...
Core concepts topics | ||
A.1 | Core concepts: A.1 Glossaries & core concepts | Jay Meier |
A.2 | Core concepts: A.2 ID Proofing and Verification Systems - Overall | Andrew Hughes, Jay Meier, Isha Chhatwal, Julian White, Mike Magrath |
A.3 | Core concepts: A.3 Artificial Intelligence - in the context of IDPV Systems | James Monaghan |
A.4 | Core concepts: A.4 Simulated humans and synthetic identity - context | Heather Vescent |
Attacks & Threats topics | ||
B.1 | B.1 Current threats and attack vectors What are the current Attack vectors & threats? | Jay Meier
|
B.2 | What are hacker motivations (social engineering), payloads. | Heather Vescent |
B.3 | B.3 Phone/Voice vector attacks and defences How are Phone/Voice attacked and defended? | Chris LaBarbera |
B.4 | B.4 A collection of real world incidents Some examples of Attack scenarios & real world media stories |
|
Prevention, Defences, Countermeasures topics | ||
C.1 | C.1 Prevention and Countermeasures What are current Prevention & Countermeasures? | Dawid Jacobs |
Emerging capabilities for detection, defence, mitigation topics | ||
D.1 | What do Emerging defences and mitigation strategies look like and how might they evolve? | |
E.1 | E.1 A Collection of regulatory materials What regulations and governmental discussion forums are starting to form? (Collect and Collate) | Denny Prvu
|
...