|
|
8:00 a.m.
Registration, Continental Breakfast & Exhibits
8:30 a.m.
Chairperson's Welcome & Speed Networking
Become acquainted with your fellow conference attendees in this fun and fast-paced forum!
Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson
|
^BACK TO TOP |
9:15 a.m.
Emerging Biometrics: Future Directions In Identification Technology
Biometric sensors, and the systems incorporating them, have been in use for decades for identification, authentication, and access control. Within the U.S. criminal justice community, the mature modalities have long been friction ridge for positive and forensic identification and DNA for forensic identification. More recently, face and voice recognition has been introduced for lead generation and iris is gradually becoming important for custodial transfer applications.
It has long been known that humans display a rich, additional set of identifying signatures which have not been significantly used. Evolving mission needs, coupled with advancing technology, are causing additional biometric modalities to emerge for research and assessment today, and perhaps employment in the future. Known subject DNA analysis at the point of encounter has been under active development for several years and may see employment in a few years. The use of periocular features to enhance face matching is of active interest. The use of tattoos for lead generation appears to offer significant value. And longer term scent, electrocardiology at a distance, and even electroencephalography may well find investigative niches.
To begin your summit experience, this session will get your mind turning by delving deeper into the following areas of:
- Human beings, through their normal day to day activities, produce and leave behind a variety of persistent identifying traces including fingerprints, DNA, scent, handwriting, images, sounds and other biometric indicators
- “Strong biometrics”, (for example fingerprints and DNA), are sufficient by themselves to positively identify the person who deposited them
- “Weak biometrics”, while insufficient for positive identification can be combined and used with other information to identify individuals with high likelihood
- Advancing technology and emerging mission needs new modalities; beyond the traditional fingerprints, DNA, iris, and face images hold significant promise for identification, verification, access control, investigative and intelligence applications
- Future trends of user centric biometrics - for the first time in history consumers are not just adopting and reacting to technology but are driving the development and marketing
James Loudermilk, Senior Level Technologist
FEDERAL BUREAU OF INVESITGATION |
^BACK TO TOP |
9:45 a.m.
How To Improve Identity Discovery Through Multimodal Fusion
A Latin American country has implemented an automated border control and credentialing solution that manages visitors and trusted travelers while identifying illegal entries. Eligible immigrants are enrolled in a workflow centric, multi-biometric system and are issued a personal identification card. The identification and enrollment fraud detection is handled by a multi-biometric identification system, handling 10-print, face, 2-iris and biographic data to improve accuracy.
This session will provide you with the necessary information to integrate multi-modal fusion into your own biometric systems allowing for an enhanced identity discovery, including how to:
- Understand the key fundamentals of multi-modal fusion – how it works, benefits, strengths and weaknesses – through a real-world case study
- Choose the right type of biometric system, understanding the different forms of biometric systems and their advantages/disadvantages
- Incorporate biometrics into an end-to-end workflow centric solution for identity management
- Understand that identity includes biometrics and biographics and how integrating biographic matching assists in identity matching
During this presentation, you will learn about a best practice for implementing a multimodal biometric system, how to avoid common pitfalls and ensure success. You will leave with practical knowledge that can be tailored to your own multi-biometrics project.
Richard Martin, Director/Identity Management Systems
CREATIVE INFORMATION TECHNOLOGIES, INC.
Tarvinder Sembhi, VP
WCC GROUP
10:15 a.m.
Your Opportunity To Ask Questions
10:25 a.m.
Morning Refreshment, Networking Break & Exhibits |
^BACK TO TOP |
10:55 a.m.
How To Modernize Your Existing Biometrics Systems
In a global information society, confirmation and management of identities is critical. Increasingly, biometrics are used to confirm that we are who we say we are. Unfortunately, some governments and businesses deploy biometric systems without careful consideration of the privacy issues that arise with their use.
Implementing biometric solutions to confirm identity, while protecting privacy, is not only possible but advisable to organizations at home and abroad. The public is increasingly privacy conscious and global regulators are expanding their reach to cover the use of new technologies that implicate fundamental human rights, including privacy. By recognizing that privacy, at its core, is about the trust of people whose information an organization holds, organizations should at the outset build into biometric systems privacy considerations and protections.
The Privacy and Biometrics panel will engage experts with a broad range of opinions in a lively discussion of rights to privacy, social perception, and ethics relative to the use of biometrics.
