Loading…
June 14-15, 2026
Mumbai, India
View More Details & Registration

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for MCP Dev Summit Mumbai to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration..

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.


Venue: Lotus 3 clear filter
arrow_back View All Dates
Monday, June 15
 

11:30am IST

The Invincible MCP Server: Building Crash-Proof AI Tools With Durable Execution - Shubham Londhe, Temporal
Monday June 15, 2026 11:30am - 11:55am IST
We All have been building AI Agents with MCP since it launched in 2024, but there's one thing no one is talking about - "What happens when MCP Fails? (and they fail often). MCP is just a process and it can crash, and so will the AI agent progress, it all can vanish with a crash.

Well, the new Tasks primitive in MCP (SEP-1686) helps a lot, it gives your AI agents a way to hand off long-running tools, but it doesn't solve the real problem. They don't maintain the state when the server crashes.

In this session, I'll do a live demo of a Kubernetes Auto Healing AI Agent with MCP server and walk through how to wrap MCP tool logic in workflows that survive crashes, restarts, and network failures.
I'll cover how to handle human-in-the-loop approvals inside long-running tools, how to retries and state-management, and how to observe what your MCP tools are doing in production.

I'll be breaking a running server on stage and show you the agent recovering without losing a step. Hence "The Invincible MCP Server"
Speakers
avatar for Shubham Londhe

Shubham Londhe

Senior Developer Advocate, Temporal
Hello Dosto, I am Shubham Londhe, a Senior Developer Advocate, passionate about developing and deploying production-ready applications.

Its been more than 9+ years in the IT industry and having worked with AWS, Temporal, gave me a lens of how Production-readiness works.

I take this experience and share it with learners across India through my YouTube channel "TrainWithShubham" with over 175000 subscribers. Happy Learning... Read More →
Monday June 15, 2026 11:30am - 11:55am IST
Lotus 3
  Building with MCP

11:55am IST

From Shadow MCP To Sanctioned MCP: Building an Enterprise Agent Governance Program - Navin Pai, StackGen & Archana Rajkumar, SentinelOne
Monday June 15, 2026 11:55am - 12:20pm IST
MCP has become the de-facto "standard" for exposing the external environment to agents, but security has always been a trailing concern, making a lot of platform teams sweat under the collar. Policy checks and tool-call authentication were tacked on quickly, but are quickly being seen are necessary but not sufficient. This session zooms out from single-agent enforcement to the operational challenge security and platform teams actually face in 2026: dozens of agents, hundreds of MCP server connections, multiple clouds, rogue tool registrations, and no centralized visibility into what's running.

This session presents a multi-stage maturity model for enterprise MCP governance, to help take practitioners from "we have no idea what's running" to "every tool call is governed, audited, and compliant with internal policies", and shows how to build the program incrementally, without boiling the ocean in the process and slowing down developer velocity.
Speakers
avatar for Navin Pai

Navin Pai

Director of Engineering, StackGen
Navin is a Founding Engineer at OpsVerse. You'll often find him on the internet, getting into flamewars about observability, large scale system design, and open source software
avatar for Archana Rajkumar

Archana Rajkumar

Staff Software Engineer, SentinelOne
I am a Staff Software Engineer at SentinenOne, and enjoy working at the intersection of AI, CyberSecurity and DevOps
Monday June 15, 2026 11:55am - 12:20pm IST
Lotus 3
  Security, Identity + Trust

12:20pm IST

Your AI Chatbot Just Exposed Your CEO’s Salary To an Intern: Securing Enterprise AI Agents - Hasini Samarathunga & Sahan Dilshan, WSO2
Monday June 15, 2026 12:20pm - 12:45pm IST
Have you ever worried that your new AI Agent might be a little too helpful? Imagine an intern asking an HR chatbot, "What is the CEO's salary?" and the bot, designed to be helpful, promptly fetches it.

As we equip LLMs with tools via the MCP to query internal systems, we introduce a significant data privacy risk if the agent cannot distinguish who is making the request.

