Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving

Автор: Black Hat

Загружено: 2025-11-07

Просмотров: 1783

Описание:

Cybersecurity has an identity problem. Managing the complexities of identity in a corporate environment never gets easier.

As we enter the world of Agentic AI, each "Agent" will also have its own identity, and attributes that may identify it as an agent of the company it represents – or be fakes that attackers use to socially engineer victims in a new range of attacks. Traditional cybersecurity frameworks aren't prepared for Agentic AI, identity, and access management, and companies lack policies to define how to authenticate, authorize, or audit AI Agents. Without clear identity frameworks and standards for Agentic AI, we run the risk that AI Agents will exceed intended scope, be difficult to audit, and without clear threat models, enable unintended attacks or exploits. Employees will also create Shadow AI Agents, even if well intended, that may act autonomously, access sensitive data, trigger workflows, and connect with third-party systems all in the name of "getting the job done".

Attackers are going to take advantage of this chaos. Security teams will have to identify and combat this activity. We have an opportunity to solve some of the systemic problems now, before Agentic AI becomes prolific. Standards bodies are engaging, and startups are offering ideas. In this discussion, we will explore ideas and solutions to the Agentic AI crisis, and the risks to organizations and governments alike when internal accidents or external attacks strike.

By:
Cristin Flynn Goodwin | Founder and Managing Partner, Advanced Cyber Law

Full Abstract Available:
https://www.blackhat.com/sector/2025/...

Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Keynote: The Once and Future Rules of Cybersecurity

Keynote: The Once and Future Rules of Cybersecurity

Современные идеи искусственного интеллекта: Дженсен Хуан, Джеффри Хинтон, Ян Лекун и видение буду...

Современные идеи искусственного интеллекта: Дженсен Хуан, Джеффри Хинтон, Ян Лекун и видение буду...

NOC-umentary: Inside the Black Hat NOC

NOC-umentary: Inside the Black Hat NOC

Andrej Karpathy: Software Is Changing (Again)

Andrej Karpathy: Software Is Changing (Again)

Exposing The Dark Side of America's AI Data Center Explosion | View From Above | Business Insider

Exposing The Dark Side of America's AI Data Center Explosion | View From Above | Business Insider

The Drone Supply Chain's Grand Siege: From Initial Breaches to Long-Term Espionage

The Drone Supply Chain's Grand Siege: From Initial Breaches to Long-Term Espionage

DEFCON — это не то, чего я ожидал...

DEFCON — это не то, чего я ожидал...

Dark Side of AI - How Hackers use AI & Deepfakes | Mark T. Hofmann | TEDxAristide Demetriade Street

Dark Side of AI - How Hackers use AI & Deepfakes | Mark T. Hofmann | TEDxAristide Demetriade Street

Cybersecurity Architecture: Who Are You? Identity and Access Management

Cybersecurity Architecture: Who Are You? Identity and Access Management

The Chinese Hack that Stole 22m People’s Data | Cyberwar | Vice News

The Chinese Hack that Stole 22m People’s Data | Cyberwar | Vice News

The Art of Reading Minds | Oz Pearlman | TED

The Art of Reading Minds | Oz Pearlman | TED

How to Secure AI Business Models

How to Secure AI Business Models

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

Keynote: Cyber Threats in the Age of AI

Keynote: Cyber Threats in the Age of AI

Security in the Age of Agentic AI | Vasu Jakkal, Microsoft Security | RSAC 2025

Security in the Age of Agentic AI | Vasu Jakkal, Microsoft Security | RSAC 2025

Keynote: Who Gets to Point Fingers? Technical Capacity and International Accountability

Keynote: Who Gets to Point Fingers? Technical Capacity and International Accountability

Ваш браузер знает о вас все и сливает данные: как защититься?

Ваш браузер знает о вас все и сливает данные: как защититься?

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

Using Deep Learning Attribution Methods for Fault Injection Attacks

Using Deep Learning Attribution Methods for Fault Injection Attacks

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]