Moderator:
Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson
Panelists:
Karl Martin, President & CEO
BIONYM INC.
Jerry Jackson, Senior Engineer/Architect, Biometrics and Identity Management
SOFTWARE ENGINEERING INSITUTE OF CARNEGIE MELLON UNIVERSITY
Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL, INC.
|
^BACK TO TOP |
11:25 a.m.
How To Leverage Your Biometrics To Support The Process For Managing Identity Intelligence
The Defense Intelligence Agency (DIA) is leveraging Department of Defense (DoD) Biometrics to support the process for managing Identity Intelligence. By analyzing all of the attributes associated with an individual and leveraging the linkages to people, places, events, and locations, the DIA is able to we can develop a pattern of life and assess the threat risk associated with the individual and fully illuminate their identity. By more widely disseminating a Persons of Interest list, via the DoD Biometrically Enabled Watch List (BEWL), when a biometric match is made, the list can inform DoD entities, USG agencies, and international partners as to the nature of the individual.
As the dissemination of the BEWL expands beyond DoD, there is an effort to migrate from a simple “tier” based alert scale to a broader scale of categories. This is known as the Categorical BEWL and this watch list enables users to positively identify the person encountered and obtain additional information on the potential threat posed by that individual and “why” that individual is listed on the BEWL. Handling of the individual that has been encountered is then driven by the nature of the encounter and the authority under which the biometric screener is operating.
This forward-thinking session will provide you with insight on how your own biometric systems can be used to support the process of managing Identity Intelligence successfully, including:
- Managing Identity Intelligence successfully
- How to support varying Rules of Engagement
- The technical standards established for exchange of a biometrically enabled watch list
- Future considerations for improved distribution of a biometrically enabled watch list
Dalton Jones, Forensic, Biometrics, and Identity Intelligence Executive,
DEFENSE INTELLIGENCE AGENCY
12:05 a.m.
Your Opportunity To Ask Questions
12:15 p.m.
Lunch On Your Own -- But Not Alone!
Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific biometric hot topic. Take this opportunity to join others in a small, interactive group setting to network and brainstorm solutions to your most pressing biometric concerns. |
^BACK TO TOP |
1:35 p.m.
Group Digest: Evaluation Techniques And Minimizing Errors In Measurement
Each of you is gathering biometrics for a different reason. In your group discuss what your main objective is in your organization and what you are hoping to achieve with the use of biometrics. Explain to your group how you are measuring your findings and how you are training operators and users to ensure little to no error.
|
^BACK TO TOP |
2:15 p.m.
Leveraging Fingerprint ID To Effectively Eliminate Duplicate Records And Streamline Business Processes
Attend this presentation and learn how Prometric, the global leader in technology-enabled testing and assessment services, and the Institute for Transfusion Medicine (ITxM), the third-largest U.S. independent blood center, have implemented fingerprint identity management solutions to automate both routine and high stakes identification transactions using real-time 1-to-many search. Two very different companies, serving very different markets, each benefiting from the same customer-facing technology. Learn how they address high volume biometric enrollments; maintain flexibility in the face of privacy and regulation changes; and deploy solutions that reduce errors, and enhance convenience and security.
You’ll walk away with ideas on how to capitalize on the advantages fingerprint biometrics can provide to meet your own identity management needs and considerations to bear in mind when making decisions on the appropriate technology solution.
Eric Schulties, Vice President and Chief Information Officer
INSTITUTE FOR TRANSFUSION MEDICINE (ITxM)
Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL, INC. |
^BACK TO TOP |
2:45 p.m.
How To Implement Biometrics For Mobile Devices And Payments
The use of smartphone applications for mobile payments is on the rise. With this fast-paced adoption of new technology by a growing number of smartphone users, security is critical. Traditional methods employed by banks and secure payment providers pose usability issues on the device and providers continue to struggle with existing challenges associated with traditional authentication methods, such as passwords and one-time SMS pass codes.
While users are able to benefit from ease of use when paying for items with their mobile device, they are also exposing themselves to unique security risks in the event of loss or theft of the device itself, in addition to the risks associated with conducting secure transactions using web applications. Weighing security and user experience is an ongoing challenge as users continue to embrace the convenience of payments using mobile applications.
Delfigo Security has developed a solution to bring intelligent authentication to mobile devices, building on years of experience with authentication and security for financial applications.
