Products Services Support & Resources Research
PRIVATE DINING

 

Always On Assurance:
Navigating CTEM & Continuous Validation

A Cyber Leaders' Dinner


  • Date: Thursday, 12th February 2026
  • Time: 6:30 PM - 9:00 PM
  • Venue: City Social, Tower 42, London

Is your security programme validated against reality or just theory? As the industry coalesces around Continuous Threat Exposure Management (CTEM), the role of adversarial testing is fundamentally changing.

Join Rapid7 experts, Craig Roberts and Ken Green, to discuss the evolution of security assurance. We will explore how leaders are combining CTEM strategies with Continuous Red Teaming Services (CRTS) to move beyond static testing and establish a posture of continuous, verifiable resilience.

Key Discussion Points

  • The CTEM Mandate: Moving from vulnerability lists to validated exposure management.

  • The Role of CRTS: Using continuous red teaming to power the ''Validation'' phase of the CTEM cycle.

  • Mobilisation: Ensuring your validation strategy results in actionable, prioritised remediation. 

This is a focused conversation on the strategy and execution required to build a genuinely resilient security programme through ongoing, sophisticated threat emulation.



Agenda
  • 6:30 PM – Arrival drinks
  • 7:00 PM – Dinner and discussion
  • 9:00 PM – Networking & close

Speakers

Craig Roberts.jpeg

Craig Roberts

Principal Software Engineer at Rapid7

Ken Green

Ken Green

Director of Product Management for Attack Surface Management at Rapid7


Reserve your seat and join us

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mollis lacus .

Register Now

Agenda

Day Agenda

10 am - Arrival plus Coffee & Tea
10.30 am - Round Table Part 1
12.30 am - Lunch
 1.45 pm - Round Table Part 2
 3.45 pm - End

Round Table Agenda

The below agenda covers a 5 stage plan that will be drafted during the roundtable aligned to your business. The output will provide you with a draft Target Operating Model that will enable Cybersecurity to form part of your business process to maintain and manage the operational cost of Cyber Security and effectively manage risks for the business.
The plan will include but not limited to the below details: 

Stage 1 - Mapping your current Cybersecurity Operating Model and identifying gaps
Stage 2 - Understanding your non technical security challenges and mapping security technology to business process and operations
Stage 3 - Drafting of a Cyber security strategy with clearly defined objectives and goals
Stage 4 - Clearly define Cyber Security KPIs that will highlight technology, process and or people's effectiveness
Stage 5 - Drafting of Protection level Agreements to measure the effectiveness of operationalising cyber security

WEBCAST

Thank Lorem ipsum dolor sit amet, consectetur

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras et nulla ligula. Maecenas commodo turpis non nisi rhoncus, non gravida ligula ornare. Quisque nulla ante, malesuada ut vestibulum eu, congue id mauris. Cras eu metus risus.

EXPLORE WEBCASTSor go back to homepage
...

CUSTOMER SUPPORT
+1-866-390-8113 (Toll Free)

SALES SUPPORT
+1-866-772-7437 (Toll Free)

Need immediate help with a breach?

+1-866-772-7437

SOLUTIONS
All Solutions
Industry Solutions
Compliance Solutions

SUPPORT & RESOURCES
Product Support
Resource Library
Customer Stories
Events & Webcasts
Training & Certification
IT & Security Fundamentals
Vulnerability & Exploit Database

ABOUT US
Company
Diversity, Equity, and Inclusion
Leadership
News & Press Releases
Public Policy
Open Source
Investors

CONNECT WITH US
Contact
Blog
Support Login
Careers