Why this matters
You cannot secure what you only understand through slides. Build a tiny internal tool with an agent. Watch where it helps. Watch where it guesses. Watch where it overreaches. Watch how identity, context, tools, and permissions actually work when the thing is live.
That hour will teach you more than twenty vendor briefings. The security leaders who do well here will be the ones who touched the stove themselves.
The toolchain gap
Some of your current vendors will adapt to human-plus-agent teams. Some will not. What is not acceptable is pretending the stack that barely kept up with humans will somehow keep up by force of tradition.
What the real risk calculation looks like
If you adopt agents with guardrails: new attack surfaces — true. Also: better visibility, faster review, more consistent policy enforcement, an actual chance of paying down old security debt.
If you block agents outright: all the old attack surface, all the old slowness, all the old backlog. Plus shadow adoption. That is not the conservative option. That is the lazy one.
The direct ask
Your engineers need a security leader who can say yes with conditions. Yes in this environment. Yes with these controls. Yes with this traceability. That is leadership.