Threat Talks - Your Gateway to Cybersecurity Insights

Zero Trust in the AI Era


Listen Later

AI can fake your voice.
Deepfakes can move millions of dollars in minutes.
And attackers no longer need to break trust - they can simulate it.

Security teams are entering an era where nothing can be trusted at face value.


In part two of our Zero Trust series with Dr. Zero Trust, Chase Cunningham, he and Lieuwe Jan Koning (Co-Founder and CTO at ON2IT Cybersecurity) explore what the future of Zero Trust looks like in an AI-driven world. 

How do you verify identity when voices and faces can be faked?
How do organizations defend against scams that scale to millions of targets?
And what happens when AI starts attacking AI?

They discuss real-world examples including deepfake fraud, “cyber-kidnapping” scams, prompt injection attacks, and the growing role of AI policy engines in defending modern systems.

One key takeaway: AI is accelerating a global trust crisis.

And this is what makes Zero Trust matters more than ever.

Simple Zero Trust principles like verification, passphrases, strict payment procedures, and continuous validation become essential safeguards for every organization.

Because in an environment where anything can be simulated, trust must always be verified.

Missed part one?
Watch “From Revolution to Reality”: https://www.youtube.com/watch?v=6reox4sqaUc&t

Timestamps

00:00 - Introduction: AI Security Threats and the Future of Zero Trust
01:07 - How Long Will Zero Trust Last? The Future of Zero Trust Strategy
01:54 - The Future of Zero Trust in an AI-Driven World
04:24 - Deepfakes, Fraud, and the Zero Trust Response to AI Security Threats
16:10 - AI Security Threats: Prompt Injection, AI Agents, and the Next Arms Race
21:55 - Final Thoughts on AI Security Threats and the Future of Zero Trust

 

Key Topics Covered

  • How AI security threats like deepfakes are changing identity verification
  • Why the future of Zero Trust depends on continuous verification
  • How AI-driven attacks scale fraud and social engineering
  • Why AI policy engines may become the next defensive layer in cybersecurity

Resources

  • Threat Talks: https://threat-talks.com
  • ON2IT (Zero Trust as a Service): https://on2it.net
  • AMS-IX: https://www.ams-ix.net/ams
  • Threat Talks playlist on AI and Cyber Trends: https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox  


Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

 

🔔 Follow and Support our channel! 🔔


 === 


► YOUTUBE:    / @threattalks  

► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

► APPLE: https://podcasts.apple.com/us/podcast...

 

👕 Receive your Threat Talks T-shirt

https://threat-talks.com/

 

🗺️ Explore the Hack's Route in Detail 🗺️

https://threat-talks.com

 

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

...more
View all episodesView all episodes
Download on the App Store

Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks