As Agentic AI rapidly transforms enterprise workflows, a new security challenge is emerging. Token Security and Descope, in collaboration with an expert group of cybersecurity leaders, announced the release of the AI Security Guide: A Maturity Model for Secure Agentic AI Adoption. The comprehensive framework in the guide is designed to help organizations adopt agentic AI securely, responsibly and at scale, while promoting AI innovation.
The guide brings together practical insights and best practices from across the security community, including CISOs from leading organizations such as Silicon Valley CISO Investments (SVCI), Vercel, Verily Life Sciences, Live Oak Bank, AppLovin, Notable Capital, and Xcel Energy.
Cyber Technology Insights : IBN Unveils DefenseWireNews to Highlight Trailblazers in Defense, Aerospace, and Cybersecurity
“We’re entering a world where AI doesn’t just suggest, it acts,” said Itamar Apelblat, Co-Founder and CEO of Token Security. “Agentic AI systems are launching code, triggering workflows, making decisions, and creating new identities. As a result, Non-Human Identities will quickly outnumber human identities by more than 100 to one. Security must now shift priority to the identities that matter most in this new world.”
“We created this guide because we kept hearing the same question from CISOs and developers; ‘How do I make sure our AI or MCP server doesn’t break things or worse?,’” said Rishi Bhargava, Co-Founder of Descope. “The answer starts with treating AI agents like first-class actors. Secure authentication, granular authorization, and policy-based governance needs to be baked into every agentic AI deployment. We’re proud to team up with the best minds in the industry to offer a roadmap to ensuring secure AI and MCP deployments.”
The AI Security Guide outlines a four-phase maturity model that helps enterprises address the risks of AI autonomy: from shadow AI experimentation to the secure deployment of autonomous agents operating across critical systems. It emphasizes identity and access management (IAM) for Non-Human Identities (NHIs), policy-based controls, and continuous governance for both internal and third-party AI tools.
The four phases of the maturity model phases are:
- Ad-hoc AI Adoption and Deployment
- Structured AI Enablement and Integration
- Operationalizing AI Infrastructure and Governance
- Autonomous AI Action and Operational Control
Cyber Technology Insights : Resecurity Partners with AfricaCERT to Strengthen Cybersecurity Across Africa
Contributing authors of the guide include:
- Itamar Apelblat, Co-Founder & CEO at Token Security
- Rishi Bhargava, Co-Founder of Descope
- Ty Sbano, former CISO at Vercel
- Rich Friedberg, CISO at Live Oak Bank
- Clint Maples, CISO at Robert Half
- Shaun Marion, VP & CSO at Xcel Energy
- Laura Hamilton, Investor at Notable Capital
- Jason Woloz, CISO at Verily Life Sciences
- Jeremiah Kung, Global Head of InfoSec at AppLovin
- Anshu Gupta, former CISO
- Jeff Trudeau, Fintech CISO
- Kapil Bareja, Cyber and Strategic Risk Leader, Deloitte
- Latesh Nair, Global Product Head, Healthfirst
“Agentic AI isn’t just the next wave of technology. It fundamentally redefines how systems behave, make decisions, and interact autonomously,” said Shaun Marion, VP and CISO at Xcel Energy. “This guide arrives at a critical moment to provide security leaders a playbook to ensure we don’t move into a future shaped by invisible AI actors, untraceable actions, and preventable failures.”
Cyber Technology Insights : ControlCase Unveils 2025 Product Catalog Highlighting Comprehensive Compliance and Cybersecurity Solutions
To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com
Source: globenewswire