Synopsis
Sekuro CTO Jason Trampevski had a candid fireside chat with Tenable Senior Vice President of Product Jason Merrick.
The conversation encompassed:
- How Tenable stays ahead of the threat landscape;
- Common challenges faced by organisations across exposure management, tech stack consolidation and patch management – and how Tenable addresses these;
- The evolving nature of the CISO role, and
- Exciting updates on how Tenable is incorporating AI capabilities to help their customers with simplification, visibility and aggregation.
We have distilled their talk into key takeaways.
Watch the full fireside chat here:
How to Stay Ahead of the Threat Landscape






Tenable has 44,000 customers globally. Tap into a security provider or vendor with breadth and depth of customer data and analyses.
Obtain insights from industry constituents and partners. They have a broader view, exposure and deeper experience than your organisation.
Adopt a risk-based approach specific to solving for your use cases.
Understand and have visibility into your configuration, policy entitlements and implement least privileged access to mitigate policy drift.
Subscribe to prescriptive guidance – work with security partners to address vulnerabilities and concerns that have been uncovered. Test and confirm remediation initiatives.
Enforce the Golden Triangle – tie in your technology investments with people and processes. Have the right teams and processes in place.
How Tenable Helps Customers Overcome Common Challenges

Drive actions and accountability across your organisation
The Tenable One platform and suite of products provides comprehensive analytics across the latest scan data and attack paths, mapped to the MITRE ATT&CK® framework, for visual reporting on how your systems are connected.

Holistic insights into your operational environment
Tenable One provides customisable, visual dashboards and operational insights across web application scans, operational technology, identity exposures, to provide a ‘limited exposure’ view to CISOs, CIOs and SecOps, and other functional stakeholders. Present compelling insights, based on a grading system of criticality, of how well your vulnerabilities are being managed, and how you are trending over time.

Prioritise Patching
Tenable Vulnerability Intelligence and Exposure Response provides the ‘explainability’ on how critical an exposure is. The context-driven prioritisation and response feature, based on a database fed by signals across zero-day detections, social media, press, and the dark web, provides actionable insights by indicating assets impacted, the vulnerability lifecycle, and risk impact.
The Fundamentals of Exposure Management

Build Your Inventory
Understand what assets you’re responsible for, across conventional IT, endpoint, cloud, OT, identity, human, non-human

Analyse
Study associated risks, vulnerabilities, toxic combinations, weaknesses

Communicate and prioritise
Technology and business prioritisation to drive compliance and remediation

Optimise Outcomes
How to Make Exposure Management a Whole-Of-Organisation Remit and Elevate the Conversation to the Board





Don’t be afraid to ask for help and enlist your technology/security partner.
Tear down the organisational silos, and marry data across cloud, identity, infrastructure, endpoints, network, policy, culture.
Translate technology priorities into the business context. Help all stakeholders understand the ROI and value of your technology investments, and always answer the question, ‘What is the business risk?’.
Bring the CFO into your conversations. They are ultimately responsible for your business’ operational continuity, through their Earnings Before Interest, Taxes, Depreciation, and Amortisation (EBITDA) lens.
Communicate actionable vulnerability intelligence and demystify leadership decisions around risk management and mitigation. This avoids recency bias when the media covers high profile breaches and vulnerabilities that may not align with your strategic course of-action.
What Is Tenable Focusing on in Terms of Future Releases and Platform Features?
- Simplification and consolidation across multiple vendor solutions, encompassing network, endpoints, OT, software. Tenable is working on a single pane of glass to provide vulnerability aggregation, continuous control monitoring and security posture management to provide a holistic view of risk and help their clients to prioritise remediation.
- AI-based contextual intelligence for easier, simpler and more effective risk remediation. Tenable has been training their Large Language Model (LLM), based on their vulnerability database and customer behaviours, to inject speed and productivity into vulnerability management. This includes features such as: rapid search for information on corporate assets; Copilot, and the ability to have a self-help conversation with a ChatBot; and autonomous agents to automate vulnerability aggregation and asset inventory queries without the need for verbose prompt engineering (as is the case today).
Learn how Sekuro’s Orchestrated Vulnerability Management streamlines vulnerability detection and simplifies decision-making for your organisation.

Jason Trampevski
Chief Technology Officer (CTO), Sekuro
Jason is a strategic technology leader dedicated to helping organisations achieve their goals through the effective use of technology. His expertise lies in building resilience and driving business success. As a specialist in transforming complex business requirements into streamlined technology solutions, his focus lies in harmonising the essential components of people, processes, and technology to empower organisations to maintain agility and competitiveness in today's rapidly evolving digital world.