Cyberside Chats: Cybersecurity Insights from the Experts

AI Broke Trust: Identity Has to Step Up in 2026


Listen Later

AI has supercharged phishing, deepfakes, and impersonation attacks—and 2025 proved that our trust systems aren’t built for this new reality. In this episode, Sherri and Matt break down the #1 change every security program needs in 2026: dramatically improving identity and authentication across the organization. 

We explore how AI blurred the lines between legitimate and malicious communication, why authentication can no longer stop at the login screen, and where organizations must start adding verification into everyday workflows—from IT support calls to executive requests and financial approvals.  

Plus, we discuss what “next-generation” user training looks like when employees can no longer rely on old phishing cues and must instead adopt identity-safety habits that AI can’t easily spoof.  

If you want to strengthen your security program for the year ahead, this is the episode to watch.  

Key Takeaways: 

  1. Audit where internal conversations trigger action. Before adding controls, understand where trust actually matters—financial approvals, IT support, HR changes, executive requests—and treat those points as attack surfaces.  
  2. Expand authentication into everyday workflows. Add verification to calls, video meetings, chats, approvals, and support interactions using known systems, codes, and out-of-band confirmation. Apply friction intentionally where mistakes are costly.  
  3. Use verified communication features in collaboration platforms. Enable identity indicators, reporting features, and access restrictions in tools like Teams and Slack, and treat them as identity systems rather than just chat tools.  
  4. Implement out-of-band push confirmation for high-risk requests. Authenticator-based confirmation defeats voice, video, and message impersonation because attackers rarely control multiple channels simultaneously.  
  5. Move toward continuous identity validation. Identity should be reassessed as behavior and risk change, with step-up verification and session revocation for high-risk actions.  
  6. Redesign training around identity safety. Teach employees how to verify people and requests, not just emails, and reward them for slowing down and confirming—even when it frustrates leadership.  
  7.  Tune in weekly on Tuesdays at 6:30 am ET for more cybersecurity advice, and visit www.LMGsecurity.com if you need help with cybersecurity testing, advisory services, or training. 

    Resources: 

    CFO.com – Deepfake CFO Scam Costs Engineering Firm $25 Million 

    https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/ 

    Retool – MFA Isn’t MFA 

    https://retool.com/blog/mfa-isnt-mfa 

    Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” 

    https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/ 

    Wired – Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data 

    https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/ 

    LMG Security – 5 New-ish Microsoft Security Features & What They Reveal About Today’s Threats 

    https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/ 

     

    ...more
    View all episodesView all episodes
    Download on the App Store

    Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    2 ratings


    More shows like Cyberside Chats: Cybersecurity Insights from the Experts

    View all
    No Agenda Show by Adam Curry & John C. Dvorak

    No Agenda Show

    5,968 Listeners

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

    371 Listeners

    The DSR Network by The DSR Network

    The DSR Network

    1,794 Listeners

    Conspirituality by Derek Beres, Matthew Remski, Julian Walker

    Conspirituality

    2,082 Listeners

    What Rough Beast by Virginia Heffernan and Stephen Metcalf

    What Rough Beast

    64 Listeners