AI Agents Are Redefining Cybersecurity Access Models | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


CrowdStrike’s Daniel Bernard and Brightmind’s Gur Talpaz on Agentic Identity Risk


Daniel Bernard, chief business officer, CrowdStrike, and Gur Talpaz, co-founder and general partner, Brightmind Partners

The rise of an agentic workforce is shattering the trust models that security teams spent a decade building, said Daniel Bernard, chief business officer at CrowdStrike, and Gur Talpaz, co-founder and general partner at Brightmind Partners.

See Also: AI Impersonation Is the New Arms Race—Is Your Workforce Ready?

Agents operate 24/7, spin up and disappear within hours, and can amplify both the competence and the errors of the humans who deploy them. In a recent incident, a rogue agent at Meta enabled critical access across systems to a far broader employee base than intended as an early sign of what is coming, Bernard said.

“Zero standing privileges, continuous real-time authentication – whether they’re human beings or they’re agentic beings, they have access to what they need, when they need it, in a risk-based, measured approach,” Talpaz said.

In this video interview with Information Security Media Group at RSAC Conference 2026, Bernard and Talpaz also discussed:

  • CrowdStrike’s acquisition of SGNL;
  • Why SGNL’s implementation of continuous, context-aware authorization stood apart from prior approaches;
  • Why cybersecurity must evolve to match the pace of agentic adoption.

Bernard leads CrowdStrike’s channel, alliance and partnership efforts while driving growth initiatives and go-to-market strategy for the SMB customer segment. As a cybersecurity and cloud expert, he has experience in disrupting markets and accelerating revenue growth through direct and indirect channels.

Talpaz is a finance and technology professional with extensive experience in corporate development and equity research. He previously was vice president of corporate development at CrowdStrike.



——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW