Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Core concepts topics

A.1

Core concepts: A.1 Glossaries & core concepts

Jay Meier

A.2

Core concepts: A.2 ID Proofing and Verification Systems - Overall

Andrew Hughes, Jay Meier, Isha Chhatwal, Julian White, Mike Magrath

A.3

Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems

James Monaghan

A.4

Core concepts: A.4 Simulated humans and synthetic identity - context

Heather Vescent *

Attacks & Threats topics

B.1

B.1 Current threats and attack vectors

What are the current Attack vectors & threats?

Jay Meier

  • Denny Prvu

  • Max Most

  • Sal D’Agostino

  • Sean Lanzner

B.2

B.2 Hacker motivations

What are hacker motivations (social engineering), payloads.payloads… they want to steal something or profit from it or break something.

What is vulnerable.

Target audience consideration for those not SME’s

Heather Vescent

Potential

B.3

B.3 Phone/Voice vector attacks and defences

How are Phone/Voice attacked and defended?

Chris LaBarbera

B.4

B.4 A collection of real world incidents

Some examples of Attack scenarios & real world media stories

  • Jay Meier

  • Denny Prvu

  • Max Most

  • Mike Magrath

Prevention, Defences, Countermeasures topics

C.1

C.1 Prevention and Countermeasures

What are current Prevention & Countermeasures?

Dawid Jacobs

Emerging capabilities for detection, defence, mitigation topics

D.1

What do Emerging defences and mitigation strategies look like and how might they evolve?

E.1

E.1 A Collection of regulatory materials

What regulations and governmental discussion forums are starting to form? (Collect and Collate) - North American Primary

Denny Prvu

  • Peter Davis

  • Mike Magrath

...