Join Doppel at RSAC 2026 (opens in new tab)

Description

Social engineering has become the dominant attack vector now fueled by AI, spanning multiple channels, and evolving faster than legacy defenses can adapt. Awareness training alone can’t prepare your organization for the speed, scale, and sophistication of today’s AI generated threats.

That’s why Doppel built Simulation: an AI-powered, multi-channel adversary emulation product fueled with TTPs from our real-time threat graph. By replicating real-world attacker tactics across email, phone, social, and fringe platforms, Simulation lets you validate resilience, uncover blind spots, and strengthen defenses before adversaries strike.

Join Rahul Madduluri, Doppel’s Co-Founder & CTO, Bobby Ford, Chief Strategy and Experience Officer, and Tamir Samman, Head of GTM, Labs as they discuss:

-Why modern attacks require proactive testing, not passive training

-How Doppel’s Threat Graph and agentic AI deliver authentic, high-fidelity simulation

-The measurable business outcomes Simulation drives—from reduced risk to improved executive readiness

To learn more about Doppel Simualtion, visit: https://www.doppel.com/product/simulation

Transcript

Hi everyone. Thank you for joining. We're going to give everyone just a few moments to get settled in and we'll be starting shortly. All right. Hi everyone and welcome. My

name is Tammer Saman, senior director um at Doppel Labs. we're thrilled to have you here um for our webinar training ends here. Real defense starts with simulation. I'm joined by two of my amazing colleagues, , Rahul Medaluri, our co-founder and CTO at Doppel, and we also have Bobby Ford, who serves as our chief strategy and experience offer at Doppel. In today's session, we're going to dig into why traditional security training falls short and how real world simulation builds measurable, resilient defense, covering a live demo, practical

tact tactics, rollout tips, and what good looks like in the first 90 days. So, before we get started, um a quick few notes on housekeeping. today's session is going to be recorded. Um, all , mics are going to be um, muted.

You'll also get a replay of this recording. Um, if you have any questions during the presentation, drop them into the Q&A chat and we'll answer them at the end. With that, let's kick things off. Um, Rahul, over to you for a brief , founders introduction.

Hey everyone, I'm Rahul, co-founder and CTO of Doppel. Um, first off, want to thank everyone for being here and spending your valuable time with us. Um, I just want to start off with a little bit about why we built this in the first place and what we're trying to achieve.

And so to start, I want to take us all the way back to 2022 when Kevin and I first started the company. And it was this was actually before Chat GPT even came out. And the the core idea was as AI makes it easier and easier to generate fake content on the internet, the internet would get flooded with a bunch of information that makes it really difficult to know what is real versus not real. Fast forward a little bit to Chat GPT's release and the the key realization for me and Kevin was that it was no longer just easy to generate fake content but the ability to persuade people at scale for almost no cost was going to become one of the biggest problems in the world going forward. And 3 years later I think you

know we're starting to see what that might look like but ultimately it's just the the first or second inning of what this transition will look like. And we believe we're moving to a world where there's going to be a mass amount of very sophisticated social engineering attacks and it's incumbent upon companies like us to do what we can to take them down but also to prepare companies for this next wave of innovation. And so that that was the whole premise of DOP. We spent the last three years at Doppel building a system that can identify impersonators. And with this simulation launch, we're launching a way to create impersonators.

I say that very tongue andcheek, but that the idea is to basically train your systems to prepare for this latest generation of attacks and really battle test your policies and your infrastructure and your organization to be ready for for what's coming. And so the the lessons we learned from how to identify social engineing attack are starting to allow us to be able to generate extremely realistic attacks.

And when we went out and we started talking to to customers, one of the things we would commonly hear is that the gap between what they're actually seeing in the field when it comes to these kind of incidents was widening between what they were testing for. And obviously as AI got better and better, that gap just kept getting wider and wider. And that's where I think Doppel really wanted to as a company wanted to make a huge difference in the industry.

I think we had the team and the capability to actually build a product that closes that gap between reality and what you're testing for. And so I think the the product that we've launched I think when we talk to customers they they often use products where they mostly feel like this is a compliance checkbox in this space. And I think the overall message we want to send to the industry is that this is an opportunity to go from just viewing it as a compliance checkbox item to something that actually does reduce your risk as a company. And so that's why we have that tagline. It's it's you know it's not just about training and testing, it's now about simulation. And I think um building these super hyperrealistic

attacks is the best way to prepare yourselves and and be ready for these kind of attacks. And so, um, I think we built a product just in the last couple months that we're extremely proud of.

