...
Core concepts topics | ||
A.1 | Core concepts: A.1 Glossaries & core concepts | Jay Meier |
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Andrew Hughes, Jay Meier, Isha Chhatwal, Julian White, Mike Magrath |
A.3 | Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems | James Monaghan |
A.4 | Core concepts: A.4 Simulated humans and synthetic identity - context Incorporate intent into applicable sections. Sections will be eliminated from scope to be deservant of their own domain. | Heather Vescent * |
Attacks & Threats topics | ||
B.1 | B.1 Current threats and attack vectors What are the current Attack vectors & threats? | Jay Meier
|
B.2 | What are hacker motivations (social engineering), payloadspayloads… they want to steal something or profit from it or break something. What is vulnerable. Target audience consideration for those not SME’s Incorporate intent into applicable sections. Sections will be eliminated from scope to be deservant of their own domain. | Heather Vescent Potential |
B.3 | B.3 Phone/Voice vector attacks and defences How are Phone/Voice attacked and defended? | Chris LaBarbera |
B.4 | B.4 A collection of real world incidents Some examples of Attack scenarios & real world media stories |
|
Prevention, Defences, Countermeasures topics | ||
C.1 | C.1 Prevention and Countermeasures What are current Prevention & Countermeasures? | Dawid Jacobs |
Emerging capabilities for detection, defence, mitigation topics | ||
D.1 | What do Emerging defences and mitigation strategies look like and how might they evolve? | |
E.1 | E.1 A Collection of regulatory materials What regulations and governmental discussion forums are starting to form? (Collect and Collate) - North American Primary | Denny Prvu
|
...