I'm interested to hear what the community is doing in the area of Voice Fraud. It appears to be an emerging risk, with the ability to impersonate voice with as little as 3 seconds of social media audio. If anyone has an initiative in place, or planning an initiative to tackle this, can you share your approach or guidance?
Do you consciously and explicitly use zero-trust approaches (not tech called zero trust) in your 1. cybersecurity design, architecture or frameworks 2. incident response, or crisis management
Yes, for all27%
No, but we use the zero trust technology54%
Yes, for 1. No for 2.15%
Yes for 2, No for 12%
View Results
What sets us apart?
No selling.
No recruiting.
No self promotion.
Read Our GuidelinesTrusted peer advice and insights for technology professionals.
It is interesting to see how many voice fraud cases are appearing to bypass authentication checks in many services.