Podcast Summary: The Compound and Friends
Episode: CrowdStrike’s George Kurtz Reveals the Biggest Cybersecurity Threat of 2026
Date: January 14, 2026
Guests: George Kurtz (President, CEO, and Co-founder of CrowdStrike)
Hosts: Downtown Josh Brown
Overview
This episode dives deep into the rapidly evolving world of cybersecurity, focusing on the transformative impact of AI-driven threats and defenses entering 2026. Host Josh Brown interviews George Kurtz, CEO of CrowdStrike, exploring the threat landscape, CrowdStrike’s notable success, groundbreaking acquisitions, and the strategies organizations need to stay secure in a world where every company is becoming an AI company.
Key Discussion Points and Insights
1. CrowdStrike’s Recent Performance and Growth
- CrowdStrike’s Outperformance:
Josh highlights CrowdStrike’s exceptional stock performance in 2025 (~35% annual return), outpacing both the S&P 500 and competitors.- [02:26] “You guys are doing exactly that… double the performance of the S&P 500, triple the performance of one of your largest competitors.” — Josh Brown
- The Secrets to Success:
Kurtz credits relentless focus on customer outcomes, innovative products, and seamless licensing models like Falcon Flex.- [03:05] “When you really care about the customers and you think about building the best technology, not just getting something out there, it shows…” — George Kurtz
2. The 2026 Threat Landscape: AI vs. AI
- Speed and Sophistication of Attacks:
The battle in cybersecurity is now “the battle of the agentics”—an arms race of AI on both sides. Attackers leverage autonomous “agentic AI” to infiltrate and act within systems much faster than before.- [05:47] “Right now it’s the battle of the agentics... the adversary is obviously taking advantage of agentic AI and already... So are we.” — George Kurtz
- Compression of Attack Timelines:
Time to compromise has shortened from hours to minutes. Kurtz shares a stunning stat from CrowdStrike’s threat report:- [06:34] “We quoted one stat in our threat report, I think was 51 seconds between when an adversary got onto a system and then pivoted and moved to something else.”
- Emergence of Autonomous Malware:
Instead of traditional command-and-control, new threats are autonomous, adapting to each system and operating without constant communication—a major detection challenge.- [07:10] “They can drop malware that isn’t even malware… it’s just basically prompts and it doesn’t phone home… it can work autonomously.”
3. The Evolution of the Attack Surface
- AI Agents Multiply Risk:
With enterprises adopting AI agents and non-human identities, the “surface area” for attack is vastly increased.- [09:08] “Now in 2026 you have a lot of companies that have built their own AI agents… they are superhumans that have full access almost to all your data and your networks… it needs to be protected.”
- Protecting AI Use:
CrowdStrike’s acquisition of Pangea powers advanced guardrails and protections for AI implementations.
4. Attacker Techniques: They Don’t Break In, They Log In
- Identity is the New Perimeter:
Modern breaches are less about breaking down the door and more about exploiting identities and credentials—especially through social engineering and session hijacking.- [11:13] “Adversaries don’t break in. They log in in 2026.” — George Kurtz
- Continuous vs. Standing Privileges:
CrowdStrike’s acquisition of Signal enables “runtime identity,” granting privileges only as needed for specific workflow tasks, and revoking them immediately after.- [14:29] “By definition, you always have zero standing privileges until you, you get privileges for what you want to do in that workflow and then they’re gone.”
5. Acquisitions: Securing Identity and the Browser
- Signal (Continuous Identity):
A $740M deal to lock down identity at runtime using a dynamic, English-language rules engine that drastically reduces risk and error.- [16:07] “They built an identity graph… connect all these disparate systems and rules to be able to make it so much easier to implement.”
- Seraphic (Browser Security):
Another acquisition, Seraphic, bridges a key security blindspot: the browser. Most work happens in the browser—Seraphic adds visibility and control without forcing users into a proprietary browser.- [20:10] “Identity is the new perimeter. But the browser is the front door... The bulk of what they do in their day is in their browser.”
- [21:12] “You have the ability to provide incredible visibility and control combined with our agent signals… implement control models that they could only dream of…”
6. Falcon & Instant AI Protection
- Falcon AI Detection and Response:
General availability launched to roaring demand—customers are eager to protect AI workflows and meet compliance mandates.- [23:05] “There isn’t a company of size that isn’t looking at how to protect AI, period, around the globe.”
- [23:40] “...part of our goal as a company is when we buy these things… we make them work seamlessly within the platform.”
7. The Startup Ecosystem: Falcon Fund
- Strategic Acceleration and Investment:
CrowdStrike, with AWS and Nvidia, has formed an accelerator for 35 security startups—balancing in-house innovation with ecosystem collaboration.- [24:41] “There isn’t one company… We can’t solve everything. But what we see in these startups is they are in the early days of solving something that's unique…”
8. The AI Opportunity and CrowdStrike’s Moat
- Autonomous Security Operations:
CrowdStrike’s long-term bet is on transitioning to an “agentic” Security Operations Center—autonomous security, powered by unrivaled, annotated real breach data.- [26:46] “Agentic Security Operations center, which is the SoC... There’s five levels of autonomy in driving. When there’s five levels of autonomous security…”
- [27:51] “The real moats are the data. Okay, so we’ve got 10 years of data… It’s incredible.”
- Data as Competitive Moat:
Kurtz underscores that trained models are fueled by CrowdStrike's real-world, in-the-trenches detection and remediation experience.- [29:06] “You guys have trained models based on real life incidents that you have the de facto single source of truth on what happened, how was it fixed, what were the detection moments…”
Notable Quotes & Memorable Moments
- On Agentic AI Threats:
- [05:47] “It’s the battle of AI. That’s the way I would basically position it.” — George Kurtz
- On Modern Intrusions:
- [11:13] “Adversaries don’t break in. They log in in 2026.” — George Kurtz
- On Continuous Identity & Signal Acquisition:
- [14:29] “By definition, you always have zero standing privileges until you… get privileges for what you want to do in that workflow and then they’re gone.” — George Kurtz
- On Browser as the Front Door:
- [20:10] “Identity is the new perimeter. But the browser is the front door.” — George Kurtz
- On Data as a Moat:
- [27:51] “The real moats are the data. Okay, so we've got 10 years of data which is actually annotated and… reinforced, you know, human learning that we have.” — George Kurtz
Key Timestamps
- Performance and ARR Growth Discussion: [02:26] – [05:19]
- AI-Driven Threat Landscape: [05:47] – [08:36]
- AI as Attack Surface, Pangea Discussion: [09:08] – [10:33]
- Identity as the New Perimeter: [11:13] – [14:46]
- Signal Acquisition & Analogy: [14:46] – [17:14]
- Complexity of Modern Identity Management: [17:14] – [19:26]
- Browser Security & Seraphic Acquisition: [20:10] – [22:46]
- Falcon AI & Customer Demand: [23:05] – [24:12]
- Startup Ecosystem and Falcon Fund: [24:12] – [25:58]
- Long-Term AI Opportunity: [26:46] – [29:06]
- Closing Thoughts on 2026: [29:44] – [30:19]
Conclusion
This episode offers a penetrating look at the shape of cybersecurity in 2026, led by one of the field’s top innovators. The convergence of AI, identity, and browser security, along with strategic acquisitions and real-world data, is positioning CrowdStrike to lead in both defending against and defining the future of cyber threats—where speed, autonomy, and data are the ultimate battleground.
