Loading…
April 2-3, 2026
New York, NY
View More Details & Registration

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for MCP Dev Summit North America to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration..

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.


Venue: Empire Complex (7th Floor) clear filter
Thursday, April 2
 

11:50am EDT

Securing MCP at Scale: From Principles To Production - Peter Smulovics, Morgan Stanley
Thursday April 2, 2026 11:50am - 12:15pm EDT
As MCP adoption accelerates across platforms, the risks of giving LLMs tool access are growing quickly. This session explores the real threat surface of MCP systems: prompt injection, tool poisoning, unsafe permissions, supply-chain “rug pulls,” cross-tool escalation, and data-exfiltration risks that arise when agents can call arbitrary tools. Building on Microsoft's recent work hardening MCP on Windows, we outline a practical reference architecture for secure deployments: signed and verified tool manifests, unique server identities, scoped capabilities, sandboxed execution, authenticated connections, governance via registries, audit logging, and runtime anomaly detection. Attendees will leave with a blueprint for running MCP in production: what to lock down, how to operate it safely, and how enterprises can integrate MCP into existing security, IAM, and compliance frameworks. This talk equips developers, architects, and security teams to build safer agentic systems and contribute to a more secure MCP ecosystem.
Speakers
avatar for Peter Smulovics

Peter Smulovics

Distinguished Engineer, Morgan Stanley
Peter Smulovics is a Distinguished Engineer at Morgan Stanley with 15+ years at the firm and 30+ in the industry. A 2× Microsoft MVP and co-creator of C#, he serves as Vice Chair of FINOS (Linux Foundation) Technical Oversight Committee and leads Open Source Readiness. He focuses... Read More →
Thursday April 2, 2026 11:50am - 12:15pm EDT
Empire Complex (7th Floor)
  Security and Operations

12:20pm EDT

When MCP Becomes a Product - Gautam Baghel, HashiCorp & Roy Derks, IBM
Thursday April 2, 2026 12:20pm - 12:45pm EDT
MCP servers often begin as simple side projects. You build a quick integration, get a basic connection working, and show a demo. But as users begin to rely on your tool, the stakes change. In this talk, we share the lessons learned from taking multiple of MCP servers from initial Proofs of Concept to robust production standards, supporting tens of thousands of developers across open-source and enterprise environments. These are the real-world realities of treating your MCP server as a shipping product.
Speakers
avatar for Roy Derks

Roy Derks

Developer Experience, IBM
Roy Derks is a lifelong software developer, author and public speaker from the Netherlands. Currently chasing his dreams in Silicon Valley, California. Roy's mission is to make the world a better place through technology by inspiring developers all over the world, more specifically... Read More →
avatar for Gautam Baghel

Gautam Baghel

Sr. Product Manager, Gen AI, HashiCorp, an IBM company
Gautam is a passionate technologist who thrives on solving DevOps puzzles and building meaningful solutions. He's all about automating stuff, streamlining workflows, and building scalable systems. Through his talks, Gautam shares practical insights and inspires others to dive into... Read More →
Thursday April 2, 2026 12:20pm - 12:45pm EDT
Empire Complex (7th Floor)

12:50pm EDT

Golem To Murderbot: Challenges With Agentic Security Delegation Via MCP - Michael Schwartz, Gluu
Thursday April 2, 2026 12:50pm - 1:15pm EDT
To implement "Zero Trust", authorization must be enforced consistently across every layer: inside the agent, in the cloud (like MCP gateways and services), and down to the database. Each layer needs its own dynamic authorization decision engine, yet those decisions must remain aligned and explainable.

As AI agents become first-class actors in enterprise systems, traditional security models start to strain. This session examines how agentic workflows challenge today’s delegation mechanisms, especially when agents act autonomously, chain operations, or cross trust boundaries. We’ll explore where OAuth works well and where it falls short.

The session argues for centralized policy management using Cedar, decoupled from application code to prevent policy drift. It will introduce emerging governance models like GovOps, which treat policies, schemas, and authorization logic as managed assets with lifecycle controls and automated compliance. Attendees will leave with a practical ideas for secure agent delegation and governing agentic systems at scale.

