

Introduction to RAG Security for Software Developers
Retrieval Augmented Generation (RAG) is widely considered one of the most essential building blocks for enterprise LLM applications.
Its embedding capabilities make internal data easily accessible—but that power also raises critical security concerns.
In this livestream, we’ll demonstrate how to build a fully functional, secure RAG system using open-source tools and minimal setup. This hands-on session is designed for software engineers who want to move beyond theory and see what it takes to deploy a secure RAG pipeline in practice.
We will cover:
The models best suited for securing RAG architectures
Why access control is the foundation of any secure RAG implementation
How fine-grained authorization impacts both the ingestion and retrieval of data
A step-by-step walkthrough of implementing an end-to-end security layer
How developers are using MongoDB Vectors for secure and scalable RAG workflows
Join us with Dr. Han Heloir @ MongoDB, for a live demo of building a secure RAG application from the ground up. You’ll walk away with practical knowledge and a clear path to implementing RAG securely in your own projects.