A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Pre-Conference Workshop
Agenda Day 1
Agenda Day 2
Post-Conference Workshop
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners
 
Register Now
agenda - Day 1: Tuesday, February 26, 2008

8:00 a.m.
Registration, Continental Breakfast & Exhibits


8:30 a.m.
Icon
Chairperson's Welcome & Opening Remarks

William A. Rogers, Associate Editor
BIOMETRIC DIGEST
Conference Chairperson

  ^BACK TO TOP

8:45 a.m.
Icon
The Future Of Identity: A Roadmap For Next Generation Systems

Tomorrow's biometric systems will be diverse in the applications they support, they will be called on to provide real-time response, and they will be scalable beyond our current frame of reference. How then do we anticipate what future needs are and how do we plan system implementations with this in mind? The answer lies in a system architecture model that is driven by a framework and policy agenda, not the other way around.

During this can't-miss presentation, Dr. Atick, a visionary in his field, will share his views on how:
  • Current system designs are inconsistent with market adoption forces and cannot anticipate all future needs
  • Next generation large-scale systems will rely on service-oriented architectures
  • Middleware may become obsolete as it can go against the open and shared model of service-oriented architectures
  • Adapting biometrics to this model means that knowledge, not data, is shared

Dr. Joseph Atick, Executive Vice President, Chief Strategic Officer
L-1 IDENTITY SOLUTIONS

Recognized as an unparalleled visionary and strategist, Dr. Atick has been at the forefront of some of technology's most significant breakthroughs over the last fifteen years. Hear the latest biometrics industry update from one of the leading industry leaders. Don’t miss this top-rated speaker!

  ^BACK TO TOP

9:45 a.m.
Icon
Speed Networking

Become acquainted with your fellow attendees in this fun and fast-paced forum!

  ^BACK TO TOP
10:15 a.m.
Icon
Morning Networking Break & Exhibits

10:45 a.m.
Icon
An Update On The Vulnerabilities Of
Biometric Systems To Spoofing

During this interesting and informative session, you will hear about International Biometric Group's (IBG) latest project, Spoof 2007. Specifically, you will learn about a plan to address an often overlooked vulnerability of biometrics, spoofing.

Particular highlights will include:
  • Why spoof analysis in addition to traditional performance testing is necessary
  • Review of some common spoofs
  • Spoofing from the deployment and development perspective
  • A look at Spoof 2007, IBG's latest contribution to the field of biometric testing
  • What the future holds

Samir Nanavati, Partner
INTERNATIONAL BIOMETRIC GROUP

  ^BACK TO TOP

11:35 a.m.
Icon
How Hand Geometry Helped Secure William Beaumont Hospital: From Initial Consideration Through 10 Years Of Operations

William Beaumont Hospital began using hand geometry in 1994 as a pilot to determine if it was user friendly and simple in operation. Their findings were very positive and the hospital proceeded to implement additional hand readers to better secure their narcotics. This case study will cover the rational for initial consideration of the program and initial infrastructure necessary for the operation. Hear the practical lessons learned during the 10 plus year rollout of this biometric system including enrollment issues and results to date. Finally, some simple maintenance tips for ensuring the units remain operational will be addressed.

Additionally, integrating biometrics into an overall access control environment will be discussed, as well as the redundancy in security with Pyxis for narcotic controls. In conclusion, the hospital will demonstrate how hand geometry routinely assists in drug diversion/theft investigations.

You will leave this session with:
  • Practical steps for initiating hand geometry into your security operation
  • An actual demonstration of the enrollment process
  • Ideas on how to integrate hand geometry into your access control methodology

Chris Hengstebeck, Director of Security
WILLIAM BEAUMONT HOSPITAL

  ^BACK TO TOP
12:25 p.m.
Lunch On Your Own -- But Not Alone!

Join a small group of your colleagues for lunch with an informal discussion facilitated by one of our expert speakers. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.


2:00 p.m.
Icon
Pre-Deployment Considerations For A Successful Biometrics Implementation Project

The need to fully understand pre-deployment considerations is a critical prerequisite for a successful biometric implementation. During this session, you will learn the key steps and issues you need to examine before implementing your own biometrics projects, including:
  • Requirements Definition – Operational requirements surveys, application impact studies, statements of work, source selection, etc.
  • Planning Considerations – program management, evaluation of alternative solutions, management of the permissions database, etc.
  • Life-cycle cost analysis – initial hardware/software costs, enrollment costs, maintenance, problem recovery, etc.
  • Social Issues and Concerns – including privacy

Also, you will hear about a new concept for anonymous biometric authentication. This approach is being developed to protect an individual's private information and maintain the anonymity of the authentication system.

Leave this session with an outline of what needs to be done to ensure successful implementation of biometrics.

Russ Ryan, Vice President, Information & Communications
NATIONAL BIOMETRIC SECURITY PROJECT

  ^BACK TO TOP

2:50 p.m.
Icon
Implementing Voice Authentication At Bell Canada: Best Practices & Lessons Learned In Using Voice Biometrics To Improve Privacy And The Customer Experience In The Telecom Industry

Bell Canada's implementation of voice authentication to its consumer base was the first and largest commercial application of biometrics to-date. This pioneering case study will walk you through Bell Canada's biometrics project - - from the early stages of the thought process, to the project implementation, marketing requirements and consumer research. The project was a joint partnership involving Persay's Vocal Password application and combining the integration skills of IBM and Microsoft desktop software to deliver a project in record time: a short 5-month timeframe from vendor selection to customer launch.

You will leave this session with a better understanding of:
  • What it takes to plan, build and maintain a biometrics project
  • How to address customer privacy concerns - - and make it convenient
  • Critical success factors for working effectively with your partners - - vendors, integrators, and others
  • How to deliver a biometrics project in 5 months

Charles Giordano, Associate Director, Privacy Marketing Strategy
BELL CANADA

Fred Mackenzie, Senior Business Solution Advisor
BELL CANADA


3:40 p.m.
Icon
Afternoon Networking Break & Exhibits
  ^BACK TO TOP

4:00 p.m.
Icon
How To Build A Small-Scale Biometric Matching System Using Readily Available Hardware

What's behind the curtain; from capture to match result and everywhere in between! This presentation will demystify the steps to building a small scale biometric matching system using readily available hardware; and identifying various software components and their integration.

Also, through an interesting analysis of the progression of biometric technologies compared to other technologies of the past 20 years, you will gather key insights into the acceptance and use of biometrics today, and what to expect in the future.

If you're working on or planning a biometrics system, this session will teach you key technical considerations such as:
  • A sample equipment list to capture fingerprints and facial images
  • Example source code and application setup guidelines
  • Standards used
  • Open source technology available to create an identity management system

Patrick Grant, Director of Technology
TASCET IDENTITY NETWORK
A VERAX COMPANY

  ^BACK TO TOP

4:50 p.m.

Recap Of Day One

William A. Rogers, Associate Editor
BIOMETRIC DIGEST

  ^BACK TO TOP

5:00 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


6:30 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group.Take advantage of Miami's fine dining while you continue to network with your colleagues.

  ^BACK TO TOP
Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Pre-Conference WorkshopsAgenda Day 1Agenda Day 2Post-Conference Workshops
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure

 

Upcoming ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2011 Advanced Learning Institute Inc. All Rights Reserved
8600 West Bryn Mawr Avenue, Suite 920-N, Chicago, IL 60631 • Phone: 773-695-9400 • Fax: 773-695-9403