The discussion frame is two narratives: a 15th century myth and a 2025 Apple TV mini-series based Martha Wells' books.
Speakers
avatar for Michael Schwartz

Michael Schwartz

Founder / CEO, Gluu
Mike is the founder of cybersecurity software vendor Gluu, BD of the Linux Foundation Janssen Project, and twice a week hosts the livestream Identerati Office Hours. He is also author of "Securing the Perimeter" (Apress 2018) about open source digital identity. His podcast "Open Source... Read More →
Thursday April 2, 2026 12:50pm - 1:15pm EDT
Empire Complex (7th Floor)
  Security and Operations

2:35pm EDT

From Scopes To Intent: Reimagining Authorization for Autonomous Agents - Andres Aguiar & Abhishek Hingnikar, Okta
Thursday April 2, 2026 2:35pm - 3:00pm EDT
The Model Context Protocol (MCP) has standardized how we connect models to data, but the security layer remains a work in progress. Currently, MCP implements authorization via standard OAuth scopes.

While this works for handling coarse-grained tool access, it presents challenges for finer grained permissions.

To solve this, we must move toward intent-based authorization—a model where agents are authorized to perform actions based on the specific context of a task, rather than a pre-approved list of capabilities.

This presentation will dissect the consequences of the current OAuth model on agent design and present ideas of how to address them. We will discuss how to implement dynamic authorization that allows agents to be helpful without being intrusive, ensuring that security scales alongside intelligence.
Speakers
AH

Abhishek Hingnikar

Product Architect, Okta
avatar for Andres Aguiar

Andres Aguiar

Director of Product @ Okta, Okta
Solving Authorization with openfga.dev | fga.dev
Thursday April 2, 2026 2:35pm - 3:00pm EDT
Empire Complex (7th Floor)
  Security and Operations

3:05pm EDT

Deploying MCP at Scale Without Skipping Compliance - Becky Brooks, MCP Manager by Usercentrics
Thursday April 2, 2026 3:05pm - 3:30pm EDT
With EU AI Act enforcement beginning this year, teams deploying MCP need to understand what regulators will actually look for in production systems.

This talk is a practical guide for builders and IT teams deploying MCP at scale without dodging compliance. We’ll break down the concrete requirements emerging from regulation, including audit logs, traceability, access controls, and oversight mechanisms, and show how they map directly to MCP-based architectures.

We’ll cover how compliance applies across the systems MCP touches, from internal tools and data sources to the emerging MCP Apps ecosystem, where consumer-facing workflows introduce new expectations around transparency, consent, and accountability as AI increasingly mediates how brands and consumers interact.

Attendees will leave with a clear picture of what it takes to deploy MCP that works in production and holds up under regulatory scrutiny.
Speakers
avatar for Becky Brooks

Becky Brooks

Staff Product Marketing Manager, MCP Manager by Usercentrics
Becky Brooks is a Staff Product Marketing Manager at MCP Manager by Usercentrics, where she helps teams safely and confidently deploy MCP in real-world AI systems. She focuses on making MCP accessible and trustworthy so teams can use AI to move faster without sacrificing safety or... Read More →
Thursday April 2, 2026 3:05pm - 3:30pm EDT
Empire Complex (7th Floor)
  Security and Operations
  • Audience Experience Level Any

3:35pm EDT

Shadow MCP: Finding the MCPs Nobody Approved - Aidan Sochowski & Alexander Frazer, Runlayer
Thursday April 2, 2026 3:35pm - 4:00pm EDT
Shadow IT is back - but this time it's AI-powered. Employees are configuring MCP servers directly in Cursor, Claude Desktop, and VS Code, creating a blind spot that traditional security tools miss. These shadow MCPs operate outside centralized control, enabling data exfiltration, supply chain attacks, and compliance violations.

This talk exposes the shadow MCP problem and presents a comprehensive detection and response framework:

- Why shadow MCPs are uniquely dangerous (AI amplifies access, automates actions, no audit trail)
- Discovery techniques: IDE config scanning, MDM integration, network detection patterns
- Classification: distinguishing managed vs shadow servers across device fleets
- Response playbooks: triage, investigation, remediation by risk level

I'll share real vulnerability examples from official MCPs (GitHub, Asana, Supabase, Postmark) and demonstrate automated detection through IDE hooks (Cursor, Claude Code) and MDM platforms (SimpleMDM, Jamf).

