Cover Image for Introduction to RAG Security for Software Developers
Cover Image for Introduction to RAG Security for Software Developers
Avatar for Permit.io
Presented by
Permit.io
Never Build Permissions Again
Hosted By

Introduction to RAG Security for Software Developers

YouTube
Registration
Welcome! To join the event, please register below.
About Event

Retrieval Augmented Generation (RAG) is widely considered one of the most essential building blocks for enterprise LLM applications.

Its embedding capabilities make internal data easily accessible—but that power also raises critical security concerns.

In this livestream, we’ll demonstrate how to build a fully functional, secure RAG system using open-source tools and minimal setup. This hands-on session is designed for software engineers who want to move beyond theory and see what it takes to deploy a secure RAG pipeline in practice.

We will cover:

  • The models best suited for securing RAG architectures

  • Why access control is the foundation of any secure RAG implementation

  • How fine-grained authorization impacts both the ingestion and retrieval of data

  • A step-by-step walkthrough of implementing an end-to-end security layer

  • How developers are using MongoDB Vectors for secure and scalable RAG workflows

Join us with Dr. Han Heloir @ MongoDB, for a live demo of building a secure RAG application from the ground up. You’ll walk away with practical knowledge and a clear path to implementing RAG securely in your own projects.

Avatar for Permit.io
Presented by
Permit.io
Never Build Permissions Again
Hosted By