Building Radiant AI: Lessons Learned on Applying Large Language Models in Identity

John Pritchard, CPO, Radiant Logic

Generative AI, with its capabilities in analyzing data and behavior, presents a promising solution to improve identity and application access risk management. Large Language Models (LLMs) provide a generational leap for understanding risks and detecting anomalies in data. However, they also suffer from a wide range of issues including hallucinations, privacy, and data protection–blocking many use cases. This session will cover our experiences in the integration of LLMs to streamline access governance processes and reduce access risk management for business applications. Key topics to be covered include:

  • Real-World Applications: Using LLMs to improve identity and application risk management.
  • Commercial and Open Source LLM options.
  • Integration patterns like Chain-of-Thought prompting, Chain-of-Experts and Retrieval Augmented Generation.

This presentation is designed for IT professionals, cybersecurity experts, and decision-makers seeking to stay ahead of the curve in protecting their organizations. Join us to discover how Generative AI can be a game-changer in mitigating risks and fortifying your identity security posture.


Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

identity and access management
What Are The Biggest Cybersecurity Threats in 2024?
We may be into the summer of 2024, but there are still plenty of surprises left in store in the world of cybersecurity to present issues for the rest of the year. Identity and access management is always going to be a moving target, battling to stay ahead or catch up with the latest security...
IAM: What the World is Saying
If you are a business pulling through the post-pandemic years and harnessing the potential of digital workspaces and marketplaces, identity management and access management are no longer an option – they are a necessity. It is the fundamental protection measure for the company’s digital resources, including networks, applications, and organizational and user data. Without robust...
Why Identity is the Cornerstone of a Zero Trust Architecture
Written by Scott Silver, Xalient  As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity. As we continue to digitally transform organisations,...