Attendees will leave with practical techniques for gaining visibility into shadow MCP usage and a framework for bringing unauthorized integrations under organizational control.
Speakers
AS

Aidan Sochowski

Senior Product Engineer, Runlayer
Aidan is a founding product engineer at Runlayer. Previously he's worked
at Glean on scalable connector and crawler infrastructure and at YouTube
on recommendations serving infrastructure

... Read More →
avatar for Alexander Frazer

Alexander Frazer

Founding Security Engineer, Runlayer
Alexander Frazer is a Founding Security Engineer at Runlayer, specializing in generative AI and cybersecurity. With 15+ years of experience, he focuses on AI security challenges and MCP implementations. Previously he has led creation and evaluation of AI-driven security triage systems... Read More →
Thursday April 2, 2026 3:35pm - 4:00pm EDT
Empire Complex (7th Floor)
  Security and Operations

4:30pm EDT

If You Can Secure It Here, You Can Secure It Anywhere - Milan Williams & Katrina Liu, Semgrep
Thursday April 2, 2026 4:30pm - 4:55pm EDT
Here's the thing about being a security company: you can't ship a vulnerable MCP server. For us, getting pwned isn’t just embarrassing - it gets us on the front page of Hacker News. Our customers trust us to protect them from nation-state attackers, well-funded adversaries (and the odd teenager attacking for lolz.)

At the same time, the MCP ecosystem is still maturing. Hardening standards for sophisticated attackers don't exist yet. And with high-profile supply chain attacks now targeting agents, attackers are actively exploiting the trust developers place in their toolchains. Last year, a flaw in mcp-remote turned into a remote code execution nightmare, exposing over 400,000 developers. That's the reality we're building in.


When it came to our MCP server, we built it using the same rigor we use to protect the world's largest companies. This talk covers the threat model we designed against, gaps in MCP's current design that required workarounds, and ultimately how we built an MCP server trusted by enterprise customers, and hardened against even the most novel attacks. If we can secure it here, you can secure it anywhere.
Speakers
avatar for Milan Williams

Milan Williams

Senior Product Manager, Semgrep
I build security products. I'm a Senior Product Manager at Semgrep, a high-growth cybersecurity startup. I lead the teams responsible for Semgrep Code (SAST) and Secrets detection products.

I recently graduated from Harvard University with degrees in Computer Science and Physics. In my free time, you can find me geeking about the latest in security / developer tooling, running in San Francisco's Golden Gate Park, or enjoying local theater... Read More →
avatar for Katrina Liu

Katrina Liu

Software Engineer, Semgrep
Katrina is a software engineer at Semgrep. She is on the Semgrep Analysis Foundations Team, the team that owns and maintains the core static analysis functionality of the Semgrep tool. She is currently working on Semgrep's MCP server.
Thursday April 2, 2026 4:30pm - 4:55pm EDT
Empire Complex (7th Floor)
  Security and Operations

5:00pm EDT

Towards Building Safe & Secure Agentic AI - Dawn Song, UC Berkeley; UC Berkeley Center for Responsible Decentralized Intelligence & Matt White, Linux Foundation/PyTorch Foundation
Thursday April 2, 2026 5:00pm - 5:25pm EDT
Recent advancements in agentic AI have unlocked powerful new capabilities, however, they also introduce fundamentally new security risks. In this talk, I present a system-level view of the security landscape of agentic AI, drawing on a comprehensive systematization of attacks and defenses across modern agent architectures.

I show how increasing agent flexibility along different dimensions expands attack surfaces and enables threats such as prompt injection, memory poisoning, unsafe data flows, credential leakage, and unauthorized execution. Using real-world incidents and CVE analyses, I illustrate how agents can be manipulated through external content, compromised tools, or poisoned internal components.

