The best way to keep up with identity security tips, guides, and industry best practices.
The Identity Problem Just Got 100x Bigger and 1000x Faster
Every year the RSA Conference has a defining tension. In 2026, it was this: the enterprise is deploying AI agents faster than it can govern them, defending against attacks faster than humans can respond, and connecting agents to tools through a protocol most security teams haven’t heard of yet.
Three numbers capture the moment: 85% adopting, 5% governing, 22 seconds to breach.
Together they describe a world where identity is no longer about people logging into applications. It’s about autonomous agents making thousands of decisions per second, accessing every system in your enterprise, through a protocol called MCP that has become the new front door.
Here are the three shifts every CISO needs to internalize coming out of RSAC 2026.
1. The Agent Governance Gap Is the Defining Security Crisis of the Next 12 Months
I’ve been to a lot of RSA conferences. I’ve never seen a gap between adoption and readiness this wide.
Cisco’s Jeetu Patel put the numbers on the board during his keynote: 85% of enterprises are experimenting with AI agents. Only 5% have moved them to production. The blocker isn’t technology. It’s security. Specifically, it’s governance — the ability to answer a basic question that every board is about to ask: What AI agents exist in your environment, who owns them, and what can they do?
Okta’s data made it worse. 88% of organizations have already experienced agent-related security incidents. But only 22% treat agents as identities. 70% of identity incidents are now linked to AI. We’re experiencing the consequences of ungoverned agents before we’ve built the frameworks to govern them.
And here’s the part that should keep CISOs up at night: 60% of organizations cannot terminate a misbehaving agent once it’s running. 59% admit shadow AI operates entirely outside their governance perimeter.
Every major vendor at RSAC shipped agent identity capabilities — CrowdStrike, Palo Alto (Cortex AgentiX), Cisco (Duo Agentic Identity), Microsoft (Entra Agent ID), Okta, SailPoint, Saviynt, SentinelOne, Silverfort, ConductorOne. The Innovation Sandbox winner, Geordie AI, is purpose-built for AI agent governance. First time an agent-native company has won the top prize. That tells you where the market’s center of gravity has shifted.
But VentureBeat cataloged five of these agent identity frameworks and found three critical gaps that none of them solve: behavioral monitoring (watching what agents actually do, not just what they’re permitted to do), agent-to-agent verification (how one autonomous agent trusts another), and self-modification auditing (detecting when an agent changes its own behavior or instructions).
The products are shipping. The frameworks are forming. But the hard problems remain unsolved.
What this means for you:
If you don’t have an agent identity and governance strategy today — not on next year’s roadmap, today — you are behind. The question isn’t whether your organization is deploying AI agents. It’s whether you know about all the ones that are already running. Non-human identities now outnumber human identities 100-to-1 in the average enterprise. IDC projects 1.3 billion AI agents in operation by 2028. Your identity governance program needs to cover humans, service accounts, API keys, AND AI agents through one framework, one policy engine, one audit trail. If you’re still treating identity governance as quarterly access reviews for employees, you’re governing 1% of your actual identity surface.
2. Autonomous Defense Is No Longer Optional — 22-Second Attack Windows Broke the Human-in-the-Loop Model
Microsoft’s Vasu Jakkal delivered what I believe was the most important keynote of the conference. Her message: “The future of security is ambient and autonomous — woven deeply into every layer of the AI stack, from agents to apps, to platforms, to infrastructure.”
This isn’t aspiration. It’s being forced on us by the math.
Mandiant’s M-Trends 2026 report, released during the conference, revealed that attacker dwell time has collapsed to 22 seconds. Not 22 hours. Not 22 minutes. Twenty-two seconds from initial access to lateral movement. In 2022, that number was 8 hours. The compression is exponential, and it’s being driven by attackers using the same AI tools we’re deploying for defense.
Zscaler’s ThreatLabz research added fuel: most enterprise AI systems are compromisable in 16 minutes. 100% of the systems they tested had critical flaws. And up to 80% of the reconnaissance, discovery, and exploitation chain is now AI-driven.
At 22-second attack windows, no human can be in the loop for response. Period. The triage-investigate-escalate-approve-remediate cycle that has defined SOC operations for two decades is architecturally obsolete against AI-speed attacks.
