A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Pre Conference Workshops
Agenda Day 1
Post-Conference Workshops
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners

Network With Us!
Facebook

 
Register Now
agenda - Day 1: Tuesday, March 5, 2013

8:00 a.m.
Registration, Continental Breakfast & Exhibits


8:30 a.m.
Chairperson's Welcome & Speed Networking

Become acquainted with your fellow conference attendees in this fun and fast-paced forum!

Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson

  ^BACK TO TOP

9:15 a.m.
Icon
Emerging Biometrics: Future Directions In Identification Technology

Biometric sensors, and the systems incorporating them, have been in use for decades for identification, authentication, and access control. Within the U.S. criminal justice community, the mature modalities have long been friction ridge for positive and forensic identification and DNA for forensic identification. More recently, face and voice recognition has been introduced for lead generation and iris is gradually becoming important for custodial transfer applications.

It has long been known that humans display a rich, additional set of identifying signatures which have not been significantly used. Evolving mission needs, coupled with advancing technology, are causing additional biometric modalities to emerge for research and assessment today, and perhaps employment in the future. Known subject DNA analysis at the point of encounter has been under active development for several years and may see employment in a few years. The use of periocular features to enhance face matching is of active interest. The use of tattoos for lead generation appears to offer significant value. And longer term scent, electrocardiology at a distance, and even electroencephalography may well find investigative niches.

To begin your summit experience, this session will get your mind turning by delving deeper into the following areas of:

  • Human beings, through their normal day to day activities, produce and leave behind a variety of persistent identifying traces including fingerprints, DNA, scent, handwriting, images, sounds and other biometric indicators
  • “Strong biometrics”, (for example fingerprints and DNA), are sufficient by themselves to positively identify the person who deposited them
  • “Weak biometrics”, while insufficient for positive identification can be combined and used with other information to identify individuals with high likelihood
  • Advancing technology and emerging mission needs new modalities; beyond the traditional fingerprints, DNA, iris, and face images hold significant promise for identification, verification, access control, investigative and intelligence applications
  • Future trends of user centric biometrics - for the first time in history consumers are not just adopting and reacting to technology but are driving the development and marketing

James Loudermilk, Senior Level Technologist
FEDERAL BUREAU OF INVESITGATION

  ^BACK TO TOP

9:45 a.m.
Icon
How To Improve Identity Discovery Through Multimodal Fusion

A Latin American country has implemented an automated border control and credentialing solution that manages visitors and trusted travelers while identifying illegal entries. Eligible immigrants are enrolled in a workflow centric, multi-biometric system and are issued a personal identification card. The identification and enrollment fraud detection is handled by a multi-biometric identification system, handling 10-print, face, 2-iris and biographic data to improve accuracy.

This session will provide you with the necessary information to integrate multi-modal fusion into your own biometric systems allowing for an enhanced identity discovery, including how to:

  • Understand the key fundamentals of multi-modal fusion – how it works, benefits, strengths and weaknesses – through a real-world case study
  • Choose the right type of biometric system, understanding the different forms of biometric systems and their advantages/disadvantages
  • Incorporate biometrics into an end-to-end workflow centric solution for identity management
  • Understand that identity includes biometrics and biographics and how integrating biographic matching assists in identity matching

During this presentation, you will learn about a best practice for implementing a multimodal biometric system, how to avoid common pitfalls and ensure success. You will leave with practical knowledge that can be tailored to your own multi-biometrics project.

Richard Martin, Director/Identity Management Systems
CREATIVE INFORMATION TECHNOLOGIES, INC.

Tarvinder Sembhi, VP
WCC GROUP


10:15 a.m.
Icon
Your Opportunity To Ask Questions


10:25 a.m.
Icon
Morning Refreshment, Networking Break & Exhibits

  ^BACK TO TOP

10:55 a.m.
Icon
How To Modernize Your Existing Biometrics Systems

In a global information society, confirmation and management of identities is critical. Increasingly, biometrics are used to confirm that we are who we say we are. Unfortunately, some governments and businesses deploy biometric systems without careful consideration of the privacy issues that arise with their use.
 
Implementing biometric solutions to confirm identity, while protecting privacy, is not only possible but advisable to organizations at home and abroad.  The public is increasingly privacy conscious and global regulators are expanding their reach to cover the use of new technologies that implicate fundamental human rights, including privacy. By recognizing that privacy, at its core, is about the trust of people whose information an organization holds, organizations should at the outset build into biometric systems privacy considerations and protections.

