...
Core concepts topics | ||||||
A.1 | Core concepts: A.1 Glossaries & core concepts | Jay Meier | ||||
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Mike Engle, Andrew Hughes, Jay Meier, | ||||
A.3 | Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems | James Monaghan, Jay Meier | ||||
Attacks & Threats topics | ||||||
B.1 | B.1 Current threats and attack vectors What are the current Attack vectors & threats? | Jay Meier, Sean LanznerJoey Pritikin, Mike Chaudoin | ||||
B.32 | B.3 Phone/Voice vector attacks and defences How are Phone/Voice attacked and defended? | Chris LaBarbera | ||||
B.43 | B.4 A collection of real world incidents Some examples of Attack scenarios & real world media stories | Sean Lanzner, Maxine Most | ||||
Prevention, Defences, Countermeasures topics | ||||||
C.1 | C.1 Prevention and Countermeasures What are current Prevention & Countermeasures? | Dawid Jacobs | Emerging capabilities for detection, defence, mitigation topicsD.1 | What do Emerging defences and mitigation strategies look like and how might they evolve? | EDawid Jacobs, Jay Meier | |
Regulations, Guidelines, Recommendations | ||||||
D.1 | E.1 A Collection of regulatory materials (and public-sector-related material) What regulations and governmental discussion forums are starting to form? (Collect and Collate) - North American Primary | Denny Prvu |
...