Your Blueprint for Building Secure and Scalable AI Agents
Learn from the experts at Auth0, AWS, and Deloitte


One registration gets you access to both sessions:
  • Part 1: Use Case
  • Part 2: Demo
AI agents are unlocking new opportunities, but they also introduce new, complex security risks. Many teams struggle to balance innovation with security; from protecting sensitive data to managing access at scale.

Join experts from Auth0, AWS, and Deloitte for this exclusive series that shares practical best practices and real-world strategies for building secure, scalable AI systems that earn customer trust.

 Nov 6 | Nov 13

 Webinar


Gareth Davies

Chief Product Officer,
Auth0

Ravi Boppee

Managing Director,
Deloitte Consulting

Jose Alvarez

Partner Solutions Architect,
Amazon Web Services

Register now

Can't make it live? Register anyway and we'll send you the recording.

Two-part webinar series

icon-book-white.png

Part 1: 5 best practices for building secure and scalable AI

Dates & Times:

  • November 6 @ 10:00 a.m. PT
  • November 6 @ 11:00 a.m. GMT
  • 7 November @ 1:00 p.m. AEDT
Gareth Davies, CPO for Auth0 joins experts from AWS and Deloitte Consulting, where they will discuss how to:

  • Securely allow AI agents to make API calls to first and third-party apps.
  • Ensure AI agents have granular and least-privileged access at all times.
  • Build customer trust by securing agents as they take actions on behalf of users.
Designed for leaders setting the roadmap and balancing speed with compliance.
icon-paper-white.png

Part 2: Auth0 for AI Agents Demo

Dates & Times:

  • November 13 @ 10:00 a.m. PT
  • November 13 @ 11:00 a.m. GMT
  • 14 November @ 1:00 p.m. AEDT

Experience the strategy in action with a hands-on technical demonstration of Auth0 for AI Agents. We’ll show you, step-by-step:
  • How to authenticate users so agents know exactly who they are acting for.
  • How to use a secure token vault for managing access tokens and calling APIs.
  • How to enforce Fine-Grained Access Control to ensure agents access only authorized data.
  • How to enable human-in-the-loop processes for reviewing sensitive actions.

Perfect for practitioners and developers who need to see the code and implementation details.

Secure your spot today