The talk also provides a systematic overview of end-to-end automatic red teaming and risk assessment for agentic AI systems as well as a defense-in-depth framework for building secure agentic systems, spanning runtime guardrails, access control, information-flow tracking, privilege separation, and secure-by-design architectures, helping practitioners assess risk, close security gaps, and deploy agents safely at scale.
Speakers
avatar for Dawn Song

Dawn Song

Professor, Computer Science @ UC Berkeley and Director of Berkeley RDI (Berkeley Center for Responsible Decentralized Intelligence), UC Berkeley; UC Berkeley Center for Responsible Decentralized Intelligence
Dawn Song is a UC Berkeley CS Professor & Berkeley RDI Co-Director. She is the recipient of the MacArthur, Guggenheim, ACM, IEEE, and Sloan Fellowship, Schmidt Sciences AI2050 Senior Fellowship, NSF CAREER Award, MIT Technology Review TR-35 Award, ACM SIGSAC Outstanding Innovation... Read More →
avatar for Matt White

Matt White

Global CTO of AI, Linux Foundation
Matt White is the Executive Director of the PyTorch Foundation and GM of AI at the Linux Foundation. He is also the Director of the Generative AI Commons. Matt has nearly 30 years of experience in applied research and standards in AI and data in telecom, media and gaming industries... Read More →
Thursday April 2, 2026 5:00pm - 5:25pm EDT
Empire Complex (7th Floor)
  Security and Operations
  • Audience Experience Level Any
  • Session Slides Yes

5:30pm EDT

MCP Traffic Handling at Scale: Stateless Design, Proxies, and the Road Ahead - Erica Hughberg, Tetrate & Boteng Yao, Google
Thursday April 2, 2026 5:30pm - 5:55pm EDT
As MCP adoption grows, teams are facing a new set of challenges: session management across fleets, policy enforcement for agents and users, and operating MCP traffic at scale.

We’ll explore how proxies currently handle stateful MCP sessions, how stateless designs dramatically simplify scaling and operations, and how proxies like Envoy can enforce authorization, tool safety, and policy without becoming bottlenecks. The discussion will also look ahead to emerging MCP proposals, including stateless transports, async tasks, and server discovery, and why alignment between protocol evolution and proxy implementations matters for the ecosystem.

Attendees will leave with concrete architectural insights, practical lessons learned, and a clearer picture of where MCP traffic handling is headed and how to build for it now.
Speakers
avatar for Boteng Yao

Boteng Yao

Software Engineer, Google
Boteng is a Senior Envoy Maintainer and Software Engineer at Google, working on Envoy for various products with an emphasis on data plane, reliability, and security.
avatar for Erica Hughberg

Erica Hughberg

Envoy AI Gateway Maintainer, Tetrate
Erica Hughberg is a technical leader, software engineer, and community advocate passionate about helping engineering teams develop scalable, secure, and user-focused application platforms. As a maintainer of Envoy AI Gateway, she concentrates on features that enable organizations... Read More →
Thursday April 2, 2026 5:30pm - 5:55pm EDT
Empire Complex (7th Floor)
  Security and Operations
 
Friday, April 3
 

11:30am EDT

Demistifying Client ID Metadata Documents in MCP - Den Delimarsky, Anthropic
Friday April 3, 2026 11:30am - 11:55am EDT
With the recent specification update, MCP moved away from using DCR as the default in favor of Client ID Metadata Documents (CIMD). It's a new approach to client registration already adopted by such projects like Bluesky, and now making its way to the MCP ecosystem. CIMD is significantly easier to use than DCR while providing the same security guarantees and a much more flexible approach to client governance. In this session, you will learn about the transition from DCR to CIMD, how you should design your MCP servers (and MCP clients) around this new requirement, and what the future holds for broader CIMD adoption.
Speakers
avatar for Den Delimarsky

Den Delimarsky

Member of Technical Staff, Anthropic
Den is an avid reverse engineer, passionate about APIs, protocols, and security. He leads MCP technical programs at Anthropic and prior to that built authentication and authorization libraries used by millions of developers around the globe. You can learn more about his work on h... Read More →
Friday April 3, 2026 11:30am - 11:55am EDT
Empire Complex (7th Floor)
  Security and Operations

12:00pm EDT

Threat Modeling Authorization in MCP - Sarah Cecchetti, OpenID Foundation
Friday April 3, 2026 12:00pm - 12:25pm EDT
This session will describe the work of the AI Threat Modeling working group within the OpenID Foundation. Security considerations in OAuth were a concern before MCP, and MCP's use of OAuth raises additional concerns including malicious elicitation and code execution requests. I will describe MCP attacks which enable attackers to exfiltrate sensitive data, compromise password-protected accounts, and gain remote control of local machines.
Speakers
avatar for Sarah Cecchetti

