Cover Image for Anshu Gupta - Agentic AI Security - What you need to know?
Cover Image for Anshu Gupta - Agentic AI Security - What you need to know?
Avatar for Tejas Cyber Network

Anshu Gupta - Agentic AI Security - What you need to know?

Zoom
Registration
Past Event
Welcome! To join the event, please register below.
About Event

Speaker - Anshu Gupta

Defining the "Agentic" Attack Surface

  • Concept: moving from "Output" (GenAI) to "Action" (Agents).

  • Architecture breakdown: Understanding the "Cognitive Loop" (Perception $\rightarrow$ Planning $\rightarrow$ Action $\rightarrow$ Memory) and where vulnerabilities hide in each stage.

Threat Landscape: When Prompts Become Payloads

  • Deep dive: Indirect Prompt Injection (how reading a malicious website can hijack an agent).

  • Real-world scenarios: Data exfiltration via API calls, unauthorized purchases, and "confused deputy" attacks where agents are tricked into misusing their permissions.

The OWASP Top 10 for LLMs (Agent Edition)

Focusing on the risks specific to autonomy:

  • LLM06: Excessive Agency: Granting agents too much power or vague permissions.

  • LLM07: Insecure Plugin Design: Vulnerabilities in the tools the agent connects to (e.g., SQL databases, email clients).

Zero Trust for Agents: Identity & Access Management

  • Treating agents as non-human identities.

  • Strategies for Just-in-Time (JIT) access and scoping OAuth tokens strictly to the task at hand (e.g., "Read Email" vs. "Send Email").

"Hooking Before Hacking": Monitoring & Observability

  • Why traditional WAFs (Web Application Firewalls) fail against semantic attacks.

  • Implementing "Thought Monitoring"—analyzing the agent's Chain of Thought (CoT) for malicious intent before it executes a tool call.

Defensive Architectures & Guardrails

  • Human-in-the-loop (HITL): requiring approval for high-stakes actions (e.g., transferring funds, deleting files).

  • Sandboxing: executing agent-generated code in ephemeral, isolated environments (e.g., Firecracker microVMs or Docker containers).

Governance & The Future of Multi-Agent Systems

  • Managing "Swarm" risks: what happens when multiple agents with different instructions conflict?

  • Essential policy checklist for deploying autonomous agents in the enterprise.

Avatar for Tejas Cyber Network