LIVE WEBINAR

Building a Security Blueprint for the Ungoverned Agent Problem

Reduce agent‑related incidents by up to 60% in 90 days

April 29, 2026

11:00 AM PDT

Secure AI agents the right way: from inventory to runtime

Every week, teams spin up new AI agents in Salesforce, Microsoft Copilot, Google Vertex, Claude, and dozens of others. Some are sanctioned. Many aren’t. Almost none are governed.

Closing the AI Agent Governance Gap: From Inventory to Runtime is a two-part video series on what AI agent security looks like when it is done the right way.

In Part 1, three CISOs explain why AI agents create a structural governance gap and what security leaders need to understand about inherited access, visibility, and accountability.

In Part 2, we show how to take control in practice: from discovering agents and understanding access to monitoring risk and enforcing runtime guardrails.

Attend these sessions to see how to move from snapshot visibility to continuous governance.

Reserve your seat

Select which event(s) you want to attend


By agreeing to receive a response, you agree to our Terms of Use/Privacy Policy

AI agents are creating a new governance challenge for security leaders.

AI agents are already active in our environments, operating with inherited access and outside the controls designed for human identities.

In this series, we examine how organizations can close the AI agent governance gap by moving from basic inventory to continuous oversight and runtime enforcement. The result is a more complete model for securing AI agents the right way: built on finding, understanding, monitoring, and enforcing.

Events in this Series

Building a Security Blueprint for the Ungoverned Agent Problem

April 29, 2026 at 11:00 AM PDT

CISOs from T-Mobile, Cisco, and the former CISO of Walt Disney discuss how to govern AI agents that are already running in enterprise environments.

Secure AI agents from discovery to runtime with Obsidian Security

May 6, 2026 at 11:00 AM PDT

Whether you're just starting to get a handle on your AI agent inventory or looking to mature your runtime controls, this session will give you a concrete framework and a live product walkthrough you can evaluate against your own environment.

Obsidian Security logo

All Rights Reserved ©2026

See Your Target Accounts Already in Market

We identify companies actively researching cybersecurity, CX, and enterprise tech solutions.

Includes sample accounts, intent signals, and activation strategy.

Access Real Buyer Intent Data for Cybersecurity & B2B Tech

Get a sample of verified in-market accounts, campaign benchmarks, and audience insights.

No spam. Only relevant insights and campaign data.

Get Verified B2B Buyers from Your Target Accounts

See how CyberTech Insights identifies in-market buyers, activates demand, and converts pipeline across cybersecurity and enterprise tech.

What are you looking to achieve?

Get Your Custom Audience & Pipeline Plan

We’ll share a sample audience, campaign benchmarks, and how we generate pipeline for companies like yours.