Sarah Cecchetti

Chair of AI Threat Modeling Working Group, OpenID Foundation
By day, Sarah is Director of Product Management for Semperis, a Series C startup. She also chairs the AI threat modeling group in the OpenID Foundation. Prior to that she spent five years at AWS where she led the open-sourcing of Cedar. She co-founded IDPro and co-authored NIST SP... Read More →
Friday April 3, 2026 12:00pm - 12:25pm EDT
Empire Complex (7th Floor)
  Security and Operations
  • Audience Experience Level Beginner
  • Session Slides Yes

12:30pm EDT

Mix-Up Attacks in MCP: Multi-Issuer Confusion and Mitigations - Emily Lauber, Microsoft
Friday April 3, 2026 12:30pm - 12:55pm EDT
MCP deployments increasingly involve multiple authorization servers / identity providers across tools, registries, gateways, and enterprise environments. That flexibility introduces a classic but under-discussed class of failures: mix up attacks. A mix-up attack is where a client or intermediary confuses which issuer/authorization server it’s interacting with and misroutes sign-in artifacts, such as tokens, to the wrong party, potentially a malicious one.

This talk gives a clear threat model for mix-up in MCP-style topologies (client↔server↔auth server), then focuses on practical mitigations being discussed in the Auth Mix-Up Attack Prevention WG. I’ll also cover what’s realistic to adopt today in SDKs and servers versus what should be standardized in the MCP Core spec or another standard like OAuth.
Speakers
avatar for Emily Lauber

Emily Lauber

Senior Product Manager, Microsoft
Emily Lauber is a Senior Product Manager at Microsoft focused on identity, authentication, and developer platforms. She works at the intersection of cloud security, browser-based auth, and standards, helping shape how modern apps and agents securely authenticate and access resources... Read More →
Friday April 3, 2026 12:30pm - 12:55pm EDT
Empire Complex (7th Floor)
  Security and Operations

2:25pm EDT

Putting the Single Back in Single Sign-On: Cross-App Access for MCP - Paul Carleton, Anthropic & Max Gerber, Twilio
Friday April 3, 2026 2:25pm - 2:50pm EDT
MCP makes it easy for AI agents to connect to tools, but authorization hasn't kept up. Users connecting an MCP client to a dozen MCP servers face a dozen separate OAuth flows, one for each server, each with its own login and token lifecycle. If we have Single Sign-On, why are users signing in so many times? It's not just a UX problem. Enterprise environments can quickly run into governance issues with unmanaged or scattered permissions. Security teams can't answer basic questions about which agent can access which system under what policy. Every agent-to-server connection is another point-to-point relationship with no central visibility. Cross-App Access (XAA), built on the Identity Assertion JWT Authorization Grant (ID-JAG), solves both problems. By leveraging the existing trust between the MCP client, MCP server, and the organization's Identity Provider, the IdP can broker token exchanges from the user's initial login. Agents gain access to everything the admin has approved with one sign-in. No additional user interaction required. The IdP becomes the policy decision point for approving, scoping, and auditing delegated access across MCP integrations. In this session, Paul Carleton (Anthropic) and Max Gerber (Twilio) explain the technical underpinnings that enable enterprise admins to enforce policies about which users, clients, and servers can interact. They'll also demo an MCP client completing an XAA flow from beginning to end to obtain access tokens securely and silently. Attendees will leave understanding how Cross-App Access works and how to integrate with it.
Speakers
avatar for Max Gerber

Max Gerber

Principal Software Engineer, Twilio
Max Gerber is the software engineering lead for agent and AI identity at Twilio, where he works on core identity SDKs and APIs including OAuth, SAML, SSO, and RBAC. He previously led identity initiatives at Stytch and served as a lead engineer on MuleSoft’s IAM team during its integration... Read More →
avatar for Paul Carleton

Paul Carleton

Member of Technical Staff, Anthropic
Paul Carleton is a Core Maintainer of the Model Context Protocol and Auth Nerd at Anthropic, where he leads auth implementations across Anthropic's clients and the TypeScript and Python SDKs. He drives MCP conformance testing efforts to ensure consistent behavior across the ecosy... Read More →
Friday April 3, 2026 2:25pm - 2:50pm EDT
Empire Complex (7th Floor)
  Security and Operations

2:55pm EDT

The Boring Attack That Will Actually Get You - Craig Jellick, Obot AI
Friday April 3, 2026 2:55pm - 3:20pm EDT
The MCP security conversation focuses heavily on prompt injection, tool abuse, and session hijacking. These matter. But if you're running a registry of MCP servers, your most likely breach won't be complicated. It will be a compromised server you trusted too quickly.

