As AI agents evolve from chatbots to autonomous systems capable of executing code, browsing the web and making real-world decisions, they introduce powerful opportunities—and serious security risks. In this CyberArk Labs webinar, researchers Shaked Reiner and Nil Ashkenazi reveal what happens when these agents are manipulated by threat actors, exposing vulnerabilities in real-world implementations and emerging frameworks like the Model-Context-Protocol (MCP). Designed for CISOs, directors, and IT security leaders, this session delivers eye-opening research, real attack scenarios and practical advice for understanding and mitigating the new risks posed by AI-driven autonomy—before adversaries exploit them.
Recommended for You
 37:45
37:45The Future of Privilege is here. Discover how to evolve your current infrastructure with Just-in-Time access, and Zero Standing Privilege.
 1:01:26
1:01:26Experts unpack best practices and pitfalls to avoid when trying to manage multiple clouds at once
 31:00
31:00Discover who’s really in your cloud—and how to protect developer and data scientist identities without slowing innovation.
 28:32
28:32Join CyberArk experts Uzi (VP, Machine Identity Solutions) and Darren (Senior Product Manager) to learn how to eliminate secrets vault sprawl and unify governance across your organization.
 29:53
29:53Learn why enterprises are replacing legacy app control with least privilege to boost security, efficiency, and compliance.
 42:55
42:55Learn how Discover (Capital One) automated TLS certificates and scaled trust operations ahead of the 47-day mandate. Watch the webinar.
 23:51
23:51Explore how quantum computing reshapes cybersecurity in \"Future-Proofing IAM,\" a webinar featuring experts from Deloitte and CyberArk.
 1:00:50
1:00:50See how automation and AI-driven identity governance streamline compliance, reduce manual effort, and turn audits into a strategic advantage.
 57:36
57:36Get an exclusive first look at CyberArk’s latest Machine Identity Security innovations.
 35:07
35:07Discover how to simplify identity governance and administration (IGA) with our on-demand webinar, 'Modern IGA Made Simple.' Learn how automation, AI, and seamless integration can help you overcome man
 17:02
17:02Discover how automating User Access Reviews cuts manual effort by up to 80%, reduces audit fatigue, and strengthens compliance, all while saving time and costs.
 36:19
36:19Explore the evolving landscape of identity-based attacks and understand how cybercriminals adapt their strategies, while uncovering practical steps to strengthen your organization’s security posture.
 35:14
35:14Join CyberArk and Computacenter and learn how large organizations can enforce strong, scalable MFA strategies at the endpoint.
 32:04
32:04Explore how modern session management and Zero Standing Privilege strengthen PAM programs and support cloud, compliance, and hybrid work.
 43:29
43:29Join CyberArk and FIDO Alliance to explore how passkeys are redefining enterprise authentication.
 20:51
20:51Cloud’s evolution expands risk. Join CyberArk & IDC to explore platform engineering’s role in securing access, managing developer risk, and scaling defenses without slowing innovation.
 37:25
37:25A webinar to help you prepare for 47-day TLS certificate renewals. Learn to automate cert management, reduce risk, and build a scalable CLM strategy.
 32:55
32:55CyberArk Chief Strategy Officer Clarence Hinton explores trends, market dynamics and other issues shaping the 2025 identity security landscape.
 26:40
26:40Learn how unified PAM + IGA simplifies access reviews, cuts audit fatigue, and boosts security with Zero Standing Privileges.
 44:17
44:17Secrets sprawl is growing fast. Join CyberArk experts to explore a practical, unified approach to securing secrets across modern cloud-native environments.

