Fighting Deep Fakes: Think Like the Attacker
None
<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="Brian Long - Fighting Deep Fakes Becomes a Frontline Cybersecurity Challenge" src="https://player.vimeo.com/video/1151907385?badge=0&autopause=0&player_id=0&app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js"></script></p><p data-start="410" data-end="846">Deepfakes have moved from novelty to a practical weapon — and Brian Long, CEO of Adaptive Security, says most organizations still aren’t built to handle what comes next. Long explains why AI-driven impersonation has become one of the fastest-growing forms of social engineering: it’s cheap, widely accessible, and increasingly convincing across channels that traditional security awareness programs don’t fully cover.</p><p data-start="848" data-end="1236">Long breaks down what he calls the “state of the art” in attacks: deepfake personas that combine voice and likeness with open-source intelligence to mimic real employees, executives, or trusted vendors. The result is an attacker who doesn’t just sound right — they can reference real details about roles, locations, coworkers, and family, making the request feel legitimate in the moment.</p><p data-start="1238" data-end="1668">That’s why he argues awareness alone isn’t enough. As tells in deepfake audio and video fade, teams need updated controls and processes that don’t rely on spotting imperfections. Long points to familiar social-engineering pressure tactics — urgency, secrecy, and requests that break established workflows — as the signals that still matter most. If the message demands an exception, it should trigger verification, not compliance.</p><p data-start="1670" data-end="2070">Adaptive Security’s approach blends AI with training by “thinking like the attacker.” Long describes how the company analyzes publicly available information about an organization, uses the same kinds of models adversaries would use, and then runs safe simulations to identify where people and processes break down. Those findings can drive targeted training as well as changes to policy and controls.</p><p data-start="2072" data-end="2358" data-is-last-node="" data-is-only-node="">A key takeaway: the attack surface is widening beyond email. Long warns that voice and SMS are increasingly common paths for impersonation — even in BYOD environments where security teams may assume it’s “not their problem.” In the deepfake era, that assumption can become an open door.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/fighting-deep-fakes-think-like-the-attacker/" data-a2a-title="Fighting Deep Fakes: Think Like the Attacker"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ffighting-deep-fakes-think-like-the-attacker%2F&linkname=Fighting%20Deep%20Fakes%3A%20Think%20Like%20the%20Attacker" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ffighting-deep-fakes-think-like-the-attacker%2F&linkname=Fighting%20Deep%20Fakes%3A%20Think%20Like%20the%20Attacker" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ffighting-deep-fakes-think-like-the-attacker%2F&linkname=Fighting%20Deep%20Fakes%3A%20Think%20Like%20the%20Attacker" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ffighting-deep-fakes-think-like-the-attacker%2F&linkname=Fighting%20Deep%20Fakes%3A%20Think%20Like%20the%20Attacker" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ffighting-deep-fakes-think-like-the-attacker%2F&linkname=Fighting%20Deep%20Fakes%3A%20Think%20Like%20the%20Attacker" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>