top of page
Article
![[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA](https://static.wixstatic.com/media/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.webp)
![[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA](https://static.wixstatic.com/media/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.webp)
[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA
The Racecar Illusion: Focus on Reliable Fundamentals, Not the Flashiest Gear Chris Silva, VP Analyst at Gartner, likened our obsession...

Kenneth Nam
7 hours ago2 min read
3
![[Gartner SRM Summit 2025] Cyber Deterrence Strategy](https://static.wixstatic.com/media/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.webp)
![[Gartner SRM Summit 2025] Cyber Deterrence Strategy](https://static.wixstatic.com/media/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.webp)
[Gartner SRM Summit 2025] Cyber Deterrence Strategy
The session on stopping attacks before they even begin, known as Cyber Deterrence , was one of the most thought-provoking at Gartner SRM...

Paul Kwon
7 hours ago6 min read
6
![[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations](https://static.wixstatic.com/media/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.webp)
![[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations](https://static.wixstatic.com/media/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.webp)
[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations
How will the cyber-security landscape change by 2025? In his “Outlook for Security Operations 2025” presentation, Gartner’s Eric Ahlm...

Pyo Kwon
8 hours ago5 min read
4
![[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC](https://static.wixstatic.com/media/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.webp)
![[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC](https://static.wixstatic.com/media/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.webp)
[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC
The session “AI-Enhanced SOC: Bridging the Gap to Advanced Automation in 2025,” presented by Kevin Schmidt, was compelling because it...

Pyo Kwon
24 hours ago4 min read
3
![[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat](https://static.wixstatic.com/media/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.jpg/v1/fill/w_334,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.webp)
![[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat](https://static.wixstatic.com/media/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.jpg/v1/fill/w_306,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.webp)
[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat
Generative AI: Innovation and Risk Shaping Security’s Future Generative AI (Gen AI) is rapidly gaining traction in security. About 16% of...

Kenneth Nam
1 day ago5 min read
7
![[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency](https://static.wixstatic.com/media/374e53_e0176a65f8214259be5ef72b110ba532~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_e0176a65f8214259be5ef72b110ba532~mv2.webp)
![[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency](https://static.wixstatic.com/media/374e53_e0176a65f8214259be5ef72b110ba532~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_e0176a65f8214259be5ef72b110ba532~mv2.webp)
[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency
Efficient Tool Optimization Strategies in a Complex Cybersecurity Landscape The cybersecurity landscape often feels like a blizzard of...

Kenneth Nam
2 days ago4 min read
17
![[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)](https://static.wixstatic.com/media/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.webp)
![[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)](https://static.wixstatic.com/media/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.webp)
[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)
On Day 2 of the Gartner Security and Risk Management Summit 2025, Akif Khan highlighted Identity and Access Management as the backbone of...

Pyo Kwon
2 days ago5 min read
6
![[Gartner SRM Summit 2025] Managed Detection and Response Market Guide](https://static.wixstatic.com/media/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.jpg/v1/fill/w_334,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.webp)
![[Gartner SRM Summit 2025] Managed Detection and Response Market Guide](https://static.wixstatic.com/media/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.jpg/v1/fill/w_306,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.webp)
[Gartner SRM Summit 2025] Managed Detection and Response Market Guide
Pete Shoard Gartner VP Analyst Gartner Guide Insight: From Buying Security to Driving Operational Efficiency Pete Shoard, a Gartner Vice...

Kenneth Nam
3 days ago2 min read
19
![[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises](https://static.wixstatic.com/media/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.webp)
![[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises](https://static.wixstatic.com/media/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.webp)
[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises
Patrick Long Gartner Analyst Why SOC Service Models Matter Patrick Long, a Gartner distinguished analyst, opened his session by stressing...

Kenneth Nam
3 days ago3 min read
4
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing
Eric Ahlm’s session , “Tips for Improving Your Security Operations With Adversarial Exposure Validation,” underscored AEV as the heart of...

Pyo Kwon
3 days ago2 min read
13
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation
In 2023 and 2024 the Gartner SRM Summit focused on ASM (Attack Surface Management) and CTEM (Continuous Threat Exposure Management)...

Pyo Kwon
3 days ago3 min read
6
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
[Gartner SRM Summit 2025] Opening Keynote
Jun 9-11, 2025 | National Harbor, MD Speakers Leigh McMullen (Gartner Distinguished VP Analyst) Katell Thielemann (Gartner Distinguished...

Paul Kwon
3 days ago3 min read
5
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
[Gartner SRM Summit 2025] Conference Overview
Jun 9-11, 2025 | National Harbor, MD Conference Overview From June 9 to 11, 2025, the Gartner Security and Risk Management Summit took...

Paul Kwon
3 days ago3 min read
11


When Retail Giants Stumble: Lessons from Recent Attacks on Victoria’s Secret, North Face and Cartier
In early June 2025 three household names - Victoria’s Secret, North Face and Cartier - fell victim to cyberattacks that exposed customer...

PAGO Networks
Jun 82 min read
9


A Three-Part Reflection Series on MDR and PAGO Security Summit by SharedIT
Following the 2025 PAGO Security Summit , Jang Doohwan from SharedIT published a three-part deep-dive series unpacking how Managed...

PAGO Networks
May 291 min read
14


Next-Generation SOC Demands Skilled Experts: Insights from DataNet Korea
PAGO CoE (Center of Excellence) - Seoul, South Korea The evolving threat landscape and growing complexity of cybersecurity operations...

PAGO Networks
May 282 min read
18


Waymo and the Cybersecurity Mirror: What Autonomy Teaches Us About Digital Defense
Waymo LLC, formerly known as the Google Self-Driving Car Project One of the cool things we can notice around San Francisco is the...

PAGO Networks
May 73 min read
11
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions
Day 3 of RSAC 2025 brought the spotlight to the deeper implications of AI not just as a tool, but as a force actively reshaping global...

PAGO Networks
May 23 min read
13
![[RSAC 2025 Sessions] How Security Companies Are Evolving](https://static.wixstatic.com/media/374e53_583697585e864124a2474dd726416819~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_583697585e864124a2474dd726416819~mv2.webp)
![[RSAC 2025 Sessions] How Security Companies Are Evolving](https://static.wixstatic.com/media/374e53_583697585e864124a2474dd726416819~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_583697585e864124a2474dd726416819~mv2.webp)
[RSAC 2025 Sessions] How Security Companies Are Evolving
On April 30, the final day of RSA Conference 2025 offered a different tone from the previous two days. While the early part of the...

PAGO Networks
May 13 min read
8
![[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity](https://static.wixstatic.com/media/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.webp)
![[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity](https://static.wixstatic.com/media/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.webp)
[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity
RSAC 2025 If RSA Conference 2025 made one thing clear, it’s that AI is no longer a theoretical concept, it’s becoming central to how...

PAGO Networks
Apr 294 min read
34
Subscribe to the PAGO Newsletter
bottom of page