Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

Meeting status metadata

Quorum

NOT QUORATE

Notes-Status

READY FOR REVIEW

Approved-Link

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum: QUORATE NOT QUORATE

Notes-Status: DRAFTING READY FOR REVIEW APPROVED

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

Agenda

  • Call meeting to order

  • Roll call & determination of voting participant quorum

  • Agenda bashing

  • Approval of previous minutes 2023-11-01 DeepfakesIDV DG Meeting Notes DRAFT

  • Announcements

    • Yes, we meet on Friday this week

  • Main discussion items (see table below)

    • If sufficient newcomers, a quick overview of work to date

    • Overview of AI topic area

    • Overview of telephony topic area

    • Targeted recruitment for this DG

    • Volunteers to self-assign to content areas

  • AOB

  • Adjourn meeting

\uD83D\uDC65 Attendees

Voting participants

Voter

Organization

Presence

Alastair Treharne

Beruku Identity Limited

Andrew Hughes

Ping

Present

Ashok Singal

Demystify Biometrics

Chris LaBarbera

Verizon

Present

Denny Prvu

RBC Royal Bank of Canada

Present

Iain Corby

SafetyTech Limited

Jay Meier

FaceTec, Inc.

Present

Jim Pasquale

ChasmCrossing Solutions

Jordan Burris

Socure

Julian White

Beruku

Justin Byrd

N/A

Present

Maxine Most

Acuity Market Intelligence

Present

Mike Magrath

Easy Dynamics

Present

Peter Davis

Airside Mobile, Inc

Non-Voting Participants

Participant

Organization

Presence

Dawid Jacobs

DAL Identity

Present

Heather Vescent

n/a

Present

Uttam Reddi

Aware Corp

Present

Brandon Gutierrez

Equifax

Present

James Monaghan

n/a

Present

Stephanie Schuckers

Clarkson University

Present

Dan Bachenheimer

Accenture

Present

Zarrak Khan

N/A

Present

Michael Engle

1Kosmos

Present (by AI Bot)

Guests

Participant

Organization

Presence

Quorum determination

Meeting is quorate when 50% + 1 of voting participants attend

There are <<14>> voters as of <<2023-11-08>>

Approval of Prior Minutes

Motion to approve meeting minutes listed below: (not quorate - holding over)

Moved by:

Seconded by:

Link to draft minutes and outcome

Discussion

\uD83D\uDDE3 Discussion topics

Time

Item

Presenter

Notes

Announcement: New Survey

Heather V

  • Created a survey related to the deepfakes topic

  • Intended generally for Security and Identity industry people

  • Expectation is that some of the outputs will come back into this group

  • Based on Heather’s standard survey research method

  • 1:1 interviews are possible to

  • Please take the survey and circulate to your networks

Overview of work to date (wiki)

Andrew

If many newcomers to the call

Overview of AI Topic Area

James M

  • James presents his initial thoughts on the AI topic area

  • The challenge will be to cover the “AI” topics that are relevant to the IDPV topic - don’t cover all of AI - lots of that stuff exists and isn’t that useful to us

  • Try to give people a place to hang their understanding on - e.g. the bullet about statistics → Data science → ML → AI - this is an evolutionary sequence that advances via new approaches, new technology, new names

  • https://ig.ft.com/generative-ai/

  • James will post his document to the wiki soon

  • Volunteers?

  • Heather - has analysis tools/frameworks that might be helpful

  • Dan B - there are additional core concepts that we should separate - uniqueness in a population, functional ID proofing, foundational ID Proofing, remote versus in-person IDPV

    • injection attacks (IT Security domain), Presentation attack detection (biometrics domain)

Overview of Telephony topic area

Chris L

  • Chris ran through slides about telephony and deepfakes

  • The content is posted to the wiki already - please take a look

  • Very interesting deck and topic - to detect attacks effectively is very infrastructure and cost intensive - so orgs must do a tradeoff analysis and smart sampling of suspected attacks otherwise costs are unsustainableB.3 Phone/Voice vector attacks and defences

Ideas for targeted invitations

Leads

Volunteers to self-select topic areas to join

All

✅ Open Action items

  •  

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

Task report

Looking good, no incomplete tasks.

⤴ Decisions

  • No labels