Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Foundations: Threat Models for Agentic AI for Government
- Types of agentic threats: misuse, escalation, data leakage, and supply-chain risks
- Adversary profiles and attacker capabilities specific to autonomous agents in government environments
- Mapping assets, trust boundaries, and critical control points for agents within government systems
Governance, Policy, and Risk Management for Government
- Governance frameworks for agentic systems in government (roles, responsibilities, approval gates)
- Policy design: acceptable use, escalation rules, data handling, and auditability within government operations
- Compliance considerations and evidence collection for audits in the public sector
Non-Human Identity & Authentication for Agents for Government
- Designing identities for agents: service accounts, JSON Web Tokens (JWTs), and short-lived credentials in government systems
- Least-privilege access patterns and just-in-time credentialing for government applications
- Identity lifecycle management, rotation, delegation, and revocation strategies for government agents
Access Controls, Secrets, and Data Protection for Government
- Fine-grained access control models and capability-based patterns for agents in government systems
- Secrets management, encryption-in-transit and at-rest, and data minimization practices for government data
- Protecting sensitive knowledge sources and Personally Identifiable Information (PII) from unauthorized agent access in the public sector
Observability, Auditing, and Incident Response for Government
- Designing telemetry for agent behavior: intent tracing, command logs, and provenance within government systems
- Security Information and Event Management (SIEM) integration, alerting thresholds, and forensic readiness in the public sector
- Runbooks and playbooks for agent-related incidents and containment in government operations
Red-Teaming Agentic Systems for Government
- Planning red-team exercises: scope, rules of engagement, and safe failover for government environments
- Adversarial techniques: prompt injection, tool misuse, chain-of-thought manipulation, and API abuse in government systems
- Conducting controlled attacks and measuring exposure and impact within the public sector
Hardening and Mitigations for Government
- Engineering controls: response throttles, capability gating, and sandboxing in government applications
- Policy and orchestration controls: approval flows, human-in-the-loop, and governance hooks within government systems
- Model and prompt-level defenses: input validation, canonicalization, and output filters for government agents
Operationalizing Safe Agent Deployments for Government
- Deployment patterns: staging, canary, and progressive rollout for agents in government environments
- Change control, testing pipelines, and pre-deploy safety checks within the public sector
- Cross-functional governance: security, legal, product, and operations playbooks for government deployments
Capstone: Red-Team / Blue-Team Exercise for Government
- Execute a simulated red-team attack against a sandboxed agent environment in a government setting
- Defend, detect, and remediate as the blue team using controls and telemetry within the public sector
- Present findings, remediation plan, and policy updates for government operations
Summary and Next Steps for Government
Requirements
- Strong background in security engineering, system administration, or cloud operations
- Understanding of artificial intelligence and machine learning (AI/ML) concepts and the behavior of large language models (LLMs)
- Experience with identity and access management (IAM) and secure system design
Audience for Government
- Security engineers and red team members
- AI operations and platform engineers
- Compliance officers and risk managers
- Engineering leads responsible for agent deployments
21 Hours