Webinar: Deepfakes – A Technical Peek Behind the Curtain

Register Now for the Technical Foundations of AI for Deepfakes!

We’ve all seen deepfakes on the Interwebs… from funny videos to politics and, of course, from the impetus behind many technical innovations, an insatiable appetite for porn. At her talk at RSAC 2020, Alyssa Miller, Application Security Advocate at Snyk, took a unique view at the effect this might have on many more aspects of life beyond mischief or cyber security and into the threats that deepfakes pose to businesses and global markets. Since time was limited, she didn’t get to showcase details about the tech used by the wizards of data to pull off such magical feats. Now she does! Join us for a brief history of deepfakes, live demos of machine learning techniques and where this all might fit into the careers of InfoSec pros in this FREE EH-Net Live! webinar on Tues March 31, 2020 at 1:00 PM EST. Join us live to receive certificates for easy submission of CPEs!

 Please RT:

Agenda for “Deepfakes – A Technical Peek Behind the Curtain”:

Note: Subject to Change
  • Intro by Don Donzal, EH-Net Editor-in-Chief
  • Bio – Alyssa Miller
  • Presentation
    • A Brief History of Deepfakes
    • Beyond Fun and Cyber Security: Effects on Global Markets
    • Not All Doom & Gloom
    • Live Demos
    • Career Aspects
    • Your Turn!
  • Q&A
  • Post Game on EH-Net

Although this is a free event, registration is required. Our virtual doors to the webinar open 30 minutes before the scheduled start time. Feel free to invite your friends and colleagues!

EH-Net Live! March 2020 – Guest Bio

Alyssa Miller is a hacker, security evangelist, cybersecurity professional and public speaker with almost 15 years of experience in the security industry. A former developer, her background is application security, not only conducting technical assessments, but also helping develop (Read more...)

*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Don Donzal. Read the original post at:

Integrated Security Data PulseMeter

Step 1 of 7

What percentage of your organization’s security data is integrated into a SIEM or data repository you manage? (Select one)(Required)