From reconnaissance to execution, modern adversaries can now generate convincing identities, clone leaders’ voices, imitate employees on video calls with precision.
Using open-source tools and AI models available on platforms like Hugging Face and GitHub, creating weaponised deepfakes is accessible to anyone with basic skills.
In this live session, our cybersecurity experts break down how deepfakes are used to accelerate intrusions, bypass controls and amplify impact throughout ππ‘π π€π’π₯π₯ ππ‘ππ’π§.
You’ll see how attackers use π¬π²π§ππ‘πππ’π ππ¨π§πππ§π at each stage of the cyber kill chain to create a multilayered deception, with each stage reinforced by real social content, trending topics and familiar voices that make the attack feel authentic.
Think you’d spot a deepfake? Most of our last attendees couldn’t.
What you’ll learn:
How deepfakes are deployed at stages of the cyber kill chain from reconnaissance and weaponisation to delivery, exploitation and exfiltration
Realistic attacker scenarios, showing how synthetic audio/video improves success rates
Validation techniques your team can apply instantly, even without specialist tooling
Join us for the finale in our 3 part series on deepfakes and social engineering.