2015 Conference Program

Transcription

2015 Conference Program
d n
2n itio
Ed
2015
Walter E. Washington Convention Center, Washington, DC, USA
Conference: March 23–25, 2015 · Exhibition: March 24–25, 2015
Conference Program and
Registration Brochure
The global hub for advanced identity technologies:
biometrics, secure credentials and digital identity systems
‹‹ The Launchpad – Identity in a brave
new world
‹‹ Identity technology at the heart of
next-generation banking solutions
‹‹ Proof of identity: New approaches to
delivering government and commercial
services online
‹‹ The cyber security crisis: Rising to
the challenge
‹‹ Physical tokens of trust: Taking secure
credentials to the next level
‹‹ Border security: Identity matters
‹‹ Lightning Talks – Next-generation
authentication technology for the
digital age
‹‹ Countering Identity fraud: Technologies
and techniques
‹‹ Enabling DHS missions through
‹‹ Facilitating the hyper-mobility
of travellers: Enhancing trust,
convenience and security
biometrics: OBIM customers and services
‹‹ Meet the Media – Hosted by ‹‹ Healthcare: Opening up new
opportunities with 21st century
identity technology
Juan Williams
‹‹ The ‘why’ behind complex
privacy controls
‹‹ Fishbowl Debate: Identity in the
service of development
‹‹ connect:ID Spotlight: Facial recognition
‹‹ The internet of ‘everybody’ and
‘everything’: Identity matters in a hyper-connected world
‹‹ Mobile identity in the field of play
‹‹ Mobile identity in the digital realm
Register Now at: www.connectidexpo.com/delegate-booking
master QC logo (c:100, m:60, y:0, k:0)
Platinum Sponsor
Evening Reception Sponsor
Gold Sponsor
Gold Sponsor
Sponsor
Silver Sponsor
Sponsor
Powered by
www.connectidexpo.com
Bronze Sponsor
Sponsor
Conference Program
Monday – 23 March 2015
12:30
The Protectors: The guardians of identity, protectors of
privacy, and establishers of trust.
The importance of privacy, security and convenience in mobile
identity services
Conference Chairmen’s Opening Addresses
Mark Lockie, Managing Director, Science Media Partners, UK
‹‹ Privacy is a central tenet of any digital or mobile identity service, and
citizens often associate their mobile numbers with their identity;
Robert M. Harbour, Chairman and President, International
Biometrics & Identification Association, USA
12:40
‹‹ Lawmakers agree, and have ruled, that citizens have specific rights
over their mobile numbers. Extending protection into the digital
world through mobile identity solutions is a natural extension of
these voice call rights;
The Launchpad: Identity in a brave new world
Identity is a multi-faceted concept. Enabling, disruptive, powerful,
valuable. This panel of diverse identity stakeholders will take
the audience on a voyage of exploration, through the universe
of identity as it exists today, and then on to the outer reaches.
Individual visions of identity in a brave new world...
The panel, led by Phil Scarfo, VP Global Marketing, Biometrics, HID
Global, USA will include:
‹‹ Understanding the barriers to online activity is crucial to inform
the planning and delivery of digital public services.
Pat Walshe, Director of Privacy – Public Policy, GSM Association, UK
14:00
Session Break
Identity technology at the
heart of next-generation
banking solutions
Proof of identity: New
approaches to delivering
government and commercial
services online
14:15
Session Chairman’s
Introduction
Session Chairman’s
Introduction
14:20
Using technology to improve
security and ease-of-use for
customers
A 3D approach to minimizing
your identity risks: Using Data,
Documents and Devices to
maximize security
The Dreamers: Visionaries seeking to weave the fabric of secure,
seamless and innovative identity solutions in a mobile,
transactional society.
Who are you?
‹‹ ‘Proof of self’ through the ages and now;
‹‹ Tension between technology and policy;
‹‹ Unmasking the imposter, the criminal, the terrorist.
James A. Loudermilk, Senior Level Technologist, Federal Bureau
of Investigation (FBI), USA
‹‹ One of the oft-overlooked
benefits to new security and
identification technologies is
how they improve the overall
ease-of-use for the end-user;
Nomophobia Rules!
‹‹ The fastest-growing phobia is the fear of not having your mobile
device on you – Caught it yet?
‹‹ If not, there is a huge amount of interesting enabling new
technology coming at you that will help you catch it.
‹‹ This presentation will provide
a case study overview of
U.S. Bank’s work with voice
biometrics, as well as an
overview of other security
technologies currently
being used;
‹‹ And a new emerging identity ecosystem is at the very heart of it.
Terry Hartmann, VP Security Solutions & Industry Applications,
Unisys Corporation, USA
The Architects: Creators of robust identity infrastructure,
standards, technology and credentials for the future.
