Identity Under Attack: Lessons on AI-Driven Credential Risks from Security Experts

Updated:
Identity Under Attack: Lessons on AI-Driven Credential Risks from 2 Security Experts
Discover 3 key takeaways from security leaders at Dashlane and Morgan Stanley about how AI-driven credential threats are impacting businesses.

Identity is now the front line of cybersecurity. As credential-based attacks become more sophisticated and widespread, AI is accelerating the speed, scale, and success of these threats.

To examine how this is impacting businesses, Dashlane CISO Joanna Chen recently co-hosted a webinar with Prashanth Challa, Managing Director of Wealth Management Cybersecurity at Morgan Stanley.

Get the essential takeaways from their conversation below, or catch up on everything they discussed by checking out their on-demand webinar, “Identity Under Attack: How Credential Threats Are Reshaping Security in Finance and Tech.”

#1: AI is a game-changer for both attackers and defenders

Where phishing emails and brute-force attacks were once indiscriminate, AI now enables attackers to create highly tailored and convincing lures at scale.

It can scrape data from public sources, generate context-specific messaging, and even mimic communication styles—making it harder for employees to spot the red flags. Joanna and Prashanth agreed: AI has lowered the barrier to entry for cybercrime while increasing its potential impact.

On the defensive side, however, AI is just as powerful. By automating risk detection and surfacing suspicious activity faster, AI-powered security tools can help teams respond before attackers gain a foothold.

“A rising tide lifts all boats, so what’s happening for attackers is also happening for defenders… One side doesn’t really have the edge over the other in terms of AI.”

Joanna Chen, CISO at Dashlane

The challenge, Joanna and Prashanth said, is ensuring the AI tools businesses are using are transparent and trustworthy. This is especially true in regulated industries where governance and compliance carry as much weight as technical capability.

#2: As technical defenses improve, attackers will lean harder on social engineering

As attackers get more sophisticated with AI and deepfakes, humans remain the path of least resistance. Both Joanna and Prashanth warned that organizations can’t just harden systems. They must also prepare their people.

“The thing we’ve seen starting to pick up now, but I expect it to really blow up in 2026,” shared Prashanth, “is attacks on our call centers—taking advantage of GenAI and deepfakes to impersonate employees or clients.”

Because call centers are often staffed with junior, seasonal, or contract employees, fraudsters use spoofed phone numbers, high-pressure tactics, and even AI-generated voices to trick agents into resetting accounts or granting access. Morgan Stanley is responding by strengthening authentication procedures and piloting AI tools that can monitor calls in real time to ensure protocols are followed.

Joanna added that beyond call centers, humans more broadly remain the most persistent risk:

“Where attackers often go is that human element. It’s always going to be a bit squishy… and it’s always going to be a part of a company’s risk that they can’t fully get rid of.”

She noted that with defenses like firewalls growing stronger, attackers are prioritizing the exploitation of people instead. With tools like ChatGPT making it easy to generate convincing content in any language, the human factor is only becoming more vulnerable.

#3: Proactive, multi-layered security is key to reducing credential risk

Prashanth addressed the value of a defensive, proactive cybersecurity strategy.

“Doing the basics is what matters. The hard part is that you have to do the basics right every time, and the hacker only has to do it right once.”

Prashanth Challa, Managing Director of Wealth Management Cybersecurity at Morgan Stanley

Both experts outlined several strategies that organizations in any industry can use to reduce identity risk:

  • Adopt passwordless authentication where possible to minimize reliance on credentials that attackers can steal.
  • Use layered security controls such as SSO, credential management, and MFA, which close gaps that any single solution leaves exposed.
  • Increase visibility into credential usage with tools that flag weak or compromised credentials before attackers exploit them.
  • Embed security into daily workflows through contextual nudges and real-time education, rather than relying on one-off security training—which 11% of employees said they’d rather get a root canal than attend.
  • Plan for incident response with clear playbooks that address not only technical recovery but also communication, governance, and customer reassurance.

The rapid evolution of credential-based threats means organizations can’t afford a reactive stance. Identity security must be proactive, layered, and woven into business culture.

Customer trust is everything, and protecting that trust starts with protecting identities.

Sign up to receive news and updates about Dashlane