Digital ecosystems continue to grow and expand at record levels as organizations and governments seek to provide remote access and services to meet customer, citizen and employee demand. However, an unintended side effect of this growth is an ever-expanding attack surface that legacy identity verification systems can’t stand up to. Couple that with easily accessible and criminally weaponized generative artificial intelligence (AI) and machine learning tools, and there is an increasing need for highly secure remote identity verification.
iProov’s Security Operations Center threat researchers observe unique evidence of large-scale, multi-platform remote identity verification system attacks that are easier than ever for even novice threat actors to launch. Supported by data from iProov’s threat intelligence research, Dr. Andrew Newell reveals how bad actors are using advan
ced AI tools, such as highly convincing face swaps in tandem with emulators and other metadata manipulation methodologies, to create new and widely unmapped threat vectors to attack remote identity verification systems.
This session is a critical primer for identity and cybersecurity professionals looking to preempt the next generation of attacks.