Cisco’s Patel warned about what he called “the oops phase” — with autonomous agents, the core security concern shifts from information theft to agents taking consequential wrong actions. An agent with access to production infrastructure doesn’t steal data. It takes actions. It modifies configurations. It approves workflows. It moves money. The blast radius of a compromised agent is categorically different from a compromised credential.
Google launched agentic SOC capabilities with Gemini-powered threat investigation. CrowdStrike shipped Charlotte AI AgentWorks for building custom security agents. SentinelOne’s Purple AI hit 50%+ attach rate in their install base. The Agentic SOC — where AI agents handle triage, investigation, and response with minimal human intervention — emerged as the architectural aspiration across the show floor.
What this means for you:
You need autonomous AI to defend against autonomous AI. That is no longer a provocative statement — it’s operational reality at 22-second dwell times. But here’s the paradox that defined RSAC 2026: the organizations that most need autonomous defense (because they’re under AI-driven attack) are the same ones that cannot yet govern autonomous systems (because 60% can’t even terminate a misbehaving agent). Solving the governance problem from takeaway #1 is the prerequisite for safely deploying the autonomous defense you need. They’re not separate problems. They’re the same problem viewed from two sides.
3. MCP Is the Protocol That Will Define Agent Security — and Most Security Teams Haven’t Heard of It Yet
If you walked the RSAC show floor without understanding MCP — the Model Context Protocol — you missed the most consequential infrastructure shift happening in enterprise security right now.
MCP is to AI agents what SAML and OIDC are to human authentication. It’s the protocol that standardizes how AI agents connect to tools, access data, and take actions across enterprise systems. When an AI agent queries your Snowflake database, creates a Jira ticket, modifies an AWS IAM policy, or sends a Slack message — that tool call flows through MCP.
Eight vendors announced MCP-specific security and governance capabilities at RSAC: Cisco built an MCP Gateway into Secure Access. Palo Alto added MCP support to Cortex AgentiX. Cloudflare launched MCP Server Portals. Fortinet added MCP to FortiAI. Silverfort deployed an inline MCP gateway. SentinelOne’s Prompt Security monitors 13,000+ MCP servers. Google integrated Model Armor with MCP. ConductorOne launched AI Access Management with 3,000+ hosted MCP servers.
A live demo at the conference showed an Azure tenant takeover exploiting an MCP vulnerability. This is not theoretical risk.
Here’s why MCP matters at a structural level: whoever controls the MCP layer — authentication, authorization, governance, audit — controls what every AI agent in the enterprise can do. It’s the new chokepoint. The new perimeter. The layer where agent security will be won or lost.
And yet most security teams don’t have MCP visibility today. They don’t know which MCP servers are running in their environment. They don’t know which agents are connecting to which tools. They don’t have policy enforcement at the MCP layer. They don’t have audit trails for MCP tool calls.
This is 2006 for cloud security all over again. A foundational infrastructure shift is happening, the early movers are building governance around it, and the majority of the market hasn’t caught up yet. The difference is that in 2006, you had years to figure out cloud security. With MCP, the agents are already running.
What this means for you:
Add MCP to your security vocabulary immediately. Inventory the MCP servers in your environment. Understand which agents are connecting to which tools through which MCP endpoints. Build or buy governance at the MCP layer — authentication, authorization, policy enforcement, and audit logging for every tool call. The CISOs who build MCP governance now will have the same structural advantage that the CISOs who adopted cloud security early had a decade ago. The ones who wait will be playing catch-up against autonomous agents operating through ungoverned protocol infrastructure.
The Common Thread
These three takeaways are not separate trends. They are one structural change viewed from three angles:
The agent governance gap (takeaway #1) is the problem. Autonomous defense (takeaway #2) is the forcing function that makes solving it urgent. MCP (takeaway #3) is the infrastructure layer where the solution lives.
Identity has evolved from managing people who log into applications to governing autonomous machines that make thousands of decisions per second through a protocol most security teams are just learning about. The organizations that adapt their security architecture to this reality in the next 12 months will define the next era of enterprise security.
The ones that don’t will be governed by the agents instead of governing them.
Stay in touch
The best way to keep up with identity security tips, guides, and industry best practices.
Explore more articles
Your Recruiting Stack Is a Disaster. We're Burning Ours Down.
The Fastest Path to AI Is Now the Safest Path: Introducing AI Access Management by ConductorOne
Extensible Identity Flows: How ConductorOne Finally Made Joiner Provisioning Bend to Your Rules