This session will provide you with an understanding of the mobile applications being used to manage personal data and how accounts can be accessed quickly, with an enhanced experience for the end user, including:
- Issues pertaining to payments which are unique to mobile devices
- Challenges with applying traditional authentication methods with mobile payments
- How mobile biometrics can be used easily to enhance authentication of users on mobile devices
- Benefits of biometric authentication where your users are initiating payments on their mobile device by using payment applications
Cynthia D. Normand, CTO
NEW TECHNOLOGIES AND ASSOCIATES, INC.
Abby Porter, Director of Program Management
DELFIGO SECURITY
3:15 p.m.
Your Opportunity To Ask Questions
3:25 p.m.
Afternoon Refreshment, Networking Break & Exhibits
3:45 p.m.
The Implementation Of Biometrics And Single Sign-On For Access To Electronic Health Records
Clark and Daughtrey Medical Group, P.A., known for its technology leadership, is a multi-specialty medical practice with over 50 physicians and other medical providers working in 25 specialized areas including primary care, cardiology and cancer. In 2006, Clark and Daughtrey implemented fingerprint biometrics and enterprise single sign-on to establish secure provider access to its system for electronic medical records. It also aimed to provide secure extranet connections to affiliated hospitals and medical providers.
Benchmark best practices with this progressive organization as you review the benefits and lessons learned of their biometric implementation, including:
- Integration of Biometric Fingerprint to Virtual Desktop Infrastructure
- Integration of Identity Manager into their environment, synchronizing passwords between applications
- Easy self-enrollment process
- Use of different fingerprint readers from different vendors with one stored fingerprint
- Improved security with automated login to access all internal and external systems
- Drastically reduced quantity of password-related requests for IT assistance
- Improved speed of user login/logout
- Meets Health Insurance Portability and Accountability Act (HIPAA) regulatory requirements with fewer steps
Nick Ivon, Director of Information Systems
CLARK AND DAUGHTREY MEDICAL GROUP, P.A.
4:15 p.m.
Your Opportunity To Ask Questions
4:25 p.m.
End Of Day One Wrap Up |
^BACK TO TOP |
4:30 p.m.
Networking Reception: Please Join Us!
We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!
|
7:00 p.m.
Dine Around
Sign up during the day for dinner with a group. Take advantage of Miami's fine dining while you continue to network with your colleagues.
|
8:00 a.m.
Continental Breakfast & Exhibits
8:30 a.m.
Chairperson's Opening & Presentation:
Virtual Identity Analysis Through The VITAL Framework
Online activities can reveal a substantial amount of personal information -- individuals leave identifying data across dozens, if not hundreds of sites. While it is difficult to gain visibility into every element of an individual’s online persona, employers may be liable if employees engage in problematic online activities. This presentation will help to define the challenge, and discuss possible solutions, through the cutting edge v-ID1 database and the VITAL framework.
You'll get a glimpse at the future of the biometrics world from this top-rated leading
industry expert!
Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson
|
^BACK TO TOP |
9:15 a.m.
How To Successfully Launch A Large-Scale Biometric Implementation: Techniques, Technologies, And What To Avoid
Mandated by the Maritime Transportation Security Act of 2002, the Transportation Worker Identification Credential (TWIC) program is an ambitious government project. It has led to the issuance of interoperable and standards-based biometric smart card credentials to nearly 2 million civilian maritime workers who require unescorted access to secure areas of the U.S. maritime infrastructure - including port facilities and vessels. The TWIC program is jointly managed by the Transportation Security Administration and the U.S. Coast Guard.
In this informative session, you will get a comprehensive update on the current status of the TWIC program and plans for TWIC reader deployment, as well as key techniques and tactics to use during a large-scale biometric implementation, including:
- The technologies and standards behind the TWIC program and the key role of biometrics
- Lessons learned from a comprehensive pilot program for TWIC readers and what to avoid when implementing smart cards into your organization
- The steps facility and vessel operators will need to take to upgrade their access control systems to use an automated access control system
John Schwartz, Program Manager - TWIC Program
TRANSPORTATION SECURITY ADMINISTRATION
Walter Hamilton, Sr. Consultant
IDENTIFICATION TECHNOLOGY PARTNERS
|
^BACK TO TOP |
9:45 a.m.
Your Opportunity To Ask Questions
9:55
a.m.
Morning Networking Break & Exhibits
|
10:25 a.m.
