Close

New Workspace Modernization Research from CDW

See how IT leaders are tackling workspace modernization opportunities and challenges.

Mar 05 2026
Security

What Is Continuous Threat Exposure Management? A Risk-Driven Approach for State and Local Agencies

CTEM helps agencies shift from vulnerability management to continuous, risk-based exposure reduction aligned with business impact.

State and local governments face a relentless stream of newly disclosed vulnerabilities, evolving attack techniques and growing pressure from leadership to demonstrate measurable risk reduction. For many public sector IT and security teams, traditional vulnerability management programs are no longer enough.

Continuous threat exposure management offers a path forward. According to CDW security leaders, CTEM represents a shift from counting vulnerabilities to managing real business risk.

“CTEM is a risk management strategy,” says Charles Cartwright, executive technology strategist for CDW. “It’s a risk management strategy that is based on business and threat context. It’s not just based on what’s vulnerable. That’s traditional vulnerability management.”

Buck Bell, leader of CDW’s Global Security Strategy Office, frames it this way: “The conversation in cybersecurity is moving from just accounting for vulnerabilities to actually managing real business exposure. That’s what CTEM promises.”

Click the banner below to consider how managed security services can help.

 

What Is CTEM in Cybersecurity?

CTEM is built around a structured, repeatable process. Bell describes it as a five-stage approach that provides logical progression and maturity: “It’s effectively five steps in the maturation — scoping, discovery, prioritization, validation and mobilization.”

Here’s what that looks like in practice:

  • Scoping requires understanding the assets an organization has and identifying those that matter most
  • Discovery identifies vulnerabilities and misconfigurations, as well as potential attack paths
  • Prioritization ranks exposures based on business impact and the likelihood of exploitation
  • Validation simulates attacks to confirm which paths are truly exploitable
  • Mobilization tracks and remediates exposures in a coordinated way

Cartwright emphasizes that CTEM is more than a periodic scan-and-patch cycle.

“Typically, in vulnerability management, you have a scanner, you detect vulnerabilities and you patch them,” he says. “That tends to happen in a silo of the security organization. With CTEM, you need to identify your sources of data across the enterprise, aggregate all of that data, deduplicate it, add business context and then have a mobilization layer to remediate.”

In other words, CTEM is not “vulnerability management plus” — it’s a broader, enterprise risk program.

Why CTEM Matters for State and Local Government Environments

Several forces are driving CTEM conversations in the public sector.

First, security teams are overwhelmed. “Their security operations center teams are overloaded on software vulnerabilities,” Cartwright says. “Every single day, there are new critical vulnerabilities coming out. Their teams just can’t handle remediating all of those without impacting the business.”

Second, many organizations lack visibility beyond Common Vulnerabilities and Exposures. Misconfigured systems, over-permissioned identities and risky cloud deployments often go unnoticed in traditional programs.

“What about exposures related to misconfigured systems or risky configurations?” Cartwright asks. “It’s not necessarily a vulnerability, but it’s the way the system has been deployed.”

Third, prioritization is a persistent struggle. Without business context, agencies often resort to “playing Whac-A-Mole,” Cartwright says — fixing issues as they appear rather than strategically protecting critical assets.

Bell adds another dimension: the growing uncertainty related to AI-driven threats.

“There’s a generalized fear of what AI is bringing to overall threat approaches,” he says. “Point-in-time analysis is really insufficient. Customers want a more continuous ability to evaluate their risk posture.”

For state and local governments — which manage sensitive citizen data, critical infrastructure and public safety systems — the stakes are high. Leaders increasingly expect security teams to articulate risk in business terms, not just technical metrics.

READ MORE: Utilities are the new frontline against cyberthreats.

How Does a CTEM Program Help Agencies Manage Threat Exposure?

While the five stages provide structure, the real transformation occurs in how agencies think about exposure.

In discovery, organizations often uncover shadow IT, says Cartwright — assets and applications that IT and security teams weren’t aware of. Continuous exposure management also surfaces identity risks and cloud misconfigurations that traditional scans miss.

