...
Time | Item | Presenter | Notes |
---|---|---|---|
5 min | New weekly meeting schedule | Andrew |
|
10 min | “Success Headline” review | Defer to future meeting - ensure reminder goes out in advance | |
10 min | Mind map review | Discussion about whether the current map is 'good enough' to begin the work | |
25 min | Topic leaders discussion | Offers: Dawid - Countermeasures (Prevention) Chris - Phone network attacks Maxine - Strategic marketing Jay - Glossary/terminology Heather - hacker motivations (social engineering), payloads, simulated humans, synthetic identity Andrew poses these questions based on the mind map: <<>> What are ID Proofing and ID Verification and how do the services work? <<>> What is AI in the context of human simulations and ID Verification and how does it work? <<>> How are attack attempts done today against the most common ID Verification mechanisms? (non-AI and AI) <<>> What attacks will be possible or more threatening in the future? |
...