Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Taming the AI Identity Explosion Securing Agentic AI and Non Human Identities

Автор: DevSecCon

Загружено: 2025-10-22

Просмотров: 69

Описание:

AI systems are rapidly shifting from static models to swarms of autonomous agents with their own identities, decisions, and access rights. Traditional identity and access management (IAM) systems built for humans and static service accounts can’t keep up. This talk will explore how agentic AI reshapes the identity landscape, where every agent may need its own verifiable, auditable, and revocable identity. Drawing from OWASP’s Top 10 Non-Human Identity Risks and the CSA’s agentic AI IAM framework, we’ll dive into new trust models, real-world attack vectors, and actionable strategies to keep autonomous systems accountable and secure.

Taming the AI Identity Explosion   Securing Agentic AI and Non Human Identities

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Agents and MCP Servers   Are the electric sheep safe

Agents and MCP Servers Are the electric sheep safe

STOIC Security   Shielding Your Generative AI App from the Five Deadly Risks

STOIC Security Shielding Your Generative AI App from the Five Deadly Risks

Agentic Applications Require Agentic Security Solutions

Agentic Applications Require Agentic Security Solutions

Бывший рекрутер Google объясняет, почему «ложь» помогает получить работу.

Бывший рекрутер Google объясняет, почему «ложь» помогает получить работу.

Prompt Engineering 101: Taking the Steering Wheel of the LLM | Complete Guide to AI Prompting

Prompt Engineering 101: Taking the Steering Wheel of the LLM | Complete Guide to AI Prompting

Master 80% of n8n in 36 Minutes

Master 80% of n8n in 36 Minutes

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Сварщик изобрел замок без ключа! Это простое изобретение может изменить всё.

Сварщик изобрел замок без ключа! Это простое изобретение может изменить всё.

Mr Bean does 'Blind Date' | Comic Relief

Mr Bean does 'Blind Date' | Comic Relief

AI ATTACKS! How Hackers Weaponize Artificial Intelligence

AI ATTACKS! How Hackers Weaponize Artificial Intelligence

Stop Rambling: The 3-2-1 Speaking Trick That Makes You Sound Like A CEO

Stop Rambling: The 3-2-1 Speaking Trick That Makes You Sound Like A CEO

Solving Prioritization Whack-a-Mole: Automated Remediation Built on Trust

Solving Prioritization Whack-a-Mole: Automated Remediation Built on Trust

Common Pitfalls and How to Avoid Them When Building Production Ready Multi Tenant MCP Servers

Common Pitfalls and How to Avoid Them When Building Production Ready Multi Tenant MCP Servers

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Walking and Talking in the Woods with AI: The Future of Untethered Software Development

Walking and Talking in the Woods with AI: The Future of Untethered Software Development

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

1,000 Ants vs. Black Widow

1,000 Ants vs. Black Widow

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

Red Teaming AI   How to Stress Test LLM Integrated Apps Like an Attacker

Red Teaming AI How to Stress Test LLM Integrated Apps Like an Attacker

Don’t Waste Money: Which AI Subscription Is Worth It?

Don’t Waste Money: Which AI Subscription Is Worth It?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com