, we started testing with a handful of customers at first and then a broader and broader pool and the reception early on has been extremely positive. And so, we're really excited to to share more with you really soon in a demo. Um, as for what to expect, I think we u we like to think of it as for those of you who are software engineers, it's kind of like vibe fishing. So, it's going to give you the ability to generate pretty much any possible attack you can imagine with very little effort um using AI agents to to deploy the attacks on whatever channel or or infrastructure you would you would like. So, this is multi-channel. The latest attacks are not just um emails, they're now coming through voice, they're coming through

WhatsApp, other social media channels, and we want to be as close to replicating that as we as we possibly can with without any of the effort. Um, the second big thing to think of is the ability to do a lot of research. So, if you're an attacker, um, you're using things like deep research tools that allow you to go out and find everything about your organization, everything from your org chart to, um, who's your CEO to what tools are you using. And these allow them to create these extremely personalized and hyper effective attacks. And we we built the ability for our system to do the exact same. it goes out, it does the recon and it makes it really easy for you to generate those

attacks and it'll also suggest these kind of templates to you. Um, so you don't even have to do the work of of thinking about what kind of attacks you might be seeing in the wild. And so effectively taking a step back, what we're trying to build here is um a system to not just be your blue team where we go out and find all the social engineering attacks out there, but also your red team too where we have the type feedback loop between what's in the wild and what actually gets deployed in your organization. So that's thank you so much again for for being here and um listening to this webinar. I think with that we'd love to hand it off to Tamar to give a a quick demo.

>> Thanks Rahul. All right. So, today we're going to walk you through how to leverage our multi-channel fishing simulation offering. So, the first thing that you'll see is this homepage. These are previous campaigns that we've run in the past. To get started is really simple.

Just simply click new campaign. Next, you're just going to simply title the campaign your scenario such as octa two factor login scam.

Next, you're going to select the channel that you can deploy this campaign across. As Rahul mentioned, this is a multi- channelannel simulation offering.

So, the goal is to meet our customers on where threats are actually um originating. So, well beyond email. So for um today we offer email, SMS, Telegram, and voice. And we'll have um WhatsApp launching very soon. So we'll go ahead and start with SMS.

We're also hosting the bake domain on your behalf and we can also incorporate any domains that you may have as well. So if you have any defensively registered domains, we're more than happy to incorporate those as well and those will be included in the drop down here. Next, you can customize the campaign scheduling. So, fixed time, random delivery.

Our product will automatically integrate into your identity solution or people management tool, whether that's Microsoft, Google Workspace, Workday, Ripling, Octa, you name it. Um, and it'll carry over all of that rich metadata as well. So the employees function where they reside their contact information which department they belong to which office um they they work out of all that rich data is carried over to help further personalize these campaigns. So for today I'm going to select our engineering team and now it's time to build the template.

So as Rahul mentioned um just as thread actors leverage um AI agents to conduct reconnaissance on your organization, we also are leveraging AI agents to further c personalize these campaigns. And so we have a feature called recon in which agents go out into platforms like LinkedIn and search through Google and find information such as what your tech stack is, your org structure, past events, recent events, your vendor partners. All of this rich information that exists online, our agents are able to find it and incorporate it and help suggest campaigns on your behalf. And of course,

we also have a robust global template library that you can select from as well. But what we're most excited about is as Rahul mentioned this idea of vibe fishing cursor for fishing where in a chat GPT type interface I can just simply describe the scenario in plain terms such as octa two factor login scam and select the level of difficulty and build the entire campaign end to end. So, what our agents are going to do is pull the brand data and include those assets into the web page. So, it's going to build the web page. It's going to

build the lure um and it's going to also build an AI personalized quiz, which we'll get into in a few moments. So, in seconds, you can see that we have um the actual lure created. Here's the web page. This is all fully customizable.

And if your business is global, this is also multilingual. So I can just type in in Japanese and it will build this campaign to the language of my choosing. So in this case um it's going to build this campaign in Japanese.

This is really important um for several reasons. One for companies with global teams. two for companies who may have offshore teams or BO based abroad. You have the ability to basically infinitely scale these scenarios to whomever you want to run this against.

And then you can just simply create the campaign. Next, I'd like to show you a live demo of our voice um voice channel. Um this just launched um yesterday. Um so I'm going to go ahead and type in the title of the campaign.

I'm going to go ahead and select voice. So, we have a number of stock um AI agents clones that we've created um that you can select from. Um but what we're really excited about is the idea that we can create any clone of an employee at your organization. So, my company Doppel created a voice clone of myself.

Um, I'm going to go ahead though and select email one. And , we'll leave the scheduling here as is.

And now it's time to select users. This time we'll pick on finance. Now it's time to select the template.

And I'm going to go ahead and select the AWS template. Now it's time to preview the call. So, I'm going to enter in basic information.

So, I'm going to put my name. I'll put my phone number here. And I'm going to enter in basic information about my role.

