DiscoverDefense in DepthHow Do We Build a Security Program to Thwart Deepfakes?
How Do We Build a Security Program to Thwart Deepfakes?

How Do We Build a Security Program to Thwart Deepfakes?

Update: 2024-05-23
Share

Description

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Russ Ayers, svp of cyber & deputy CISO, Equifax.

In this episode:

  • Are we  seeing AI and LLM rapidly push into what was science fiction into production?

  • What happens as our ability to generate realistic sound, video, and images opens the obvious door for indistinguishable fakes from the real thing? 

  • How do we keep up as security professionals?

  • What are the security implications for this tech hitting the consumer market?

Thanks to our podcast sponsor, Sonrai Security

Sonrai Security

A one-click solution that removes excessive permissions and unused services, quarantines unused identities, and restricts specific regions within the cloud. Later, maintain this level of security by automatically enforcing policies as new accounts, roles, permissions, and services are added to your environment.

Start a free trial today! sonrai.co/ciso

Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How Do We Build a Security Program to Thwart Deepfakes?

How Do We Build a Security Program to Thwart Deepfakes?