DIGITAL INTEGRITY PROTOCOL

What's in this lesson: Defense against synthetic voice/video and high-stakes impersonation attacks.
Why this matters: A single deepfake video call could cost the company millions. You are the final firewall.
SIGNAL: UNSTABLE | BITRATE: LOW | AUTH: PENDING

Attention: The Split-Second Trap

You join an unscheduled Zoom call with your Division Head. They look slightly "off" but sound exactly right. They say: "I'm at a conference, need you to approve this emergency vendor payment now. I'll stay on the line."

What is your immediate action?

A) Approve it immediately; delay could be costly.
B) Pause and ask them to confirm via a separate Slack message.

The Synthetic Media Landscape

Attackers use Generative AI to clone humans across three main dimensions. Understanding these signatures is your first line of defense.

πŸŽ™οΈ
Voice (Vishing)

Cloned in 30s. Sounds perfectly natural.

πŸ‘€
Video (Deepfake)

Real-time face swaps during live calls.

πŸ“§
Style (BEC)

Mimicking tone and internal jargon.

How to Spot a Fake:
  • Digital Jitter: Glitches around the mouth or jawline.
  • Mismatched Audio: Voices that don't match lip movements.
  • Extreme Urgency: Pressure to act quickly to bypass thought.

The MCV Protocol

Multi-Channel Verification (MCV) is the mandatory SOP for any high-risk request. Click each step to reveal the protocol requirements.

Step 1: The Pause
Acknowledge the request but state you must follow the SOP. A real executive will respect the policy.
Step 2: The Jump
Step 3: The Validation

Check-In: MCV Applied

You receive an urgent voice call from the CFO requesting an MFA code. What is the most compliant next step?

A) Give the code; the CFO's time is valuable.
B) Hang up and message the CFO on Slack to verify the request.
C) Ask the CFO to email you from their personal account.

The Defense Stack

Technology catches 99% of threats. You are the final layer that catches the "Impossible 1%."

YOU (The Human Firewall)
MFA / Identity Management
AI Email Filters

Filters catch malicious links and spoofed headers. MFA stops basic credential theft. But only you can detect an unusual tone of voice or a suspicious request for an "emergency wire."

The Reporting Sequence

A detected attempt is a piece of intelligence. Reporting it protects the whole company.

DETECT FAKE
↓
DENY REQUEST
↓
REPORT TO #SECURITY

Security then initiates a global block on the attacker's source.

Check-In: Incident Management

You recognized a deepfake call and hung up. What is your remaining obligation?

A) No further action is needed since you didn't fall for it.
B) Notify your immediate team in an informal email.
C) Report the incoming number and time to the Security Operations Center.

Key Takeaways

  • Trust but Verify: AI can clone any person. Never trust media alone for high-risk requests.
  • Channel Hopping: The MCV protocol (switching channels) is your strongest weapon.
  • Urgency = Alarm: Treat extreme pressure as a primary indicator of fraud.
  • Report to Protect: Your report helps the company block future attacks.

You are about to begin the assessment. Select the best answer for each question.