Please ensure Javascript is enabled for purposes of website accessibility

Agentic AI Masterclass

Secure AI Agents with Expert-Led Sessions

AI agents aren't waiting for instructions anymore. They're authenticating to your infrastructure, making decisions, and acting on your systems autonomously. The security models we've built over the last twenty years were never designed for that.

Clutch Security’s Agentic AI Masterclass is designed to help CISOs and security teams understand AI agents, their risks, and how to go about securing them.

Module 1

The Ground Shifted

AI Got Hands
Play
Duration

2:05

Episode 1

AI Got Hands

Welcome to the Agentic AI Masterclass. While the industry focused on data leakage and DLP policies, AI started authenticating to infrastructure and acting on its own.

Contractors Who Don't Ask Questions
Play
Duration

2:55

Episode 2

Contractors Who Don't Ask Questions

AI tools, automation, and agents are three different things. This episode gets precise about the distinction and why it matters for security.

Four Properties, Zero Precedent
Play
Duration

3:30

Episode 3

Four Properties, Zero Precedent

Agents combine four properties no previous technology ever has: autonomy, non-determinism, external manipulability at runtime, and real credentials with real permissions.

The Worst Possible Order
Play
Duration

2:36

Episode 4

The Worst Possible Order

Agent adoption is happening in the reverse order of safety. The most dangerous category, local developer-driven agents, got adopted first. The safest will get adopted last.

Module 2

Who's Actually Driving

Neither Human nor Machine
Play
Duration

4:22

Episode 5

Neither Human nor Machine

An agent is an autonomous consumer of non-human identities. Securing the agent and securing its credentials are two separate problems that need to be solved together.

Blind Spots All the Way Down
Play
Duration

3:41

Episode 6

Blind Spots All the Way Down

Every time an agent acts on your infrastructure, five layers are involved: person, agent, tool, identity, resource. No tool in your security stack sees more than one of them.

The Case of the Curious Crab
Play
Duration

3:12

Episode 7

The Case of the Curious Crab

In January 2026, open-source agent OpenClaw hit 100,000 GitHub stars in three days. Over 30,000 instances were found exposed publicly, many without basic password protection.

Module 3

Where Things Break

npm Install Compromise
Play
Duration

3:42

Episode 8

npm Install Compromise

MCP servers from npm, framework dependencies, poisoned skills, manipulated tool descriptions. The channels through which agents get their capabilities have almost no security verification at any layer.

Plaintext and Prayers
Play
Duration

3:53

Episode 9

Plaintext and Prayers

The most common way agents get credentials is a plaintext config file on a developer's machine. A malicious MCP server doesn't need a zero-day. It just reads the file it was handed.

Read the Wrong Document, Lose the Kingdom
Play
Duration

4:23

Episode 10

Read the Wrong Document, Lose the Kingdom

Prompt injection is OWASP's number one LLM security risk. An attacker embeds instructions in a document or email, and the agent follows them using its legitimate credentials.

Module 4

The Fixes That Aren't

The Fifteen-Minute Illusion
Play
Duration

3:45

Episode 11

The Fifteen-Minute Illusion

Short-lived credentials are the go-to answer for agent risk. But a prompt-injected agent with a fifteen-minute token can exfiltrate data in seconds.

Perfectly Scoped, Still Compromised
Play
Duration

3:33

Episode 12

Perfectly Scoped, Still Compromised

Strict least privilege sounds like the right answer for agent security. But a prompt-injected agent operating within its authorized permissions is doing everything it's allowed to do.

Watching the Watchers
Play
Duration

4:36

Episode 13

Watching the Watchers

A growing approach proposes using an LLM to monitor agents and generate scoped credentials in real time. The monitoring AI has the same fundamental limitations as the agent it's watching.

Module 5

What Actually Works

Map the Mess
Play
Duration

2:31

Episode 14

Map the Mess

You need to know what agents are running in your environment before anything else. Discovery and inventory, from Person to Agent to Tool to Identity to Resource, pays off immediately.

What Normal Looks Like
Play
Duration

3:15

Episode 15

What Normal Looks Like

Discovery is a snapshot. Ongoing governance requires behavioral baselining in destination systems, policies around agent-to-identity mapping, and fast containment when something deviates.

Honest Answers, Open Questions
Play
Duration

3:32

Episode 16

Honest Answers, Open Questions

A candid close on where the industry actually stands. What you can build today, what's emerging in MCP and prompt injection research, and what remains genuinely unsolved.