Leadership by example
This is happening more and more. It also reads as pretty lo-fi, as in just AI voice cloning being used - it’s cloned video as well for others. I doubt there will be published stories when it’s successful.
Again, make sure you have controls in place. But don’t just think of financial phishing “Quick, we need this money and it’s a secret” is a pretty big wavy red flag.
But I’d think of service desk or service provider scenarios. Account creation, resets, network changes etc. Perimeter security is grand until someone opens it. They’re the sneaky ones to watch for.
Do your people jump to it when the Exec call? Then deal with it. Educate everyone. Start from the top down in this case.
Leadership by example.