Zero Trust for AI Systems
Published by O'Reilly Media, Inc.
Securing Modern Environments
Course Outcomes:
- Define roles and responsibilities for Zero Trust adoption
- Apply Zero Trust principles to secure systems powered by Generative AI and autonomous AI Agents
- Identify and address security gaps introduced by AI integrated workflows
- Implement controls that protect people, devices, data—and the expanding surface of AI-powered systems and agents
As Agentic AI and Generative AI reshape how enterprises operate and make decisions, the need for a modernized security model has never been greater. Join expert Razi Rais in this course to master the principles, standards, and implementation strategies of Zero Trust architecture—rooted in the foundational "never trust, always verify" approach. But Zero Trust must now do more than protect traditional assets. With the rise of autonomous agents and AI systems that can access sensitive data, act independently, and even influence security outcomes, the classic model must evolve. This course explores how to extend Zero Trust to AI-powered systems, address emerging risks, and embrace AI-led security approaches that help you stay resilient in an increasingly AI-driven world.
This course will help you learn Zero Trust principles, understand the relevant standards and guidance, and equip you to apply Zero Trust effectively in the age of AI.
What you’ll learn and how you can apply it
- Define roles and responsibilities for Zero Trust adoption
- Apply Zero Trust principles to secure systems powered by Generative AI and autonomous AI Agents
- Identify and address security gaps introduced by AI integrated workflows
- Implement controls that protect people, devices, data—and the expanding surface of AI-powered systems and agents
This live event is for you because...
- You want to design and implement a modern Zero Trust architecture that meets today’s security demands.
- You’re a security or system architect who focused on securely integrating Generative AI workflows including AI Agents across the organization
- You’re exploring how Zero Trust must evolve to address the security challenges introduced by AI.
- You’re driving the adoption of forward-looking security practices and want to stay ahead of the AI-driven threat landscape.
Prerequisites
- Basic knowledge of computer security topics, including authentication, authorization, firewall, storage devices, cloud computing, and networking
- Basic familiarity with AI/ML systems and their integration
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
Zero Trust Security Fundamentals (55 minutes)
- Presentation: he origins of zero trust; understanding the meaning of the “never trust, always verify” mindset; what isn’t zero trust (marketing buzzwords, approaches, and hacks); the role of key players, including governments, cloud providers, and standard and compliance bodies. The evolution of zero trust for AI systems; reinterpreting "never trust, always verify" for machine learning models; AI-specific security challenges
- Group discussion: Check your knowledge of the “never trust, always verify” mindset
- Q&A
Break
Adapting Security for AI using Zero Trust (55 minutes)
- Presentation: The evolution of zero trust for AI systems; reinterpreting "never trust, always verify" for AI systems adoption; AI driven attacks and security challenges
- Group Discussion: Identify potential AI-related security vulnerabilities in common enterprise scenarios
- Q&A
Break
AI-Specific Frameworks and Standards for Zero Trust (55 minutes)
- Presentation: Understanding the common zero trust frameworks (NIST, CISA,etc);AI specific security frameworks and guidance; MITRE ATLAS, OWASP Top 10 for LLMs
- Exercise: Identify key AI risks to corresponding zero trust pillars (Identity, Device, Application, Data, Network)
- Q&A
Break
Using AI to Enhance Zero Trust (45 minutes)
- Presentation: AI-driven decision making for zero trust;contextual decision making;risk assessment and anomaly detection;real time threat intelligence;
- Case Study: Discuss AI real world use-cases that enhance Zero Trust security.
- Q&A
Break
Future Directions (15 minutes)
- Presentation: AI's role in implementing and enhancing zero trust architectures; resources for continued learning in AI security and zero trust
- Final Q&A
Your Instructor
Razi Rais
Razi Rais is a cybersecurity and AI leader at Microsoft, with over 20 years of experience building secure, resilient systems for Fortune 500 companies worldwide. He brings a globally informed perspective to enterprise-scale security, shaped by hands-on experience living and working in Singapore, UAE, France, and the United States. His background spans engineering, architecture, and product management, giving him a unique lens on the evolving intersection of AI and cybersecurity. He drives enterprise efforts to secure AI at scale and address emerging threats using frameworks like the NIST AI Risk Management Framework, OWASP Top 10 for LLMs, and MITRE ATLAS. Razi has coauthored several books, including Zero Trust Networks, second edition, and Azure Confidential Computing and Zero Trust and is a frequent speaker at conferences such as RSA and Identiverse. He serves on the GIAC advisory board, is a Microsoft Certified Trainer and delivers AI and cybersecurity training worldwide. Connect with him on LinkedIn to follow his latest work.