This presentation will cover: The strategies and tools used by these covert operatives to sneak through the cracks How we discovered something was wrong, and how we quickly stepped in to stop it How you can spot fake IT workers in your hiring process and workplace Practical advice for fortifying your organization in implementing robust screening processes and security protocols to safeguard against infiltration