A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Pre-Conference Workshop
Agenda Day 1
Agenda Day 2
Post-Conference Workshop
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners
 
Register Now
agenda - Day 1: Tuesday, March 3, 2009

8:00 a.m.
Registration, Continental Breakfast & Exhibits


8:30 a.m.
Icon
Chairperson's Welcome & Opening Remarks

Samir Nanavati, Partner
INTERNATIONAL BIOMETRIC GROUP (IBG)
Conference Chairperson

  ^BACK TO TOP

8:40 a.m.
Icon
How To Provide A Highly Secure And Cost-Effective Biometrics Solution For Your Organization

Pearson VUE, the global leader in electronic testing for regulatory and certification boards, has pioneered a number of security technologies since launching their wholly-owned and operated test center network, the Pearson Professional Centers, in 2002. Their goal has always been to provide the highest levels of test center quality and security.

The recent implementation of palm vein recognition technology has allowed Pearson VUE to move toward one-to-many comparisons at a speed that is conducive to a large-scale, global testing operation. In addition, the palm vein system provides a highly secure and cost-effective solution without the criminal connotations that can be associated with fingerprint technology.

You will leave this session with a greater understanding of palm vein recognition technology, including:
  • The benefits it provides over other biometric applications
  • How to coordinate the acceptance of the technology from internal users, clients and testing center staff
  • How to overcome the challenges of implementing a palm vein recognition system in your own organization

Rubén Arturo Garcia, Product Manager
PEARSON VUE

Samir Nanavati, Partner
INTERNATIONAL BIOMETRIC GROUP (IBG)
Conference Chairperson

  ^BACK TO TOP

9:30 a.m.
Icon
Speed Networking

Become acquainted with your fellow attendees in this fun and fast-paced forum!

  ^BACK TO TOP
10:00 a.m.
Icon
Morning Networking Break & Exhibits

10:30 a.m.
Icon
How To Implement Transportation Worker Identification Credential (TWIC) Biometric Readers As Part Of A Physical Access Control System (PACS)

Security professionals with the responsibility for implementing the TWIC program at the grass roots level and the integrators/installers who support them are experiencing a great deal of confusion with exactly how to execute TWIC as part of a Physical Access Control System (PACS).

Attend this session and learn about the challenges and successes of a live TWIC Biometric Reader implementation at the Port of Miami. Specifically, you will learn:
  • The methods acceptable to access the information available on the TWIC card
  • How to interface the TWIC biometric readers with existing physical access control systems
  • The operational procedures that had to be established to enable Port security to get the most use and information from the TWIC card
  • How the port implemented TWIC readers at different locations to meet the requirements of both the U.S. Coast Guard and local security organizations

Louis A. Noriega, Chief, Seaport Information Systems
PORT OF MIAMI, FLORIDA

Consuelo Bangs, Senior Program Manager
SAGEM MORPHO INC.

  ^BACK TO TOP

11:20 a.m.
Icon
How To Provide Secure, Multi-Factor Identity Verification For Handheld Devices: Avoiding The Cost And Disruption Of Implementing New Devices

Strong two-factor authentication is needed when accessing any sensitive resource (e.g. computer resources, server or application) in the enterprise. A current implementation of strong two-factor authentication includes smart cards with digital certificates for desktop access. This approach works for users with respect to internal access at conventional PCs, however additional challenges are involved when an organization has personnel that need to gain access to sensitive applications that are served on handheld devices (e.g. PDAs).

Northrop Grumman needed to provide secure, multi-factor identity verification for applications that run on handhelds. Key application requirements were to use biometrics for verification and to avoid the costs and disruption of having to discontinue use of their existing handheld devices. These requirements dictated a solution that would perform the identity verification externally to the handheld and then communicate standard credentials to it via an available communication channel.

Their solution was to employ a self-contained biometric token with wireless communications. The biometric-enabled token performs local identity verification of the authorized user and then communicates with the existing handheld by transmitting an X.509 certificate via an encrypted secure Bluetooth connection between the token and the handheld. This approach met the requirements of the application and eliminated the need to replace handheld units.

This case study will provide you with:
  • An overview of the access control challenges unique to the use of handheld devices
  • An understanding of the capabilities of self contained biometric identity verification hardware
  • An actual demonstration of the process as it applies to a daily user of the system

Erik Bowman, Systems Engineer
NORTHROP GRUMMAN

John Petze, President & CEO
PRIVARIS INC.

  ^BACK TO TOP
12:10 p.m.
Lunch On Your Own -- But Not Alone!

Join a small group of your colleagues for lunch with an informal discussion facilitated by one of our expert speakers. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.


1:40 p.m.
Icon
How A Major Retailer Streamlined The In-Store Experience And Enhanced Security Using Fingerprint Biometrics

AT&T's Strategy and Innovations group knew that one of the most frustrating aspects of any busy retail store is the lines that inevitably form at stationary Point-of-Sale terminals performing check out.

By implementing a mobile POS platform based around small but powerful tablet PCs, AT&T has enabled their in-store staff to conduct transactions ranging from answering account questions to processing accessory purchases, anywhere in the store. Because these devices operate wirelessly, PCI regulations and AT&T Security policy dictated that access to these devices and the back-end retail systems be protected with strong authentication at a user, not device level. Traditional AT&T strong authentication methods such as One Time Password devices proved too cumbersome to use with the mobile form factor and stylus entry. The mobile devices are shared among retail staff, so authentication is performed frequently. Clearly, an easier, but still secure authentication mechanism had to be found.

