Defending Against AI Voice Attacks
UW Professional & Continuing Education
Certificate in Cybersecurity Risk Management
Overview
Guest lecture for a cohort of management professionals in the University of Washington's Certificate in Cybersecurity Risk Management program. The session was designed to prepare students for upcoming Red Team/Blue Team simulations and real-time organizational assessments, with a focus on understanding AI-generated threats in the context of enterprise security.
The lecture provided a grounded, practical perspective on how AI-based security tools are built and deployed in the real world, with an emphasis on strategic implementation and policy implications rather than deeply technical code. Students explored how tools like VoiceGuard AI can be integrated into incident response planning and defensive security postures.
What Was Covered
Threat Detection
How VoiceGuard actively identifies AI-generated voice fraud and sophisticated deepfakes, including the technical signals that distinguish synthetic from authentic speech.
Enterprise Deployment
Practical strategies for integrating AI-based security tools into existing organizational frameworks, covering implementation considerations for security teams and IT leadership.
Strategic Defense
How to factor AI-driven threats into policy writing, incident response plans, and defensive postures, tailored for a management and risk assessment audience.
About the Speaker
Andrew Metcalf builds AI systems that create, protect, and explore memory. He founded Ajax Studio, a multimodal platform for generating music, videos, and digital artists with persistent creative identity. He also created VoiceGuard AI, a free tool for detecting synthetic voice scams.
His background includes US Army service, founding Textstr (an automotive SMS marketing platform), and serving on the board of Fresh Start Futures. He brings a practical, execution-focused perspective to discussions of AI technology and its implications.
Interested in a similar talk for your organization?
This presentation can be adapted for security teams, executive leadership, compliance groups, and academic programs.