Exploring Information Security - Exploring Information Security

What are Deepfakes with Dr. Donnie Wendt


Listen Later

Summary:

In this enlightening episode of the Exploring Information Security podcast, we dive deep into the world of deepfakes with Dr. Donnie Wendt. With a background in cybersecurity at MasterCard, Dr. Wendt shares his journey into the exploration of deepfake technology, from setting up a home lab using open-source tools to presenting the potential business impacts of deepfakes to leadership teams.

Key Discussions:

  • What are Deepfakes? Dr. Wendt explains the basics of deepfakes, a technology that uses machine learning to superimpose someone's likeness onto another person, creating realistic fake videos or audio recordings. Initially used for nefarious purposes, the technology has found applications in politics, social engineering, and entertainment.

  • Creating Deepfakes: Discover how Dr. Wendt utilized open-source tools and a good Nvidia video card to experiment with deepfake creation, including making Nicholas Cage a regular "guest" in security briefings at MasterCard.

  • The Threat Landscape: Dr. Wendt discusses the use of deepfakes in political manipulation and fraud, highlighting recent instances where deepfakes have influenced elections and scammed individuals and businesses out of large sums of money.

  • Detection and Prevention: The conversation touches on the challenges of distinguishing deepfakes from real footage, emphasizing the importance of skepticism, critical thinking, and verification processes to combat misinformation.

  • Positive Applications: Despite their potential for misuse, deepfakes also have beneficial uses, such as giving voice back to ALS patients, recreating historical speeches, and aiding medical diagnosis. Dr. Wendt stresses the importance of recognizing the technology's positive impact alongside its threats.

Episode Highlights:

  • Dr. Wendt's firsthand experience with creating deepfakes and the technical requirements for doing so.

  • Insight into the evolving capabilities of deepfake technology and the cat-and-mouse game between creators and detectors.

  • The significance of robust verification processes within organizations to safeguard against deepfake-related fraud.

Resources Mentioned:

  • Faceswap.dev: An open-source tool for experimenting with different deepfake creation algorithms.

Contact Information:

Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]

Subscribe

Sign up with your email address to receive news and updates.

Email Address
Sign Up

We respect your privacy.

Thank you!


...more
View all episodesView all episodes
Download on the App Store

Exploring Information Security - Exploring Information SecurityBy Timothy De Block

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

43 ratings


More shows like Exploring Information Security - Exploring Information Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,971 Listeners

Risky Business by Patrick Gray

Risky Business

360 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

627 Listeners

StarTalk Radio by Neil deGrasse Tyson

StarTalk Radio

14,115 Listeners

Down the Security Rabbithole Podcast (DtSR) by Rafal (Wh1t3Rabbit) Los

Down the Security Rabbithole Podcast (DtSR)

96 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

367 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,006 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,864 Listeners

The Indicator from Planet Money by NPR

The Indicator from Planet Money

9,553 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

168 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Brad & Will Made a Tech Pod. by Brad Shoemaker, Will Smith

Brad & Will Made a Tech Pod.

479 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners