Events
,
Machine Identities
,
RSAC Conference
P0 Security’s Duggal and Dányi on practical access controls for AI agents
Anna Delaney (annamadeline) •
March 28, 2026
Gergely Dányi, co-founder and CTO, P0 Security, and Neha Duggal, CPO, P0 Security
Legacy privileged access management was built for humans, and artificial intelligence agents play by entirely different rules. Enterprises deploying agents are giving them broad permissions with no accountability, no auditability and no meaningful control, said Neha Duggal and Gergely Dányi of P0 Security.
Unlike service accounts, agents dynamically select actions from a set of available capabilities and are far more likely than humans to execute dangerous operations when given the opportunity. The result: agents accumulating standing access to sensitive systems with no tie back to a human identity. Duggal, P0 Security’s CPO, said the solution is to build controls from the start, not retrofit them after production deployment.
“Just like we have labeled service identities differently, we should label agent identities differently,” said Dányi, co-founder and CTO at P0 Security.
In this video interview with Information Security Media Group at RSAC Conference 2026, Duggal and Dányi also discussed:
Why non-human identity life cycle management must address entitlement and credential revocation as two distinct operational concerns;
How P0 Security’s authorization control plane enforces runtime access decisions for agents, agnostic of architecture;
Real-world deployments spanning SOC triage automation and HR finance agents with scoped data access.
Duggal is the CPO with extensive expertise in cloud security, observability and enterprise SaaS. With nearly 20 years of experience, she has led multiple products from early-concept stage to wide-scale customer adoption, built high-performing cross-functional teams, and driven product strategies that delivered measurable business outcomes.
At P0 Security, Dányi leads the development of the first unified identity governance and PAM platform purpose-built for the cloud. With extensive expertise in cloud security, access management and startup execution, he drives a modern approach that replaces fragmented legacy tools with an identity-native platform that governs and secures all forms of access across hybrid environments.