Download Publication

Who it's for:
- Red Teamers and Penetration Testers
- Agentic AI Developers and Engineers
- Security Architects
- AI Safety Professionals
Agentic AI Red Teaming Guide
Release Date: 05/28/2025
- How Agentic AI systems are different from GenAI systems
- The unique security challenges of Agentic AI
- Why red teaming AI agents is important
- How to perform red teaming on AI agents, including test requirements, actionable steps, and example prompts
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Acknowledgements

Anirudh Murali
Principal Engineer, Agentic AI Security

Ken Huang
CEO & Chief AI Officer, DistributedApps.ai
Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.
In addition, Huang contributed extensively to key initiatives in the space. He is a core contribut...

Nick Hamilton
OpenAI

Michael Morgenstern

Sai Honig

Gian Kapoor
Principal Enterprise Architect
.jpeg)
Prateek Mittal

James Stewart

Jayesh Dalmet
Network Security Engineer L4 ( Sr. Security Engineer), NetApp
Responsible for leading the design, implementation, and maintenance of security tools, technologies, and solutions across the organization. In this senior-level leading role, I collaborate with cross-functional teams, provide technical guidance, and drive the strategic direction of security tooling initiatives to protect organization.

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 140 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...
Related Certificates & Training

Learn more