The Privacy and Biometrics panel will engage experts with a broad range of opinions in a lively discussion of rights to privacy, social perception, and ethics relative to the use of biometrics.

Moderator:

Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson

Panelists:

Karl Martin, President & CEO
BIONYM INC.

Jerry Jackson, Senior Engineer/Architect, Biometrics and Identity Management
SOFTWARE ENGINEERING INSITUTE OF CARNEGIE MELLON UNIVERSITY

Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL, INC.

  ^BACK TO TOP

11:25 a.m.
Icon
How To Leverage Your Biometrics To Support The Process For Managing Identity Intelligence

The Defense Intelligence Agency (DIA) is leveraging Department of Defense (DoD) Biometrics to support the process for managing Identity Intelligence. By analyzing all of the attributes associated with an individual and leveraging the linkages to people, places, events, and locations, the DIA is able to we can develop a pattern of life and assess the threat risk associated with the individual and fully illuminate their identity. By more widely disseminating a Persons of Interest list, via the DoD Biometrically Enabled Watch List (BEWL), when a biometric match is made, the list can inform DoD entities, USG agencies, and international partners as to the nature of the individual.

As the dissemination of the BEWL expands beyond DoD, there is an effort to migrate from a simple “tier” based alert scale to a broader scale of categories. This is known as the Categorical BEWL and this watch list enables users to positively identify the person encountered and obtain additional information on the potential threat posed by that individual and “why” that individual is listed on the BEWL. Handling of the individual that has been encountered is then driven by the nature of the encounter and the authority under which the biometric screener is operating.

This forward-thinking session will provide you with insight on how your own biometric systems can be used to support the process of managing Identity Intelligence successfully, including:

  • Managing Identity Intelligence successfully
  • How to support varying Rules of Engagement
  • The technical standards established for exchange of a biometrically enabled watch list
  • Future considerations for improved distribution of a biometrically enabled watch list

Dalton Jones, Forensic, Biometrics, and Identity Intelligence Executive,
DEFENSE INTELLIGENCE AGENCY


12:05 a.m.
Icon
Your Opportunity To Ask Questions


12:15 p.m.
Lunch On Your Own -- But Not Alone!

Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific biometric hot topic. Take this opportunity to join others in a small, interactive group setting to network and brainstorm solutions to your most pressing biometric concerns.

  ^BACK TO TOP

1:35 p.m.
Icon
Group Digest: Evaluation Techniques And Minimizing Errors In Measurement

Each of you is gathering biometrics for a different reason. In your group discuss what your main objective is in your organization and what you are hoping to achieve with the use of biometrics. Explain to your group how you are measuring your findings and how you are training operators and users to ensure little to no error.


  ^BACK TO TOP

2:15 p.m.
interactive session
Leveraging Fingerprint ID To Effectively Eliminate Duplicate Records And Streamline Business Processes

Attend this presentation and learn how Prometric, the global leader in technology-enabled testing and assessment services, and the Institute for Transfusion Medicine (ITxM), the third-largest U.S. independent blood center, have implemented fingerprint identity management solutions to automate both routine and high stakes identification transactions using real-time 1-to-many search. Two very different companies, serving very different markets, each benefiting from the same customer-facing technology. Learn how they address high volume biometric enrollments; maintain flexibility in the face of privacy and regulation changes; and deploy solutions that reduce errors, and enhance convenience and security.

You’ll walk away with ideas on how to capitalize on the advantages fingerprint biometrics can provide to meet your own identity management needs and considerations to bear in mind when making decisions on the appropriate technology solution.

Eric Schulties, Vice President and Chief Information Officer
INSTITUTE FOR TRANSFUSION MEDICINE (ITxM)

Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL, INC.

  ^BACK TO TOP

2:45 p.m.
Icon
How To Implement Biometrics For Mobile Devices And Payments

The use of smartphone applications for mobile payments is on the rise. With this fast-paced adoption of new technology by a growing number of smartphone users, security is critical. Traditional methods employed by banks and secure payment providers pose usability issues on the device and providers continue to struggle with existing challenges associated with traditional authentication methods, such as passwords and one-time SMS pass codes.

While users are able to benefit from ease of use when paying for items with their mobile device, they are also exposing themselves to unique security risks in the event of loss or theft of the device itself, in addition to the risks associated with conducting secure transactions using web applications. Weighing security and user experience is an ongoing challenge as users continue to embrace the convenience of payments using mobile applications.

