June 11, 2026 – Member Meeting: Identity Security in the Age of AI Agents: Beyond Traditional IGA, BalkanID | Reflecting on 20+ Years of Zeek (formerly Bro), Corelight

Registration Required: June 11, 2026, 7:00 pm – 9:00 pm Pacific Time | 2 CPEs

Session One: Identity Security in the Age of AI Agents: Beyond Traditional IGA, BalkanID

As organizations move from human-driven workflows to AI-augmented and AI-automated environments, identity security must evolve. The rise of non-human identities—API keys, service principals, machine accounts, autonomous agents, LLM-powered copilots, and workflow bots—has created an explosive growth in entitlements, privilege drift, and hidden access paths that legacy IGA was never designed to handle.

This session breaks down how identity security and access governance must transform in an era where AI agents interact autonomously, request access dynamically, operate across connected and disconnected applications, and make decisions on behalf of users. We’ll explore the foundational shifts required: continuously updated identity graphs, real-time privilege posture, automated risk and RBAC analysis, just-in-time purpose-based access for agents, autonomous remediation, and policy guards that supervise non-human actors.

Connect with Subbu Rama

Subbu Rama is a 3x founder and the CEO and Co-founder of BalkanID, a company specializing in identity security access governance solutions. With close to 2 decades in the tech industry, he has a strong background in infrastructure, AI, cybersecurity and cloud computing, holding product, engineering and cybersecurity roles. Prior to BalkanID, Subbu co-founded Bitfusion, a startup focused on virtualization technologies for AI, GPU infrastructure, which was later acquired by VMware (Dell Technologies). He is passionate about building innovative solutions that tackle complex challenges. Subbu holds a Master’s degree in Electrical and Computer Engineering from the University of Wisconsin Madison and an Early Career Award Recipient.

BalkanID provides modular, AI-assisted identity security and access governance (IGA) solutions designed to work with both connected and disconnected applications. Its platform streamlines critical tasks such as user access reviews, lifecycle automation with purpose-based just-in-time access, and identity security posture management, including IAM risk & RBAC analysis and a Copilot feature. It empowers organizations to enforce least privilege principles and efficiently manage identity risk at scale.


Session Two: Reflecting on 20+ Years of Zeek (formerly Bro), Corelight

The history of Zeek from LBL to the DoD.

Connect with Vern Paxson

Vern Paxson is a former professor of computer science at UC Berkeley and leads the Networking and Security Group at the International Computer Science Institute (ICSI). A deeply influential figure in internet security and measurement, he has contributed extensively to the IETF community, serving as chair of the Internet Research Task Force (IRTF) and as the IETF’s Transport Area Director.

An ACM Fellow and SIGCOMM Award recipient, Paxson is recognized for his groundbreaking work on internet measurement, intrusion detection, and large-scale attacks. He is the original author of the flex lexical analyzer and the creator of the Zeek intrusion detection system, which forms the foundation of Corelight’s Open NDR platform. His leadership has helped shape Corelight’s research direction and the evolution of Zeek for modern enterprise and cloud environments.

Paxson also coined the term “backscatter” to describe telltale network noise generated by DDoS attacks using spoofed addresses. He earned his PhD from UC Berkeley in 1997.

At Corelight, we believe the best approach to cybersecurity risk starts with network evidence. This evidence helps elite defenders increase visibility, unlock powerful analytics, accelerate investigations, and level up threat hunting. Our Open Network Detection and Response Platform is the fastest-growing in the industry, and the only one powered by open source and GenAI. We protect some of the most sensitive, mission-critical enterprises and government agencies in the world.

Related Posts