‹‹ The presentation focuses on
customer-centered design
when integrating these new
technologies into existing
customer access points.
The who, what, why, where, when of global identity initiatives
‹‹ A huge number of identity initiatives have come to existence in
recent years: eIDAS, European Citizen Card (ECC), FIDO Alliance,
and Kantara Initiative, just to name a few.
‹‹ The goals and commercial interests of these initiatives are
quite different.
Beth Gallagher Dumke, Vice
President, Innovation, Payment
Services, U.S. Bank, USA
‹‹ This presentation gives an overview of identity initiatives with
a focus on the identity documents involved.
Klaus Schmeh, Consultant, cv cryptovision, Germany
ICAO’s roles in traveler identification
‹‹ What do you mean that’s not me?
‹‹ This line hasn’t moved in days!
‹‹ What else do I get with this passport?
R. Michael Holly, Chairman, New Technologies Work Group,
International Civil Aviation Organization (ICAO), USA
Identity is a multi-faceted
concept. Enabling, disruptive,
powerful, valuable.
14:40
Managing Identity - A Core
Banking Provider View
Richard Longo, Senior Vice
President, Strategic Alliances &
Special Projects, Temenos, USA
‹‹ Robust identity management
strategies need to leverage a
balanced use of identity data
attributes, identity documents
and device intelligence;
‹‹ Recent consumer research
has confirmed the need for
variable amounts and forms
of identification to align with
individual willingness to
provide identifying information;
‹‹ In this session, we will discuss
methods and best practices to
combine identity data attributes,
identity documents and device
intelligence in order to address
the most common identity risks.
Kimberly Little Sutherland,
Senior Director of Identity
Management, LexisNexis Risk
Solutions, USA
The future of federation:
Securing identity for
government services
‹‹ The Government of Canada is
using cutting-edge technology
to allow citizens to use
already-existing credentials
to verify identity;
‹‹ Using trusted services, such
as bank credentials, can
eliminate password fatigue
and create an easy, secure
user experience.
Andre Boysen, Chief Identity
Officer, SecureKey Technologies,
Canada
15:00
Case Study – Multi-modal
biometric authentication
(voice+face) for mobile
commercial banking
‹‹ Wells Fargo has successfully
launched a way for Wells
Fargo corporate customers to
login to their banking mobile
app utilizing technology from
SpeechPro that recognizes
individual features of the
human voice and face;
‹‹ This presentation discusses
the history of this deployment,
the key benefits to clients, and
the use and effects of ‘token
and password-free’ access by
account holders.
Andy Foote, VP/Strategist,
Innovation Research and
Development, Wholesale
Banking, Wells Fargo, USA
Enabling the web economy
through trusted identities
Douglas D. Thomas, Director of
Counterintelligence Operations
and Investigations, Lockheed
Martin, USA
‹‹ An electronic ID (eID) is
needed for citizens to transact
online securely, with privacy
protection and the same ability
to verify identity as in face-toface interactions;
‹‹ Trust that individuals are
who they claim to be is
necessary to enable the
growing web economy, while
ensuring the protection of our
identities online;
Biometric authentication
in banking and payments –
How Latin America is leading
the way
16:35
‹‹ The State of North Carolina,
MorphoTrust and a team of
carefully selected partners
will collaborate to test a driver
license equivalent proof-ofidentity for online transactions.
‹‹ Case study #1 – Fraud
prevention by banks using
biometrics;
‹‹ Case study #2 –
Authentication as a service;
‹‹ What can we learn from these
Latin American deployments?
David Benini, Vice President of
Marketing, Aware Inc., USA
Carlos Collodoro, CEO, TSM
Technology Ltd., Brazil
Moving beyond passwords
with active authentication
‹‹ The Active Authentication (AA)
platform aims to supplant
dependency on legacy
passwords and smartcards;
‹‹ The AA platform continuously
collects, fuses, scores, and
produces layered fidelity
rankings based on multiple
aspects of an individual;
David Ulmer, Chief Information
Officer, NC Department of
Transportation, USA
‹‹ An overview of novel,
software-based cognitive
and behavioural modalities
currently in advanced research
and development, and
integrated into the AA platform.
Identity as a Service – Trusted,
interoperable, user-centric
‹‹ A technical and business
overview of the Attribute
Exchange Network (AXN), a
cloud-based infrastructure
for enabling trusted,
interoperable, user-centric
identity as a service;
16:55
‹‹ Services include real-time
attribute, device, biometric and
other attribute verification;
‹‹ Attribute-based access
control (ABAC) services can be
enabled for federated access
to sensitive enterprise content
using verified user attributes;
online businesses and retailers
can verify user affiliation to
provide benefits/discounts
and enable secure payment
transactions.