Biometric Vendor Panel Debate: Your Opportunity To Compare And Contrast Different Technologies
A variety of biometric technologies will be showcased and debated in this lively session. Everyone is invited to debate the promise and reality of biometric systems. Get your questions answered in this interactive forum.
Moderator:
Samir Nanavati, Partner
IBG
Conference Chairperson
Panelists:
If Interested In This Opportunity See Sponsorship Section |
^BACK TO TOP |
10:55 a.m.
How To Validate The Viability, Performance, And Operational Effectiveness Of Multimodal Biometrics
The U.S. Department of Homeland Security (DHS) Science and Technology Directorate and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program, in partnership with the U.S. Department of Defense, National Institute of Standards and Technology, and the United States Naval Academy, initiated the Iris-Face Technical Demonstration (IFTD) and Evaluation at the United States Border Patrol (USBP) McAllen Station facility in Texas in October 2010.
The goal of this project was to validate the viability, performance, and operational effectiveness of iris and facial capture technology of illegal aliens apprehended and detained by USBP in McAllen. The motivation for consideration of iris in DHS applications is based on the possibility to rapidly capture an accurate biometric and to execute a rapid identification. The operational trial was conducted by USBP agents, with data collection being done alongside the current fingerprint and face image collection. Approximately five hundred persons were imaged over a two week period.
This session will provide you with a first-hand look at how to implement multimodal biometric technologies into your organization as well as a thorough examination of the possible benefits, including:
- How you can pursue advanced multimodal biometrics—iris scans, facial recognition, and other technologies—to meet future requirements for increased reliability, efficiency, flexibility, and security, and to further improve information sharing and support increased levels of mobility and the challenges that presents
- Why these technologies will be able to fulfill capability and performance demands we all will face in the coming decade, including functionality, availability, flexibility, scalability, and affordability
- Ways to leverage new tools, technologies, and approaches to integrate your biometric and biographic applications into a comprehensive set of automated services
- The adoption of compatible standards for collecting, storing, transmitting, and matching biometric data, which will ultimately result in improved security and facilitated travel worldwide
Greg Ambrose, CIO
US-VISIT, U.S. DEPARTMENT OF HOMELAND SECURITY
11:25 a.m.
Your Opportunity To Ask Questions
11:35 a.m.
Exploring A Preprocessing Methodology For Passport Photo Enhancement
This educational session will explore and discuss the problem of restoring severely degraded facial images resulting from original passport documents. Preliminary exploration on this topic shows that a pre-processing methodology is necessary to improve the overall performance of facial recognition.
The contributions of this work are two-fold:
- To explore alternative pre-processing schemes to perform restoration of passport photos
- Experimental studies to show how the pre-processing schemes perform when compared to baseline image restoration methods
From this session, you will gain an understanding in how to enhance and restore photos that have damaged or degraded facial imagines, including how:
- Image pre-processing can be used to de-noise and eliminate watermark traces that may be present in scanned passport photos
- The application of such a pre-processing scheme is observed to affect the performance of face matching between good quality face images (ground truth) and restored passport face photos
Dr. Antwan Clark, Professor
RENSSELAER POLYTECHNIC INSTITUTE
Thirimachos Bourlai, Assistant Professor
WEST VIRGINIA UNIVERSITY
12:05 p.m.
Your Opportunity To Ask Questions
12:10
p.m.
Lunch On Your Own -- But Not Alone!
Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific biometric hot topic. Take this opportunity to join others in a small, interactive group setting to network and brainstorm solutions to your most pressing biometric concerns.
|
^BACK TO TOP |
1:40
p.m.
Group Discussion: Using The Cloud To Securely And Efficiently Share Identification Information
Through the use of the cloud the sharing of secure information across departments in organizations has been improved. During this group discussion you will address the challenges of security when dealing with the cloud and brainstorm solutions to overcome them. Discuss what obstacles you have, or may, run into if you were to integrate the use of the cloud in your organization. |
^BACK TO TOP |
2:10 p.m.
Successful Ways To Combine Multiple Technologies With Biometrics To Achieve The Greatest ROI
Like all companies, Citigroup is consistently challenged to lower costs, while simultaneously obtaining the highest levels of ROI in all endeavors. Citigroup Security and Investigation Services (CSIS) has been challenged to meet this ever-changing financial environment as well. While ensuring that risk profiles did not diminish, CSIS set out to obtain a lower operating cost impact, while enhancing the reliability of the functional security aspects.
