AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Tactics of Deception: Protecting Trust and Purpose

Date:
Wednesday, April 8
Time:
2 p.m. ET / 7 p.m. GMT
Dark graphic labeled “Virtual Session” with text “Tactics of Deception: Protecting Trust and Purpose” over abstract computer imagery.

Social engineering attacks no longer rely on poorly written phishing emails or obvious scams. Today’s adversaries exploit trust, authority, and urgency, often using AI-driven voice cloning, deepfakes, and highly tailored impersonation, to manipulate well-trained professionals into making high-impact decisions in minutes.

In this session, Bishop Fox's Alethe Denis, Red Team Sr. Security Consultant and DEF CON Social Engineering Black Badge winner, examines how modern deception tactics are being used to target extended vendor ecosystems. Drawing on real-world incidents, from vishing attacks that bypass bank controls to deepfake-enabled executive impersonation, this talk explores why traditional security controls often fail when the human element is under pressure.

Attendees will learn how attackers exploit familiar workflows such as vendor payment changes, leadership approvals, and urgent member-related requests, and why speed, empathy, and trust are increasingly weaponized against organizations. The session concludes with practical mitigation strategies that blend technical controls, operational safeguards, and human-centered design to help reduce fraud risk, protect sensitive data, and preserve member trust in an era of AI-enabled deception.


Microsoft Teams image 13

About the speaker, Alethe Denis

Senior Security Consultant II

Alethe Denis is a Senior Security Consultant II at Bishop Fox specializing in red team social engineering, physical security bypass, and open-source intelligence (OSINT). With extensive experience conducting security assessments for both private and public sector organizations — including critical infrastructure — she brings a rare combination of technical depth and human-focused attack simulation to every engagement.

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.