Listen

Description

If AI Agents have capabilities just like humans, should we treat them like humans? 

If something goes wrong in an agentic workflow, who takes the blame if they're all just nameless, faceless bots? 

Join us as we talk about it. 

Do AI Agents need Identities like humans? An Everyday AI Chat with Jordan Wilson and Okta's Eric Kelleher

Newsletter: Sign up for our free daily newsletter
More on this Episode: Episode Page
Join the discussion on LinkedIn: Thoughts on this? Join the convo on LinkedIn and connect with other AI leaders.

Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineup
Website: YourEverydayAI.com
Email The Show: info@youreverydayai.com
Connect with Jordan on LinkedIn


Topics Covered in This Episode:

  1. AI Agents in Enterprise: Opportunities and Risks
  2. Agentic AI: Human vs. Agent Responsibility
  3. Securing AI Agent Identities: Okta’s Approach
  4. Evolution of Identity Management for AI Agents
  5. Identity Governance and Auditability for Agents
  6. Agent Impersonation and Cybersecurity Threats
  7. Rogue AI Agent Behaviors and Case Studies
  8. Zero Trust Security: Agentic Age Challenges
  9. Open Standards: Cross App Access Protocol
  10. Benefits of Identifying AI Agents Like Humans
  11. Responsible AI Adoption and Ethical Concerns
  12. Practical Steps to Secure Agentic Identity

Timestamps:

00:00 "AI Agents: Power and Pitfalls"

05:38 "Automating Identity and Access Governance"

06:49 Balancing Innovation and AI Security

11:57 "Addressing Rogue AI Threats"

17:17 "Securing Real AI Agents"

19:56 "Balancing AI Innovation and Security"

24:13 "Standards for Identifying Nonhuman Agents"

27:24 "AI Agents: 24/7 Security"

29:48 Securing and Managing Agent Identities

Keywords: 

AI agents, agentic AI, AI agent identity, securing AI agents, agentic identities, AI identity management, nonhuman identity, machine identity, multi agent orchestration, agent impersonation, agent governance, securing agents, compromised identity, cyber attacks, threat actors, state actors, privileged access management, identity governance, identity directory, auditability, credential vaulting, agent provisioning, agent deprovisioning, automation, zero trust, AI authorization, AI authentication, cross app access, model context protocol, identity security posture management, rogue agent behavior, agent discovery, business logic, anomaly detection, technology guardrails, responsible AI, ethical AI,

Send Everyday AI and Jordan a text message. (We can't reply back unless you leave contact info)

Start Here ▶️

Not sure where to start when it comes to AI? Start with our Start Here Series. You can listen to the first drop -- Episode 691 -- or get free access to our Inner Cricle community and access all episodes there: StartHereSeries.com