As organisations accelerate AI adoption and continuous delivery, automated workflows and CI/CD pipelines have become mission-critical infrastructure. These systems enable rapid innovation, scalability, and operational efficiency, but they also depend on high-value credentials and secrets. When compromised, these secrets can provide attackers with silent, far-reaching access to code, data, and production systems.
At The Grand IT Security 2026, one of the roundtable topics, will examine how organisations can secure AI and CI/CD automation while maintaining speed, flexibility, and developer momentum.
The Automation Security Dilemma
Automation pipelines are built for trust and speed. Service accounts deploy code, AI models access sensitive data, and workflows trigger actions across cloud and on-prem environments, all often without human intervention. This makes them powerful, but also uniquely vulnerable.
A single leaked token, over-privileged API key, or misconfigured secret can cascade across environments. For security and technology leaders, the key question is:
How can we protect secrets and credentials in highly automated systems without slowing down innovation or disrupting delivery pipelines?
Balancing security, access control, and delivery velocity
Traditional security models struggle in automated environments. Static credentials, shared secrets, and manual approval processes do not scale with modern DevOps and AI operations.
organisations must shift toward least-privilege, just-in-time access models that dynamically adapt to workloads and contexts. This means enforcing strong access boundaries while keeping pipelines frictionless for developers and data teams.
The challenge is not choosing between security and speed, it is designing systems where both reinforce each other.
Detecting and responding to anomalous credential usage
In CI/CD and AI automation, breaches rarely appear as obvious attacks. Credential abuse often blends in with legitimate system behavior, making visibility and context essential.
Continuous monitoring and anomaly detection allow organisations to baseline normal credential usage and identify deviations in real time, such as unusual pipeline executions, unexpected data access, or abnormal token lifetimes.
The focus moves from reactive incident response to proactive detection and containment, reducing both dwell time and impact.
Continuous assurance as the new standard for automation
AI-driven development and continuous delivery require security controls that operate at the same speed as automation itself. Secrets management, credential rotation, and access enforcement must be embedded directly into pipelines through policy-as-code and automated controls.
The leadership question evolves from “Are our pipelines secure?” to:
“Are our automated systems continuously protected, auditable, and resilient, while supporting rapid experimentation and deployment?”
Why this matters for Leaders
Securing automation is no longer a purely technical concern, it is a strategic business and risk issue. At The Grand IT Security 2026, sessions will explore:
- Detecting and responding to anomalous credential usage in AI and CI/CD pipelines.
- Implementing least-privilege access without creating operational bottlenecks.
- Securing automated workflows while enabling fast, reliable innovation.
Through expert insights, real-world examples, and interactive discussions, leaders will gain actionable strategies to align security, engineering, and business objectives.
Shaping the future of secure automation
As AI and automation increasingly define how organisations build and operate digital services, protecting secrets becomes foundational to trust and resilience. Secure automation is not about slowing teams down, it is about enabling confident, scalable innovation.
The Grand IT Security 2026 offers a unique platform for security, technology, and business leaders to address these challenges, share best practices, and shape the future of secure AI and CI/CD operations.
Join us on May 21st, 2026, at Stockholm Waterfront Congress Centre, Sweden | By invitation only.

















































