A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Interactive Workshops
Agenda Day 1
Agenda Day 2
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners

Network With Us!
Facebook

 
Register Now
agenda - Day 1: Tuesday, February 28, 2012

8:00 a.m.
Registration, Continental Breakfast & Exhibits


8:30 a.m.
Icon
Chairperson's Welcome & Presentation:
Virtual Identity Analysis Through The VITAL Framework

Online activities can reveal a substantial amount of personal information -- individuals leave identifying data across dozens, if not hundreds of sites. While it is difficult to gain visibility into every element of an individual’s online persona, employers may be liable if employees engage in problematic online activities. This presentation will help to define the challenge, and discuss possible solutions, through the cutting edge v-ID1 database and the VITAL framework.

You'll get a glimpse at the future of the biometrics world from this top-rated leading
industry expert!

Samir Nanavati, Partner
IBG

  ^BACK TO TOP

9:30 a.m.
Icon
Speed Networking

Become acquainted with your fellow attendees in this informative and fast-paced forum!

  ^BACK TO TOP
10:00 a.m.
Icon
Morning Refreshment, Networking Break & Exhibits

10:30 a.m.
Icon
The FBI's Next Generation Identification Program:
Understanding And Preparing For Multimodal Functionality

Driven by advances in technology, customer requirements, and a growing demand for Integrated Automated Fingerprint Identification System (IAFIS) services, the FBI has initiated the Next Generation Identification (NGI) program. This program will further advance the FBI’s biometric identification services, providing an incremental replacement of current IAFIS technical capabilities, while introducing new functionality.

NGI improvements and new capabilities are in the process of being introduced across a multi-year timeframe within a phased approach. The NGI system will offer state-of-the-art biometric identification services and provide a flexible framework of core capabilities that will serve as a platform for multimodal functionality.

This session will give you an inside look at how to prepare your organization for multimodal functionality, including:
  • New services and advanced functionality to the user community
  • How to increase the speed and accuracy of identification services

Nick Megna, Unit Chief, CJIS Division
FEDERAL BUREAU OF INVESTIGATION

  ^BACK TO TOP

11:15 a.m.
Icon
Leveraging Fingerprint ID To Effectively Eliminate Duplicate Records And Streamline Business Processes

Attend this presentation and learn how Prometric, the global leader in technology-enabled testing and assessment services, and the Institute for Transfusion Medicine (ITxM), the third-largest U.S. independent blood center, have implemented fingerprint identity management solutions to automate both routine and high stakes identification transactions using real-time 1-to-many search. Two very different companies, serving very different markets, each benefiting from the same customer-facing technology. Learn how they address high volume biometric enrollments; maintain flexibility in the face of privacy and regulation changes; and deploy solutions that reduce errors, and enhance convenience and security.

You’ll walk away with ideas on how to capitalize on the advantages fingerprint biometrics can provide to meet your own identity management needs and considerations to bear in mind when making decisions on the appropriate technology solution.
 
Nancy Gibson, Manager of Biometric Authentication Solutions
LEXISNEXIS RISK SOLUTIONS

Eric Schulties, Vice President and Chief Information Officer
INSTITUTE FOR TRANSFUSION MEDICINE (ITxM)

Jim Sullivan, Director of Sales
BIO-KEY INTERNATIONAL, INC.
 

  ^BACK TO TOP
12:00 p.m.
Lunch On Your Own -- But Not Alone!

Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific topic. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.


1:30 p.m.
Icon
How To Leverage Fingerprint Biometrics To Address Criminal Justice Information Service Requirements With An Existing IT Infrastructure, On A Limited Budget

All across the country, city employees require access to centralized information in order to do their jobs. For those working at city hall or in emergency services such as police or fire departments, one critical information repository is the FBI’s Criminal Justice Information Services (CJIS) database. In January 2011, a new mandate went into effect requiring the use of “advanced authentication” for anyone accessing this information. For many cities, identifying the most effective way to comply with this mandate, with limited budget dollars, remains a struggle.

The City of Winter Park, Florida, wanted to have a system in place well before the CJIS regulation took effect. With more than 550 employees serving more than 28,000 residents, the IT staff needed a solution that not only would provide strong two-factor authentication to comply with CJIS, but would integrate into their existing IT infrastructure, and wouldn’t hamper their delivery of services.

