The Cyber5 Podcast

Bonus Episode on Deepfakes (Part 1) with Nisos’ Dev Badlu

This is a bonus episode of the podcast in a two part series covering a Nisos project with New York University (NYU) on the technical considerations for creating deepfakes as well as processes and procedures to detect them featuring Nisos Senior Software Engineer Dev Badlu.

  • (00:28) Introduction
  • (01:06) Overview of Nisos Deepfake Project
  • (02:21) Question 1 – What kind of research did you have to do to start making deepfake videos?
  • (03:51) Question 2 – Are there a lot of open source libraries intended to make building deepfakes easier?
  • (05:20) Question 3 – What was the most difficult part of the process for building a deepfake video?
  • (06:15) Question 4 – How difficult is it to make deepfake audio?
  • (06:56) Question 5 – How can we detect deepfakes?

Bonus Episode: Deepfakes Part 1 | July 24, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks