DiscoverThe ITSM Practice: Elevating ITSM and IT Security KnowledgeSecuring Agentic AI: Maturity-Based Cybersecurity Strategies
Securing Agentic AI: Maturity-Based Cybersecurity Strategies

Securing Agentic AI: Maturity-Based Cybersecurity Strategies

Update: 2025-09-02
Share

Description

Agentic AI is here, learning, deciding, and acting without human approval. But is your organization mature enough to secure it? In this episode, we explore how to align AI autonomy with tailored security controls using NIST maturity tiers and ISO frameworks.


In this episode, we answer to:

What makes agentic AI different from traditional automation?

Why can’t existing controls fully secure autonomous systems?

How should your AI security evolve with your maturity level?


Resources Mentioned in this Episode:

KOVRR website, article "Cybersecurity Maturity Model Implementation: A How-To Get Started Guide", link https://www.kovrr.com/blog-post/cybersecurity-maturity-model-implementation---a-how-to-get-started-guide


Lindiwe Matlali, article "The Hidden Risks of Agentic AI: How Autonomous Systems Could Be Exploited and How to Defend Against Them", https://www.linkedin.com/pulse/hidden-risks-agentic-ai-how-autonomous-systems-could-defend-matlali-cekue


Forbes, article "Overcoming Cybersecurity Challenges In Agentic AI". link https://www.forbes.com/sites/tonybradley/2025/03/26/overcoming-cybersecurity-challenges-in-agentic-ai/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Securing Agentic AI: Maturity-Based Cybersecurity Strategies

Securing Agentic AI: Maturity-Based Cybersecurity Strategies

Luigi Ferri