8:00 a.m.
Registration, Continental Breakfast & Exhibits
8:30 a.m.
Chairperson's Welcome & Opening Remarks
William A. Rogers, Associate Editor
BIOMETRIC DIGEST
Conference Chairperson
|
^BACK TO TOP |
8:45 a.m.
The Future Of Identity: A Roadmap For Next Generation Systems
Tomorrow's biometric systems will be diverse in the applications they support, they will be called on to provide real-time response, and they will be scalable beyond our current frame of reference. How then do we anticipate what future needs are and how do we plan system implementations with this in mind? The answer lies in a system architecture model that is driven by a framework and policy agenda, not the other way around.
During this can't-miss presentation, Dr. Atick, a visionary in his field, will share his views on how:
- Current system designs are inconsistent with market adoption forces and cannot anticipate all future needs
- Next generation large-scale systems will rely on service-oriented architectures
- Middleware may become obsolete as it can go against the open and shared model of service-oriented architectures
- Adapting biometrics to this model means that knowledge, not data, is shared
Dr. Joseph Atick, Executive Vice President, Chief Strategic Officer
L-1 IDENTITY SOLUTIONS
Recognized as an unparalleled visionary and strategist, Dr. Atick has been at the forefront of some of technology's most significant breakthroughs over the last fifteen years. Hear the latest biometrics industry update from one of the leading industry leaders. Dont miss this top-rated speaker! |
^BACK TO TOP |
9:45 a.m.
Speed Networking
Become acquainted with your fellow attendees in this fun and fast-paced forum!
|
^BACK TO TOP |
10:15 a.m.
Morning Networking Break & Exhibits
10:45 a.m.
An Update On The Vulnerabilities Of
Biometric Systems To Spoofing
During this interesting and informative session, you will hear about International Biometric Group's (IBG) latest project, Spoof 2007. Specifically, you will learn about a plan to address an often overlooked vulnerability of biometrics, spoofing.
Particular highlights will include:
- Why spoof analysis in addition to traditional performance testing is necessary
- Review of some common spoofs
- Spoofing from the deployment and development perspective
- A look at Spoof 2007, IBG's latest contribution to the field of biometric testing
- What the future holds
Samir Nanavati, Partner
INTERNATIONAL BIOMETRIC GROUP |
^BACK TO TOP |
11:35 a.m.
How Hand Geometry Helped Secure William Beaumont Hospital: From Initial Consideration Through 10 Years Of Operations
William Beaumont Hospital began using hand geometry in 1994 as a pilot to determine if it was user friendly and simple in operation. Their findings were very positive and the hospital proceeded to implement additional hand readers to better secure their narcotics. This case study will cover the rational for initial consideration of the program and initial infrastructure necessary for the operation. Hear the practical lessons learned during the 10 plus year rollout of this biometric system including enrollment issues and results to date. Finally, some simple maintenance tips for ensuring the units remain operational will be addressed.
Additionally, integrating biometrics into an overall access control environment will be discussed, as well as the redundancy in security with Pyxis for narcotic controls. In conclusion, the hospital will demonstrate how hand geometry routinely assists in drug diversion/theft investigations.
You will leave this session with:
- Practical steps for initiating hand geometry into your security operation
- An actual demonstration of the enrollment process
- Ideas on how to integrate hand geometry into your access control methodology
Chris Hengstebeck, Director of Security
WILLIAM BEAUMONT HOSPITAL
|
^BACK TO TOP |
12:25 p.m.
Lunch On Your Own -- But Not Alone!
Join a small group of your colleagues for lunch with an informal discussion facilitated by one of our expert speakers. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.
2:00 p.m.
Pre-Deployment Considerations For A Successful Biometrics Implementation Project
The need to fully understand pre-deployment considerations is a critical prerequisite for a successful biometric implementation. During this session, you will learn the key steps and issues you need to examine before implementing your own biometrics projects, including:
- Requirements Definition Operational requirements surveys, application impact studies, statements of work, source selection, etc.
- Planning Considerations program management, evaluation of alternative solutions, management of the permissions database, etc.
- Life-cycle cost analysis initial hardware/software costs, enrollment costs, maintenance, problem recovery, etc.
- Social Issues and Concerns including privacy
Also, you will hear about a new concept for anonymous biometric authentication. This approach is being developed to protect an individual's private information and maintain the anonymity of the authentication system.
Leave this session with an outline of what needs to be done to ensure successful implementation of biometrics.
Russ Ryan, Vice President, Information & Communications
NATIONAL BIOMETRIC SECURITY PROJECT
|
^BACK TO TOP |
2:50 p.m.
Implementing Voice Authentication At Bell Canada:
Best Practices & Lessons Learned In Using Voice Biometrics To Improve Privacy And The Customer Experience In The Telecom Industry
Bell Canada's implementation of voice authentication to its consumer base was the first and largest commercial application of biometrics to-date. This pioneering case study will walk you through Bell Canada's biometrics project - - from the early stages of the thought process, to the project implementation, marketing requirements and consumer research. The project was a joint partnership involving Persay's Vocal Password application and combining the integration skills of IBM and Microsoft desktop software to deliver a project in record time: a short 5-month timeframe from vendor selection to customer launch.
You will leave this session with a better understanding of:
- What it takes to plan, build and maintain a biometrics project
- How to address customer privacy concerns - - and make it convenient
- Critical success factors for working effectively with your partners - - vendors, integrators, and others
- How to deliver a biometrics project in 5 months
Charles Giordano, Associate Director, Privacy Marketing Strategy
BELL CANADA
Fred Mackenzie, Senior Business Solution Advisor
BELL CANADA
3:40 p.m.
Afternoon Networking Break & Exhibits
|
^BACK TO TOP |
4:00 p.m.
How To Build A Small-Scale Biometric Matching System Using Readily Available Hardware
What's behind the curtain; from capture to match result and everywhere in between! This presentation will demystify the steps to building a small scale biometric matching system using readily available hardware; and identifying various software components and their integration.
Also, through an interesting analysis of the progression of biometric technologies compared to other technologies of the past 20 years, you will gather key insights into the acceptance and use of biometrics today, and what to expect in the future.
If you're working on or planning a biometrics system, this session will teach you key technical considerations such as:
- A sample equipment list to capture fingerprints and facial images
- Example source code and application setup guidelines
- Standards used
- Open source technology available to create an identity management system
Patrick Grant, Director of Technology
TASCET IDENTITY NETWORK A VERAX COMPANY
|
^BACK TO TOP |
4:50 p.m.
Recap Of Day One
William A. Rogers, Associate Editor
BIOMETRIC DIGEST
|
^BACK TO TOP |
5:00 p.m.
Networking Reception: Please Join Us!
We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!
|
6:30 p.m.
Dine Around
Sign up during the day for dinner with a group.Take advantage of Miami's fine dining while you continue to network with your colleagues.
|
^BACK TO TOP |
Speakers & Key Highlights • Who Will Attend • Benefits of Attending • Rave Reviews
Pre-Conference Workshops • Agenda Day 1 • Agenda Day 2 • Post-Conference Workshops
Venue & Lodging • Registration Fees • Discounts & Policies • Conference Supporters
Register Now • Forward To A Colleague
|
|