Imposter Job Applicants Are Slipping Through: Here’s How to Stop Them
September 16, 2025
Mandalay Bay I Ballroom
Breakout Session
Today, talent acquisition leaders aren’t just reviewing résumés—they’re defending their workforce. Inbound applications are spiking as much as 800%, as applicant tracking systems (ATS) and recruiting teams have become prime targets for increasingly sophisticated imposter applicant rings. These are not just fake profiles. They are fabricated or stolen identities designed to bypass background checks, onboarding, and even embed inside organizations as “imposter employees.”
The impact is broader than lost interview capacity. Imposter hires introduce cybersecurity and breach vulnerabilities, siphon productivity from engineering & security, and people teams, and in extreme cases, as confirmed by the U.S. Department of Justice, have enabled nation-state actors to infiltrate U.S. firms.
Background checks and employee verification processes remain foundational. But they were never built to catch synthetic identities or adversaries operating at this scale. That’s why the industry is evolving, pairing background screening with real-time identity verification to stop fraud at the front door.
The impact is broader than lost interview capacity. Imposter hires introduce cybersecurity and breach vulnerabilities, siphon productivity from engineering & security, and people teams, and in extreme cases, as confirmed by the U.S. Department of Justice, have enabled nation-state actors to infiltrate U.S. firms.
Background checks and employee verification processes remain foundational. But they were never built to catch synthetic identities or adversaries operating at this scale. That’s why the industry is evolving, pairing background screening with real-time identity verification to stop fraud at the front door.
Speakers
Session Type
Core Session
Topic
Strategic Workforce Technology
Learning Objective 1
Identify how imposter applications are scaling and the operational and security risks they pose.
Learning Objective 2
Quantify the true cost of hiring fraud—from interview drain to breach exposure.
Learning Objective 3
Integrate real-time identity verification with background screening and ATS platforms to secure the end-to-end applicant funnel.
Access Type
Conference Pass