Raphael John-Lall
Business owners are being urged to strengthen their cybersecurity defences as increasingly sophisticated cyberattacks—driven by artificial intelligence and deepfake technology—pose a growing threat to operations and financial stability.
Managing Director of Pinaka Consulting, Shiva Bissessar, warned that cybercriminals are rapidly evolving their tactics, using more convincing and technologically advanced methods to exploit vulnerabilities within organisations.
Speaking to the Business Guardian, Bissessar highlighted deepfakes as one of the most pressing risks facing businesses today. He also referenced his presentation at the CANTO Connect 2026 and its 42nd AGM, held from February 1 to 3 at the Hyatt Regency Hotel in Port of Spain, where the issue was a central focus.
CANTO Caribbean, in a social media post on the event, noted that Bissessar addressed the growing threat posed by deepfakes—AI-generated content capable of manipulating audio, video and images in ways that undermine trust, security and decision-making across governments, businesses and society.
That session examined what deepfakes are, why they matter, and how business owners, organisations and policymakers can respond in an increasingly complex digital environment.
“So, what is the attack evolution that we’re seeing right now? Deepfakes, AI-generated content, it’s a threat that is out there right now, and we’re seeing it moving. You guys would have seen the videos with Will Smith two years ago eating spaghetti, where he looks really contorted and his face is all over the place, to now where we have realistic deepfakes.”
He explained that cybercriminals are shifting away from traditional social engineering techniques to more advanced, AI-enhanced deception strategies.
“And the attack evolution is going to be now, moving social engineering from your traditional methods of trying to fool people, to trying to fool people with more convincing deepfakes. So social engineering is not a technical term, it’s something that you do all the time. You come and you meet an audience, you social engineer your way into a room. Social engineering is how we convince people to trust us, to carry out some action that we want them to carry out. It’s not technical.”
Bissessar warned that this evolution is already affecting businesses through schemes such as business email compromise, where fraudsters impersonate vendors or executives to manipulate employees into authorising payments or granting access.
“We have now the advent of attacks that are based on business email compromise. So, a business email compromise is where you would see someone pretending to be a vendor. They will send you an email, and they are trying to convince you to click on that email and add them to the vendor list, or send a wire to an ex-different account that you’re normally accustomed to. That business email compromise is very prevalent in T&T.”
He stressed that established internal controls—particularly those governing financial transactions—must not be bypassed, even when communications appear legitimate.
“You have to go through a process. But this is the game. These guys are so good at trying to get you to bypass your existing workflows. This is what they try to do. So, they would send you an email, pretend to be a supplier, hey, click on this link to add them to the list. Click on this link to send money to a different account.”
New and Emerging Threats
Bissessar also pointed to a growing range of AI-enabled threats, noting that cybercriminals are refining their tactics using more sophisticated scripts and deception techniques.
“What are some of these AI-enabled techniques? We’ve seen the technical measures that bad actors are trying to perpetrate against the good actors, where are the good actors, or their potential victims. The areas that they would exploit would be that pretext script that they have to try to convince somebody that they are someone else. Those scripts will now improve with AI.”
He highlighted “financial sextortion” as another emerging concern, particularly affecting younger users.
“This is where persons try to prey on teenagers and get them to submit some compromising photo of themselves, and they will use that now as leverage to ask them for money once they’ve fallen victim to that scheme. These attacks are not perpetrated by individuals. There are groups known for these types of attacks, and they are based in certain regions of the world.”
He noted similarities with romance scams, which have already been flagged locally by the Financial Intelligence Unit of Trinidad and Tobago.
“Romance scams have been recognised by the Financial Intelligence Unit of Trinidad and Tobago (FIUTT) as something taking place in Trinidad and Tobago of significance. They have data to support that. They’ve issued a report. They’ve issued warnings on that, whereas the financial sextortion is something that applies to the youth. But this type of extortion, if we look at it from that general word of extortion, it is something that takes place globally, and it has been taking place in T&T.”
Bissessar added that deepfake-enabled fraud is no longer theoretical, citing a high-profile case in Hong Kong where a company employee was tricked during a video call into transferring millions of dollars.
“Deepfake attacks did take place in Hong Kong maybe a couple years ago, where the controller of accounts was on a conference call that he thought was his executives, and they were basically scammed out of…he sent money. He followed the instructions received on that video call, and he sent money to the tune of, I believe, $25 million. So, this is not fiction.”
He also warned that ransomware attacks are becoming more organised, with cybercriminals operating in structured networks resembling legitimate business ecosystems.
“Ransomware is being perpetrated by a group of bad actors. It’s an ecosystem. It’s a business ecosystem. Just as you have economies of scale in the everyday world, these guys have classed themselves into areas of specialisation.”
Call for Collaboration
Against this backdrop, Bissessar called for stronger collaboration between the public and private sectors to counter the growing cyber threat.
“The bad actors are creating ecosystems. What are the good actors doing? Do we truly have public-private partnership in Trinidad and Tobago when it comes to cybersecurity? We’ve heard some great plans about what the Telecommunications Authority of Trinidad and Tobago (TATT) is doing. But I would encourage you to partner with the private sector as well. Partner with some of the smaller private sector entities as well, because we have certain expertise that we could lend to this type of situation.”
As cyber threats become more sophisticated, he stressed that vigilance, robust internal controls and collaboration will be critical in safeguarding businesses from increasingly complex digital risks.