In this session, we’ll explore the critical intersection of IAM and AI agents. You’ll see how to implement fine-grained access control and “on-behalf-of” user execution in MCP servers. By securely propagating user context, an agent ensures that when the CEO queries salary data, the data is delivered, but when an intern makes the same request, the system restricts it.

We’ll also dive into the “Human-in-the-Loop” (HITL) pattern, a safeguard that pauses high-risk actions for explicit human approval. You’ll learn how to design secure-by-default MCP architectures using standard authentication flows, zero-trust permissioning, and HITL workflows to keep your AI agents aligned, controlled, and trustworthy.
Speakers
avatar for Hasini Samarathunga

Hasini Samarathunga

Senior Software Engineer, WSO2
Hasini Samarathunga is a Senior Software Engineer at WSO2, with 3+ years of experience specializing in IAM and B2B domains. She is currently working on building B2B capabilities for MCP servers and introducing Agent-as-a-Service within WSO2 Identity Server.

She believes great tech talks should cut through the buzzwords and make complex ideas accessible, ensuring everyone, regardless of experience level, can walk away having learned something useful... Read More →
avatar for Sahan Dilshan

Sahan Dilshan

Associate Tech Lead, WSO2
Sahan Dilshan is an Associate Tech Lead at WSO2, where he has spent the past five years designing and building identity and access management features. His current focus sits at the intersection of two complementary areas: IAM for AI securing agentic systems with proper identity... Read More →
Monday June 15, 2026 12:20pm - 12:45pm IST
Lotus 3
  Security, Identity + Trust

12:45pm IST

Your MCP Server Is an Attacker's Dream: A Security Playbook From Real-World Assessments - Akash Mahajan, KLOUDLE Inc.
Monday June 15, 2026 12:45pm - 1:10pm IST
MCP servers are quickly becoming the default interface between AI agents and production systems.

This speed has a cost. Most teams shipping MCP servers today are repeating the same security mistakes like overprivileged tool definitions, missing input validation, no transport-layer auth, and blind trust in what the LLM sends downstream.

This talk presents a practical security assessment playbook for MCP servers, built from hands-on penetration testing and security assessments of real MCP deployments.

We'll walk through the three-five most common vulnerability patterns seen in the wild.

- tool poisoning
- permission escalation
- transport misconfiguration
- server-side request forgery through tool arguments

For each vulnerability class, you'll see how the attack works, why it slips past code review, and what the fix looks like in practice.

Attendees will walk away with a repeatable methodology for assessing the security posture of any MCP server before it hits prod. Whether they built it or adopted it.
Speakers
Monday June 15, 2026 12:45pm - 1:10pm IST
Lotus 3
  Security, Identity + Trust

3:50pm IST

MCP Elicitation in the Wild: When Agents Ask for Too Much - Kaiwalya Koparkar, Gravitee.io
Monday June 15, 2026 3:50pm - 4:15pm IST
Elicitation is one of MCP's most powerful and least governed features. It lets servers request additional input from users at runtime, enabling richer, more dynamic agent interactions. But in production environments, elicitation also opens a surface for agents to request sensitive data they shouldn't need, bypass approval flows, or trigger unintended actions under the guise of a helpful prompt. This session examines elicitation as a runtime governance problem: what it is at the protocol level, where the security boundary sits between server and client, and how to enforce limits on what agents can elicit without neutering the feature entirely. Drawing on real implementation experience, the talk covers policy patterns for elicitation scope control, audit logging of elicitation events, and the UX tradeoffs of locking it down. Attendees will leave with a clear framework for deciding when elicitation is safe, when it needs guardrails, and how to implement those guardrails in a running MCP deployment.
Speakers
avatar for Kaiwalya Koparkar

Kaiwalya Koparkar

Platform Advocate, Gravitee
Monday June 15, 2026 3:50pm - 4:15pm IST
Lotus 3
  Security, Identity + Trust

4:15pm IST

Securing MCP Servers for the Enterprise: OAuth 2.0, Keycloak, and Spring Boot in Production - Vishal Singh, Quest2travel
Monday June 15, 2026 4:15pm - 4:40pm IST
The MCP spec mandates OAuth 2.0 for HTTP-exposed servers, but most tutorials stop at "add a Bearer token." Enterprise deployments demand more: dynamic client registration, tool-level authorization, token introspection under load, and audit trails for compliance.

