NHIcon 2026 is where builders and breakers, defenders and decision-makers unite to confront what agentic AI means – not just for security, but for the way software works and enterprises run.
This one-day virtual experience will blaze new ground and bring together the people on the front lines of this high-stakes inflection point.
We welcome proposals across a range of perspectives – from deep-dive technical implementations to broader operational and policy insights. (10-, 25-, and 45-minute slots are available!)
Whether you’re reverse engineering how agents behave in the wild, hardening your identity fabric, or trying to decode what “autonomous” really means in a production environment, we want your story.
We are seeking proposals
How to Contribute
Technical Sessions:
Under-the-hood explorations of LLMs and agentic platforms, or the protocols bringing these new tools into the enterprise. Architectural how-tos, and hands-on demonstrations are both welcome.
Case Studies:
Real-world lessons from organizations building and/or securing agentic AI, software workloads, and service accounts.
Workshops:
Interactive learning for developers and practitioners.
Panels:
Conversations bringing together diverse perspectives from security, AI, and enterprise.
Target Audience
Security practitioners; DevOps engineers; identity architects; AI developers, technologists, and researchers; CISOs; and policymakers who want to understand and address the non-human identity challenge.
ALL ANGLES OF AGENTIC AI SECURITY
Suggested Topics
We invite original submissions that address the real and emergent security, operational, and governance challenges of agentic AI and non-human systems in production.
1
Agent Architecture and Safety Design
How agents are structured, how feedback loops are managed, and how teams detect misuse, drift, or fragility. What’s working in the wild?
2
Exploits, Control Failures, and Misuse Scenarios
Real-world cases where agents went off-script, bypassed constraints, or triggered unintended outcomes – and what teams did next.
3
Data Access, Leakage, and Confidentiality Risk
When autonomous agents interact with sensitive data, how do you constrain their reach, ensure auditability, and prevent unintended sharing?
4
Emergent Privileges and Shadow
Access Paths
How AI systems gain, request, or inherit permissions in unexpected ways. What happens when the perimeter is a protocol?
5
Agent-Created Code and Workflow Vulnerabilities
When agents generate code or take actions on your behalf, what new classes of risk emerge? What can be tested, validated, or secured?
6
Identity Guardrails and Evolving Standards
How protocols like MCP, SPIFFE/SPIRE, WIMSE, and OIDC are evolving to support agentic systems. What’s working today for identity, trust, and control – and what still needs to be invented. Who’s pushing the envelope, and where is emerging consensus forming?
7
Integration, Observability, and
Incident Response
How teams are monitoring, logging, and responding to agent activity today. What telemetry actually helps during investigations?
WHAT WE ARE LOOKING FOR
Selection Criteria
NHIcon is built by and for the seccurity practitioners leading the charge into the Agentic AI era. We invite proposals that bring clarity to complexity—case studies, frameworks, and forward-looking research that help others navigate the new landscape of non-human identity security. If your story can help the community think differently or act smarter, we want to hear from you.
Relevance
Alignment with non-human identity security and agentic AI.
Originality
Fresh ideas, new perspectives, or novel research.
Practicality
Value for practitioners and decision-makers.
Clarity
Well-structured abstracts and learning outcomes.
Diversity
Representation of a wide range of voices and backgrounds.