Supply chain attacks aren't new, and neither are the defenses. But the speed of MCP adoption has outpaced basic hygiene: validation, provenance, versioning, and review processes that mature package ecosystems learned the hard way.

This talk argues that before you harden against novel agent-based attacks, you need to treat your MCP registry like critical infrastructure. We'll cover practical approaches to vetting servers, establishing trust boundaries, detecting drift, and building review workflows that scale.

Prompt injection is a real threat. But the server you added last week without review is a more immediate one.
Speakers
avatar for Craig J

Craig J

VP of Engineering, Obot AI
Craig Jellick is VP of Engineering and co-founder of Obot AI, where they are building an agent platform that helps teams of all technical levels create software, automate work, and ship real tools using AI. Previously, he was a founding engineer and Director of Engineering at Rancher... Read More →
Friday April 3, 2026 2:55pm - 3:20pm EDT
Empire Complex (7th Floor)
  Security and Operations
  • Audience Experience Level Any
  • Session Slides Yes

3:25pm EDT

Beyond the Sandbox: Security at the Host Layer - Lorenzo Verna & Pietro Valfrè, Denied
Friday April 3, 2026 3:25pm - 3:50pm EDT
Security in the MCP ecosystem has primarily followed a "Henhouse Model": building a perimeter to manage who enters with which keys. While we’ve become adept at granting agents the access they need to be productive, a new challenge is emerging. Because agents often operate with the user’s broad privileges, it is no longer just about managing entry; it is about ensuring that an agent's actions remain consistently aligned with the user’s intent.

While sandboxing is vital for isolation, it cannot "undo" the real world. When an agent uses an MCP tool to send an email, modify a calendar, or trigger a financial API, it steps through a "one-way door." Unlike local code, these actions lack a git revert.

We believe the most sustainable path forward is to move the primary authorization boundary to the Host. In this session, we propose an architectural approach that shifts outbound security to the application layer. By centering protection where context is richest, we can simplify server development and provide a more reliable way to manage the unpredictable nature of autonomous workflows.
Speakers
avatar for Lorenzo Verna

Lorenzo Verna

Co-founder and CPO, Denied
Lorenzo Verna (Math & CS) is Co-Founder & CPO at Denied.dev. A former CTO and founder with 3 startups and 2 exits, he has 15+ years building and scaling software products and AI platforms. His current work focuses on securing agentic systems, including MCP tool execution and policy... Read More →
avatar for Pietro Valfrè

Pietro Valfrè

CEO & Co.founder at Denied, Denied
Pietro, CEO and Co-founder of Denied, previously served as the first employee of a mid-size Italian venture studio. During his time there, he ultimately headed R&D and contributed to the successful development of several ventures. Having thoroughly explored the field of Auth, he is... Read More →
Friday April 3, 2026 3:25pm - 3:50pm EDT
Empire Complex (7th Floor)
  Security and Operations

4:20pm EDT

Securing the MCP Ecosystem: Production Patterns for Transparency and Trust - Lisa Tagliaferri & Trevor Dunlap, Chainguard
Friday April 3, 2026 4:20pm - 4:45pm EDT
Model Context Protocol servers are increasingly granted access to critical infrastructure from observability systems and databases to code repositories. This access introduces new supply chain security challenges for teams operating MCP servers in real-world environments.

In this talk, we share lessons learned from Chainguard’s experience building MCP infrastructure for production. Starting with mcp-grafana, our first hardened MCP server, we reduced known CVEs to 0 at publish time while shrinking image size by 65%. We developed repeatable security patterns for MCP delivery, including automated rebuilds, attack surface minimization, SBOM generation, and SLSA provenance.

We then applied these same patterns to a different use case: a documentation MCP serving over 1,500 container image guides, enabling secure access through AI assistants. These implementations demonstrate how consistent supply chain controls can support both infrastructure-integrated and content-focused MCP servers.

