Hello Ala,

We are looking forward to your participation in Why and How to Adopt the CTEM Framework tomorrow.

Why and How to Adopt the CTEM Framework Why and How to Adopt the CTEM Framework
Pete Shoard, Gartner VP Analyst, Maya Malevich, XM Cyber Head of Product Marketing

Attack Surfaces are expanding as organizations invest in Cloud, SaaS and third-party supplier relationships to support business needs.
At the same time,...

Jan 12 2026 03:00 PM | 51 mins


You can test your system now to make sure you can view our webinars and videos: https://techtarget.service-now.com/csm/en/why-can-t-i-hear-and-or-see-the-webinar?id=kb_article_view&sysparm_article=KB0030126.

Discover more content from XM Cyber

Standing Tall – Top Tips for Your Security Posture Program Standing Tall – Top Tips for Your Security Posture Program
Chris Roberts Researcher, Hacker and CISO, Boom Supersonic & Tobi Traebing Technical Director, XM Cyber

Today, more than ever, organizations need to understand, align on, and mobilize around security posture to facilitate the growth executive teams want to see....

Jan 19 2026 03:00 PM | 49 mins

Defending Your SAP Castle: Best Practices for Protecting Against SAP Attacks Defending Your SAP Castle: Best Practices for Protecting Against SAP Attacks
Jason Fruge Resident CISO at XM Cyber, Bill Bradley Senior Sr Dir Prod Mktg at XM Cyber

SAP is a powerful solution that can run and tie nearly all business processes together – and attackers know that too. If your SAP is compromised, your...

Jan 19 2026 03:00 PM | 39 mins

Thank you,
XM Cyber

All times are displayed in your timezone: Europe/Rome
Update your email preferences: click here

Should you wish to unsubscribe from this channel please click here

For more information, please visit us at www.brighttalk.com
XM Cyber™, 11 Galgalei Haplada
Herzliya, IL

 

Click here to unsubscribe from this email