Delfigo Security has developed a solution to bring intelligent authentication to mobile devices, building on years of experience with authentication and security for financial applications.

This session will provide you with an understanding of the mobile applications being used to manage personal data and how accounts can be accessed quickly, with an enhanced experience for the end user, including:

  • Issues pertaining to payments which are unique to mobile devices
  • Challenges with applying traditional authentication methods with mobile payments
  • How mobile biometrics can be used easily to enhance authentication of users on mobile devices
  • Benefits of biometric authentication where your users are initiating payments on their mobile device by using payment applications

Cynthia D. Normand, CTO
NEW TECHNOLOGIES AND ASSOCIATES, INC.

Abby Porter, Director of Program Management
DELFIGO SECURITY


3:15 p.m.
Icon
Your Opportunity To Ask Questions


3:25 p.m.
Icon
Afternoon Refreshment, Networking Break & Exhibits


3:45 p.m.
interactive session
The Implementation Of Biometrics And Single Sign-On For Access To Electronic Health Records

Clark and Daughtrey Medical Group, P.A., known for its technology leadership, is a multi-specialty medical practice with over 50 physicians and other medical providers working in 25 specialized areas including primary care, cardiology and cancer. In 2006, Clark and Daughtrey implemented fingerprint biometrics and enterprise single sign-on to establish secure provider access to its system for electronic medical records. It also aimed to provide secure extranet connections to affiliated hospitals and medical providers.

Benchmark best practices with this progressive organization as you review the benefits and lessons learned of their biometric implementation, including:

  • Integration of Biometric Fingerprint to Virtual Desktop Infrastructure
  • Integration of Identity Manager into their environment, synchronizing passwords between applications
  • Easy self-enrollment process
  • Use of different fingerprint readers from different vendors with one stored fingerprint
  • Improved security with automated login to access all internal and external systems
  • Drastically reduced quantity of password-related requests for IT assistance
  • Improved speed of user login/logout
  • Meets Health Insurance Portability and Accountability Act (HIPAA) regulatory requirements with fewer steps

Nick Ivon, Director of Information Systems
CLARK AND DAUGHTREY MEDICAL GROUP, P.A.


4:15 p.m.
Icon
Your Opportunity To Ask Questions


4:25 p.m.
End Of Day One Wrap Up

  ^BACK TO TOP

4:30 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


7:00 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group. Take advantage of Miami's fine dining while you continue to network with your colleagues.

 

agenda - Day 2: Wednesday, March 6, 2013

8:00 a.m.
Continental Breakfast & Exhibits


8:30 a.m.
Chairperson Address
Chairperson's Opening & Presentation: Virtual Identity Analysis Through The VITAL Framework
Online activities can reveal a substantial amount of personal information -- individuals leave identifying data across dozens, if not hundreds of sites. While it is difficult to gain visibility into every element of an individual’s online persona, employers may be liable if employees engage in problematic online activities. This presentation will help to define the challenge, and discuss possible solutions, through the cutting edge v-ID1 database and the VITAL framework.

You'll get a glimpse at the future of the biometrics world from this top-rated leading
industry expert!

Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson

  ^BACK TO TOP

9:15 a.m.

interactive session
How To Successfully Launch A Large-Scale Biometric Implementation: Techniques, Technologies, And What To Avoid

Mandated by the Maritime Transportation Security Act of 2002, the Transportation Worker Identification Credential (TWIC) program is an ambitious government project. It has led to the issuance of interoperable and standards-based biometric smart card credentials to nearly 2 million civilian maritime workers who require unescorted access to secure areas of the U.S. maritime infrastructure - including port facilities and vessels. The TWIC program is jointly managed by the Transportation Security Administration and the U.S. Coast Guard.

In this informative session, you will get a comprehensive update on the current status of the TWIC program and plans for TWIC reader deployment, as well as key techniques and tactics to use during a large-scale biometric implementation, including:

  • The technologies and standards behind the TWIC program and the key role of biometrics
  • Lessons learned from a comprehensive pilot program for TWIC readers and what to avoid when implementing smart cards into your organization
  • The steps facility and vessel operators will need to take to upgrade their access control systems to use an automated access control system

John Schwartz, Program Manager - TWIC Program
TRANSPORTATION SECURITY ADMINISTRATION

Walter Hamilton, Sr. Consultant
IDENTIFICATION TECHNOLOGY PARTNERS

 

  ^BACK TO TOP

9:45 a.m.
Icon
Your Opportunity To Ask Questions


9:55 a.m.
Icon
Morning Networking Break & Exhibits


10:25 a.m.
Icon
Biometric Vendor Panel Debate: Your Opportunity To Compare And Contrast Different Technologies

A variety of biometric technologies will be showcased and debated in this lively session. Everyone is invited to debate the promise and reality of biometric systems. Get your questions answered in this interactive forum.

