A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Pre-Conference Workshop
Agenda Day 1
Agenda Day 2
Post-Conference Workshop
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners
 
Register Now
agenda - Day 1: Tuesday, October 30, 2007

7:45 a.m.
Registration, Continental Breakfast & Exhibits


8:15 a.m.
Icon
Chairperson's Welcome & Presentation:
An Update On The Vulnerabilities Of Biometric Systems To Spoofing

During this interesting and informative session, you'll hear about International Biometric Group's latest project, Spoof 2007. Specifically, you will learn about a plan to address an often overlooked vulnerability of biometrics, spoofing. Particular highlights will include:
  • Why spoof analysis in addition to traditional performance testing is necessary
  • Review of some common spoofs
  • Spoofing from the deployment and development perspective
  • A look at Spoof 2007, IBG's latest contribution to the field of biometric testing

Samir Nanavati, Partner
INTERNATIONAL BIOMETRIC GROUP
Conference Chairperson

  ^BACK TO TOP

9:15 a.m.
Icon
Speed Networking

Meet your colleagues in this fun and fast-paced forum! You'll have a chance to meet and greet your fellow attendees.

  ^BACK TO TOP
9:45 a.m.
Icon
Morning Networking Break & Exhibits

10:15 a.m.
Icon
How Hand Geometry Helped Secure William Beaumont Hospital:
From Initial Consideration Through 10 Years Of Operations

William Beaumont Hospital began using hand geometry in 1994 as a pilot to determine if it was user friendly and simple in operation. Their findings were very positive and the hospital proceeded to implement additional hand readers to better secure their narcotics. This case study will cover the rational for initial consideration of the program and initial infrastructure necessary for the operation. Hear the practical lessons learned during the 10 plus year rollout of this biometric system including enrollment issues and results to date. Finally, some simple maintenance tips for ensuring the units remain operational will be addressed.

Additionally, integrating biometrics into an overall access control environment will be discussed, as well as the redundancy in security with Pyxis for narcotic controls. In conclusion, the hospital will demonstrate how hand geometry routinely assists in drug diversion/theft investigations.

You will leave this session with:
  • Practical steps for initiating hand geometry into your security operation
  • An actual demonstration of the enrollment process
  • Ideas on how to integrate hand geometry into your access control methodology

Chris Hengstebeck, Director of Security
WILLIAM BEAUMONT HOSPITAL

  ^BACK TO TOP

11:05 a.m.
Icon
How The Federal Bureau of Investigation Has Integrated Multi-Modal Biometrics Within Its Automated Fingerprint Identification System (IAFIS)

This presentation will provide an updated overview of the current FBI Integrated Automated Fingerprint Identification System (IAFIS). Additionally, this presentation will describe large-scale biometric projects and changes to standards that will provide multi-modal biometric services as part of the FBI Next Generation Identification.

B. Scott Swann, Supervisory IT Specialist, Criminal Justice Information Services Division
FEDERAL BUREAU OF INVESTIGATION

  ^BACK TO TOP
11:55 a.m.
Lunch On Your Own -- But Not Alone!

Join a small group of your colleagues for lunch with an informal discussion facilitated by one of our expert speakers. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.


1:30 p.m.
Icon
Pre-Deployment Considerations For A Successful Biometrics Implementation Project

The need to fully understand pre-deployment considerations is a critical prerequisite for a successful biometric implementation. During this session, you will learn the key steps and issues you need to examine before implementing your own biometrics projects, including:
  • Requirements Definition – Operational requirements surveys, application impact studies, statements of work, source selection, etc.
  • Planning Considerations – program management, evaluation of alternative solutions, management of the permissions database, etc.
  • Life-cycle cost analysis – initial hardware/software costs, enrollment costs, maintenance, problem recovery, etc.
  • Social Issues and Concerns – including privacy

Also, you will hear about a new concept for anonymous biometric authentication. This approach is being developed to protect an individual's private information and maintain the anonymity of the authentication system.

Leave this session with an outline of what needs to be done to ensure successful implementation of biometrics.

Russ Ryan, Vice President Information & Communications
NATIONAL BIOMETRIC SECURITY PROJECT

  ^BACK TO TOP

2:20 p.m.
Icon
How To Use Multimodal Biometric Approaches To Improve Identification Results From Non-Ideal Biometric Imagery

Biometrics recognition in recent years has been characterized by continual improvements of operational characteristics, increased reliability and growing deployment opportunities. For researchers at the Center for Identification Technology Research at West Virginia University, challenges lay ahead in the analysis of biometric information captured in unconstrained environments, those that do not inconvenience the users. Unconstrained capture may imply that an identity match decision will be made from, for example, blurred images and low resolution video, which limit the amount of traditional biometric information available for recognition. Our presentation will catalog recent research directions in the analysis of non-ideal biometric imagery and discuss multimodal biometric approaches which can overcome the quality limitations in individual modalities by opportunistic inclusion of information that can be used to identify humans.

