UPCOMING SLIVER WORKSHOP: Getting Started & 1.6 Features Learn More

Brandon Kovacs to Speak at GISEC Global 2025

Date:
May 6, 2025
Brandon Kovacs to Speak at GISEC Global 2025 Attacking and Defending Deepfakes: A Red Teamer's Perspective tile image.

Bishop Fox is proud to have Brandon Kovacs, Senior Security Consultant I Red Team, present at GISEC Asia 2025 on May 6, 2025 including a session on deepfakes and a session on OSINT & HUMINT in social engineering attacks.

For full details, visit: https://gisec.ae/

"Attacking & Defending Deepfakes: A Red Teamer's Perspective"

Speakers: Brandon Kovacs

Date/Time: May 6, 2025 at 11:40-12:00 p.m. SGT

Abstract: Drawing from real-world red teaming engagements, we will discuss the tactics and techniques that have proven most effective for deepfake social engineering attacks. Conversely, we will discuss the defense mechanisms that have thwarted these attacks, offering key insights on how organizations can protect themselves from deepfake video and voice-cloning attacks.

"OSINT & HUMINT in Social Engineering Attacks"

Speakers: Brandon Kovacs

Date/Time: May 6, 2025 at 2:45-4:00 p.m. SGT

Abstract: Key Takeaways:

  • OSINT & Reconnaissance – How attackers gather intelligence from social media, corporate leaks, and public records to craft personalized attacks.
  •  HUMINT & Psychological Manipulation – The art of deception, pretexting, and exploiting human trust in cyber-attacks.
  • Real-World Case Studies – Examining major social engineering incidents and the role of OSINT/HUMINT in their execution.
  • Multi-Layered Defense Strategies – Building an integrated security framework combining awareness training, digital hygiene, and AI-driven anomaly detection.



    Brandon Kovacs Headshot

    About the speaker, Brandon Kovacs

    Senior Security Consultant

    Brandon Kovacs (CRT, OSCP) is a Senior Security Consultant at Bishop Fox, where he specializes in red teaming, network penetration testing, and physical penetration testing. As a red team operator, he is adept at identifying critical attack chains that an external attacker could use to fully compromise organizations and reach high-value targets.

    More by Brandon

    Ready to get started? We can help.

    Contact Us

    This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.