Utilizing BIO-key's fingerprint biometric platform, AT&T retail staff authenticates to the network and their POS applications using just a swipe of their finger on the tablet's built in scanner. Any rep from any store can pick up any tablet, swipe their finger, and be immediately authenticated. Despite raising the authentication bar to the highest level – who you are – the retail users strongly prefer the BIO-key authentication method, because it makes the login process easier, with nothing to carry, remember, or lose. At the same time, AT&T is assured that only senior staff can approve overrides, since the biometric credential cannot be shared or stolen.

The AT&T Mobility Team continues to be a pioneering organization in developing and implementing innovative applications and integrated solutions for businesses and consumers. In this session, you will learn how AT&T and BIO-key were able to streamline retail delivery, improve customer experiences, and reduce password & token maintenance overhead - all while improving overall system integrity.

Specifically, you will leave this session with a better understanding of how to:
  • Plan, build and implement a mobile solution that integrates fingerprint biometrics to enable a superior customer experience
  • Address employee privacy concerns
  • Meet the stringent PCI compliance requirements on remote or wireless devices processing credit card data
  • Improve overall system security and staff response time while reducing ongoing maintenance costs associated with resetting passwords or token issuance
  • Successfully deliver a biometric security solution from concept to retail deployment in a short amount of time

Carl Ceresoli, Manager – Information Technology Strategies and Innovations
AT&T CONSUMER PRODUCT DIVISION

Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL

  ^BACK TO TOP

2:30 p.m.
Icon
How Vascular Biometrics Reduced The Threat Of Lost Profits In A Multi-Site Organization Network

Club Fitness implemented 24hr access to its members in January 2007 by implementing prox cards. As the number of 24hr facilities was expanded, the company started to notice a problem with card sharing, or buddy punching. This was certainly disconcerting and the club management system had no solutions in place.

Working with Communications Supply Corporation (CSC), Club Fitness set out to find a third party solution that would integrate with their current setup. The solution needed to be one that both members and employees could use, was foolproof, and could be used outdoors. After considering the benefits and challenges of fingerprint and iris scanners, Club Fitness decided on Identica’s vascular biometrics solution. The vascular system was able to be quickly integrated with their initial setup and has grown to multi-site deployment over the past two years.

Attend this session and learn how your organization can:
  • Implement vascular biometrics for use by the mass population
  • Run a network of multi-site deployments with a central command location
  • Integrate vascular biometrics with your current system and allow for a tighter set of controls

Rich Quin, IT Director
CLUB FITNESS


3:20 p.m.
Icon
Afternoon Networking Break & Exhibits
  ^BACK TO TOP

3:35 p.m.
Icon
Logical And Physical Convergence: How To Streamline Authentication, Identification And Authorization By Incorporating Smartcards In Your Organization

With the ever-increasing focus on security and protecting an organization's assets, physical, human and intellectual, organizations are seeking converged security approaches that address both physical and logical security measures.

Unisys has taken action by implementing new identification standards corporate-wide that make use of smart card technology. The current Smartcard enables access into multiple disparate systems to achieve single sign-on to many of the worldwide systems that an individual has access to, eliminating the need for multiple passwords.

This session will provide you with insight into how Unisys has optimized its use of Smartcards through a converged security approach, including:
  • The model, why it worked and how it's been used successfully around the world
  • How to maximize and optimize stronger authentication capabilities for enhanced security and greater efficiency

Lynn Devore, Enterprise Security Architect
UNISYS

  ^BACK TO TOP

4:25 p.m.
Icon
Mobile Biometrics:
Emerging Trends, Best Practices And Lessons Learned

Innovations in wireless technology and biometrics have seen tremendous growth in recent years. Among the major benefits of wireless technology are mobility and portability. Combining the mobility and portability of wireless technology with the efficiency and accuracy of biometric technology enables law enforcement organizations to increase efficiency and security.

Hear expert representatives from the public sector discuss the emerging trends in mobile biometrics, as well as best practices and lessons learned in the field.

Specifically, this panel will address:
  • The future of mobile biometrics in border management
  • Emerging trends
  • An update on the progress of the NIST Mobile ID Work Group and their work on drafting the NIST Special Publication Best Practices Recommendation for Mobile ID Devices
  • Lessons learned in domestic and foreign deployment of mobile biometric devices

Panel Moderator:
Ramon Reyes, Product Manager
SAGEM MORPHO INC.

Panelists:
Brad Wing, Biometrics Standards Coordinator
NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY (NIST)

Beth Owens, ID Section Supervisor
FRANKLIN COUNTY SHERIFF'S OFFICE, OHIO

Arun Vemury, Program Manager, HSARPA, Human Factors
U.S. DEPARTMENT OF HOMELAND SECURITY,
DIRECTORATE OF SCIENCE & TECHNOLOGY

  ^BACK TO TOP

5:10 p.m.

End Of Day One

  ^BACK TO TOP

5:15 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


6:30 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group. Take advantage of Miami's fine dining while you continue to network with your colleagues.

  ^BACK TO TOP
Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Pre-Conference WorkshopAgenda Day 1Agenda Day 2Post-Conference Workshops
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure

 

Upcoming ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2011 Advanced Learning Institute Inc. All Rights Reserved
8600 West Bryn Mawr Avenue, Suite 920-N, Chicago, IL 60631 • Phone: 773-695-9400 • Fax: 773-695-9403