February 12, 2026 – Member Meeting: The Attacker’s Distributed Supercomputer: Your Browser, SquareX | Session Two: TBA

Registration required: February 12, 2026, 7:00 PM – 9:00 PM Pacific Time | 2 CPEs

Session One – The Attacker’s Distributed Supercomputer: Your Browser, SquareX

The browser has become the primary workspace for modern enterprises, yet it remains the least visible part of the security stack. Traditional tools such as Secure Web Gateways (SWG) and Endpoint Detection and Response (EDR) were designed for a different era and struggle to see what actually happens inside the browser. This session examines how that visibility gap exposes organizations to real attacks in the wild, including malicious extensions, phishing and OAuth consent attacks. We will discuss what these incidents reveal about today’s threat landscape and how browser security helps regain control and visibility through browser-native security controls, telemetry, and policy frameworks. This talk will give an understanding of how to make the browser a measurable part of their enterprise defense strategy.

Shourya Pratap Singh is the Principal Software Engineer at SquareX, where he leads the development of security-focused browser extensions and conducts research on methods to mitigate web security risks. He has presented his research at prominent conferences such as DEFCON and Black Hat Arsenal EU and has conducted workshops at events like the Texas Cyber Summit. Shourya holds a bachelor’s degree from IIIT Bhubaneswar and is a patent holder. His professional passions are centered on advancing the security of browser extensions and web applications.

About SquareX

SquareX’s browser extension turns any browser on any device into an enterprise-grade secure browser. SquareX’s industry-first Browser Detection and Response (BDR) solution empowers organizations to detect proactively, mitigate, and threat-hunt client-side web attacks, including malicious browser extensions, advanced spearphishing, browser-native ransomware, genAI DLP, and more. Unlike legacy security approaches and cumbersome enterprise browsers, SquareX seamlessly integrates with users’ existing consumer browsers, ensuring enhanced security without compromising user experience or productivity. By delivering unparalleled visibility and control directly within the browser, SquareX enables security leaders to reduce their attack surface, gain actionable intelligence, and strengthen their enterprise cybersecurity posture against the newest threat vector – the browser.


Session Two – Are you modernizing your identity tool stack? Shashwat Sehgal, founder and CEO of P0 Security

This is not your grandma’s PAM (even though we love our grandmas): The Privileged Access Management tools most organizations use today were built to support a (mostly) human workforce and static/on-prem infrastructure…not hybrid and multi-cloud production environments packed with non-human identities, service accounts, and agents moving at machine speed.
Standing access and long-lived credentials make least privilege and Zero Trust harder to enforce and harder to prove, especially under SOC 2 pressure, audit requirements, and cyber insurance scrutiny.
This session lays out modern PAM requirements that hold up in production environments: just enough access, just-in-time elevation, and short-lived credentials that shrink the blast radius by design without disrupting eng/dev workflows.
Shashwat will map these requirements to real production access paths and share customer stories, including the initiatives that drove the need for modern PAM and the path to get there.

Shashwat Sehgal, founder and CEO of P0 Security

About your speaker: Shashwat Sehgal, Founder and CEO of P0 Security, is re-architecting Privileged Access Management (PAM) for the cloud-native era. He specializes in automating access orchestration for the “identity explosion” of humans, machines, and agents within complex production stacks.
His technical perspective is rooted in leading deep-tech products at scale. At Splunk, he leveraged OpenTelemetry to provide granular visibility into microservices architectures. Previously, at Cisco Meraki, he utilized machine learning and data science to automate troubleshooting across wide-area networks. A Computer Science and Engineering graduate from IIT-Delhi and an MBA from Columbia Business School, Shashwat offers a builder’s perspective on bridging the gap between security strategy and technical execution.

About P0:

P0 Security is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived, and auditable production access for users, NHIs, and agents. Centralized governance, just-enough-privilege, and just-in-time controls deliver secure access to production, as simply and scalably as possible. Every identity. Every system. All the time.

P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities, production resources, and environments. With P0, production access is least-privilege, short-lived, and auditable by default, including the new class of AI-driven agentic workloads emerging in modern environments.

To explore P0 Security further or book a demo, visit p0.dev

Related Posts