As Agentic AI rapidly transforms enterprise workflows, a new security challenge is emerging. Token Security and Descope, in collaboration with an expert group of cybersecurity leaders, announced the release of the AI Security Guide: A Maturity Model for Secure Agentic AI Adoption. The comprehensive framework in the guide is designed to help organizations adopt agentic AI securely, responsibly and at scale, while promoting AI innovation.

The guide brings together practical insights and best practices from across the security community, including CISOs from leading organizations such as Silicon Valley CISO Investments (SVCI), Vercel, Verily Life Sciences, Live Oak Bank, AppLovin, Notable Capital, and Xcel Energy.

Cyber Technology Insights : IBN Unveils DefenseWireNews to Highlight Trailblazers in Defense, Aerospace, and Cybersecurity

“We’re entering a world where AI doesn’t just suggest, it acts,” said Itamar Apelblat, Co-Founder and CEO of Token Security. “Agentic AI systems are launching code, triggering workflows, making decisions, and creating new identities. As a result, Non-Human Identities will quickly outnumber human identities by more than 100 to one. Security must now shift priority to the identities that matter most in this new world.”

“We created this guide because we kept hearing the same question from CISOs and developers; ‘How do I make sure our AI or MCP server doesn’t break things or worse?,’” said Rishi Bhargava, Co-Founder of Descope. “The answer starts with treating AI agents like first-class actors. Secure authentication, granular authorization, and policy-based governance needs to be baked into every agentic AI deployment. We’re proud to team up with the best minds in the industry to offer a roadmap to ensuring secure AI and MCP deployments.”

The AI Security Guide outlines a four-phase maturity model that helps enterprises address the risks of AI autonomy: from shadow AI experimentation to the secure deployment of autonomous agents operating across critical systems. It emphasizes identity and access management (IAM) for Non-Human Identities (NHIs), policy-based controls, and continuous governance for both internal and third-party AI tools.

The four phases of the maturity model phases are:

  • Ad-hoc AI Adoption and Deployment
  • Structured AI Enablement and Integration
  • Operationalizing AI Infrastructure and Governance
  • Autonomous AI Action and Operational Control

Cyber Technology Insights : Resecurity Partners with AfricaCERT to Strengthen Cybersecurity Across Africa

Contributing authors of the guide include:

“Agentic AI isn’t just the next wave of technology. It fundamentally redefines how systems behave, make decisions, and interact autonomously,” said Shaun Marion, VP and CISO at Xcel Energy. “This guide arrives at a critical moment to provide security leaders a playbook to ensure we don’t move into a future shaped by invisible AI actors, untraceable actions, and preventable failures.”

Cyber Technology Insights : ControlCase Unveils 2025 Product Catalog Highlighting Comprehensive Compliance and Cybersecurity Solutions

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: globenewswire