Developersummit
  • HOME
  • SPEAKERS
  • SESSIONS
  • SCHEDULE
  • FAQ
  • BUY TICKETS
  • ONDEMAND
  • CONTACT
saltmarch

GIDS news media, articles, insights and virtual events educate and illuminate its audiences so they can be fully prepared to deal with the new realities at work and in their professions.

Saltmarch On-Demand
Media

Our Experts

Videos On Demand

Insights

Call for Papers

Connect

About Us

Privacy Policy

Terms & Conditions

Contact Us

Subscribe to Developersummit

Get the latest event updates, and insights from today's leading voices.

© 2026-2027 Saltmarch. All rights reserved.

Securing LLMs in Production: From OWASP Top-10 to Guardrails that Work
RegisterTwitterLinkedInFacebook

< session />

Securing LLMs in Production: From OWASP Top-10 to Guardrails that Work

Fri, April 24OpsTech ArchitectureDeepTech

Large Language Models have expanded what’s possible, and what’s vulnerable. New risks like prompt injection, data exfiltration, insecure plugin calls, and model-driven denial-of-service are testing the limits of traditional security models. The OWASP LLM Top-10 (2024–2025) offers a shared vocabulary for these threats; this session turns that framework into a hands-on security playbook for engineers, architects, and security teams deploying LLMs in production.

You will learn how to threat-model LLM endpoints, implement guardrails that actually work, and sandbox plugins and tools using least privilege. The talk also shows how to align controls with the NIST AI Risk Management Framework and ISO/IEC 42001 for compliance-ready governance. Real-world attack examples and red-team simulations make this a practical session you can apply immediately.

What You Will Learn

  • How to identify and mitigate the top OWASP LLM risks: prompt injection, data leaks, insecure plugins, and model DoS

  • Designing input/output guardrails, content moderation, and schema validation that hold up under pressure

  • Sandbox design and least-privilege principles for tools and plugin execution

  • Techniques for securing RAG pipelines, tenant isolation, and sensitive data redaction

  • Mapping mitigations to NIST AI RMF and ISO/IEC 42001 for audit-ready assurance

Who Should Attend

Security engineers, AI platform leads, software architects, and DevSecOps professionals securing LLMs, agent frameworks, and retrieval-augmented systems in production environments.

< speaker_info />

About the speaker

Rohit Bhardwaj

Rohit Bhardwaj

Director of Architecture, Expert in Cloud-native Solutions

Rohit Bhardwaj is a Director of Architecture working at Salesforce. Rohit has extensive experience architecting multi-tenant cloud-native solutions in Resilient Microservices Service-Oriented architectures using AWS Stack. In addition, Rohit has a proven ability in designing solutions and executing and delivering transformational programs that reduce costs and increase efficiencies.

As a trusted advisor, leader, and collaborator, Rohit applies problem resolution, analytical, and operational skills to all initiatives and develops strategic requirements and solution analysis through all stages of the project life cycle and product readiness to execution.
Rohit excels in designing scalable cloud microservice architectures using Spring Boot and Netflix OSS technologies using AWS and Google clouds. As a Security Ninja, Rohit looks for ways to resolve application security vulnerabilities using ethical hacking and threat modeling. Rohit is excited about architecting cloud technologies using Dockers, REDIS, NGINX, RightScale, RabbitMQ, Apigee, Azul Zing, Actuate BIRT reporting, Chef, Splunk, Rest-Assured, SoapUI, Dynatrace, and EnterpriseDB. In addition, Rohit has developed lambda architecture solutions using Apache Spark, Cassandra, and Camel for real-time analytics and integration projects.

Rohit has done MBA from Babson College in Corporate Entrepreneurship, Masters in Computer Science from Boston University and Harvard University. Rohit is a regular speaker at No Fluff Just Stuff, UberConf, RichWeb, GIDS, and other international conferences.

Related Talks

Prototype to Production: Building Enterprise MCP and AI Agents with Templates

Wed, April 22

Prototype to Production: Building Enterprise MCP and AI Agents with Templates

Tuhin Sharma
Who Is Securing the Code Your AI Wrote?

Wed, April 22

Who Is Securing the Code Your AI Wrote?

Biswajit De
Building Adaptive ETL Pipelines with Apache NiFi, LLMs, and Apache Iceberg

Tue, April 21

Building Adaptive ETL Pipelines with Apache NiFi, LLMs, and Apache Iceberg

Kamesh Sampath

On-Demand Talks

Continuous Accessibility: Adding Lighthouse to Your CI/CD Pipeline

Continuous Accessibility: Adding Lighthouse to Your CI/CD Pipeline

Scott Davis
Navigating the Wild West of Building and Deploying Container

Navigating the Wild West of Building and Deploying Container

Jamie Coleman
Applied Software Engineering Case Diary: Field Lessons in Problem Solving

Applied Software Engineering Case Diary: Field Lessons in Problem Solving

Gireesh Punathil
Is your Code Net-zero?

Is your Code Net-zero?

Gunasundari Sridhar
Replay Production Traffic Locally: Instantly Spot & Fix Breaking Changes

Replay Production Traffic Locally: Instantly Spot & Fix Breaking Changes

Shardul Lavekar
Navigating the OpenTofu Landscape: From Basics to Mastery

Navigating the OpenTofu Landscape: From Basics to Mastery

Hemangi Karchalkar
All On-Demand »