Question and Answer Session
15:45
Afternoon Coffee and Tea
Sponsored by:
Question and Answer Session
The cyber security crisis:
Rising to the challenge
Physical tokens of trust: Taking
secure credentials to the
next level
16:10
Session Chairman’s
Introduction
Session Chairman’s
Introduction
16:15
Critical roles of cyber security
and counterintelligence in
identity management
Breeder documents – Closing
the gap in the identity
management chain
‹‹ Current state and trends of
external and internal threats;
‹‹ Breeder documents are
quite often counterfeited as
forgers and criminals aim
at the weakest link in the
identity chain;
‹‹ Multi-layer defense strategies;
‹‹ Strong authentication and
continuous authentication.
Personalization strategies for
fraud deterrence in plastic
card credentials
‹‹ Personalization
technologies are far more
than a means to add bearer
data to a credential;
‹‹ Specifics of how
personalization technologies
are applied can affect
counterfeit and alteration
deterrence;
‹‹ Both laser engraving and
thermal personalization can
be used in ways that inhibit
reproduction by commercial
technologies.
Debbie W. Waung, Director,
Identity Intelligence, Novetta
Solutions, USA
Joel Zlotnick, Supervisory
Physical Scientist, US
Department of State, USA
Cyber vulnerabilities of
biometrics
ABC – Challenges for visual
security of the physical token
‹‹ Biometric authentication
scenarios: Is there a
necessary trade-off between
convenience and security?
‹‹ Automatic Border Control (ABC)
is considered a key requirement
in order to cope with the
rapidly growing number of
international travelers;
‹‹ Cyber-attack vectors
that affect biometric
authentication systems;
‹‹ How to mitigate the
vulnerabilities.
Bojan Simic, CTO, HyprKey, USA
‹‹ What level of trust in the
automatic inspection process
is necessary without reverting
to manual inspection?
‹‹ Physical document designs
need to be optimized for more
reliable manual inspection.
John Peters, Marketing & Sales
Manager – North America, OVD
Kinegram, USA
Dave Coxe, CEO, ID Dataweb, USA
15:40
‹‹ This presentation provides an
overview on the current status
of breeder documents initiatives,
such as ‘ORIGINS’ in Europe.
Christian Wagner, Vice President
Segment Development
Government, SMARTRAC
TECHNOLOGY GROUP, Germany
Mark DiFraia, Senior
Director, Solutions Strategy,
MorphoTrust, USA
15:20
‹‹ Breeder documents need to
be brought to a much higher
level of security;
17:15
Question and Answer Session
17:20
Keynote Question and Answer Session
Introduced by Clark Nelson, Senior Vice
President, MorphoTrak
Identity: A 21st century gatekeeper for
critical infrastructure and beyond
‹‹ A look at the role of identity and how it
enables access and protection of critical
infrastructure in today’s hyper mobile
and digital world;
‹‹ Identity services are the key.
Suzanne Spaulding, Under Secretary, National Protection
and Programs Directorate, Department of Homeland Security
(DHS), USA
17:40
Keynote Question and Answer Session
17:45
End of Day One
Tuesday – 24 March 2015
08:45
Lightning Talks (continued)
Next generation authentication using on-card gesture recognition
‹‹ On-card gesture recognition technology enables users to
authenticate during transactions without the need for any
additional infrastructure, simply by capturing their gesture on the
surface of the card;
Introduction
Robert M. Harbour, Chairman and President, International Biometrics
& Identification Association, USA
08:50
‹‹ This concept allows for transactions to be performed with a
consistent level of security across any infrastructure.
Keynote
The FIDO authentication revolution:
News from the front
Stefan Barbu, Head of Secure ID Americas, NXP Semiconductors, USA
‹‹ Where are we on this journey to the
future of online authentication?
The post-password era: How to strengthen your identity to avoid
a crisis
‹‹ Is FIDO authentication delivering on
its promise to be both easier and
more secure?
‹‹ Data breaches are occurring daily and passwords are no longer an
effective method to protect data;
‹‹ The methods of compromising passwords evolve daily, but the
core defensive tactics to secure them remain the same;
‹‹ FIDO Standards Roadmap today and
tomorrow.
‹‹ The ‘Post-Password Era’ means moving to a universal,
standards-based, multi-authentication system involving more
than a password.
Brett McDowell, Executive Director, FIDO Alliance, USA
09:10
Keynote
Jason Hart, CEO and Director, Identiv, USA
Tracking visa overstays: Biometric exit
Goodbye password, hello secure identification
Congressman Louis J. Barletta,
Pennsylvania’s 11th Congressional
District, USA
‹‹ How deep can identity go? Iris, facial, fingerprint, text or beyond?
‹‹ How tightly can biometrics be coupled to identity?
‹‹ Can biometrics become revocable? How?
‹‹ What if identification became certain, even absolute?
‹‹ What are some of the likely social, political, economic and
environmental implications?
