
New Identity Blueprint for a Future with Cloud & AI
Cloud Security Podcast
Culinary Memories and Cybersecurity Connections
This chapter explores personal culinary favorites from South Texas, including unique Thanksgiving traditions. It also encourages listeners to connect with Beyond Identity and promotes related podcasts and newsletters.
Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of Beyond Identity, explains why even common forms of MFA are insufficient and why any system that relies on a "secret moving" is vulnerable to attack.
The conversation dives deep into the architectural shift needed to truly secure identity: moving from probabilistic tools to deterministic proof. Jasson breaks down how to leverage the hardware-backed secure enclaves (like TPMs and the Secure Enclave) that already exist in our devices to create un-phishable, device-bound credentials that can't be stolen or copied.
We also explore how this approach provides a necessary defense against the next wave of AI-enabled threats, including deepfakes and hyper-realistic social engineering attacks that will make it nearly impossible for humans to spot the difference.
Guest Socials - Jasson's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction(02:10) Who is Jasson Casey?(04:00) What is the 2025 Version of IAM?(07:15) Why Hasn't The Identity Problem Been Solved?(08:00) The Fundamental Flaw: Relying on Secrets That Move(10:00) The Solution: Un-phishable, Hardware-Backed Identity(12:15) Why Your Current MFA is Insufficient and Easily Exploited(14:42) The Apple Pay Analogy: How Secure Identity Already Works in Your Pocket(18:58) The "Aha!" Moment: Reducing Help Desk & SOC Workload(25:25) The AI Adversary: How Deepfakes Will Break Authentication(30:00) The Answer to AI Threats: Cryptographically Attested, Device-Bound Proof(32:15) Challenges of Adopting a New World of Identity(34:30) Beyond Human Identity: Securing Workloads, Drones & IoT(36:20) Deterministic vs. Probabilistic: A New Blueprint for Security(45:20) Final Questions: Drones, Cooking, and Tex-Mex
Thank you to Beyond Identity for sponsoring this episode