This session builds a production-grade MCP server with Spring Boot and the MCP Java SDK, secured by Keycloak. We cover: mapping OAuth scopes to MCP tool permissions, rate limiting per client credential with Bucket4j, wiring OpenTelemetry traces through the MCP request lifecycle, and handling edge cases at scale — token clock skew across distributed agents, graceful degradation when the IdP is unreachable, and preventing prompt injection from leaking privileged tool responses.

Attendees leave with a working architecture adaptable to any identity provider and a clear mental model of where MCP security ends and application security begins.

Breakdown: threat model (3 min), OAuth 2.0 + Keycloak layer (7 min), hardened Spring Boot server (8 min), edge cases from the field (5 min), architecture takeaway (2 min).
Speakers
avatar for Vishal Singh

Vishal Singh

Senior Software Developer, Quest2travel
Senior Software Developer at Quest2travel by MakeMyTrip, building Java/Spring Boot backend systems for B2B corporate travel at scale. Previously at Comviva (Tech Mahindra) on fintech platforms handling 3.5M+ API requests/day. Active open-source contributor to Keycloak (OIDC claim... Read More →
Monday June 15, 2026 4:15pm - 4:40pm IST
Lotus 3
  Security, Identity + Trust

4:40pm IST

Agentic DX: Bringing Your IDP Into the IDE - Adnan Vahora & Dhwani Suthar, Motorola Solutions
Monday June 15, 2026 4:40pm - 5:05pm IST
Platform engineering has a chicken-and-egg problem: the platform needs adoption to justify investment, but adoption requires onboarding that teams resist when deadlines are tight. Our internal developer platform hit this hard. It serves 4,000+ developers across clouds and managed Kubernetes, yet many teams found the portal too unfamiliar.
We solved it with a second entry point built on MCP. Instead of learning a new UI, developers get 30+ platform capabilities directly in IDE chat, from namespace provisioning and Helm deployments to cost analysis and access management. An MCP App renders forms in chat, developers approve and execute, and a first deployment can happen with almost no onboarding.
This session covers the production architecture: sandboxed iframe-based MCP Apps, Elicitation for structured write approvals, an Adaptive Tool Router that keeps 30+ tool schemas from flooding the context window, a split between deterministic Agent Skills and ReAct reasoning, and a safety layer with a sub-500ms kill switch plus delegated RBAC tied to existing permissions. Attendees leave with a practical blueprint for meeting developers where they already work.
Speakers
avatar for Dhwani Suthar

Dhwani Suthar

Software Engineer, Motorola Solutions
Everyone loves spinning up massive cloud infrastructure. Absolutely nobody loves figuring out who has to pay for it.That’s where I come in. At Motorola Solutions, I’m a full-stack data engineer in FinOps, taking high-velocity streaming data and reverse-engineering it into beautiful... Read More →
avatar for Adnan Vahora

Adnan Vahora

Software Engineer, Motorola Solutions
Building the roads and traffic lights for the next generation of AI at Motorola Solutions. I’m currently obsessed with solving the 'hard parts' of Agentic AI—like figuring out how to secure Agent-to-Agent traffic without slowing it down.

I’m a big believer in open standards (huge fan of Envoy & Wasm) and love turning chaotic problems into clean architecture. Always happy to swap stories about platform engineering, Rust, or the latest in AI governance. Come say hi... Read More →
Monday June 15, 2026 4:40pm - 5:05pm IST
Lotus 3

5:35pm IST

Why Your MCP Server Needs Real Users — Implementing OAuth and Dynamic Client Registration for MCP - Tamil Vanan Karuppannan, Arcesium & Achanandhi M, EY
Monday June 15, 2026 5:35pm - 6:00pm IST
ost MCP servers today ship with a simple setup: plug in an API key or a shared credential, and you're good to go. That works fine for a weekend hack, but the moment you bring MCP into an enterprise, things start to fall apart. You don't want MCP clients storing static usernames and passwords — that's a security incident waiting to happen. You can't tell who did what, you can't enforce fine-grained access control, and your security team is not going to be happy. What enterprises actually need is for users to authenticate through their existing SSO, get access to MCP servers based on who they are and what they're allowed to do, and have every action tied back to a real identity for audit and compliance.

In this talk, we use the OpenSearch MCP Server as a concrete example to show why this matters and what we can do about it. We'll walk through extending the server to support OAuth 2.0 Authorization Code Flow with PKCE and Dynamic Client Registration (DCR), following the MCP authorization spec.
Speakers
avatar for Tamil Vanan Karuppannan

Tamil Vanan Karuppannan

Principal Engineer, Arcesium
Tamil vanan is a cloud native Tech lead at Arcesium and a former Kubernetes SME at VMware. He is passionate about finding solutions to problems in the cloud native environment.

He works with cloud-native technologies like Kubernetes, multi-cloud and networking. He is a passionate supporter of open source and CNCF and actively participates in it... Read More →
avatar for Achanandhi M

Achanandhi M

Advanced Analyst, EY
Achanandhi is an open source advocate who enjoys exploring new technologies and loves building communities. He actively contributes to open source projects and frequently speaks at community events, sharing knowledge about cloud-native technologies and open source. He is passionate... Read More →
Monday June 15, 2026 5:35pm - 6:00pm IST
Lotus 3
  Security, Identity + Trust

6:25pm IST

Who Do You Trust? Securing Multi-Agent MCP Systems in Healthcare - Yuvraj Pradhan, MIT ADT University & Archana Kumari, MIT ADT University
Monday June 15, 2026 6:25pm - 6:50pm IST
An LLM caught my friend’s condition that doctors took two months to confirm. We asked: what happens when multiple specialised models review the same case together?

We built ConsensusMed on MCP. Each specialist model for a medical domain runs as an independent MCP server, and an orchestrator coordinates their outputs and decides what to trust when models disagree.

Multi-agent clinical systems face real attack surfaces:

- A malicious MCP server can exfiltrate OAuth tokens and impersonate legitimate users
- Prompt injection in clinical reports silently shifts outputs before consensus
- Tampered model weights corrupt findings with no OAuth scope catching it

So we built a trust layer directly into MCP:

- An MCP interceptor proxy redacts PHI using NER before any tool call reaches a specialist server
- The chairman verifies SHA-256 hashes of model weights against Ed25519-signed manifests before spawning
- Specialists run as stdio subprocesses. They never bind to a port. Network access is structurally impossible.

For regulated environments, we built an air-gapped MCP registry that operates entirely offline with cryptographic verification before execution.
Speakers
avatar for Yuvraj Pradhan

Yuvraj Pradhan

AI Systems Engineer, MIT-ADT UNIVERSITY
Yuvraj Pradhan is an AI Systems Engineer specialising in cost-efficient GenAI and secure multi-agent architectures. He is the first author of research published in Springer Nature on architecting a 125M-parameter NanoLLM for STEM tasks that outperforms significantly larger models... Read More →
avatar for Archana Kumari

Archana Kumari

Ai Systems Developer, MIT ADT University
Archana Kumari is an AI Systems Developer building practical machine learning systems and edge AI applications. Her work spans LLMs, computer vision on embedded devices, and full-stack tooling with Python and Java. She has developed multi-agent reasoning frameworks and voice-assisted... Read More →
Monday June 15, 2026 6:25pm - 6:50pm IST
Lotus 3
  Security, Identity + Trust
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience Experience Level
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -