Course Outline

Foundations: Threat Models for Agentic AI for Government

  • Types of agentic threats: misuse, escalation, data leakage, and supply-chain risks
  • Adversary profiles and attacker capabilities specific to autonomous agents in government environments
  • Mapping assets, trust boundaries, and critical control points for agents within government systems

Governance, Policy, and Risk Management for Government

  • Governance frameworks for agentic systems in government (roles, responsibilities, approval gates)
  • Policy design: acceptable use, escalation rules, data handling, and auditability within government operations
  • Compliance considerations and evidence collection for audits in the public sector

Non-Human Identity & Authentication for Agents for Government

  • Designing identities for agents: service accounts, JSON Web Tokens (JWTs), and short-lived credentials in government systems
  • Least-privilege access patterns and just-in-time credentialing for government applications
  • Identity lifecycle management, rotation, delegation, and revocation strategies for government agents

Access Controls, Secrets, and Data Protection for Government

  • Fine-grained access control models and capability-based patterns for agents in government systems
  • Secrets management, encryption-in-transit and at-rest, and data minimization practices for government data
  • Protecting sensitive knowledge sources and Personally Identifiable Information (PII) from unauthorized agent access in the public sector

Observability, Auditing, and Incident Response for Government

  • Designing telemetry for agent behavior: intent tracing, command logs, and provenance within government systems
  • Security Information and Event Management (SIEM) integration, alerting thresholds, and forensic readiness in the public sector
  • Runbooks and playbooks for agent-related incidents and containment in government operations

Red-Teaming Agentic Systems for Government

  • Planning red-team exercises: scope, rules of engagement, and safe failover for government environments
  • Adversarial techniques: prompt injection, tool misuse, chain-of-thought manipulation, and API abuse in government systems
  • Conducting controlled attacks and measuring exposure and impact within the public sector

Hardening and Mitigations for Government

  • Engineering controls: response throttles, capability gating, and sandboxing in government applications
  • Policy and orchestration controls: approval flows, human-in-the-loop, and governance hooks within government systems
  • Model and prompt-level defenses: input validation, canonicalization, and output filters for government agents

Operationalizing Safe Agent Deployments for Government

  • Deployment patterns: staging, canary, and progressive rollout for agents in government environments
  • Change control, testing pipelines, and pre-deploy safety checks within the public sector
  • Cross-functional governance: security, legal, product, and operations playbooks for government deployments

Capstone: Red-Team / Blue-Team Exercise for Government

  • Execute a simulated red-team attack against a sandboxed agent environment in a government setting
  • Defend, detect, and remediate as the blue team using controls and telemetry within the public sector
  • Present findings, remediation plan, and policy updates for government operations

Summary and Next Steps for Government

Requirements

  • Strong background in security engineering, system administration, or cloud operations
  • Understanding of artificial intelligence and machine learning (AI/ML) concepts and the behavior of large language models (LLMs)
  • Experience with identity and access management (IAM) and secure system design

Audience for Government

  • Security engineers and red team members
  • AI operations and platform engineers
  • Compliance officers and risk managers
  • Engineering leads responsible for agent deployments
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories