Request More Information

Email:  WhatsApp:

koenig-logo

Deepfake & Synthetic Identity Fraud

26 May 2026   09:30 AM CST

  • Free Webinar
  • Live Q&A
  • Free Participation Certificate
  • Learn from Industry Experts

Learn More About This Topic

Webinar Overview
Deepfake and synthetic identity fraud are new types of cyber threats in which hackers use AI to make fake identities, voices, and videos that look and sound real. These attacks are different from regular fraud in that they don't just use stolen credentials. Instead, they make up new, believable identities or convincingly copy real people like CEOs, managers, or even family members. Attackers use AI tools to make fake audio (voice cloning), fake videos (deepfakes), and fake identity profiles (synthetic identities that mix real and fake data). These are then used in situations like business email compromise (BEC), fake requests for approval, financial fraud, or getting around systems that check your identity. As an example, an attacker could copy a CEO's voice and call a finance employee to ask for an urgent transfer of funds. Employees often do what the voice says without checking because it sounds real and makes them feel like they have to. Synthetic identities are also used to get around KYC processes, open fake accounts, or get into systems without permission. The hardest part of deepfake attacks is getting people to trust you. People tend to trust what they see and hear, which makes these attacks very effective, even in groups with strong technical controls.
Key Points

  • Verification through multiple channels (call-back, secondary confirmation)
  • Strong ways to check someone's identity
  • Employees should be aware of the risks of deepfakes.
  • Policies to check high-risk requests (for money or access)
Meet The Trainer
Prem Kumar
Prem Kumar

Cannot perform runtime binding

Register for the Webinar
Registration successful!
Details have been shared over email.
Explore More Webinars
Understand SharePoint Online Permission Model, Inheritance & RBAC
Show More

Webinar Summary:

This webinar explains how SharePoint Online fits into Microsoft 365, the core architectural concepts to design scalable collaboration, and practical guidance on site collections, hub sites, and subsites so you can plan governance, navigation, and lifecycle decisions confidently

26 May 2026 | 07:30 AM CST   1 Hour

Identity And Access Management (IAM) In GCP - From Basics To Best Practices
Show More
Webinar Summary:

This webinar provides a comprehensive deep dive into Identity and Access Management (IAM) in Google Cloud, focusing on how organizations can securely manage access to cloud resources at scale. Participants will gain a clear understanding of IAM fundamentals, including identities, roles, and policies, and how these components work together to enforce fine-grained access control. The session will also explore advanced concepts such as custom roles, service accounts, and IAM best practices aligned with the principle of least privilege. Through real-world use cases and practical insights, attendees will learn how to design secure and efficient access strategies, minimize risk, and ensure compliance in their cloud environments. Whether you are a beginner or an experienced cloud professional, this webinar will equip you with the knowledge required to confidently implement and manage IAM in Google Cloud.

26 May 2026 | 03:30 AM CST   1 Hour

Mastering Email Security Using Cisco Secure Email Gateway
Show More

Webinar Summary:

This webinar explains how the Cisco Secure Email portfolio protects organizations from email-based threats like spam, phishing, and malicious attachments. It covers how modern email usage has expanded the attack surface and how Cisco uses a layered security approach with advanced threat intelligence to secure both inbound and outbound email traffic. It also introduces key concepts such as email flow, listeners, HATs, RATs, and the role of Simple Mail Transfer Protocol (SMTP), along with basic configuration.

26 May 2026 | 02:30 AM CST   1 Hour