...
Page Properties | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
|
Info | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions: Quorum:
Notes-Status:
Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page |
...
Motion to approve meeting minutes listed below:
Moved by:
Seconded by:
Link to draft minutes and outcome | Discussion |
---|---|
No quorum on today’s call. |
\uD83D\uDDE3 Discussion topics
...
Time | Item | Presenter | Notes |
---|---|---|---|
5 min | New weekly meeting schedule | Andrew |
|
10 min | “Success Headline” review | Defer to future meeting - ensure reminder goes out in advance | |
10 min | Mind map review | Discussion about whether the current map is 'good enough' to begin the work | |
25 min | Topic leaders discussion | Offers: Dawid - Countermeasures (Prevention) Chris - Phone network attacks Maxine - Strategic marketing Jay - Glossary/terminology Heather - hacker motivations (social engineering), payloads, simulated humans, synthetic identity Andrew poses these questions based on the mind map: <<>> What are ID Proofing and ID Verification and how do the services work? <<>> What is AI in the context of human simulations and ID Verification and how does it work? <<>> How are attack attempts done today against the most common ID Verification mechanisms? (non-AI and AI) <<>> What attacks will be possible or more threatening in the future? |
...