Robert E. Stewart, Sr., Chief Operating Officer, Sonavation, USA
09:30
Keynote Question and Answer Session
Panel Debate
Lightning Talks
Border security: Identity
matters
Next-generation
authentication technology
for the digital age
This panel, introduced by
Ramsey Billups, CBP, Federal
Systems, 3M Cogent, will
examine the mix of complex
and interrelated issues
involved in effectively
managing the flow of
people across borders. This
includes such issues as
security, identification of
people, secure credentials,
workplace verification,
internal enforcement, trade
and commerce facilitation.
Although we tend to treat these
issues as distinct, they are
invariably not. Our panelists
will help the audience to
understand the big picture and
learn how various components
impact each other.
Apex Air Entry Exit Reengineering at US Department
of Homeland Security (Invited)
U.S. Chamber of Commerce
representative (Invited)
Bob Davidson, Head, Aviation
Facilitation, IATA
Richard Outland, Technical
Delivery Consultant,
Government Programs, Gemalto
Gordon Wilson, President,
WorldReach Software, Canada
10:35
Coffee, Tea and Sponsored by:
Exhibition Viewing
Facilitating the hyper-mobility
of travellers: Enhancing trust,
convenience and security
Healthcare: Opening up
new opportunities with 21st
century identity technology
Session Chairman’s
Introduction
Session Chairman’s
Introduction
‹‹ Biometric credit card
consumer feedback;
The future of today’s travel
documents
‹‹ What comes next…a global
rollout.
‹‹ Secure document
technologies;
Secure ID tokens alleviate the
root cause of misidentification
and inaccurate patient data
Robert Fee, Director, Sales &
Business Development, Zwipe,
USA
‹‹ Passport standards;
Biometric-based credit cards:
Fact or fiction?
‹‹ Zwipe Mastercard project,
from concept to pilot;
Identity On-line: IEEE P2410
(BOPS) versus FIDO
‹‹ Differences and similarities
between BOPS and FIDO;
‹‹ Important: End-to-end
security goes well beyond
identity!
‹‹ Why the BOPS approach
succeeded through the IEEE
approvals process.
Scott Streit, Professor of
Computer Engineering and
Computer Science, Villanova
University, USA
11:00
‹‹ Supporting infrastructure
components to secure
borders and identities.
Robert MacDonald, Senior
Manager, Product Marketing,
Entrust, USA
‹‹ One root cause of healthcare
waste, fraud and abuse
starts with unreliable ID
management;
‹‹ The significance of
interoperable identity for
the government, insurance
companies and providers
using credentialing tokens;
‹‹ How ID tokens meet
healthcare regulations while
establishing the foundation
for protecting against fraud,
diminishing keystroke errors
and misidentification, and
eliminating the creation of
duplicate records.
David Batchelor, Vice Chair
and Acting Chairman of Health
and Human Services Council,
Board Member Smart Card
Alliance, and Co-Company
Founder of Medical Identity
Fraud Alliance, USA
11:30
Integrating air, land and sea
borders through the use of
biometrics and self-service
The confluence of healthcare
portals, identity, and costs
savings
‹‹ Self-service biometric
collection is the key to
technology adoption at border
crossings;
‹‹ Rarely mentioned in the
discussion surrounding
healthcare identities (or
credentials) is the value and
cost savings online identities
generate for healthcare
providers and public sector
entities;
‹‹ New multi-biometric airport
systems address multiple
use cases by playing on the
strengths and weaknesses of
individual modalities;
‹‹ Government is the
orchestrator of border security
schemes deployed at air and
land locations where one
solution does not fit all.
Jeff Lennon, Director Global
Business Development, VisionBox, Portugal
11:50
‹‹ Five major airports in the UAE
will benefit from advanced
border control technology to
facilitate trade and travel;
‹‹ Secure and convenient patient
authentication solutions can
reduce medical errors and
minimize fraudulent access to
healthcare;
Steve Vinsik, Vice President,
Criminal Justice and Public
Security Business Unit,
MorphoTrak, USA
12:10
Question and Answer Session
12:20
Keynote
13:45
Fishbowl Debate: Identity in the service of development
Session Leader Introduction: Alan Gelb, Senior Fellow, Center for
Global Development, USA
ID systems in developing countries: Effective but trusted?
‹‹ Digital ID technology is increasingly used in developing countries
and promises large gains;
‹‹ This trend exposes ‘legal gaps’ in data privacy legislation and the
rule of law;
‹‹ The identity industry needs to help ensure that its products are
trusted, as well as effective.
Alan Gelb, Senior Fellow, Center for Global Development, USA
Biometrics to optimise governance
Peter McDonald, Public Health
Practice Leader, Experian, USA
Securing access for patients
and providers: Assured
authentication in healthcare
‹‹ Learn how centralized
management of eGate
technology provides real-time
visibility into operations.