The presentation will emphasize:
  • The impact of biometric capture on overall customer experience with biometrics
  • The impact of image quality on the accuracy of iris, face and fingerprint recognition
  • Multibiometric approaches to increasing the reliability of biometric systems

Bojan Cukic, Co-Director
CENTER FOR IDENTIFICATION TECHNOLOGY RESEARCH,
WEST VIRGINIA UNIVERSITY


3:10 p.m.
Icon
Afternoon Networking Break & Exhibits
  ^BACK TO TOP

3:30 p.m.
Icon
One Year In – A Look At The US Registered Traveler Program:
Defining Key Business Drivers And Overcoming Technical Challenges

Airport security has received much attention since the events of 9/11, with a number of programs aiming to make air travel safer. The Registered Traveler (RT) program is one such program that seeks to do this – not only without disrupting legitimate travel, but actually enhancing service to the traveling public.

This case study presentation will examine the US RT program one year into its current phase – now that multiple airports have deployed and interoperable RT cards have been issued. You will hear the evolution of this unique “public-private partnership” program including key business drivers and technical challenges. You’ll also gain insight on the development of the Registered Traveler Interoperability Specification and the current status of the program.

Attend this insightful session and learn:
  • The roles of the Transportation Security Administration, American Association of Airport Executives, sponsoring entities, and RT service providers
  • Which airports are participating and their experiences with the program to date
  • What biometrics are being used to provide a variety of functions within the overall RT system
  • How interoperability can be achieved in a multi-vendor environment

Conor White, Chief Technology Officer
DAON

Carter Morris, Senior Vice President, Transportation Security Policy
AMERICAN ASSOCIATION OF AIRPORT EXECUTIVES

  ^BACK TO TOP

4:20 p.m.
Icon
Counterfeit-Proofing The Social Security Number (SSN) Card:
Observations On Critical Issues To Consider In The Quest For Enhanced Security

The GAO is the investigative and research arm of the United States Congress. GAO has been at the forefront in examining identity theft in federal and state programs associated with the fraudulent use of social security numbers, driver licenses, birth certificates, and immigration documents. In the post-9/11 environment, the Congress has become increasingly concerned that SSN cards represent a valuable commodity to identity thieves. Accordingly, the Intelligence Reform Act of 2004, requires the Social Security Administration to take steps to better protect the SSN card from counterfeiting, tampering, alteration, and theft. A variety of options, including using biometric technology, currently exist to "harden" the SSN card. However, each option varies in terms of the level of security provided, cost, and implementation challenges.

This presentation will provide attendees with an overview of:
  • How the events of September 11, 2001 have mitigated potential barriers to expanded use of biometric technology
  • GAO penetration studies, in which fraudulent documents were used to compromise the integrity of the identity verification processes of key programs and services
  • SSA's progress toward safeguarding the SSN and enhancing the card as required by the Intelligence Act
  • Key issues to be considered before enhancing the card
  • The range of options available to SSA for enhancing the card

Dan Bertoni, Director
U.S. GOVERNMENT ACCOUNTABILITY OFFICE

  ^BACK TO TOP

5:10 p.m.
Icon
Show & Tell: See Selections of Key Biometric Applications And How They Work

Sometimes it's almost impossible to describe how certain biometric technologies work. This session doesn't "tell you," but "shows you" how it's done so that you learn what goes on "behind the scenes."

In this fun and lively forum, you will have to discuss and gain insight in the following areas:
  • Gait recognition and the way we walk
  • Consumers embracing biometric access in their homes and work places
  • Vein recognition and how it stacks up to other types of biometrics
  • Signature authentication and which applications are best suited for it

Bill Rogers, Associate Editor & Founder
BIOMETRIC DIGEST

  ^BACK TO TOP

5:40 p.m.
End Of Day One


5:45 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees and speakers are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


7:00 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group.
Take advantage of Las Vegas's fine dining while you continue to network with your colleagues.

  ^BACK TO TOP
Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Pre-Conference WorkshopsAgenda Day 1Agenda Day 2Post-Conference Workshops
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure

 

Upcoming ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2011 Advanced Learning Institute Inc. All Rights Reserved
8600 West Bryn Mawr Avenue, Suite 920-N, Chicago, IL 60631 • Phone: 773-695-9400 • Fax: 773-695-9403