New Identity Blueprint for a Future with Cloud & AI
Description
Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of Beyond Identity, explains why even common forms of MFA are insufficient and why any system that relies on a "secret moving" is vulnerable to attack.
The conversation dives deep into the architectural shift needed to truly secure identity: moving from probabilistic tools to deterministic proof. Jasson breaks down how to leverage the hardware-backed secure enclaves (like TPMs and the Secure Enclave) that already exist in our devices to create un-phishable, device-bound credentials that can't be stolen or copied.
We also explore how this approach provides a necessary defense against the next wave of AI-enabled threats, including deepfakes and hyper-realistic social engineering attacks that will make it nearly impossible for humans to spot the difference.
Guest Socials - Jasson's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00 ) Introduction(02:10 ) Who is Jasson Casey?(04:00 ) What is the 2025 Version of IAM?(07:15 ) Why Hasn't The Identity Problem Been Solved?(08:00 ) The Fundamental Flaw: Relying on Secrets That Move(10:00 ) The Solution: Un-phishable, Hardware-Backed Identity(12:15 ) Why Your Current MFA is Insufficient and Easily Exploited(14:42 ) The Apple Pay Analogy: How Secure Identity Already Works in Your Pocket(18:58 ) The "Aha!" Moment: Reducing Help Desk & SOC Workload(25:25 ) The AI Adversary: How Deepfakes Will Break Authentication(30:00 ) The Answer to AI Threats: Cryptographically Attested, Device-Bound Proof(32:15 ) Challenges of Adopting a New World of Identity(34:30 ) Beyond Human Identity: Securing Workloads, Drones & IoT(36:20 ) Deterministic vs. Probabilistic: A New Blueprint for Security(45:20 ) Final Questions: Drones, Cooking, and Tex-Mex
Thank you to Beyond Identity for sponsoring this episode