Lunch and Sponsored by:
Exhibition Viewing
‹‹ This session focuses on the
rise of online identities in
healthcare, their drivers, and
the ways in which identities
provide great value and cost
benefit to providers and public
sector entities.
UAE border control – A
successful past and a
promising future
‹‹ Discover how advances
in contactless biometrics
(face, finger, and iris) enable
rapid processing at border
crossings;
12:45
‹‹ Governments are increasingly using multi-modal technology
platforms not only to count citizens, but also to optimize
governance;
‹‹ Fragile states are establishing a direct relationship with their
citizens cutting out the intermediaries. The result: a reduction
of trust deficit between State and Citizens and improved
service delivery;
‹‹ How Pakistan created one of the world’s largest multi-biometric
citizens’ data warehouses.
Tariq Malik, Former Chairman, National Database & Registration
Authority, Pakistan; Senior Consultant, Government Systems
Teradata Corporation, USA ‹‹ Biometric authentication
in medical dispensing can
streamline workflows and
control drug diversion;
The role of identification in the post-2015 development agenda
and the World Bank Group’s ID4D initiative​
‹‹ Ways to meet the Electronic
Prescriptions for Controlled
Substances (EPCS)
requirement for two-factor
authentication will be
discussed.
‹‹ Recognizing that identity is a key enabler for achieving
development outcomes, the World Bank Group has recently
launched the Identification for Development (ID4D) initiative;
‹‹ The ID4D agenda builds on previous efforts led by World
Bank teams in collaboration with external partners and
client counterparts;
Greg Sarrail, VP Solutions
Business Development,
Biometrics, HID Global, USA
‹‹ The presentation will describe the cross-sectoral approach
to work closely with other development partners in providing
unified technical and financial support to low- and middle-income
countries on ID4D activities.
Question and Answer Session
Mariana Dahan, ID4D Working Group Coordinator,
The World Bank, USA
Creating a sustainable person-centric identity management
solution – Take a step back and look at the foundations
Introduced by John Mears,
IBIA Director, Lockheed Martin
Senior Fellow
‹‹ CRVS – The impact on international travel and the risks of building
without a foundation;
Working together to counter
the cyber threat
‹‹ A sound CRVS system as a facilitation and safety mechanism at
borders – It’s all about the data;
‹‹ Today’s cyber actors pose
new and increasingly complex
threats to our country;
‹‹ From nation states to criminal
groups and individuals, these
cyber actors find themselves
virtually unrestricted, able to
launch attacks from all over
the world at literally the speed of light;
‹‹ CRVS as the foundation of a Digital ID.
Sophie Taylor, Programme Lead - Civil Registration and Vital
Statistics, De La Rue, UK
15:00
Afternoon Tea, Coffee and Sponsored by:
Exhibition Viewing
‹‹ Join Assistant Director Joseph M. Demarest as he conveys the many
ways that you and the FBI can work together to identify, pursue,
and defeat the cyber adversary.
Joseph M. Demarest, Assistant Director, Cyber Division, Federal
Bureau of Investigation’s (FBI), USA
12:40
Keynote Question and Answer Session
Today’s cyber actors pose
new and increasingly complex
threats to our country
The internet of ‘everybody’ and
‘everything’: Identity matters
in a hyper-connected world
Countering identity fraud:
Technologies and techniques
15:25
Session Chairman’s
Introduction
Session Chairman’s
Introduction
15:30
Internet of Things and
digital identities, the perfect
combination
Technology in preventing
identity fraud: Friend or foe?
‹‹ Internet of Things (IoT) is the
enabler for Digital Identities;
‹‹ A road-map for connecting
your enterprise to the IoT
ecosystem;
‹‹ Will mobile authentication and
digital identities merge?
Denis Joannides, CEO, Onegini,
The Netherlands
15:50
Wearable biometric identity –
Identity gets very personal
‹‹ Integration of biometric
technology into smart
mobile devices (iPhone
and Samsung Galaxy etc.)
has proved the case for
consumer-orientated
biometric authentication and
identity;
‹‹ The next wave of biometric
integration into consumer
techology will be for
wearable devices, smart
watch, bands, glasses, ear
pods and even cloths;
‹‹ Backed up by Goode
Intelligence’s research data,
this speech will highlight
how the combination of
biometrics and wearable
technology can be
leveraged for identity and
authentication purposes.
16:30
Wearing your identity – The
future of wearables and
identity management
‹‹ Wearable technology is
taking identity management
out of the hands of
professionals and into the
hands of amateurs;
‹‹ Understanding the
interactions between
identity, wearable technology
and privacy is critical to
knowing what is possible,
what is desirable and what
should be forbidden;
‹‹ Our presentation will discuss
real project examples where
we’ve seen wearable tech
and identity management
converge and address the
issues and opportunities that
have arisen.
