29 min

How Do We Build a Security Program to Thwart Deepfakes‪?‬ Defense in Depth

    • Technology

All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Russ Ayers, svp of cyber & deputy CISO, Equifax.
In this episode:
Are we  seeing AI and LLM rapidly push into what was science fiction into production?
What happens as our ability to generate realistic sound, video, and images opens the obvious door for indistinguishable fakes from the real thing? 
How do we keep up as security professionals?
What are the security implications for this tech hitting the consumer market?
Thanks to our podcast sponsor, Sonrai Security

A one-click solution that removes excessive permissions and unused services, quarantines unused identities, and restricts specific regions within the cloud. Later, maintain this level of security by automatically enforcing policies as new accounts, roles, permissions, and services are added to your environment.

Start a free trial today! sonrai.co/ciso

All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Russ Ayers, svp of cyber & deputy CISO, Equifax.
In this episode:
Are we  seeing AI and LLM rapidly push into what was science fiction into production?
What happens as our ability to generate realistic sound, video, and images opens the obvious door for indistinguishable fakes from the real thing? 
How do we keep up as security professionals?
What are the security implications for this tech hitting the consumer market?
Thanks to our podcast sponsor, Sonrai Security

A one-click solution that removes excessive permissions and unused services, quarantines unused identities, and restricts specific regions within the cloud. Later, maintain this level of security by automatically enforcing policies as new accounts, roles, permissions, and services are added to your environment.

Start a free trial today! sonrai.co/ciso

29 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Search Engine
PJ Vogt, Audacy, Jigsaw
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Darknet Diaries
Jack Rhysider
Teknologi og mennesker
Oslo Business Forum og Atea
Lex Fridman Podcast
Lex Fridman