Moderator:
Samir Nanavati, Partner
IBG
Conference Chairperson

Panelists:
If Interested In This Opportunity See Sponsorship Section

  ^BACK TO TOP

10:55 a.m.
Icon
How To Validate The Viability, Performance, And Operational Effectiveness Of Multimodal Biometrics

The U.S. Department of Homeland Security (DHS) Science and Technology Directorate and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program, in partnership with the U.S. Department of Defense, National Institute of Standards and Technology, and the United States Naval Academy, initiated the Iris-Face Technical Demonstration (IFTD) and Evaluation at the United States Border Patrol (USBP) McAllen Station facility in Texas in October 2010.
 
The goal of this project was to validate the viability, performance, and operational effectiveness of iris and facial capture technology of illegal aliens apprehended and detained by USBP in McAllen. The motivation for consideration of iris in DHS applications is based on the possibility to rapidly capture an accurate biometric and to execute a rapid identification. The operational trial was conducted by USBP agents, with data collection being done alongside the current fingerprint and face image collection. Approximately five hundred persons were imaged over a two week period.

This session will provide you with a first-hand look at how to implement multimodal biometric technologies into your organization as well as a thorough examination of the possible benefits, including:

  • How you can pursue advanced multimodal biometrics—iris scans, facial recognition, and other technologies—to meet future requirements for increased reliability, efficiency, flexibility, and security, and to further improve information sharing and support increased levels of mobility and the challenges that presents
  • Why these technologies will be able to fulfill capability and performance demands we all will face in the coming decade, including functionality, availability, flexibility, scalability, and affordability
  • Ways to leverage new tools, technologies, and approaches to integrate your biometric and biographic applications into a comprehensive set of automated services
  • The adoption of compatible standards for collecting, storing, transmitting, and matching biometric data, which will ultimately result in improved security and facilitated travel worldwide

Greg Ambrose, CIO
US-VISIT, U.S. DEPARTMENT OF HOMELAND SECURITY


11:25 a.m.
Icon
Your Opportunity To Ask Questions


11:35 a.m.
Icon
Exploring A Preprocessing Methodology For Passport Photo Enhancement

This educational session will explore and discuss the problem of restoring severely degraded facial images resulting from original passport documents. Preliminary exploration on this topic shows that a pre-processing methodology is necessary to improve the overall performance of facial recognition.

The contributions of this work are two-fold:

  1. To explore alternative pre-processing schemes to perform restoration of passport photos
  2. Experimental studies to show how the pre-processing schemes perform when compared to baseline image restoration methods

From this session, you will gain an understanding in how to enhance and restore photos that have damaged or degraded facial imagines, including how:

  • Image pre-processing can be used to de-noise and eliminate watermark traces that may be present in scanned passport photos
  • The application of such a pre-processing scheme is observed to affect the performance of face matching between good quality face images (ground truth) and restored passport face photos

Dr. Antwan Clark, Professor
RENSSELAER POLYTECHNIC INSTITUTE

Thirimachos Bourlai, Assistant Professor
WEST VIRGINIA UNIVERSITY


12:05 p.m.
Icon
Your Opportunity To Ask Questions


12:10 p.m.
Lunch On Your Own -- But Not Alone!

Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific biometric hot topic. Take this opportunity to join others in a small, interactive group setting to network and brainstorm solutions to your most pressing biometric concerns.

  ^BACK TO TOP
1:40 p.m.

Group Discussion: Using The Cloud To Securely And Efficiently Share Identification Information

Through the use of the cloud the sharing of secure information across departments in organizations has been improved. During this group discussion you will address the challenges of security when dealing with the cloud and brainstorm solutions to overcome them. Discuss what obstacles you have, or may, run into if you were to integrate the use of the cloud in your organization.

  ^BACK TO TOP

2:10 p.m.
Icon
Successful Ways To Combine Multiple Technologies With Biometrics To Achieve The Greatest ROI

Like all companies, Citigroup is consistently challenged to lower costs, while simultaneously obtaining the highest levels of ROI in all endeavors. Citigroup Security and Investigation Services (CSIS) has been challenged to meet this ever-changing financial environment as well. While ensuring that risk profiles did not diminish, CSIS set out to obtain a lower operating cost impact, while enhancing the reliability of the functional security aspects.

