Deep Fakes, Digital Identity and Security 1. Introduction and General Questions Hello! I’m Heather Vescent. I am a futurist, researcher and author of the Cyber Attack Survival Manual. This survey supports Kantara's Deep Fakes and the impact on identity proofing working group, where I am using strategic foresight to help us gain insights on this space. Results of this survey will be included in a group document and I will share insights directly via my Future of Security list.If you would be willing to participate in a 1:1 interview, there will be a place to indicate your contact information at the end of the survey. If you have any questions, contact me, Heather Vescent, at puissant @ heathervescent . com or via LinkedIn. The survey should take about 10 minutes. I appreciate your time and attention. Let's begin.... OK Question Title * 1. Please select your age. <18 19-21 22-26 27-32 33-40 41-50 51-65 66+ Prefer not to state OK Question Title * 2. Please select your gender Female Male Non-Binary Prefer not to state OK Question Title * 3. How long have you worked in the security or identity professional? Under 1 year 1-3 years 3-5 years 5-7 years 7-10 years 10-15 years 15-20 years 20-30 years 30+ years Not a professional Do not work in security or identity OK Question Title * 4. How worried are you about Very Worried Worried Neutral Not worried at all N/A Vulnerabilities Vulnerabilities Very Worried Vulnerabilities Worried Vulnerabilities Neutral Vulnerabilities Not worried at all Vulnerabilities N/A Deep Fakes Deep Fakes Very Worried Deep Fakes Worried Deep Fakes Neutral Deep Fakes Not worried at all Deep Fakes N/A Data breaches Data breaches Very Worried Data breaches Worried Data breaches Neutral Data breaches Not worried at all Data breaches N/A Social Engineering attack Social Engineering attack Very Worried Social Engineering attack Worried Social Engineering attack Neutral Social Engineering attack Not worried at all Social Engineering attack N/A Financial hacks Financial hacks Very Worried Financial hacks Worried Financial hacks Neutral Financial hacks Not worried at all Financial hacks N/A ID Verification Bypass ID Verification Bypass Very Worried ID Verification Bypass Worried ID Verification Bypass Neutral ID Verification Bypass Not worried at all ID Verification Bypass N/A Nation State hacks Nation State hacks Very Worried Nation State hacks Worried Nation State hacks Neutral Nation State hacks Not worried at all Nation State hacks N/A APT APT Very Worried APT Worried APT Neutral APT Not worried at all APT N/A Breaches by Employee Breaches by Employee Very Worried Breaches by Employee Worried Breaches by Employee Neutral Breaches by Employee Not worried at all Breaches by Employee N/A Corporate Espionage Corporate Espionage Very Worried Corporate Espionage Worried Corporate Espionage Neutral Corporate Espionage Not worried at all Corporate Espionage N/A Other worry (please specify) OK Question Title * 5. Do you work in the Security field Identity field Neither field Both fields OK Question Title * 6. Does your work involve ... Customer authorization Customer authentication Employee/Internal authorization Employee/Internal authentication Customer/Employee onboarding None of the above OK NEXT