LIVE WEBINAR

Building a Security Blueprint for the Ungoverned Agent Problem

Reduce agent‑related incidents by up to 60% in 90 days

April 29, 2026

11:00 AM PDT

Building a Security Blueprint for the Ungoverned Agent Problem

Hear from CISOs of T-Mobile, Cisco and former CISO of Walt Disney

Every week, employees across your organization are creating AI agents that are automating workflows, connecting to systems, and acting on behalf of the business. Most security programs have no record they exist.

These agents don’t go through onboarding. They don’t appear in your identity lifecycle. They inherit credentials from the people who built them and start operating quietly, under valid access, outside any governance model. The risk isn’t theoretical. It’s already running.

For CISOs and security practitioners responsible for AI strategy, risk, and governance, the question is no longer whether to adopt AI, it’s whether your security has kept pace with how fast it’s moving.

Join Mark Clancy (CISO, T-Mobile), Jason Lish (CISO, Cisco), and Ryan Knisley (former CISO, Walt Disney and Costco), for a candid conversation on building the security program that makes confident AI adoption possible.

What you’ll take away:

  • A clear picture of where AI agent risk lives in the enterprise today, and why traditional controls don’t see it
  • The governance questions your board and regulators will ask next, and how to get ahead of them
  • How security leaders at large, complex enterprises are approaching agent governance without putting the breaks on innovation
  • What a defensible AI security looks like in 2026, and what to prioritize next

Reserve your seat

By agreeing to receive a response, you agree to our Terms of Use/Privacy Policy

Speakers

Ryan Knisley

Chief Product Strategist

Axionis

Mark Clancy

Senior Vice President, Cybersecurity

T-Mobile

Jason Lish

CISO

Cisco

Obsidian Security logo

All Rights Reserved ©2026

See Your Target Accounts Already in Market

We identify companies actively researching cybersecurity, CX, and enterprise tech solutions.

Includes sample accounts, intent signals, and activation strategy.

Access Real Buyer Intent Data for Cybersecurity & B2B Tech

Get a sample of verified in-market accounts, campaign benchmarks, and audience insights.

No spam. Only relevant insights and campaign data.

Get Verified B2B Buyers from Your Target Accounts

See how CyberTech Insights identifies in-market buyers, activates demand, and converts pipeline across cybersecurity and enterprise tech.

What are you looking to achieve?

Get Your Custom Audience & Pipeline Plan

We’ll share a sample audience, campaign benchmarks, and how we generate pipeline for companies like yours.