“When you start to look at threat exposure in a continuous fashion,” he says, “you discover over-permissioned identities, attack paths through your help desk, or weaknesses in cloud and public-facing applications.”

Validation is particularly powerful. By simulating attacks, agencies can reduce thousands of theoretical vulnerabilities down to a small number of meaningful attack paths.

“Rather than saying, ‘We have 10,000 vulnerabilities,’ you may realize there are only two attack paths that can get to critical data,” Bell explains. “That helps them focus a lot.”

For organizations that have experienced a breach, this clarity can be transformative.

Buck Bell
The conversation in cybersecurity is moving from just accounting for vulnerabilities to actually managing real business exposure. That’s what CTEM promises.”

Buck Bell Global Security Strategy Office Leader, CDW

How Do Government IT Officials Address Risk With CTEM?

One of the most common misunderstandings about CTEM is that it requires scanning everything, everywhere, all the time.

“People make assumptions that they need to account for literally every asset,” Bell says. “They get bogged down because they’re not bringing risk into play.”

Executed properly, CTEM does the opposite.

“It actually helps you figure out what you don’t need to remediate,” Bell says. “Once people move from ‘I’ve got to account for everything’ to ‘Oh, wait a minute, this is going to help me prioritize,’ that’s a revelatory moment.”

The key is business context. Cartwright notes that many security teams struggle to connect technical findings to asset ownership, business processes and impact.

“They’re not coming to the table already knowing who owns this asset, how it’s used, what business process it’s a part of,” he says. Without that context, risk-based prioritization becomes a manual and tedious exercise.

For state and local governments, building that context may require closer collaboration between IT, security, operations and program owners — a shift from siloed security operations to enterprise risk governance.

DIVE DEEPER: Build stronger data governance for state and local governments.

How Do Government Agencies Measure CTEM Success?

Another challenge for public sector teams is measurement.

Traditional metrics — vulnerabilities opened versus closed — do not resonate with executive leadership or legislators.

“Closing more vulnerabilities than you are opening is good,” Bell says. “But that doesn’t tell executive teams very much about actual business risk.”

CTEM introduces a different lens. Success can be measured through improvements in key risk indicators and reductions in exploitable attack paths tied to critical assets.

Bell warns that some organizations attempt CTEM and fail because they treat it as a technical exercise rather than a risk-driven program.

“They failed to incorporate the risk management aspect and turned it into a collecting and categorizing exercise,” he says. “You need to establish milestones that indicate you’ve had success.”

For public agencies, those milestones might include reduced exposure of sensitive citizen data, shortened time to remediate high-risk attack paths or improved reporting to oversight bodies.

How to Implement a CTEM Program in State and Local Agencies?

When CTEM discussions begin, many organizations ask the same question: What’s the product?

“I think a lot of customers like to identify, ‘What’s the solution? What’s the platform that can do this for me?’” Cartwright says.

But he cautions against leading with tools.

“I like to steer them back to it being a program first, then focus on the tools.”

CTEM requires foundational capabilities, including a clear definition of risk appetite and an understanding of business process dependencies.

“To determine risk and potential impact, you have to understand the processes and functions that would be impacted,” Cartwright says.

Bell notes that organizations already familiar with continuous models — such as mature IT service management practices — often adapt more easily to CTEM than those relying solely on periodic assessments.

Automation is also essential. “The continuous part of CTEM is not just continuous information and data,” Bell says. “It’s also trying to automate some of the remediation tasks.”

CDW supports agencies across that journey, from executive workshops to architectural design and implementation. According to Bell, enterprise initiatives like CTEM require stakeholder alignment and clear communication among technical and business leaders.

Ultimately, the most important takeaway may be conceptual.

“When you’re faced with a threat,” Cartwright says, “a program like CTEM helps answer the questions: Are we vulnerable? Can this be exploited in our environment? And how does this risk impact the business?”

FangXiaNuo / Getty Images