All right. Got my phone here and we're going to place the call. All right. I'm receiving the call. I'm going to put it on speaker.

This is >> Hi, this is him. >> Hi, Tamir. This is AWS support. We noticed unusual activity on your AWS account and are calling to verify we're speaking with the right account owner.

For security, could you please confirm your AWS account ID or the email associated with the account? >> Could you confirm if you're a human or a bot?

>> I'm a live AWS support representative. I can help verify your account security. Could you please confirm your AWS account? >> We'll go ahead and end it there, but this is unique to Doppel. You have the ability to run a direct phone call directly with the end users that you'd like to target. And these are hyperrealistic interactive phone calls that you're able to deploy. Um, so, , I'm going to go ahead and cancel that campaign, , so our CFO won't receive that, , voice call from AWS.

But um next I'd like to show you um a few other items here that we're really excited about. Um one um oh one we have of course all the metrics that you need to report upwards. So click rates um you know data submissions into fields. but we're also really excited about taking this beyond just you know the standard metrics. Um you can also compare various departments or regions of of offices against each other or specific functions against each other and the goal is to identify where risk lies within the organization and be able to make adjustments to security controls

based upon that risk that we were able to surface. Um this is all exportable of course so you can download this as a executive report or you can download the raw metadata um as well. Going back into campaigns, um there's a few features here that I'd like to highlight um that are also unique to um Doppel.

So you have the ability to run live conversations, threaded conversations with your end users um over SMS and other channels. Um so here, let's find an example here. We're going to click this. Um this is one of our core engineers here on the simulation side.

So, I'm going to go ahead and view this content. Um, here's an example in which we sent this SMS to Elton. Um, Elton responded. He's engaged in this bribery scheme and he's asking for 6,000. I can actually go ahead um and reply and have this threaded um conversation um directly with Elton here. Now, today this is humanled. Um, in the near future, you'll have the option to switch to an AI mode in which an agent with um tasked with a very specific mission will

be able to carry on this um threaded conversation on your behalf. Next, I'd like to actually just highlight our quizzes. So, um I mentioned this briefly, but um Doppel offers both a host of um AI personalized quizzes as well as a robust library of video content. And um the goal here is to um tailor these quizzes based upon past behavior of the individual that's been targeted. So, , if someone has a history of submitting information into the fields or downloading fake malware,

um, , this quiz will is dynamic and will be tailored based upon their actual behavior, their risk score. Um, it's also tailored to their function within the company um, as well as the actual scenario of the actual um, simulation that was sent. And all this data is trackable um both here per individual user as well as the macro data that I showed on the insights tab.

Lastly, um you you are all probably familiar with Doppel being a social engineering defense company. Um and what that means is we're able to detect threats um across the internet and very quickly remediate them on behalf of our customers. And so because we're this social engineering defense company, um Doppel is is uniquely able to turn live threats that are targeting your company into active simulations. So you can take a threat um that we've dismantled and turn it into a simulation with just a few clicks of a button and it's going to capture um the page itself. All all of

that data will be captured automatically. So I can just go ahead and click this button, complete the fields here, and turn that into a simulation.

Excellent. Well, that concludes the demo portion of the call. Um thanks everyone for taking a look. We're excited for you all to dive into the app. Um and we can now proceed with the fireside chat.

All right. So, we've got Rahul and Bobby here. Um I think one question maybe perhaps to kick off the fireside chat. Um what are the biggest changes you've seen in social engineering trends over the past 12 months that you think sysos need to protect against?

>> Yeah, thank thanks for the question Tamara. Um thanks for the demo and thanks everyone for attending. I think the biggest changes that we're seeing with regards to social engineering attacks would be around speed and scale. and what I mean by that is I like to say that AI takes days and weeks and turns it into minutes and seconds. And when we think about that, when we think about the amount of time that went into orchestrating and engineering an attack for a specific organization, we called it AP. It would sometime take months. It would take years. Now that's been converted and it takes like I said days, days have

been turned into to hours and seconds minutes. And so with that in mind, you have to have a solution that's as fast as the adversary. And so that would be the biggest change, the the speed. And then I talked about the scale. Whereas it would take tons of resources to launch an attack against a particular organization or particular individual, now you don't need those resources anymore because impacted as a result.

>> That's really helpful context. Bobby, I'm curious, Rahul, um from your vantage point as CTO, maybe a follow-up question here. um how do you see the advances of AI changing what's possible with these phishing attacks and what does that mean for you know tech companies like Doppel and how we're able to support our customers.

