Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Each Topic Area is managed by a designated topic area leader.

Each core mechanism must tap into cross-cutting concerns topic areas as needed.

Content Topic Areas

A.1

A.1 Glossaries & core concepts

Jay Meier

A.2

Core concepts: A.2 ID Proofing and Verification Systems - Overall

Andrew Hughes

A.3

Core concepts: “AI” - Overall (in the context of IDPV Systems)

James Monaghan

A.4

Core concepts: simulated humans, synthetic identity (assumptions, explanations) 

Heather Vescent

B.1

What are the current Attack vectors & threats?

B.2

What are hacker motivations (social engineering), payloads, simulated humans, synthetic identity.

Heather Vescent

B.3

How are Phone/Voice attacked?

Chris LaBarbera

C.1

What are current Prevention & Countermeasures?

Dawid Jacobs

D.1

What do Emerging defences and mitigation strategies look like and how might they evolve?

E.1

Some examples of Attack scenarios & real world media stories

...