Rupen Mehta and Justin
Hughes, Managing Consultants,
PA Consulting, USA
Why eService success depends
on Government
‹‹ Why governments should
(and will) play a central role
in the development of public
and commercial eServices;
‹‹ An analysis of the various
models of government
involvement (i.e. NSTIC, UK
Identity Assurance Program,
Estonia, UAE and others);
‹‹ ID technology – A helpful
tool or a replacement for the
personal touch?
‹‹ A look at the different
approaches to authentication
around the world and the
corresponding levels of
assurance (EU, US and Rest
of World);
‹‹ Pros and cons of technology
vs. human interaction;
‹‹ The holistic approach – Proper
use of technological solutions.
Ian Westwood, Immigration
Consultant, UK
‹‹ Why eID and authentication
are not the same thing and
the problems (and potential
implications) of confusing
the two;
The role of effective document
authentication in creating
trustworthy ID eco-systems
‹‹ The opportunity to use the eID
document/secure element
to add a further level of
assurance for commercial
eService access and
transactions;
‹‹ Document Authentication
practices yesterday and today
(strengths and weaknesses);
‹‹ Identity Authentication
Management Systems.
Recent implementations in
North America;
‹‹ An overview of the current
SIA Proof of Concept –
Achievement of QAA4
level according to STORK
referential (Qualified ID).
‹‹ Ecosystem of Trust parallels
between people and things.
How to use best practices
to ensure improved
safeguarding.
Stephanie Delabriolle, Director,
Secure Identity Alliance, France
Jean-Claude Perrin, Secretary
General, Secure Identity
Alliance, France
Patrick W. Hearn, CEO,
Endeavor Worldwide, USA
16:50
Question and Answer Session
17:00
Panel Session
Question and Answer Session
Enabling DHS missions through biometrics: OBIM customers
and services
Alan Goode, Managing Director,
Goode Intelligence, UK
16:10
Speaker to be confirmed.
The Office of Biometric Identity Management (OBIM) will host
an interactive presentation with several existing current OBIM
customers within the Department of Homeland Security to provide an
overview of how biometric identity services are embedded into and
enable these critical missions.
An ID connected life
‹‹ A focus on the identity of
things and how an effective
identity relationship
management strategy will
allow agencies to provide
the right people with access
to trusted services while
managing risk;
‹‹ A discussion on current
initiatives underway,
including NSTIC,
Connect.gov etc.;
‹‹ How agencies can best
prepare for what’s to come –
The train has left the station
and is coming down the track.
Are you prepared?
Kolin Whitley, Director,
Experian, USA
This session will highlight OBIM services and standards, the role of
identity management within DHS, and the recent onboarding of new
several new organizations.
Session led by Kenneth Gantt, Acting Deputy Director, Office of
Biometric Identity Management (OBIM), Department of Homeland
Security (DHS), USA
17:45
Evening Reception Party Sponsored by:
18:45
Close of Day Two
Internet of Things and
digital identities, the perfect
combination
Wednesday – 25 March 2015
09:00
13:00
Moderator: B. Scott Swann, Senior Director of Innovation,
MorphoTrak, USA
Meet the Media
John B. Morris, Jr., Associate Administrator and Director of Internet
Policy, Office of Policy Analysis and Development, National
Telecommunications & Information Administration, USA
Hosted by Juan Williams and
introduced by Bill Maheu,
Senior Director of Strategic
Development, Qualcomm, USA
master QC logo (c:100, m:60, y:0, k:0)
Eric Hess, Senior Biometric Product Manager, Face Recognition, NEC
Corporation of America, USA
Sponsored by
This exciting session is hosted
by renowned journalist and
political analyst for Fox News
– Juan Williams. He will lead
a wide-ranging discussion with prominent journalists, covering
issues of great importance to the identification technology industry
– including borders and immigration, big data and privacy, and
cybersecurity.
This is a rare opportunity for conference attendees to experience
a unique perspective, as the panel members share their thoughts,
based on years of experience, expertise, and first-hand relationships
with the key decision makers in DC.
10:00
Coffee, Tea and Sponsored by:
Exhibition Viewing
10:30
Expert Discussion – The why behind complex privacy controls
An interactive look at privacy by design and why protections must
be built into future 21st century systems. Take part in a dynamic
discussion about the use of privacy controls for biometric identity
services, impacts to Personably Identifiable Information (PII), and
how safeguards can protect an individual’s privacy and civil rights
and civil liberties.