By taking advantage of several technologies, CSIS has maintained a high standard for securing our Citigroup’s perimeters, while significantly lowering their operating expenses. This has been accomplished with little “negative” impact to the operating business units, while ensuring that their employee safety and corporate environment remain at a peak level of risk mitigation.

This blending of functional aspects also had a significant “human acceptance” element. By providing reliable equipment, zero tolerance for mis-verifications, a strong auditable reporting function and ease of employee understanding and utilization, significant barriers were overcome.

This session will review the necessary steps needed to successfully combine your current technologies with biometrics, including:

  • Methodology to ensure cost savings in your organization
  • Ways to ensure you achieve long-term ROI that your organization can recognize

Rudy Wolter, Director CSIS North America Security and Investigations
CITIGROUP INC.


2:40 p.m.
Icon
Your Opportunity To Ask Questions


2:45 p.m.
Icon
Afternoon Networking Break & Exhibits

  ^BACK TO TOP

3:10 p.m.
Icon
Where Mobile Innovation Meets Security Evolution: BYOD(evice) Trends And The Evolving Mobile Workforce

The mobile ecosystem is expanding at lightning speed, with endless innovation and new applications of mobile technology.  From contactless payments and augmented reality to embedded devices and connected cities, mobile technology is changing the landscape. The impact mobile has on the world may be limitless, but with this we are facing new and sometimes unprecedented security concerns regarding how we keep up with this evolution and consistently have security solutions in place. The risks can limit the potential offered by mobile solutions.

In this session, you will learn about the latest trends and technologies in mobile innovation as it relates to the expanding mobile workforce, and how you too can consider using mobile technology to increase efficiency and productivity, including: 

  • Key ways this new trend is allowing organizations to increase their efficiency and productivity
  • Primary security concerns that are involved with enabling excessive amounts of personal data readily available and accessible on mobile devices
  • How smart phone smart casings with built-in smart card and fingerprint readers are addressing the BYOD concerns in the commercial and government space
  • How to create security solutions that address security concerns

Sriram Krishnan,Senior Director of Special Markets
GOOD TECHNOLOGY

Michael Harris, CTO
PRECISE BIOMETRICS

  ^BACK TO TOP
3:40 p.m.

How To Deploy Biometric Applications In A Variety Of Environments As Well As Prepare And Overcome Privacy Concerns That Arise In The Collection Of Biometric Data

As part of the Fujitsu Group, Fujitsu Frontech delivers a wide range of biometric solutions that incorporate Fujitsu's palm vein authentication technology. Unlike other biometric identification, Fujitsu’s PalmSecure™ technology is a unique biometric solution that utilizes contactless, non-traceable and non-shareable authentication to deliver unmatched security and privacy with extremely low false rates that is virtually impossible to forge.

In this session you will discover how PalmSecure is successfully deployed in schools across the United States in Physical Access and cafeteria applications. K through 12 and universities have seen measurable results by implementing school districts nationwide now can quickly, efficiently and accurately serve tens of thousands of students daily.

You will leave this session with a better understanding of how to integrate the use of vein authentication technology into your organization successfully as well as the benefits of doing so, including:

  • Challenges to prepare for and overcome including privacy concerns and objections raised by parents and communities on collection of biometric data
  • How to successfully deploy biometrics in applications in a variety of environments; from Kindergarten to Universities

Art Dunham, Director School Food Service
PINELLAS COUNTY SCHOOLS, FLORIDA

Charles “Bud” Yanak, Director Product Management & Partner Development
FUJITSU FRONTECH NORTH AMERICA


4:20 p.m.
Icon
Your Opportunity To Ask Questions


4:30 p.m.
Chairperson's Recap:
Key Takeaways And What To Do When You Get Back To The Office

We'll recap the highlights of the past two days and ask you to share key insights and next steps with the group.

Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson


4:45 p.m.
Close Of General Sessions

Make the most of your time out of the office.
Attend your choice of our hands-on workshops.

Pre-Conference Workshops: March 4, 2013
Post-Conference Workshops: March 7, 2013

  ^BACK TO TOP
Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Pre-Conference WorkshopsGeneral SessionsPost-Conference Workshops
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure

 

Upcoming ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2013 Advanced Learning Institute Inc. All Rights Reserved
1301 W. 22nd Street, Suite 809, Oak Brook, IL 60523 • Phone: 773-695-9400 • Fax: 630-568-3956