...
Core concepts topics | ||
A.1 | Core concepts: A.1 Glossaries & core concepts | Jay Meier |
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Mike Engle, Andrew Hughes, Jay Meier, |
A.3 | Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems | James Monaghan, Jay Meier |
Attacks & Threats topics | ||
B.1 | B.1 Current threats and attack vectors What are the current Attack vectors & threats? | Joey Pritikin, Mike Chaudoin |
B.2 | B.3 Phone/Voice vector attacks and defences How are Phone/Voice attacked and defended? | Chris LaBarbera |
B.3 | B.4 A collection of real world incidents Some examples of Attack scenarios & real world media stories | Sean Lanzner, Maxine Most |
Prevention, Defences, Countermeasures topics | ||
C.1 | C.1 Prevention and Countermeasures What are current Prevention & Countermeasures? What do Emerging defences and mitigation strategies look like and how might they evolve? | Dawid Jacobs, Jay Meier |
Regulations, Guidelines, Recommendations | ||
D.1 | E.1 A Collection of regulatory materials (and public-sector-related material) What regulations and governmental discussion forums are starting to form? (Collect and Collate) - North American Primary | Denny Prvu |
...