Detection is the first step. Identity is the architecture.
Here’s what I didn’t hear at RSA: CISOs asking for more alerts. What I heard was a consistent frustration that detection is where most solutions stop—but that’s exactly where the real problem begins.
Flagging a deepfake is not the finish line. It’s the starting gun. Who gets notified? Who makes the call? What’s the workflow between security and HR when a fake candidate clears three interview rounds? What happens between security and finance when an executive impersonation hits the wire transfer queue? The operational response is where most solutions fall short, and CISOs know it.
One CISO was direct: they don’t want a black box that says “suspicious.” They want to understand the signal, own the decision, and build the response into existing workflows. That moves beyond just a feature request—it’s a strategy shift.
The deeper shift I kept hearing: identity is the new perimeter. Firewalls protect networks. But when the threat walks in wearing a trusted face and a familiar voice, the attack surface is human. It lives in every channel where someone assumes they know who they’re talking to: video calls, contact centers, hiring pipelines, help desks, financial approvals. The enterprise threat landscape for deepfakes spans employees, customers, and vendors simultaneously. Detection tells you something went wrong. Identity infrastructure tells you before it does.
Which is why the real question CISOs left RSA sitting with is this: if we can no longer trust the interaction itself, how do we rebuild trust in identity?
The answer isn’t a single detection tool. It’s a continuous identity architecture built around three questions that need to be answered at every point of interaction: