Voice clones, virtual kidnaps, and fake CFOs on Teams - broken down with practical defenses. Dr. Jessica Barker joins Eliot Baker to turn emotions, culture, and verification into controls.
Voice clones and live-meeting deepfakes have collapsed the gap between “that would never happen here” and “finance just sent the wire.” In this episode, host Eliot Baker sits down with Dr Jessica Barker MBE to discuss her book , 'Hacked' and to dissect two escalating threats - virtual kidnaps by voice clone and executive impersonation on Teams/Zoom.
Read the full guide to social engineering defense.
What you’ll learn in this episode:
Timestamps:
(00:00) Introduction and Welcome
(00:24) Dr. Jessica Barker's Background in Cybersecurity
(01:47) Receiving the MBE: An Honor in Cybersecurity
(03:44) The Importance of Storytelling in Cybersecurity
(06:37) Real-Life Cybersecurity Stories
(11:42) The Rise of AI and Deepfake Threats
(21:56) Combating Social Engineering Attacks
(26:53) Effective Communication in Cybersecurity
(33:40) Key Takeaways for Security Awareness Leaders
(36:47) Conclusion and Final Thoughts
Resources:
Host links:
Eliot Baker: https://www.linkedin.com/in/eliotebaker/
Dr Jessica Barker: https://www.linkedin.com/in/jessica-barker/
In this episode of All Things Human Risk Management, host Eliot Baker is joined by Dr. Jessica Barker, MBE to dissect two fast-rising threats - voice-clone “virtual kidnaps” and live-meeting executive impersonation - and the human defenses that actually work when people are stressed.
Attackers don’t need much audio to clone a voice, and deepfaked “CFOs” can now appear credibly on Teams/Zoom. The playbook blends cheap AI with old-school cash pickups and urgency.
“A few seconds of audio is enough to create a convincing clone.”
Panic, urgency, and flattery drive mistakes. Teach people to detect their own state first, then act.
“Look for communications that make you feel something - then slow down and verify.”
Empathy isn’t “soft.” It accelerates incident response by increasing early reporting and reducing shame.
“Psychological safety turns near-misses into fast containment.”
Out-of-band checks stop both clone calls and fake-CFO meetings. Normalize the pause.
“Trust the pause, not the voice.”
Stories stick; stats validate. Use one story, one ask, one action per touchpoint to avoid overwhelm.
“Simplify without dumbing down - make the next step obvious.”
Employees and families are targets. Provide a one-page “clone-call” script and refrigerator checklist.
Shift from completion to capability under pressure.
“Completion shows who watched; verification shows who’s safer.”
Translate behavior metrics into risk language (fewer incidents, faster containment, smaller losses). Pair dashboards with one memorable story.
“Don’t just show numbers - show how a verification habit prevented a transfer.”
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.