Kathleen Carroll, VP Corporate Affairs, HID Global, USA
Scott Greenwood, Constitutional Rights Attorney, General Counsel,
American Civil Liberties Union, USA
14:00
14:25
Session Chairman’s Introduction
14:30
Advancements in mobile ID technology
‹‹ Smart phones and tablets are now widely deployed in lawenforcement agencies;
‹‹ What are the requirements for smart phone-based mobile
identification solutions and what are the challenges;
‹‹ Understand the various hardware options and the latest multimodal
technology that will empower these mobile devices for field
identification and even investigation.
John Dowden, Senior Product Manager, NEC Corporation of America, USA
14:50
Chris Calabrese, Senior Policy Director, Center of Democracy and
Technology (CDT), USA
11:30
Frank Fernandez, Vice President, Market Solutions Manager, Law
Enforcement and Defense, Crossmatch, USA
15:10
Question and Answer Session
Mobile identity in the digital realm
15:20
Keynote
Challenges in current authentication solutions and how mobile
and operators can solve these issues
‹‹ Digital identity is one of today’s key strategic issues for
governments, regulators and commercial organizations across the
world. But as the number of digital identities grows, so do the risks;
‹‹ The challenge is to ensure citizens are adequately protected online –
and this requires the development of identity management solutions
that extend beyond user name and password;
‹‹ Mobile identity represents a powerful platform through which to
achieve these aims.
Introduced by Rick Nelson,
Vice President Global Business
Development for Crossmatch,
USA
Mobility, identity and
homeland defense
‹‹ Threats to the US are
embracing worldwide
mobility;
‹‹ Cross-disciplinary efforts
are needed to thwart
modern threats;
Mobile identity management: Beyond the device
‹‹ Mobile identity management devices are proliferating at a rapid rate
across multiple verticals and applications, and with this mobilization
comes a unique set of challenges;
‹‹ This presentation discusses these mobile identity management
challenges beyond the device (cell phone, tablet, purpose-built
handheld, etc.); ‹‹ What are the applications, workflows, security and management
software requirements when deploying and administering identity
management solutions in a mobile environment?
Panelists:
Michael Garcia, Deputy Director, National Strategy for Trusted
Identities in Cyberspace, National Institute of Standards and
Technology, US Department of Commerce, USA
Coffee, Tea and Sponsored by:
Exhibition Viewing
Mobile identity in the field of play
Moderator: Emily Andrew, Senior Privacy Officer, National
Protection and Programs Directorate, Department of Homeland
Security (DHS), USA
Kathryn Suchma, Science and Technology Advisor/Physical
Scientist, Office of the Director of National Intelligence (ODNI)/FBI
Laboratory, USA
connect:ID Spotlight: Facial recognition
Janne Jutila, Personal Data, Director, GSM Association, Finland
15:40
Digital identity on the go
‹‹ Who are you? The importance of digital credentials in a mobile world;
‹‹ What are you? Securing connected devices;
‹‹ Mobile tools that establish
identity can deny adversaries’ mobility.
‹‹ Authentication using virtual smart cards, derived PIV credentials and
machine certificates.
Don Salo, Director, Defense Forensics and Biometrics Agency,
Department of Defense (DoD), USA
Chris Edwards, CTO, Intercede, UK
11:50
Keynote Question and Answer Session
16:00
Question and Answer Session
12:00
Lunch and Sponsored by:
Exhibition Viewing
16:05
Closing Remarks
16:10
Close of Conference
Conference Registration Form
Please register online at: www.connectidexpo.com/delegate-booking or complete the form below and send to:
Claire Walker, connect:ID Conference Secretariat, Science Media Partners, Suite 6, Pine House, The Square, Stow-on-the-Wold, Glos, GL54 1AF, UK Tel: +44 1451 830129 or (USA) 202 386 6751 • Fax: +44 (0)870 199 1100 or (USA) 202 386 6751 • Email: [email protected]
Title: Prof, Dr, Mr, Mrs, Ms (Delete as applicable)
connect:ID Conference
First Name:_________________________________________ Last Name:____________________________________
Position/Job Title:____________________________________ Company:______________________________________
Address:_________________________________________________________________________________________
City:______________________Post/Zip Code:____________________ Country:________________________________
Tel:________________________________________________ Fax:__________________________________________
Standard Registration Rate: $999.00
IBIA Member Rate: $725.00
Government Registration Rate: $650.00
(Accredited government/law enforcement officers only –
All registrations are subject to accreditation by the organizers.)
Developing Nation Rate: $450.00
Email:____________________________________________________________________________________________
Declaration
Special Dietary or access requirements:_________________________________________________________________
I have read and agree to abide by the payment and
cancellation terms, and I understand that this form
confirms my conference booking.
