5 • 7 Ratings
🗓️ 24 September 2025
⏱️ 97 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to the R Labs podcast. |
| 0:20.0 | Our special guest today is Jason Casey. Jason, dude, thank you, bro, for hanging out with us for the next hour, hour, hour and a half. Man, I really appreciate it. |
| 0:29.0 | Thanks for having me. For the few people on this planet, Jason, don't know who you are. Give everybody the two-minute spiel on what you're doing today, but focus on today, |
| 0:39.5 | and I want you to, like, leak anything out. You know, this is a talk about you, your journey. So just, |
| 0:44.7 | just today. So my name is Jason Casey. I'm the CEO and co-founder of a company called Beyond |
| 0:50.3 | Identity. Yeah, what I'm focused on today is reducing or preventing security incidents |
| 0:57.2 | at companies by actually focusing on this thing we call identity defense. We believe 70 to 80% |
| 1:02.3 | of all security incidents, some of which grow up to become breaches, are actually failures of the |
| 1:07.3 | identity system. And when you kind of systematically look at it, you can get the data and the proof out of threat reports, whether it's Mandia, Verizon DBIR, or CrowdStrike. When you |
| 1:16.3 | look at the history of identity products, you can kind of see why. They were built around productivity |
| 1:20.3 | concepts. How do I get you to work fast? Necessarily built around security concepts. And again, |
| 1:25.5 | like it doesn't take too much to peel back the onion |
| 1:27.7 | think about how much a credential whether it's a password or an access token |
| 1:32.8 | actually tells you not just about the person but about the device the workload |
| 1:37.2 | of the device the safety of the device the geography of the device relative to |
| 1:40.6 | what service or data it's asking for I've been in security long enough to kind of get me to focus on this in the last, really since 2019. And I think this is the biggest |
| 1:49.6 | threat to the world right now is identity-related exploitation. And I think identity defense is the best way of solving it through, you know, 80 to 90% prevention and 10 to 20% detection |
| 2:03.6 | response. |
| 2:04.8 | Before we jump, jump into the time machine for a second. |
| 2:08.5 | Anything security-wise always drives my brain crazy because it's such a very large, almost |
| 2:13.9 | generic sort of topic. |
| 2:15.9 | So when you say identity, two things. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Bill Kennedy, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Bill Kennedy and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.