Info |
---|
Each Topic Area is managed by a designated topic area leader. |
Content Topic Areas
A.1 | A.1 Glossaries & core concepts | Jay Meier |
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Andrew Hughes |
A.3 | Core concepts: “AI” - Overall (in the context of IDPV Systems) | James Monaghan |
A.4 | Core concepts: simulated humans, synthetic identity (assumptions, explanations) | Heather Vescent |
B.1 | What are the current Attack vectors & threats? | |
B.2 | What are hacker motivations (social engineering), payloads. | Heather Vescent |
B.3 | How are Phone/Voice attacked? | Chris LaBarbera |
C.1 | What are current Prevention & Countermeasures? | Dawid Jacobs |
D.1 | What do Emerging defences and mitigation strategies look like and how might they evolve? | |
E.1 | Some examples of Attack scenarios & real world media stories |
GOALS for content areas
Build up a small knowledge base or content collection related to the content area - use your folder in the wiki.
Write up a set of factual statements that capture the essence of the content area. Do not use jargon. Aim to provide an intelligent (but unexposed to the topic) reader the core facts of the content area.
“DG-Level Topic” Areas
Andrew Hughes | |
Maxine Most | |
DG Leaders |