Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

Please reach out to topic area leader if you wish to participate/contribute/learn there - use the mailing list or at a meeting

Note

NB: Must include citations to sources! References with no citations cannot be used!

{BOLD = Leader; Bulleted = Contributor}

Core concepts topics

A.1

Core concepts: A.1 Glossaries & core concepts

Jay Meier

A.2

Core concepts: A.2 ID Proofing and Verification Systems - Overall

Andrew Hughes

A.3

Core concepts: “AI” - Overall (A.3 Artificial Intelligence - in the context of IDPV Systems)

James Monaghan

A.4

Core concepts: simulated humans, synthetic identity (assumptions, explanations)  A.4 Simulated humans and synthetic identity - context

Heather Vescent

Attacks & Threats topics

B.1

B.1 Current threats and attack vectors

What are the current Attack vectors & threats?

Jay Meier

  • Denny Prvu

  • Max Most

B.2

B.2 Hacker motivations

What are hacker motivations (social engineering), payloads.

Heather Vescent

B.3

B.3 Phone/Voice vector attacks and defences

How are Phone/Voice attacked and defended?

Chris LaBarbera

B.4

B.4 A collection of real world incidents

Some examples of Attack scenarios & real world media stories

  • Jay Meier

  • Denny Prvu

  • Max Most

  • Mike Magrath

Prevention, Defences, Countermeasures topics

C.1

C.1 Prevention and Countermeasures

What are current Prevention & Countermeasures?

Dawid Jacobs

Emerging capabilities for detection, defence, mitigation topics

D.1

What do Emerging defences and mitigation strategies look like and how might they evolve?

E.1

E.1 A Collection of regulatory materials

What regulations and governmental discussion forums are starting to form? (Collect and Collate)

Denny Prvu

  • Peter Davis

  • Mike Magrath

...