Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

KnowBe4: Managing Human Risk in an AI-Driven Threat Landscape

KnowBe4
04/29/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • AI has reduced phishing email creation time from 16 hours to 5 minutes while maintaining 11% click rates, enabling attackers to scale sophisticated social engineering campaigns with unprecedented efficiency.
  • Real-world deepfake attacks have resulted in losses like the $25 million Zoom heist, where scripted AI-generated executives convinced an employee to wire funds, demonstrating the tangible financial impact of AI-enhanced social engineering.
  • Attackers exploit cognitive biases and dual-process thinking by triggering emotional System 1 responses that bypass critical System 2 analysis, using multi-channel campaigns and psychological profiling to maximize effectiveness.
  • Effective defense requires holistic human risk management including verification policies for high-risk actions, employee training on scam mechanics, measurement of security behaviors, and providing tools like password managers and MFA.
  • Organizations must shift from viewing humans as the 'weakest link' to recognizing employees as essential defenders who need context, tools, and authority to make security decisions, with training that connects workplace security to personal protection.
  • Human risk metrics should track training completion, phishing report rates and speed, simulated attack performance, and role-based risk scores to identify vulnerabilities and measure program effectiveness over time.

The Human Factor in AI-Enhanced Attacks

Erich Kron, CISO Advisor at KnowBe4, opens by addressing a critical gap in AI security discussions: while most conversations focus on AI's technical capabilities, few examine how artificial intelligence is transforming attacks against people. He emphasizes that humans remain the primary target and initial access vector for cyber criminals, making human risk management more critical than ever. The session challenges the outdated notion of humans as the 'weakest link,' instead framing employees as essential defenders who need proper context and tools. Kron argues that security awareness training alone is insufficient—organizations need holistic human risk management that addresses credentials, data handling, misconfigurations, and the psychological pressures employees face. With workplace stress at all-time highs and employees expected to do more with less, the human attack surface has expanded significantly.

AI-Powered Social Engineering Tactics

The webinar details how attackers are leveraging generative AI across multiple attack vectors. In phishing, AI reduces email creation time from 16 hours to 5 minutes while maintaining an 11% click rate compared to 18% for manually crafted emails—a trade-off most attackers gladly accept for the efficiency gain. Vishing (voice phishing) has become particularly dangerous with AI-enabled voice cloning, allowing attackers to impersonate executives or family members with alarming accuracy. Real-world examples include the $25 million Zoom deepfake heist where scripted AI-generated executives convinced an employee to wire funds, and Scattered Spider's help desk attacks using social engineering to reset MFA and gain account access. Smishing campaigns now use AI chatbots to initiate conversations before handing off to human operators, while QR code phishing (quishing) leverages AI to rapidly generate fake payment sites and automatically spin up replacements when takedowns occur.

Psychological Manipulation and Cognitive Biases

Kron explains how AI enables attackers to exploit human psychology with unprecedented precision. Attackers leverage cognitive biases like authority (impersonating executives), urgency (creating artificial time pressure), and social proof (referencing colleagues or industry trends) to bypass rational decision-making. The dual-process theory of thinking—System 1 (automatic, emotional) versus System 2 (deliberate, analytical)—becomes critical: attackers design campaigns to trigger System 1 responses that prevent critical thinking. Multi-channel attacks combine email, text, and voice to create reinforcing pressure, such as a phishing email followed immediately by a text message claiming urgency. AI allows attackers to build detailed psychological profiles from social media and public data, enabling hyper-personalized attacks that confirm existing biases. Even low-quality deepfakes can be effective when they align with what targets already believe or fear.

Defending Against AI-Enhanced Threats

The defense strategy centers on comprehensive human risk management rather than technology alone. Key recommendations include implementing verification policies for high-risk actions like wire transfers—requiring out-of-band confirmation through a different communication channel. Organizations should teach employees to recognize scam mechanics and red flags without requiring technical expertise, such as checking the final portion of URLs for legitimacy. Measuring program effectiveness requires tracking training completion rates, phishing report rates and speed, simulated attack failure rates, and overall risk scores that account for both behavior and role-based risk. Employees need tools to succeed: password managers for unique credentials, MFA across all accounts (including personal social media), and clear policies that give them authority to say no to suspicious requests. Kron emphasizes making security training engaging and relevant by connecting workplace security to personal protection, helping employees understand the 'why' behind security requirements to reduce friction and workarounds.

Chapters

0:00 - Introduction and Human Risk Overview
4:20 - How Cyber Criminals Manipulate Behavior
19:50 - AI-Enhanced Phishing Attacks
23:09 - Vishing and Voice Cloning Threats
25:42 - Smishing and QR Code Phishing
27:42 - Deepfake Case Studies
42:45 - Defense Strategies and Policies
43:49 - Measuring Human Risk Management
47:48 - Best Practices and Recommendations
51:28 - Closing and Q&A

Key Quotes

0:54 "... humans tend to be our most targeted resources within our organization. And because of that, they end up being the number one initial network access way that bad actors are getting in ..."
6:56 "Humans are the weakest link part. And I hate that, I hate that phrase. I don't like to state it that way at all. Humans are just humans. We're here to do what we're doing and we're here to generally not be cybersecurity experts."
22:17 "Their average phishing click rate was 18% on the simulated ones that X-Force does. They had AI put it together, it was 11% in green there. Now, you're thinking, well, it's way better to do it by hand. Yeah, it absolutely is. The difference is to get to that 18% click rate, it took them 16 hours to craft that email. And the AI one did it in five minutes."
28:33 "... they actually scripted this entire attack. Top to bottom, they scripted this entire attack. And an individual, there was one individual on here that was not actually an AI scripted and recorded person. And they just kind of sat in the background, listened to these executives talk about this $25 million they needed to transfer."
32:20 "... once this damage is done, it's never gonna be completely cleaned up. It's just not. People are always gonna be thinking in the back of their mind, or they're gonna remember this person because of that. And again, these are normal people. We're not talking nation state actors. We're not talking big deals. We're talking about a PE teacher, basically."
50:09 "MFA is fantastic and wonderful, but come on, it's not Superman here. MFA will do a lot of good things and you want to MFA everything you can."

Categories:
  • » Webinar Library » KnowBe4
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Security Operations
  • AI & Machine Learning
  • Threat Intelligence
  • Webinar
  • Best Practices
  • Technical Deep Dive
  • AI-powered social engineering
  • Human risk management
  • Deepfake attacks
  • Phishing and vishing
  • Security awareness training
  • Multi-factor authentication
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: KnowBe4: Managing Human Risk in an AI-Driven Threat Landscape

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: Insights into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-recent-findings-and-2026s-threat-landscape/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version