Attendees will learn practical approaches to threat modeling MCP servers. We’ll also share our challenges and failures, along with open-source workflows the community can adopt across the MCP ecosystem.
Speakers
avatar for Lisa Tagliaferri

Lisa Tagliaferri

Senior Directory, Developer Enablement, Chainguard
Lisa Tagliaferri is Senior Director of Developer Enablement at Chainguard and a maintainer of Sigstore’s documentation. The author of “How To Code in Python” and a Linux Foundation course developer, Lisa focuses on helping developers and maintainers adopt CNCF and OpenSSF tooling... Read More →
avatar for Trevor Dunlap

Trevor Dunlap

Senior Software Engineer, Chainguard
Trevor Dunlap is a senior software engineer at Chainguard. He holds a Ph.D. in Computer Science with a focus on automating the enhancement of vulnerability data. Trevor is an advocate for open source software security and enjoys competing on Kaggle.

Friday April 3, 2026 4:20pm - 4:45pm EDT
Empire Complex (7th Floor)
  Security and Operations
  • Audience Experience Level Any
  • Session Slides Yes

4:50pm EDT

Enterprise-Ready MCP: Security Patterns and the "4-Legged" Identity Challenge - Paulina Xu, Agentic Fabriq
Friday April 3, 2026 4:50pm - 5:15pm EDT
As MCP evolves from local developer workflows to shared, remote infrastructure, new security & identity challenges emerge. Patterns that work for single-user, local MCP setups often break down when MCP servers become gateways serving thousands of users, agents, and tools. This session explores the architectural patterns required to deploy MCP securely in enterprise environments. We’ll examine common failure modes such as data overexposure, unsafe bulk operations, topic-based disclosure, and weak audit controls, and map them to practical MCP-level mitigations including least-privilege access, tool-level guardrails, and privacy-aware logging. A focus of the talk is the “4-Legged” Identity Challenge: when a user interacts with a web app, which calls an agent, which then calls a remote MCP server. This model is not natively handled by standard OAuth flows. We’ll cover approaches such as token exchange, pre-provisioned trust, and interactive authorization, and discuss how emerging MCP capabilities like protected resource metadata support scalable identity discovery. Attendees will leave with a blueprint for moving from local MCP development to secure, production-ready MCP deployments.
Speakers
avatar for Paulina Xu

Paulina Xu

CEO, Agentic Fabriq
Paulina Xu is the CEO of Agentic Fabriq, where she is building a centralized hub for agent identity, OAuth-based authentication, permissioning, and auditability, enabling organizations to safely manage what agents can access and do across tools, applications, and teams. Prior to founding... Read More →
Friday April 3, 2026 4:50pm - 5:15pm EDT
Empire Complex (7th Floor)
  Security and Operations

5:20pm EDT

Context Middleware for MCP: From Enterprise Needs To Protocol Extension - Peder Holdgaard Pedersen, Saxo Bank
Friday April 3, 2026 5:20pm - 5:45pm EDT
Many MCP servers aren't public - they're internal enterprise deployments where security, compliance, and safety aren't optional. Yet MCP currently lacks standardized middleware patterns, forcing teams into shared libraries and bespoke solutions that recreate the NxM problem.

Context middleware lets us intercept, inspect, and transform MCP traffic at trust boundaries. Just as tools were key to end-user MCP adoption, standardized middleware can unlock it for regulated industries: PII redaction, audit logging, prompt injection defense, hallucination detection - all without vendor lock-in or security gaps.

For the emerging gateway and proxy ecosystem, this opens new market opportunities: standardized integration points that transform MCP infrastructure into a composable, enterprise-grade platform.

This talk presents a working implementation as used at a major financial institution, including demos of attack prevention and real-world findings. You'll leave understanding the architecture, the extension, the trust boundary considerations, and how to start building context-aware middleware today.
Speakers
avatar for Peder Holdgaaard Pedersen

Peder Holdgaaard Pedersen

Principal Developer, Saxo Bank
Peder architects AI systems and spearheads AI adoption at Saxo Bank as Principal Developer. He is a contributor to the C# MCP SDK and an MCP maintainer for the Financial Services Interest Group. He specializes in integrating cutting-edge AI capabilities with bespoke assistants and... Read More →
Friday April 3, 2026 5:20pm - 5:45pm EDT
Empire Complex (7th Floor)
  Security and Operations
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience Experience Level
  • Session Slides
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.