Identity in the AI Era: Managing Enterprise Risk in the Age of AI with Jasson Casey Podcast Por  arte de portada

Identity in the AI Era: Managing Enterprise Risk in the Age of AI with Jasson Casey

Identity in the AI Era: Managing Enterprise Risk in the Age of AI with Jasson Casey

Escúchala gratis

Ver detalles del espectáculo

The Evolution of Identity Security in the Age of AI

In this episode of Cyber Sentries, John Richards sits down with Jasson Casey, CEO and co-founder of Beyond Identity, to explore the intersection of identity security, AI, and enterprise risk management. As organizations rapidly adopt AI tools and agents, the fundamental challenges of identity security are evolving—requiring both new approaches and a return to core principles.

Identity: The Foundation of Modern Security

Jasson explains how identity has become the root cause of most security incidents, with identity-based failures accounting for 80% of security tickets. The conversation explores how AI is transforming every role in modern organizations, while highlighting the security implications of this rapid adoption.

Key Takeaways:

  • Identity security is fundamental to managing AI risk in enterprises
  • Traditional security concepts still apply but require new implementation approaches
  • Organizations need to track data flow and permissions across AI systems

Looking Ahead

As AI adoption accelerates, organizations must balance innovation with security. Through proper identity management and understanding of data flow, enterprises can prevent most security incidents while embracing the transformative potential of AI technologies.

Links & Notes

  • Beyond Identity
  • AI Solutions
  • Connect with Jasson Casey on LinkedIn
  • Connect with Jasson Casey on X
  • CyberProof
  • Learn more about Paladin Cloud
  • Got a question? Ask us here!
  • (00:04) - Welcome to Cyber Sentries
  • (01:26) - Meet Jasson Casey
  • (03:15) - Regrets?
  • (08:43) - Friction Point
  • (10:52) - Identity
  • (17:32) - Adoption
  • (22:41) - The Hallmark of Network Security
  • (28:34) - Paint Analogy
  • (31:41) - Threats
  • (34:32) - Visualization Tool
  • (35:37) - Their Work in This Space
  • (37:29) - Learning More
  • (38:00) - Wrap Up
Todavía no hay opiniones