Payment Details
Total payment required:___________________ Please invoice me Please charge my Visa/MasterCard/Amex*
(*delete as applicable)
Card No:__________________________________________________________________________________________
Expiry Date:_________________ Security Code:__________________ Today’s Date:____________________________
Name and address of cardholder (if different from above):__________________________________________________
________________________________________________________________________________________________
Signed:________________________________________
Date:_________________________________________
Please note that unsigned forms cannot be accepted
Data protection notice: The personal information that you provide on this
form will be stored by the event organisers Science Media Partners Limited.
We respect your privacy and do not rent, sell or disclose your personal
information to any non-affi liated third party without your consent.
NB A surcharge of 3% is applicable to all purchases made by credit card.
Terms and Conditions
Registration fees are payable in advance of the
conference and include access to the paid-for
conference sessions and exhibition area, Exhibition
Reception, conference materials, mid-session
refreshments and lunch, where stated.
Confirmation of your credit or debit card payment
along with registration confi rmation documents
will be sent to you by (air)mail. If you do not receive
confirmation of your registration 7 days prior to the
event, please contact the Conference Secretariat.
Receipt of online booking, inclusive or exclusive of
payment constitutes formal agreement to attend
and acceptance of our terms and conditions.
Cancellations
Substitutions may be made at any time but
please advise the Conference Secretariat of a
change of name. If you find it necessary to cancel
the registration completely, please notify the
Conference Secretariat immediately.
Provided written notice is received 28 days before
the start of the event, a 50% refund will be given.
It is regretted for registrations cancelled within
28 days of the conference, or for no-shows at
the conference, the full fee (100% cancellation
charges) will be payable.
In the unlikely event that Science Media
Partners Ltd shall deem it necessary to cancel
the conference, all pre-paid registration fees
will be reimbursed. Science Media Partners Ltd
reserves the right to alter the listed speakers or
programme. Science Media Partners Ltd shall
Confirmed Exhibitors (Correct at time of printing, February 2015.)
The Venue
For all Exhibition and Sponsorship inquiries, please contact:
Janine Bill, Exhibition & Sponsorship Manager, connect:ID; Tel: +44 (0)1189 843209
or (USA) 202 386 6751 Fax: +44(0)2920 946850 or (USA) 202 386 6751;
Email: [email protected]
A world-class venue, The
Walter E. Washington
Convention Center stands in
the heart of Washington, DC.
The contemporary building
has an air of style and
sophistication and provides
the perfect backdrop for
connect:ID’s multi-stream
conference and fully-featured
exhibition hall.
•3M
not be liable for reimbursing the cost of travel
or accommodation arrangements made by
companies or individual delegates.
Details are correct at the time of going to print.
Science Media Partners reserves the right to
change any session in the fi nal programme.
This conference is being organised by Science
Media Partners Ltd, a limited liability company
formed under English company law and registered
in the UK no. 5965531. Our VAT number is
GB 891 2025 35
•Identification
International Inc
•NovaTeqni
•Oberthur Technologies
•Aware, Inc.
•Identification
Technology Partners.
Inc.
•BIO-key International
•ImageWare Systems
•OVD Kinegram AG
•Center for Identification
Technology Research
•INNOVATRICS
•Qualcomm
•Integrated Biometrics
•Regula Baltija Ltd
•SABIC Speciality
Film & Sheet
•ColorID
•International Biometrics
& Identification
Association (IBIA)
•SICPA Securink Corp
Free Visitor Registration
•Crossmatch
•Iris ID Systems, Inc
•Smart Sensors Ltd
•DESKO GmbH
•IriTech, Inc.
•Sonavation
•Entrust Datacard
•Lumidigm
•SpeechPro Inc
•Gemalto
•Mentalix Inc
•SRI International
connect:ID is delighted to announce that you are able to register to attend its
fully-featured exhibition - for free… Meet an international audience, innovative
companies in the biometric and identity space, and be part of Washington DC’s
largest identity event of the year. Register to attend the Exhibition at:
http://www.connectidexpo.com/visitor-registration
•GenKey
•MODIvision
•Suprema Inc
•Green Bit S.p.A
•Morpho
•Homeland Security
Investigations
•NEC Corporation
of America
•Teslin® Substrate
by PPG
Exhibition Opening Times
•Ultra Electronics ID
Tuesday March 24, 2015: 09:15–18:45 (Evening Reception: 17:45–18:45)
•Hoyos Labs
•NexID Biometrics
•Vision-Box SA
Wednesday March 25, 2015: 09:15–16:00
•ACCESS-IS
•AuthenticID
•CMITech
•Cognitec Systems
•Novetta
•OpSec Security Group
www.connectidexpo.com
Science Media Partners Ltd., 25 Horseshoe Park, Horseshoe Rd, Pangbourne, Reading, RG8 7JW, UK
Lawmakers, senior government decision makers, global banking agencies, and
countless associations and corporation headquarters lie within easy walking
distance of this venue, whilst DC itself is a major international domestic and
international hub, providing easy access and a warm welcome to all.
Powered by