Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Page Properties
idmeeting-status-metadata

Quorum

Status
colourYellow
titlenot quorate

Notes-Status

Status
colourGreen
titleapproved

Approved-Link

2023-10-11 DeepfakesIDV DG Meeting Notes DRAFT

Info

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum:

Status
colourGreen
titlequorate
Status
colourYellow
titlenot quorate

Notes-Status:

Status
titledrafting
Status
colourBlue
titleReady for review
Status
colourGreen
titleapproved

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

...

Motion to approve meeting minutes listed below:

Moved by:

Seconded by:

Link to draft minutes and outcome

Discussion

No quorum on today’s call.

\uD83D\uDDE3 Discussion topics

...

Time

Item

Presenter

Notes

5 min

New weekly meeting schedule

Andrew

  • Wednesdays 12:00pm Eastern and Fridays 10:00am Eastern are top picks with greatest coverage

  • How to handle notes and quorum?

  • Andrew Proposes: change to 2 call times per week

    • One meeting will be “official” and the other will be “informal”

  • Begin the ‘2 meetings’ pattern next week

  • Monitor how it’s going every few weeks

  •  ACTION: Andrew to send out new meeting invitation information to the list for 2-per-week calls

10 min

“Success Headline” review

Defer to future meeting - ensure reminder goes out in advance

10 min

Mind map review

Discussion about whether the current map is 'good enough' to begin the work

25 min

Topic leaders discussion

Offers:

Dawid - Countermeasures (Prevention)

Chris - Phone network attacks

Maxine - Strategic marketing

Jay - Glossary/terminology

Heather - hacker motivations (social engineering), payloads, simulated humans, synthetic identity

Andrew poses these questions based on the mind map:

<<>> What are ID Proofing and ID Verification and how do the services work?

<<>> What is AI in the context of human simulations and ID Verification and how does it work?

<<>> How are attack attempts done today against the most common ID Verification mechanisms? (non-AI and AI)

<<>> What attacks will be possible or more threatening in the future?

...