The CTEM Chronicles: Prioritization for Balancing the Scales
By
Victor Marchetto
,
Manager, Advisory Services
Contents
Welcome to Episode 4 of the CTEM Chronicles, Phase 3 Prioritization, the point where organizations decide what deserves attention, investment, and action during this CTEM cycle.
In a world of near infinite risks but finite resources, prioritization is critical.
Why Prioritization is the Tipping Point
Security teams often find themselves overwhelmed by scan results, audit findings, and external requirements. Trying to fix everything is impractical and often ineffective. CTEM’s 3rd Phase emphasizes focusing on exposures with the most significant business and operational impact.
Instead of reacting to technical severity alone, the shift is toward exposures that are exploitable, relevant to current threat activity, and critical to the business.
Moving from vulnerability management to exposure management means shifting focus from technical severity to business relevance and adversarial feasibility. We must evaluate not just what could go wrong, but what would matter if it did.
Core Elements of Prioritization
Let’s break down what effective prioritization looks like in a CTEM-aligned program
1. Threat Modeling as a Filter
We should be focusing on threat actions, what adversaries do, not just who they are. This provides a structured lens to rank threats by relevance and impact.
Prioritize threats that are actively exploited or mapped in realistic attack paths.
Use cases: Credential abuse, phishing entry points, lateral movement opportunities.
2. Asset Criticality Mapping
Rather than addressing all assets equally, prioritize based on the business function, data sensitivity, and exposure profile of each asset in the scope for this cycle.
3. Contextual Scoring
Static CVSS scores often leave out important context. Prioritization needs dynamic, multi-input scoring models:
Exploit Prediction Scoring System (EPSS) to assess likelihood of exploitation.
Threat intelligence to determine active campaigns and TTPs in play.
Control effectiveness data: are our existing controls covering the exposure, or failing silently?
Sidebar: What is EPSS? The Exploit Prediction Scoring System (EPSS) is a data-driven risk model maintained by FIRST that predicts the likelihood of vulnerability being exploited in the wild within the next 30 days. It complements CVSS by focusing on real-world exploitability.
For example, a CVSS 9.8 vulnerability with an EPSS of 0.1% may pose less immediate risk than a CVSS 7.5 vulnerability with a 75% EPSS.
Once threats and assets are ranked, map your existing safeguards to these threats. Where are the gaps? Are compensating controls truly compensating?
This step shifts prioritization from abstract risk to concrete remediation paths which will be tested in the next phase.
The Output: An Exposure Narrative
When executed correctly, prioritization produces business-aligned exposure narratives:
What exposures exist?
Which ones have credible paths to critical systems?
What is actively being exploited?
Where are we unprotected?
What’s the cost (or consequence) of not acting?
This narrative is what enables alignment with leadership, funding for remediation, and support from cross-functional teams.
From Reactive to Risk-Based
Evolve recommends for organizations to get proactive by narrowing focus on exposures that:
Are easily discoverable by attackers
Sit close to critical data or systems
Lack meaningful protective controls
Are part of known, successful attack paths
Organizations that succeed here often group exposures by threat vector or business initiative (e.g., phishing-resistance, exposed RDP, insecure AI workflows).
CTEM prioritization is more than a spreadsheet sort. The diagram below shows how different inputs feed into a structured path toward meaningful remediation:
Pitfalls to Avoid
Fixation on CVSS: It’s a useful signal, but not a decision-making tool by itself.
Trying to Boil the Ocean: Prioritize by campaign, asset group, or threat vector. Precision is key, and keeping focused on this cycle’s scope is important.
Operating in Silos: Include IT, compliance, and business owners. CTEM prioritization is a team sport.
The table below contrasts traditional vulnerability management with CTEM’s prioritization mindset:
Feature
Traditional Vulnerability Management
CTEM Prioritization
Focus
Patch Everything
Focus on exploitable & impactful exposures
Inputs
CVSS Scores
Threat Intel, Asset value, EPSS, Control Gaps
Remediation Urgency
First most severe
Context and business driven
Output
Vulnerability list
Exposure narrative aligned to business risk
Cross-Team Collaboration
Minimal
Strong, Includes IT, Business unit liaisons, GRC
Final Thought: Prioritization is Empowerment
Phase 3 of CTEM is focused on determining what exposures and attack paths are worth spending resources to validate and fix. By focusing on exposures that pose the greatest threat to what matters most, organizations can finally get off the hamster wheel of reactive patching and move toward intelligent, sustainable defense.
In Phase 4, we’ll explore Validation where we will test our assumptions before moving to remediate.
Ready to find more vulnerabilities than your last pentest?
Unlock your organization's full security potential and uncover even more vulnerabilities than before by choosing our advanced penetration testing services.