You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: events/2026-02-13-online.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,10 +15,10 @@ Starting at 4 PM CET
15
15
16
16
### <imgsrc="https://github.com/OWASP/www-chapter-italy/blob/master/assets/images/speakers/simone-curzi.jpeg?raw=true"alt="Marco Morana"width="34"height="34"style="border-radius:50%; vertical-align:middle; margin-right:8px;" /> Simone Curzi - Microsoft
17
17
18
-
**Talk:***Am I Secure Enough? Rethinking Security as an Investment with Quantitative Risk Analysis*
18
+
**Talk:**
19
+
*Am I Secure Enough? Rethinking Security as an Investment with Quantitative Risk Analysis*
19
20
20
-
**Synopsis**
21
-
Security is often treated as a non-negotiable cost: we must be secure, no matter what. In the real world, resources are finite and security decisions have a cost, an operational impact, and a measurable effect on risk.
21
+
**Synopsis**: Security is often treated as a non-negotiable cost: we must be secure, no matter what. In the real world, resources are finite and security decisions have a cost, an operational impact, and a measurable effect on risk.
22
22
23
23
This talk challenges the idea that one should not ask “Am I secure enough?” or “Which mitigations should I focus on?”. On the contrary, these are the most important questions security professionals should be able to answer.
24
24
@@ -32,10 +32,10 @@ The result is not just better prioritization, but a shared language that allows
**Talk (draft):***Your Agents Have Power — Do They Have Guardrails? Engineering Agent Security, Privacy, and Policy in Decentralized Local Compute Setups*
35
+
**Talk:**
36
+
*Your Agents Have Power — Do They Have Guardrails? Engineering Agent Security, Privacy, and Policy in Decentralized Local Compute Setups*
36
37
37
-
**Synopsis**
38
-
As AI agents gain autonomy to plan, call tools, access data, and execute actions, they introduce new security and privacy risks—especially in decentralized, locally hosted environments. This session shows how to engineer enforceable guardrails for agentic systems using open-source components and local models, without relying on centralized cloud controls. Attendees will learn how to define risk boundaries, threat-model agent workflows, apply least-privilege tool access, enforce policy-as-code, add privacy safeguards, enable audit-ready observability, and continuously test agent behaviors. The talk concludes with a preview of swarm agents in trustless compute, highlighting what’s next for secure, decentralized agent architectures.
38
+
**Synopsis**: As AI agents gain autonomy to plan, call tools, access data, and execute actions, they introduce new security and privacy risks—especially in decentralized, locally hosted environments. This session shows how to engineer enforceable guardrails for agentic systems using open-source components and local models, without relying on centralized cloud controls. Attendees will learn how to define risk boundaries, threat-model agent workflows, apply least-privilege tool access, enforce policy-as-code, add privacy safeguards, enable audit-ready observability, and continuously test agent behaviors. The talk concludes with a preview of swarm agents in trustless compute, highlighting what’s next for secure, decentralized agent architectures.
39
39
40
40
41
41
Back to the [OWASP-Italy Chapter](https://owasp.org/www-chapter-italy)
0 commit comments