine’s privacy policy for additional information.