Why Cybersecurity is Moving Up in the Executive Agenda
It doesn't matter how fancy your nameplate is on your desk. You're still vulnerable. With the final £1.8m payment made, Claudio Lotito, chairman of...
As AI-generated content grows more sophisticated and malicious actors harness synthetic media at scale, the digital domain is becoming increasingly difficult to trust. From impersonated voices and synthetic videos to manipulated emails and language-based deception, the truth is not always what it seems.
So how do we anchor trust in a world where reality can be convincingly faked?
This blog is an exploratory reflection—a thought experiment, if you will. A look at the analog edge in a digital world. Because perhaps, in an age of misinformation, machine-generated mimicry, and escalating psychological manipulation, real security may depend on our ability to go backward, not just forward. Maybe trust will need to be grounded in things we can touch, sense, hear, and verify with our own eyes.
Let’s acknowledge the uncomfortable reality: people still largely trust what they see and hear in digital mediums—which is precisely why deepfakes, misinformation, and social engineering are so effective. This instinctive trust, once a cornerstone of digital engagement, has become a critical vulnerability. In some ways, this is healthy skepticism. But it also erodes foundational systems—collaboration, communication, decision-making.
When anything can be faked with enough data and a good model, the challenge of discerning what is real has become more complex for the receiver—not because this responsibility is new, but because the signals we once relied on to make those judgments are now easily fabricated. Just as authenticity in art or collectibles has always relied on the trained eye of the beholder, so too has digital truth always been a matter of human perception. But with synthetic content eroding traditional trust cues at scale, what was once a skill is becoming an essential cybersecurity practice. This shift fundamentally alters how we experience and manage digital trust. Instead of assuming accuracy and verifying only when something feels off, we are entering a posture where skepticism is the baseline and validation is required by default.
Here’s the question we’re exploring: In a world of digital uncertainty, could analog cues become the last bastion of credibility?
Think about it:
An in-person conversation is harder to spoof.
A handwritten note carries signals of authenticity.
Code words—think spy films, passwords hidden in plain phrases, or verbal triggers only the intended recipient would recognize—can serve as analog authentication tools in high-trust scenarios. They introduce a shared context that’s extremely difficult to replicate convincingly without insider knowledge. Used wisely, these analog markers provide an added layer of verification when other digital trust cues are unreliable.
A live phone call can carry nuance, cadence, and context (it's true that even voice is no longer a reliable signal in an era of vishing, voice cloning, and AI-generated speech. The advantage here lies more in the added friction and requirement for real-time engagement, which raises the bar for attackers and gives defenders precious space to assess authenticity.)
Timing patterns and in-person behaviors function much like a notary public—offering observable, embodied cues that are far more difficult to fake at scale. These analog signals provide a layer of real-world validation that is often absent in digital-only interactions. When performed in person, trust assessments benefit from context, consistency, and immediacy—three elements attackers struggle to replicate.
These aren’t foolproof, but perhaps they could introduce cost and complexity to deception—and that alone can slow down attacks and restore sanity to verification.
Firebreaks in the System
In wildfire strategy, a firebreak is a deliberate barrier. A gap that stops spread. Could analog trust signals serve the same function in digital systems?
Imagine requiring:
In-person validation for high-risk financial approvals
In-person or multi-modal authentication for sensitive internal communication
Verbal codes for real-time confirmation in critical workflows
Paper-based audit trails for high-value transactions
Sound inconvenient? Possibly. But so is a breach. When attackers are automating the human side of the kill chain, we have to ask: where can we slow it down?
We may already be at the point—or rapidly approaching it—where the cost and effort of slower, analog forms of validation could deliver more ROI than the high-speed convenience of digital-only workflows. If the frequency and financial impact of breaches continue to rise, then in-person confirmation, deliberate friction, and physical checkpoints may no longer be seen as operational burdens, but as strategic safeguards that protect trust, integrity, and value in high-risk workflows.
We talk a lot about "zero trust" in network security. But what about rethinking trust at the human level?
If we design workflows that require analog confirmation—or at least hybrid human-machine context switching—we add friction for attackers and space for defenders to think.
It won’t work for everything. But it could work for the most important things.
This isn’t nostalgia. It’s risk-based pragmatism. In the same way we embrace multifactor authentication and behavioral signals for system access, why not embrace multisensory signals and physical verification for human trust?
As generative AI blurs the lines between real and fake, our security strategies must evolve. But sometimes evolution means going back to basics.
Because in a world where your inbox lies, your dashboard fakes, and your data hallucinates—a voice, a handshake, or a physical pause might be the clearest signal of truth you’ve got.
It doesn't matter how fancy your nameplate is on your desk. You're still vulnerable. With the final £1.8m payment made, Claudio Lotito, chairman of...
5 min read
Everyone wants to change behavior. But not everyone knows how to prove it. Security awareness teams are asked to justify their programs with numbers....
5 min read
In the vast ocean of technology, a new wave of business is rolling in—one driven by the boundless potential of Artificial Intelligence (AI). At the...
4 min read
Subscribe to our newsletters for the latest news and insights.
Stay updated with best practices to enhance your workforce.
Get the latest on strategic risk for Executives and Managers.