Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing the Future: How to Safeguard MCP and Agentic AI with Teleport and AWS

As enterprises rapidly adopt agentic AI and large language models (LLMs) to automate critical business processes and access sensitive data, the traditional security playbook is no longer sufficient. The Model Context Protocol (MCP), a new connector for AI systems like Amazon Bedrock Agents, is revolutionizing enterprise integration—but it also introduces new risks. Join us for an in-depth session exploring how to secure MCP-based AI architectures using Teleport’s Infrastructure Identity Platform and AWS. We’ll cover.

The 2-Minute Investigation: How Teleport Identity Security Sees What Your SIEM Can't

Your SIEM collects millions of events. Your CNAPP monitors cloud configurations. But can either tell you how a developer's Okta group membership led to unexpected production access through three different systems? Can they instantly trace an API key's journey from GitHub to your crown jewel databases?

Transform Security Investigations in Seconds #teleport #securecloud #identity #blueteam

Discover how AI is revolutionizing security operations by automatically analyzing millions of log lines to provide instant user activity summaries. Learn how this game-changing tool can summarize 24-48 hours of user data including critical actions, IP addresses, locations, and working patterns - eliminating the need for manual log investigation. Perfect for security teams looking to streamline their workflow and improve threat detection efficiency.

Inside Identity Security - A Red Team Cybersecurity Documentary by Teleport

What happens when real attackers target your infrastructure —and your team has to defend it in real time? This 24-minute cybersecurity documentary takes you inside a high-stakes Red Team vs Blue Team exercise, where Persistent Security simulates an advanced attack on Teleport’s Identity Security team. As the defenders race to detect, respond, and protect their systems, the film reveals the pressure, strategy, and human dynamics behind modern threat detection.

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.