Posted on
in Presentations
Generative AI is expanding the attack surface with a surge in non-human identities (NHIs) like API keys and tokens. This session will explore how to secure these NHIs within Retrieval Augmented Generation (RAG) architectures, covering risks, real-world breaches, and best practices for reducing threats and safeguarding AI-driven applications.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community