Info |
---|
Each Topic Area is managed by a designated topic area leader. Each core mechanism must tap into cross-cutting concerns topic areas as needed. |
Content Topic Areas
A.1 | A.1 Glossaries & core concepts | Jay Meier |
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Andrew Hughes |
A.3 | Core concepts: “AI” - Overall (in the context of IDPV Systems) | James Monaghan |
A.4 | Core concepts: simulated humans, synthetic identity (assumptions, explanations) | Heather Vescent |
B.1 | What are the current Attack vectors & threats? | |
B.2 | What are hacker motivations (social engineering), payloads, simulated humans, synthetic identity. | Heather Vescent |
B.3 | How are Phone/Voice attacked? | Chris LaBarbera |
C.1 | What are current Prevention & Countermeasures? | Dawid Jacobs |
D.1 | What do Emerging defences and mitigation strategies look like and how might they evolve? | |
E.1 | Some examples of Attack scenarios & real world media stories |
...