In this session, you will gain a better understanding of how your organization can deploy fingerprint biometrics for CJIS compliance, including:
  • What is required by the CJIS mandate to meet the strong authentication component.
  • The challenges faced by many cities and why the City of Winter Park chose a fingerprint authentication solution
  • Best practices in solution evaluation and selection
  • How the biometric solution deployed was integrated into an existing IT environment and the importance this plays in the selection process
  • The tangible benefits resulting from deploying fingerprint authentication

Parsram Rajaram, IT Manager
CITY OF WINTER PARK, FLORIDA

Chris Trytten, Director of Biometrics
DIGITALPERSONA

  ^BACK TO TOP

2:15 p.m.
Icon
The Implementation Of Biometrics And Single Sign-On For Access To Electronic Health Records

Clark and Daughtrey Medical Group, P.A., known for its technology leadership, is a multi-specialty medical practice with over 50 physicians and other medical providers working in 25 specialized areas including primary care, cardiology and cancer. In 2006, Clark and Daughtrey implemented fingerprint biometrics and enterprise single sign-on to establish secure provider access to its system for electronic medical records. It also aimed to provide secure extranet connections to affiliated hospitals and medical providers.

Benchmark best practices with this progressive organization as you review the benefits and lessons learned of their biometric implementation, including:
  • Integration of Biometric Fingerprint to Virtual Desktop Infrastructure
  • Integration of Identity Manager into their environment, synchronizing passwords between applications
  • Easy self-enrollment process
  • Use of different fingerprint readers from different vendors with one stored fingerprint
  • Improved security with automated login to access all internal and external systems
  • Drastically reduced quantity of password-related requests for IT assistance
  • Improved speed of user login/logout
  • Meets Health Insurance Portability and Accountability Act (HIPAA) regulatory requirements with fewer steps

Nick Ivon, Director of Information Systems
CLARK AND DAUGHTREY MEDICAL GROUP, P.A.


3:00 p.m.
Icon
Afternoon Refreshment, Networking Break & Exhibits
  ^BACK TO TOP

3:20 p.m.
Icon
Privacy And Biometrics: How To Balance The Two

In a global information society, confirmation and management of identities is critical. Increasingly, biometrics are used to confirm that we are who we say we are. Unfortunately, some governments and businesses deploy biometric systems without careful consideration of the privacy issues that arise with their use.
 
Implementing biometric solutions to confirm identity, while protecting privacy, is not only possible but advisable to organizations at home and abroad.  The public is increasingly privacy conscious and global regulators are expanding their reach to cover the use of new technologies that implicate fundamental human rights, including privacy. By recognizing that privacy, at its core, is about the trust of people whose information an organization holds, organizations should at the outset build into biometric systems privacy considerations and protections.

The Privacy and Biometrics panel will engage experts with a broad range of opinions in a lively discussion of rights to privacy, social perception, and ethics relative to the use of biometrics.

Moderator:
Samir Nanavati
IBG

Panelists:
Charles Schaeffer, Office of the Director
FLORIDA DEPARTMENT OF LAW ENFORCEMENT

Brian R. Hunt, Chief, Future Applications Branch
U.S. DEPARTMENT OF DEFENSE

  ^BACK TO TOP

4:05 p.m.
interactive session
How To Successfully Launch A Large-Scale Biometric Implementation: Techniques, Technologies, And What To Avoid

Mandated by the Maritime Transportation Security Act of 2002, the Transportation Worker Identification Credential (TWIC) program is an ambitious government project. It has led to the issuance of interoperable and standards-based biometric smart card credentials to nearly 2 million civilian maritime workers who require unescorted access to secure areas of the U.S. maritime infrastructure - including port facilities and vessels. The TWIC program is jointly managed by the Transportation Security Administration and the U.S. Coast Guard.

In this informative session, you will get a comprehensive update on the current status of the TWIC program and plans for TWIC reader deployment, as well as key techniques and tactics to use during a large-scale biometric implementation, including:
  • The technologies and standards behind the TWIC program and the key role of biometrics
  • Lessons learned from a comprehensive pilot program for TWIC readers and what to avoid when implementing smart cards into your organization
  • The steps facility and vessel operators will need to take to upgrade their access control systems to use an automated access control system

John Schwartz, Program Manager - TWIC Program
TRANSPORTATION SECURITY ADMINISTRATION

Walter Hamilton, Sr. Consultant
IDENTIFICATION TECHNOLOGY PARTNERS

  ^BACK TO TOP

4:50 p.m.
End Of Day One

  ^BACK TO TOP

5:00 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


7:00 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group.Take advantage of Miami's fine dining while you continue to network with your colleagues.

Make the most of your time out of the office.
Attend your choice of our hands-on workshops.

  ^BACK TO TOP
Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Interactive WorkshopsAgenda Day 1Agenda Day 2
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure

 

Upcoming ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2011 Advanced Learning Institute Inc. All Rights Reserved
8600 West Bryn Mawr Avenue, Suite 920-N, Chicago, IL 60631 • Phone: 773-695-9400 • Fax: 773-695-9403