Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Time

Item

Presenter

Notes

Highlights of leadership planning meeting

Andrew

  • For each content area leader - have other DG participants ‘sign up’

  • Each content area to decide how to approach collecting a knowledge base and writing a draft for “baseline” content

    • NB: Knowledge base must form the basis for cited references!

  • Max offers to coach content area leaders in approaches and ideas

  • Need a more solid description of what problem we are trying to solve

    • Pitch towards purchasers of IDPV, evaluators of IDPV, business operators of IDPV

    • “We will provide information and understanding that empowers ‘buyers’ to identify what problems they can solve with IDPV, how to choose between systems/features, what outcomes they can expect, data protection risks of biometric data (and the threshold-based nature of biometric data), and how to approach integration into existing operations.”

Discuss first rough drafts of “explainer text”

Andrew

  • Andrew showed the first cut draft text for “IDPV System” and explained that this is a trial balloon to test whether the group feels that this level of description is valuable to advance our mission or whether a different level for the baseline is needed

  • Generally positive reactions in the group

  • There is an underlying assumption that the target audience is from the “identity” community - this might be improved by considering target audiences from the “IT security” community as well - they may not be aware of IDPV

    • e.g. use the visuals and structures that the target community normally uses to express this material (e.g. attach chains, value chains)

Shift to discussion about segmentation and audiences

  •  Max to do a high level process diagram on how to ‘research’ and gather information
  • Think of what pre-conceived assumptions we bring

Topic area assignments (Topic Area Content Pages for full list):

  • Jay to start writing conceptual descriptions of the core concepts
  • Andrew to take IDPV (what it it, how it works today, current attack/threat vectors, current countermeasures, how does widely-adopted AI accelerate current attacks or create new attacks)
  • James M to take AI topic area
  • Heather - (Andrew to find prior notes on this)Hacker motivations (social engineering), payloads, simulated humans, synthetic identity

✅ Open Action items

  •  
Info

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

...