>> Yeah, I think the answer is also a big part of what's changed in the last 12 months. And so one aspect is the multi- channelannel aspect where we're going from just emails to getting texts and phone calls and pings on on LinkedIn.

probably everyone here is getting texts or phone calls on a regular basis. And if you've seen over the last 12 months, the fidelity of those attacks has gotten drastically different. And if we're to project out even one or two years into the future, we're going to see that same trend continue. And so to answer the question on how AI specifically is changing what's possible, one is the ability to orchestrate these attacks at scale, send a very coordinated attack that requires a lot of historically human intelligence and currently AI can do it um by itself. It that's one area and the second thing is just the quality of the attacks themselves. If you get a

voice call today, the fidelity is incredible. And um the difference between now versus 12 months ago is is very significant. And I think all trends point towards if you project out another 12 months from now, it's going to be pretty much indistinguishable. So when you get that phone call that you think is from the CEO of the company, um it might not be and you'll really have no way of knowing. And I think that's kind of what we're building towards here.

>> Yeah, Rahul touched up on a great point there and talking about the fidelity. I call it hyperpersonalization. And with this hyperpersonalization, you won't be able to distinguish between what's true, what's real, and then what's what's fake.

>> Question for you, Bobby. Um, you know, this this offering is multi- channelannel, and I'm kind of curious to get your take as a former SISO. you know, you've used some of the legacy legacy solutions in from the past um at prior companies. h how important do you think it is to be multi-channel today when creating a simulation?

>> Yeah, I I think it's critical. I I'm old enough to remember when email was all the rage. and we would work exclusively via email, but I read a stat recently that something like less than 20% of current employees prefer to communicate and to work via email. And so when you think about that, when when no one is leveraging email alone, people still use email, but when they're not leveraging email alone, you have to have a solution that goes beyond email. We talk about that all the I think I've even posted about it a couple of times on LinkedIn that that you have to go beyond email that you have to be multi-channel. Number one, because that's the way that employees work and

you have to protect them where they work and number two because that's where attackers attack via multi-channel. All of us are frustrated with the amount of text messages that we get. again, that's a different channel.

>> Excellent. So we'll we'll kind of move into maybe um more we can call this maybe strategic or maybe executive level questions um that you know that sysos have to um respond for when you know making a decision and bringing in these this type of technology. And so h how do you think simulation and security awareness training fits into the broader enterprise resilience strategy over the next few years? Where does it kind of sit in that that bucket of tech stack decisions that are being made at the executive level?

>> So, it's it's definitely critical and I apologize for the background noise. I'm in a hotel room. So, if you hear the sirens go by, just know that I'm okay. >> You're good >> because I know you're concerned about my safety. I'm okay.

>> So, what what I think is that well, not what I think. What I know is that education and awareness programs have always been critical to security organizations always and there was always a need to dedicate resources to those education and awareness programs. I believe that AI will change it will change how we view our education and awareness program. It's what I alluded to a second ago when I was piggybacking off of a comment that Rahul made. In the past, we would leverage education and awareness programs because we were trying to train and educate our users.

And so, we wanted to create these simulation products to train our users to educate our users on how to recognize suspicious email and to not click, how to recognize a suspicious phone call and to not respond. I think that now with the the advances that we've made in AI, employees will no longer be able to distinguish what's real from what's fake. So therefore, if they can't distinguish what's real from what's fake, why do we still need the simulation? Because we're no longer training and educating the employees, we're training and educating the

security teams. And so you think about like the military, the UDA loop. Observe, orient, defend, right? and then attack. I think that we're doing the same thing with our simulation programs.

We're I'm sorry, not defend, decide, decide and attack. We're doing the same thing with our simulation programs that I'm leveraging the simulation program so that I know that my finance organization is more susceptible to responding to text messages. So even if I don't deploy MDM across the entire organization, the evidence suggests that at least for the finance organization, I should deploy mobile device management.

you know, there's been a lot of discussion internally about um click rates. Um and Bobby, you've I think been leading a lot of that discussion um and and famously had a LinkedIn post just a few months ago.

So one one question that comes up often is what what are the type of KPIs um that security leaders need to be looking at when it comes to um leveraging simulation and security awareness tools and maybe a follow-up question to that is how do they have these conversations with the board? You know the board is perhaps expecting a specific click rate that's measured on a monthly or quarterly basis. what what type of conversations do security leaders need to have? So may maybe start with what you kind of want to see from a metrics perspective and then what kind of conversations do security leaders need

to have on on click rates and metrics. >> So so thank you for giving me that question because I can pontificate on this for days. Um I definitely believe that click rates are dead. we've been tracking email click rates for the past 20 years and we all know that it only takes one click. we also know that employees work outside of email. We know that we know that they they conduct business outside of email. we also know that if you look at some of the the most recent largecale attacks that we've seen, those attacks didn't happen via

email. they happen via help desk or they happen via WhatsApp. And so as a result of that, you can't say I'm going to rely solely on click rates to determine whether or not I have a robust social engineering defense program.

