BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//fwd-cloudsec-2026//talk//8THCJQ
BEGIN:VTIMEZONE
TZID:PST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T100000Z
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T110000Z
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-fwd-cloudsec-2026-8THCJQ@pretalx.com
DTSTART;TZID=PST:20260601T161000
DTEND;TZID=PST:20260601T163000
DESCRIPTION:Authorization models were designed for a world where humans cli
 ck buttons. Agents don't click buttons — they make thousands of tool cal
 ls per session across dozens of APIs\, and the question isn't just "is thi
 s user allowed to call this tool?" but "is this the right tool call given 
 what this user is actually doing right now?" Static role-based or attribut
 e-based policies can't answer that question. They can tell you someone has
  access to Jira\, but they can't tell you which project to scope the call 
 to without a role-per-project mapping that doesn't scale.\nThis talk prese
 nts a working model for context-aware agent authorization that treats memo
 ry — what a user is working on\, what tools they typically use\, what th
 eir agent has been doing in this session — as a first-class input to the
  policy engine. We'll walk through where RBAC\, ABAC\, and ReBAC each fall
  short for agent tool calls\, why the missing piece is situational context
  rather than more roles\, and how to build a fast-path authorization syste
 m that evaluates dynamic memory-backed predicates alongside static policy 
 — with sub-millisecond decisions\, full auditability\, and graceful esca
 lation when the system isn't confident enough to auto-approve.\nExpect Dat
 alog\, expect architecture diagrams\, and expect honest discussion of what
 's still unsolved — including the local authentication problem that nobo
 dy wants to talk about.
DTSTAMP:20260502T124139Z
LOCATION:Room 2
SUMMARY:Context-Aware Authorization for Agentic Tool Calls - Robert Chiniqu
 y
URL:https://pretalx.com/fwd-cloudsec-2026/talk/8THCJQ/
END:VEVENT
END:VCALENDAR
