Skip to content

Commit bee1526

Browse files
authored
Refine speaker talk details in online event markdown
Updated speaker talk titles and synopses for clarity and formatting consistency.
1 parent 81b40f9 commit bee1526

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

events/2026-02-13-online.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ Starting at 4 PM CET
1515

1616
### <img src="https://github.com/OWASP/www-chapter-italy/blob/master/assets/images/speakers/simone-curzi.jpeg?raw=true" alt="Marco Morana" width="34" height="34" style="border-radius:50%; vertical-align:middle; margin-right:8px;" /> Simone Curzi - Microsoft
1717

18-
**Talk:** *Am I Secure Enough? Rethinking Security as an Investment with Quantitative Risk Analysis*
18+
**Talk:**
19+
*Am I Secure Enough? Rethinking Security as an Investment with Quantitative Risk Analysis*
1920

20-
**Synopsis**
21-
Security is often treated as a non-negotiable cost: we must be secure, no matter what. In the real world, resources are finite and security decisions have a cost, an operational impact, and a measurable effect on risk.
21+
**Synopsis**: Security is often treated as a non-negotiable cost: we must be secure, no matter what. In the real world, resources are finite and security decisions have a cost, an operational impact, and a measurable effect on risk.
2222

2323
This talk challenges the idea that one should not ask “Am I secure enough?” or “Which mitigations should I focus on?”. On the contrary, these are the most important questions security professionals should be able to answer.
2424

@@ -32,10 +32,10 @@ The result is not just better prioritization, but a shared language that allows
3232

3333
### <img src="https://github.com/OWASP/www-chapter-italy/blob/master/assets/images/trainers/Krish.jpg?raw=true" alt="Krishnendu Dasgupta" width="34" height="34" style="border-radius:50%; vertical-align:middle; margin-right:8px;" /> Krishnendu Dasgupta - AXONVERTEX AI
3434

35-
**Talk (draft):** *Your Agents Have Power — Do They Have Guardrails? Engineering Agent Security, Privacy, and Policy in Decentralized Local Compute Setups*
35+
**Talk:**
36+
*Your Agents Have Power — Do They Have Guardrails? Engineering Agent Security, Privacy, and Policy in Decentralized Local Compute Setups*
3637

37-
**Synopsis**
38-
As AI agents gain autonomy to plan, call tools, access data, and execute actions, they introduce new security and privacy risks—especially in decentralized, locally hosted environments. This session shows how to engineer enforceable guardrails for agentic systems using open-source components and local models, without relying on centralized cloud controls. Attendees will learn how to define risk boundaries, threat-model agent workflows, apply least-privilege tool access, enforce policy-as-code, add privacy safeguards, enable audit-ready observability, and continuously test agent behaviors. The talk concludes with a preview of swarm agents in trustless compute, highlighting what’s next for secure, decentralized agent architectures.
38+
**Synopsis**: As AI agents gain autonomy to plan, call tools, access data, and execute actions, they introduce new security and privacy risks—especially in decentralized, locally hosted environments. This session shows how to engineer enforceable guardrails for agentic systems using open-source components and local models, without relying on centralized cloud controls. Attendees will learn how to define risk boundaries, threat-model agent workflows, apply least-privilege tool access, enforce policy-as-code, add privacy safeguards, enable audit-ready observability, and continuously test agent behaviors. The talk concludes with a preview of swarm agents in trustless compute, highlighting what’s next for secure, decentralized agent architectures.
3939

4040

4141
Back to the [OWASP-Italy Chapter](https://owasp.org/www-chapter-italy)

0 commit comments

Comments
 (0)