what what I like to call it is social engineering susceptibility. And therefore, every organization I believe should look at ways that their employees work, look at ways that their employees socially engage and then come up with a metric that captures all of that and then reports that back to the board so that you say, "Hey," and it's it's a process. So you got, you know, you have to do it slowly, but you educate whatever board you report to or whatever audit committee you report to and you say, no longer, hey, we're converting from tracking click rates because that only tells you one piece of the equation. And we're now looking across all the ways our employees work and we have a social engineering

susceptibility score. We can double click on the areas where we're most likely to to to fall victim to a social engineering attack. But we're going to track this social engineering susceptibility score almost like a credit score and then develop a program to help it go down unlike a credit score where you want it to go up.

>> Um Rahul actually go ahead. Sounded like you wanted to follow up on that because I'm curious to get your take as someone who's building the product as a technologist. How do you kind of meet people where where they are today and providing that information? but also maybe take them on this journey u on from a product um from the product lens.

Yeah, I think um people have been very anchored on on click rates and I think Bobb's exactly right that I think the risk and impact is really what you want to measure. And when we've been talking to customers over the last several months, I think we've seen a huge amount of desire from from customers to make this transition towards more of an impact driven approach. And I'll give you just like a simple example, right?

Let's say one of your engineers gives up GitHub access to your entire codebase. That might be one or two clicks, but the impact your organization is is tremendous.

And so, as a security leader, I think what we're hearing from the customers is, okay, I think it's okay to still have click rates if that's what the board is used to, and maybe there's a slow transition that needs to be h needs to happen, but in order to truly feel confident that you're protecting your organization from actual risk, um there needs to be another another way. And I think um you know the GitHub example is just one example, but pretty much every department has an example of this where there's just one incident that could have extremely high impact. And so that's what you're most worried about as a security leader, not just the the random email someone gets where they click it, but don't actually divulge

anything too important. >> Thanks, R. Um moving now maybe perhaps to adoption and buyin. Um, Bobby, you've been in a position which in which you've had to make technology purchases and have those internal conversations with um your peers within the executive team on tools that you want. Um, what do you see as maybe the biggest blocker um for CISOs in in adopting simulation technologies? Is it is it more of a budget thing? Is it um perceived risk?

Is it complexity? Is it, you know, bringing along others on that journey? Where where do you kind of see the the the blockers? And maybe there aren't any, but curious to get >> Yeah, I really thought about this. Um, I don't I don't see a ton of blockers as it relates to anything having to do with educating or learning or creating a better security program. Um when you can show that the organization is growing, it's evolving and as a result the security program needs to evolve. Ultimately what it comes down to unfortunately often tamber

is is a resource conversation and so if there had to be a big you if there had to be like what's the largest blocker it comes down to resources. Do we have the investment? Do we have the investment available? And I know that for this for this that shouldn't even be a difficult conversation to have because I think all of us recognize since 2022 the advances that we've made with generative AI and as organizations are leveraging AI more. we know that the adversary is leveraging AI more and as a result I've always said I think I said it earlier like it takes AI to defend

against AI. And so if your simulation isn't built on top of generative AI, if your education and awareness program isn't built leveraging generative AI, then I think that you're even further behind.

>> Any guidance, I guess, in building a business case internally um for this product? maybe you touched on some of this, but anything else to add in terms of building a business case for um multi-channel simulation?

>> Yeah, I I think that it starts with that what I just said like it takes AI to defend against AI like that that full stop. That's where I start. and then I hang everything that I build off of that.

>> Awesome. >> Yeah. >> And I show I show how the adversary is leveraging it. I show the impact that it's having thanks to scale, speed, hyperpersonalization.

, and I showed that as a result, we have to do the same thing. We have to be able to educate , and train at scale at speed and we have to be able to make it hyperpersonalized. That's what I really enjoyed the most about the demo.

And and I know I've seen it a couple times, Tamara, and every time I see it, like you show me something brand new, just how how personal it can get. Like I I've yet I I mean like I get goosebumps thinking about it because I've yet to see a product that actually does that and like we're doing that. So So that's super exciting.

>> How would you evaluate a a a vendor that you're looking at? I mean, you know, is is there, you know, is is is the guidance perhaps, you know, try it out, get this in the hands of users and let them try it out, or, you know, what are there other folks maybe that are non-obvious that you need to bring into the evaluation process in order to yield a successful outcome as a as a syso? you know, who what does that look like in terms of evaluating various vendors and maybe pushing that um that forward so that you're able to bring it in for the for the company?

>> I start with the team like I I start with the team. I start with the individuals at the organization that I'll be working with. Um security cyber it's a team sport and so I look at the team like that's where I start when I look at any supplier.

starting with the team and then after I look at the team and I get an understanding of the team and and that's one of the things that I enjoy the most like listening to and and I've only been here for 3 months now but listening to our customers when they talk about the relationships that they have with our you know with the Doppel engineers what they have with the Doppel SOC like it's just phenomenal the way we respond and so it starts with the team and then after you understand hey this team will respond to my text messages to my email they'll respond to to my Slack back, then it's like, "All right, now I'll look at the product."

>> Excellent. Um, great. So, let's maybe I think this part's a lot of fun. Um, maybe taking a a peek into the future. Um, and so a question for both, um, , Bobby and Rahul. If you were advising a room of Fortune 500 sisos, um what role should simulation specifically play in defending against AIdriven attacks?

>> I'll I'll go first. Um I think that it should play the role of providing end toend comprehensive defense. And what I mean by that is if you're not leveraging a simulation tool that can prevent, detect, and also respond in a closed loop, then again, you're you're behind.

If you can't take a solution that looks at realworld examples, I think I used this illustration the last time that I talked to Rahul. It's almost like you have the playbook. It's like getting ready to play. Like we're in football season. It's like getting ready. I'm I'm Cowboys fan. is like getting ready to play the Chicago Bears this Sunday and I have their playbook. Like that's that provides you with a huge advantage. And so that's what I believe you should do when you're building out your so social engineering defense platform or your social engineering defense strategy.

Sorry. >> Yeah, just to add on to that, I think I would probably advise to you you probably Ces probably spend a lot of time, effort, and and money on penetration tests really mapping out how their infrastructure is vulnerable.

taking that same kind of mindset and approach towards your organization and the social engineering vulnerabilities. And so one way we we like to frame this is think of it as a social engineering penetration test. Um it can this is the same kind of thing that can prepare your organization for social engineering attacks that you might spend a lot of time on preparing organization for infrastructure attacks. So I think that's one of the biggest things. The second thing is to really be close to your employees on how they're receiving these attacks. I think things are changing very quickly. They're now getting calls. They're getting text messages. It's very important to have that tight feedback loop so you're aware of how the attacks are are changing. Um

you don't want to have a six month or 12 month delay between the these attacks changing and when you actually know about it.

>> This this kind of u brings us to um maybe more of a technologist type question. Um, Rahul, how how do you kind of um one, what do you think this category looks like in the next 12 months to 24 months? Um, what what's sort of like your northstar vision here for this specific category of cyber security? Um, is it, you know, more focus on training? , , is it incident response? You know, where where do you kind of see this going?

Yeah, I I think the sh the focus will shift a lot from merely compliance to these very deep simulations. And I think the ability if you remember my example back to an engineer giving up GitHub access, the ability to actually test for those kind of scenarios and actually verify those scenarios and be able to report on that is where I think things are are going. And I think the the depth of those attacks will be a big part of the success here and how big this new category really grows. If we're able to actually verify that these kind of sensitive information attacks are are really possible, then I think the

importance of it to organizations is going to grow as a as a result. And so I think right now it's maybe, you know, not the the first thing all CISOs have thought about when they think about security for the organization, but I think on their rankordered list of priorities, we're going to see it continue to grow over the next year. And um and I think simulation is kind of going to be the the first thing they look at in order to know what else they should invest in um as a company to protect themselves.

Are there specific channels perhaps that you you think will be core to being able to run um a worldclass simulation um product um as a security leader or as a technologist? you know, are are there is it is it just further expanding into social channels and chat apps or is it more so, you know, um webinar type technologies, you know, whether it's teams or zoom, where do you kind of see the channel coverage going or at least from a importance of um addressing per security teams?

>> Yeah, it's a good question. Today, I think it's a lot of text messages. We're starting to see more and more phone calls. the phone call fidelity is going to get really good. So, we're probably going to see that proliferate very quickly. I expect next year um to be a lot more video calls. So, everyone here is probably doing Zoom calls and Google Meets calls all day. What if that person you just talked to for the last 30 minutes wasn't real? Like, what if I wasn't real on this webinar, right?

Like, I think that's the world we're going to have to be confronting in in another 12 months. Um it's not here today, but it's coming very soon. Um, and I think the other thing I would say is just the coordination between these channels is growing. So instead of it just being a single email, it might be an email combined with a text combined with a voice call combined with a LinkedIn message. Um, I think the the realism really grows when you see maybe a someone on LinkedIn who sends you a text message saying, "Hey, just saw you at a conference." Um, and then leaves a voice message. Like all of that seems like it can't have come from a bad actor. And I think um that's something I'm not seeing the industry talk about a lot just like the the coordination

between all these channels in addition to just having all of them having having all these attacks come through any individual one of them.

