Obot at MCP Dev Summit North America

Obot AI | Obot at MCP Dev Summit North America

Join Obot at MCP Dev Summit North America to See What We’re Building with MCP

The Obot team is excited to sponsor MCP Dev Summit North America this April! If you’re exploring how to scale AI safely in your org, or you’re building agents and tools with Model Context Protocol (MCP), come by our tabletop to meet the team, see Obot MCP Gateway in action, and join our sessions and workshop.

Event at a glance

  • Live demo of Obot MCP Gateway: how IT teams centrally onboard, govern, and monitor MCP servers, and how employees discover and use them from their favorite AI clients.
  • Secure, policy-driven access: OAuth 2.1 auth, fine‑grained permissions, audit logging, and request filtering across all MCP traffic.
  • Searchable, role-aware catalog: IT‑verified MCPs with live documentation so users can connect quickly and confidently.
  • Flexible client and hosting options: Connect via Claude Desktop, VS Code, or Obot Chat; manage local, remote, and hosted MCPs from one control plane.
  • …and make sure to grab some fun Obot swag!
  • Date: April 1, 2026
  • Time: 1:00 PM-4:00 PM ET
  • Location: Marquis Ballroom Salon A + B
  • Speakers: Shannon Williams, President, Obot AI; Bill Maxwell, Software Architect, Obot AI
  • Add to your schedule
  • What you’ll learn:
    Enterprise adoption of the Model Context Protocol is accelerating — but the path from “MCP works on my laptop” to “MCP is running securely across our organization” is windy and challenging. The reality is that building MCPs isn’t particularly hard. Instead, the challenges are around OAuth, identity sprawl, and the governance requirements your security team will eventually land on your desk.

    The core insight is straightforward: MCP servers should focus on tools, resources, and prompts — not rebuilding OAuth infrastructure from scratch every time. A dedicated identity and governance control plane can absorb that complexity once, rather than forcing every server to solve it independently.

    In this workshop, we will:
    • Break down the authentication challenges blocking enterprise MCP adoption — OAuth scopes, dynamic client registration, token lifecycle management, and why static-only providers like Microsoft Entra are their own special headache. 
    • Show how consolidating identity into a control plane changes your architecture from a sprawl of redundant auth implementations into something actually manageable. 
    • Work through real governance scenarios: integrating remote MCP servers with an enterprise IdP, scoping tool access by user group, and applying controls at the individual tool level. 
    • Look at what central auditing and token revocation give your security team — and why that matters for getting MCP approved for production. 
    • Cover filtering strategies for PII exposure and prompt injection on MCP tool calls. 
    • You’ll leave with a clearer picture of the architectural decisions ahead of you, and a better sense of what your security team is going to ask for before they sign off on any of this.
  • Date: April 2, 2026
  • Time: 10:00-10:10 AM ET
  • Location: Broadway Ballroom
  • Speaker: Sheng Liang, CEO, Obot AI
  • Add to your schedule
  • What you’ll learn: MCP adoption in the enterprise is at an early stage and continues to grow rapidly. In the past year, Obot AI developed MCP gateways, registries, chat clients, and workflows for enterprise customers. In this talk, we will discuss the lessons we learned, the trends we observed, and the developments in MCP technologies we are particularly excited about for driving MCP adoption in the enterprise.
  • Date: April 2, 2026
  • Time: 5:00-5:25 PM ET
  • Location: Broadway Ballroom North
  • Speaker: Donnie Adams, Software Architect, Obot AI
  • Add to your schedule
  • What you’ll learn:
    What if your workflow engine wasn’t just a consumer of MCP servers, but was itself built entirely on the MCP protocol? This talk explores a novel architecture that uses MCP’s newest primitives to create a production-ready workflow orchestration system.

    We’ll demonstrate how MCP’s task framework provides natural workflow step management, while sampling enables intelligent decision-making at each stage. You’ll see how dynamic tool definition works at both workflow and step levels, allowing workflows to adapt their capabilities on the fly. We’ll also cover practical challenges like handling OAuth authentication flows mid-execution and coordinating multiple MCP servers within a single workflow.

    Through a real-world case study you’ll see how MCP’s composability transforms workflow design. Rather than building yet another workflow engine that happens to use MCP tools, we’ll show how treating MCP as the foundation protocol unlocks new patterns for distributed, intelligent automation.

    Attendees will leave with a deeper understanding of the MCP specification and how the capabilities can be composed to create production-ready workflow applications.

  • Date: April 3, 2026
  • Time: 2:55-3:20 PM ET
  • Location: Empire Complex
  • Speaker: Craig Jellick, VP of Engineering and Cofounder, Obot AI
  • Add to your schedule
  • What you’ll learn:
    The MCP security conversation focuses heavily on prompt injection, tool abuse, and session hijacking. These matter. But if you’re running a registry of MCP servers, your most likely breach won’t be complicated. It will be a compromised server you trusted too quickly.

    Supply chain attacks aren’t new, and neither are the defenses. But the speed of MCP adoption has outpaced basic hygiene: validation, provenance, versioning, and review processes that mature package ecosystems learned the hard way.

    This talk argues that before you harden against novel agent-based attacks, you need to treat your MCP registry like critical infrastructure. We’ll cover practical approaches to vetting servers, establishing trust boundaries, detecting drift, and building review workflows that scale.

    Prompt injection is a real threat. But the server you added last week without review is a more immediate one.

  • For developers: MCP gives you a clean, interoperable way to connect LLMs to tools, data, and workflows. Obot makes those MCP servers easy to find, understand, and use—with live documentation and seamless client connections.
  • For IT and security: Obot is the control plane that brings governance, observability, and compliance to MCP at scale—centralizing access control, hosting/proxying, audit trails, and policy enforcement across the enterprise.

Connect with Us

  • Stop by our tabletop to meet the team and see Obot MCP Gateway in action.
  • Catch our keynote session to learn how MCP primitives translate into real developer experience.

Have a tight schedule? Let us know your details below and one of our team members will reach out and schedule a time that works for you.

Related Articles