By taking advantage of several technologies, CSIS has maintained a high standard for securing our Citigroup’s perimeters, while significantly lowering their operating expenses. This has been accomplished with little “negative” impact to the operating business units, while ensuring that their employee safety and corporate environment remain at a peak level of risk mitigation.
This blending of functional aspects also had a significant “human acceptance” element. By providing reliable equipment, zero tolerance for mis-verifications, a strong auditable reporting function and ease of employee understanding and utilization, significant barriers were overcome.
This session will review the necessary steps needed to successfully combine your current technologies with biometrics, including:
- Methodology to ensure cost savings in your organization
- Ways to ensure you achieve long-term ROI that your organization can recognize
Rudy Wolter, Director CSIS North America Security and Investigations
CITIGROUP INC.
2:40 p.m.
Your Opportunity To Ask Questions
2:45
p.m.
Afternoon Networking Break & Exhibits |
^BACK TO TOP |
3:10 p.m.
Where Mobile Innovation Meets Security Evolution:
BYOD(evice) Trends And The Evolving Mobile Workforce
The mobile ecosystem is expanding at lightning speed, with endless innovation and new applications of mobile technology. From contactless payments and augmented reality to embedded devices and connected cities, mobile technology is changing the landscape. The impact mobile has on the world may be limitless, but with this we are facing new and sometimes unprecedented security concerns regarding how we keep up with this evolution and consistently have security solutions in place. The risks can limit the potential offered by mobile solutions.
In this session, you will learn about the latest trends and technologies in mobile innovation as it relates to the expanding mobile workforce, and how you too can consider using mobile technology to increase efficiency and productivity, including:
- Key ways this new trend is allowing organizations to increase their efficiency and productivity
- Primary security concerns that are involved with enabling excessive amounts of personal data readily available and accessible on mobile devices
- How smart phone smart casings with built-in smart card and fingerprint readers are addressing the BYOD concerns in the commercial and government space
- How to create security solutions that address security concerns
Sriram Krishnan,Senior Director of Special Markets
GOOD TECHNOLOGY
Michael Harris, CTO
PRECISE BIOMETRICS |
^BACK TO TOP |
3:40
p.m.
How To Deploy Biometric Applications In A Variety Of Environments As Well As Prepare And Overcome Privacy Concerns That Arise In The Collection Of Biometric Data
As part of the Fujitsu Group, Fujitsu Frontech delivers a wide range of biometric solutions that incorporate Fujitsu's palm vein authentication technology. Unlike other biometric identification, Fujitsu’s PalmSecure™ technology is a unique biometric solution that utilizes contactless, non-traceable and non-shareable authentication to deliver unmatched security and privacy with extremely low false rates that is virtually impossible to forge.
In this session you will discover how PalmSecure is successfully deployed in schools across the United States in Physical Access and cafeteria applications. K through 12 and universities have seen measurable results by implementing school districts nationwide now can quickly, efficiently and accurately serve tens of thousands of students daily.
You will leave this session with a better understanding of how to integrate the use of vein authentication technology into your organization successfully as well as the benefits of doing so, including:
- Challenges to prepare for and overcome including privacy concerns and objections raised by parents and communities on collection of biometric data
- How to successfully deploy biometrics in applications in a variety of environments; from Kindergarten to Universities
Art Dunham, Director School Food Service
PINELLAS COUNTY SCHOOLS, FLORIDA
Charles “Bud” Yanak, Director Product Management & Partner Development
FUJITSU FRONTECH NORTH AMERICA
4:20 p.m.
Your Opportunity To Ask Questions
|
4:30
p.m.
Chairperson's Recap:
Key Takeaways And What To Do When You Get Back To The Office
We'll recap the highlights of the past two days and ask you to share key insights and next steps with the group.
Samir Nanavati, Senior Vice President
IBG, A Novetta Solutions Company
Conference Chairperson
4:45 p.m.
Close Of General Sessions
Make the most of your time out of the office.
Attend your choice of our hands-on workshops.
Pre-Conference Workshops: March 4, 2013
Post-Conference Workshops: March 7, 2013 |
^BACK TO TOP |
Speakers & Key Highlights • Who Will Attend • Benefits of Attending • Rave Reviews
Pre-Conference Workshops • General Sessions • Post-Conference Workshops
Venue & Lodging • Registration Fees • Discounts & Policies • Conference Supporters
Register Now • Forward To A Colleague |
|
|
|