>> Thanks Raul. Um I'll I'll ask one more question. We've got a few um from the audience that I want to get to as well. Um maybe can we talk a little bit about the concept of vibe fishing? This is a term that you kind of touched on earlier earlier on. maybe not everybody's familiar what what with what this term means but it's I know we'll be posting more um on this topic but do you want to maybe describe vibe fishing as a concept for the audience?

>> Yeah. Um so again the goal here is to close the gap between reality of what you're seeing and what you're able to deploy. And so the idea of vibe fishing is that you can use natural language to modify whatever template is generated um to to m to close that gap. And so that might be as something you create from scratch. It may be you modifying an existing template to close the gap. But the the point is that if any of you are software engineers and you've been in cursor, you can actually describe exactly what you want it to be with text and it should be able to match that exactly. Um, and so it's it's a really exciting tool. I think the first time anyone uses it, they kind of have that

aha magic moment. Um, very similar to the way software engineers have been having that that that that moment. And um, it's also quite, you know, scary as well because these are exactly the kind of tools that attackers are are using and and deploying. And um, I think once customers see it for themselves, I think, you know, they kind of get a different perspective on what is really possible.

Yeah, that's what I was going to say. The the adversary is already using it. >> Yep. Yeah. we we know Scattered Spider is creating these one they're using agents to conduct recon on their target organizations. And then two um we know that they're creating voice clones and targeting help desks, support desks. Um, and that's a real risk that um, enterprise organizations um, really need to defend against and create better awareness for. Um, excellent. So, I'm going to, , turn to a few audience questions. Um, Katherine, um, a question

from Katherine. Um, can this be layered onto Google Meet? Um, may maybe this is a a ra question.

um you know where maybe where where we might be going with this. >> Yeah. So we will be working on being able to generate Google Meets um initially with just a voice but soon eventually with a video as well. Um there's kind of a second follow-up question to this which is can we detect whether or not something is an AI on your Google Meets calls? And all I'll say there is stay tuned and you know there's a number of things we want to work on at at Doppel but I think um it's it's not what we have publicly launched right now.

>> Cool. Um Donna, thank you for submitting this question. Um yeah, thanks Katherine. Um can you speak to the importance or strategies for using simulations to qualify human risk assumptions? Um this is from Donna. Um, Bobby, maybe do you want to tackle that one?

>> Yeah. When we think about human risk or we think about what we call like the human layer, , it goes back to how our employees , work, , where they engage, , where they store their data, where they send their data, where they send messages. And so we put together programs to protect them. And the majority of those program was structured around awareness.

It was structured around awareness, educating them, providing them with threat intelligence so that they would be able to recognize something that was suspicious, so that they'd be able to differentiate what's malicious versus what's suspicious versus what's legitimate. And I keep harping on this that that I think that what we're seeing with generative AI is you will no longer be able to distinguish.

And so if you're no longer able to distinguish, then you have to leverage, and this is where people think that that that you're trying to trick your users by leveraging mature simulation solutions. And again, you're not trying to trick your users. What you're trying to do is educate your security team because you need to educate your security team so that they know where your users are most likely to fall for some of these advanced attacks and so you can put controls around them to protect them. So that that is like a fundamental shift because previously we would always think of education and awareness programs or sorry we would always think about simulation programs

to train the users and what I'm saying is that we're not using it to train the users. We're using it to educate and to train the security team so that they can better protect the users.

>> Well said. Um excellent. So maybe we can just move on to final thoughts. Um, Rahul, we we can start with you. Any final thoughts that maybe perhaps you want to share with the audience um and folks who may watch this later um from from the recording in terms of where we're going with the product. Um what do you think is most important for them to understand about um what we built and what's coming along the way?

Um feel free to, you know, kind of open up there. >> Yeah, for sure. I'll talk about a couple things that are coming down the pipeline. So, we just recently launched voice. I think we're going to be launching that more broadly very quickly. Um I think going into the future, we're also going to be doing a lot more coordination between different types of of attacks. So everything from an email that leads to a voice or a text message that leads to a voice. Um you saw the beginnings of having a back and forth conversation instead of it just being um a single message. I think a long deep multi-minute conversation can lead to a lot more sensitive information being dulged. Um, and then the last thing is something we didn't touch upon

too much. Um, which is that we still believe it that training is required. It's not something that we think is no longer important. Um, we're going to be using AI to also generate very personalized training for your employees so that they can still be ready for these attacks. So, yes, testing your defenses is what we think is the most important um, for your organization, but two, there there still needs to be a way for your employees to be ready as well.

and we'll be doing a lot with AI to to build the best product there as well. >> Thanks, Ro. Um, and I and I just got pinged by the team. It sounds like there there are a few more questions that we need to answer from the audience. So, , Bobby, we'll get to your final thoughts on this in a second. Um, let's see. Do you eventually profile employees and tell which of my employees might be at high risk based on their day-to-day activity?

Um, is this more like a product question, I suppose? Um, so this is purely optin. We don't actually do this by default at all. We have the ability to do it. It's one of the first things we actually built, but we actually um don't want to actually launch this to to customers unless it is specifically something they want for their employees.

What we mostly focus on is organization level recon. Um and and this way we don't have to, you know, risk potentially pulling in private data from your um employees that you don't necessarily want want to share. So I think whatever level of fidelity there is on a very personal employee basis will be up to you as a buyer and a customer um to choose what you want to do. And I think um it really depends on the organization. U might maybe you treat engineering different than finance, maybe you treat your seuite different than the rest of your employees. is we kind of want to give you all the knobs to be able to choose, but in terms of the ability to do it, yeah, we've built out the ability to personalize it to a individual user and

it's it's surprisingly effective. >> Um, another product related question. Um, , do you also do caller ID spoofing to show that the call is coming from a legit a legitimate business?

>> Yeah, this is something we're working on and we'll have very shortly, but I think it is quite important. I think especially if you're imitating a vendor, you want you want to do your best to make sure that that caller ID also reflects that it's it's legitimate. Um I think nowadays a lot of people are starting to either ignore their calls or try to use these kind of spam blockers and so um the thread actors are going to evade that and so we need to get ahead of it as well. It's a great point though.

Um, are we primarily focused on B2B or are we also addressing B2B TOC like helping bank customers to make sure that they don't share their credentials?

>> Yeah, so it's B2B right now that's our primary focus. Um, I will say it's not we've definitely thought about the B2B TOC kind of angle.

It's just not going to be our focus um immediately. And so, um, maybe ask me again in six to 12 months and maybe have a different answer, but for right now, just very focused on B2B.

>> All right, this is this is kind of a fun question. Um, do do thread actors or cyber security have an edge on new technologies? Maybe this kind of gets into who adopts bleeding edge technology first. Um, so may maybe for both of you, Rahul and Bobby, >> I'm really biased about our engineering team and like to think that we're always at the very bleeding edge, but you know, but bad actors also have a financial motivation to be at the bleeding edge as well. And so, um, >> you know, it's I think sometimes we're ahead, sometimes they're ahead, and it ends up being a little bit of a of a cat and mouse, but I think, um, we

definitely try to stay as close to the bleeding edge as as we possibly can. Um >> yeah sure have some thoughts on this. >> Yeah I definitely have like a a different opinion. I think that when we think about all things like automation even just like the thought about bots and bot networks like the first time I was hearing of it it was always coming from the adversary. I I think that the adversary the reason why they adopt technology a lot faster is a couple reasons. Number one they don't have the internal red tape that we have. They don't when it comes to leveraging technology. I I remember having conversations with a lot of our

customers about whether or not they could adopt AI into their solutions or adopt generative AI solutions into their organizations and having to go through different committees and different councils just to adopt the solution. So that's the first thing I think. So that gives the adversary the advantage. They don't have the red tape that we have.

Number two, I think they're hungrier. I really do. I think that when you think about the hands behind the keyboards, this is legit how they make their living. They're not getting paid a salary. They don't have benefits.

They're like they legit make their living off of getting you to transfer them 70,000 euro of your own money. And I just think that when when individuals are hungry and they don't have hurdles to jump through or hurdles to jump over, hoops to jump through, that they can move a lot faster. And that's why as a result like that's why we're as passionate as we are. That's why we work as hard as we do.

>> Excellent. Um with that, Bobby, maybe some final final words from from from your vantage points as an ex SISO um that you want to relay over to the audience.

>> Yeah. Rahul touched on it earlier. and and one of the the biggest takeaways is is that our solution isn't just to provide you with the list of things that you need to go and fix, but it's actually to take what we're seeing and take what you're seeing in your environment and create a simulation product. So it's like you're you know you're stealing your your opponent's playbook.

>> Excellent. Well, um, Rahul, Bobby, thank you so much. Thank you to, , the Doppel team as well. And of course, thanks for everyone for, um, tuning in to, um, our presentation. Um, if you'd like to learn more about simulation, we encourage you to, , book a demo, um, with our team.

Um, that information, , should be shared, um, I believe in the chat. Um, and of course, we'll we'll be following up as well. But it was great to have you all here. Um, and we're excited for you to dive deeper into our multi- channelannel simulation offering. , have a great, , rest of the day, everyone. Take care.

>> All right. Thanks, everyone. >> Thanks all.

Watch Next

Learn how Doppel can protect your business

Join hundreds of companies already using our platform to protect their brand and people from social engineering attacks.