Candidate fraud is no longer just an HR issue. It’s a growing cybersecurity threat.

From AI-generated identities and proxy interviews to outsourced assessments and credential theft, hiring signals are easier to manipulate - and harder to trust - than ever. The risk doesn’t end at offer acceptance. Once inside, bad actors can operate as “trusted employees,” gaining access to systems, data, and sensitive infrastructure.

As remote and digital hiring becomes the norm, traditional safeguards are no longer enough.

In this session, cybersecurity expert and ethical hacker Terry Cutler breaks down how attackers are using hiring processes to bypass security controls entirely. He’ll walk through where organizations are most exposed, from first interaction through onboarding, and how these gaps are being exploited in real-world breaches.

You’ll see how attackers can gain access using legitimate credentials, move laterally across cloud platforms and email, and remain undetected in environments that believe they’re secure. Terry will also demonstrate how protections like two-factor authentication (2FA) are being bypassed—and what that means for your organization.

You’ll walk away with:

  • How candidate fraud is evolving into a cybersecurity threat
  • Where your hiring and onboarding processes are most vulnerable
  • Practical ways to reduce risk without slowing down hiring
  • How attackers bypass controls like 2FA and remain undetected
  • What to do when a breach originates from inside your workforce