2015 Conference Program
Transcription
2015 Conference Program
d n 2n itio Ed 2015 Walter E. Washington Convention Center, Washington, DC, USA Conference: March 23–25, 2015 · Exhibition: March 24–25, 2015 Conference Program and Registration Brochure The global hub for advanced identity technologies: biometrics, secure credentials and digital identity systems The Launchpad – Identity in a brave new world Identity technology at the heart of next-generation banking solutions Proof of identity: New approaches to delivering government and commercial services online The cyber security crisis: Rising to the challenge Physical tokens of trust: Taking secure credentials to the next level Border security: Identity matters Lightning Talks – Next-generation authentication technology for the digital age Countering Identity fraud: Technologies and techniques Enabling DHS missions through Facilitating the hyper-mobility of travellers: Enhancing trust, convenience and security biometrics: OBIM customers and services Meet the Media – Hosted by Healthcare: Opening up new opportunities with 21st century identity technology Juan Williams The ‘why’ behind complex privacy controls Fishbowl Debate: Identity in the service of development connect:ID Spotlight: Facial recognition The internet of ‘everybody’ and ‘everything’: Identity matters in a hyper-connected world Mobile identity in the field of play Mobile identity in the digital realm Register Now at: www.connectidexpo.com/delegate-booking master QC logo (c:100, m:60, y:0, k:0) Platinum Sponsor Evening Reception Sponsor Gold Sponsor Gold Sponsor Sponsor Silver Sponsor Sponsor Powered by www.connectidexpo.com Bronze Sponsor Sponsor Conference Program Monday – 23 March 2015 12:30 The Protectors: The guardians of identity, protectors of privacy, and establishers of trust. The importance of privacy, security and convenience in mobile identity services Conference Chairmen’s Opening Addresses Mark Lockie, Managing Director, Science Media Partners, UK Privacy is a central tenet of any digital or mobile identity service, and citizens often associate their mobile numbers with their identity; Robert M. Harbour, Chairman and President, International Biometrics & Identification Association, USA 12:40 Lawmakers agree, and have ruled, that citizens have specific rights over their mobile numbers. Extending protection into the digital world through mobile identity solutions is a natural extension of these voice call rights; The Launchpad: Identity in a brave new world Identity is a multi-faceted concept. Enabling, disruptive, powerful, valuable. This panel of diverse identity stakeholders will take the audience on a voyage of exploration, through the universe of identity as it exists today, and then on to the outer reaches. Individual visions of identity in a brave new world... The panel, led by Phil Scarfo, VP Global Marketing, Biometrics, HID Global, USA will include: Understanding the barriers to online activity is crucial to inform the planning and delivery of digital public services. Pat Walshe, Director of Privacy – Public Policy, GSM Association, UK 14:00 Session Break Identity technology at the heart of next-generation banking solutions Proof of identity: New approaches to delivering government and commercial services online 14:15 Session Chairman’s Introduction Session Chairman’s Introduction 14:20 Using technology to improve security and ease-of-use for customers A 3D approach to minimizing your identity risks: Using Data, Documents and Devices to maximize security The Dreamers: Visionaries seeking to weave the fabric of secure, seamless and innovative identity solutions in a mobile, transactional society. Who are you? ‘Proof of self’ through the ages and now; Tension between technology and policy; Unmasking the imposter, the criminal, the terrorist. James A. Loudermilk, Senior Level Technologist, Federal Bureau of Investigation (FBI), USA One of the oft-overlooked benefits to new security and identification technologies is how they improve the overall ease-of-use for the end-user; Nomophobia Rules! The fastest-growing phobia is the fear of not having your mobile device on you – Caught it yet? If not, there is a huge amount of interesting enabling new technology coming at you that will help you catch it. This presentation will provide a case study overview of U.S. Bank’s work with voice biometrics, as well as an overview of other security technologies currently being used; And a new emerging identity ecosystem is at the very heart of it. Terry Hartmann, VP Security Solutions & Industry Applications, Unisys Corporation, USA The Architects: Creators of robust identity infrastructure, standards, technology and credentials for the future. The presentation focuses on customer-centered design when integrating these new technologies into existing customer access points. The who, what, why, where, when of global identity initiatives A huge number of identity initiatives have come to existence in recent years: eIDAS, European Citizen Card (ECC), FIDO Alliance, and Kantara Initiative, just to name a few. The goals and commercial interests of these initiatives are quite different. Beth Gallagher Dumke, Vice President, Innovation, Payment Services, U.S. Bank, USA This presentation gives an overview of identity initiatives with a focus on the identity documents involved. Klaus Schmeh, Consultant, cv cryptovision, Germany ICAO’s roles in traveler identification What do you mean that’s not me? This line hasn’t moved in days! What else do I get with this passport? R. Michael Holly, Chairman, New Technologies Work Group, International Civil Aviation Organization (ICAO), USA Identity is a multi-faceted concept. Enabling, disruptive, powerful, valuable. 14:40 Managing Identity - A Core Banking Provider View Richard Longo, Senior Vice President, Strategic Alliances & Special Projects, Temenos, USA Robust identity management strategies need to leverage a balanced use of identity data attributes, identity documents and device intelligence; Recent consumer research has confirmed the need for variable amounts and forms of identification to align with individual willingness to provide identifying information; In this session, we will discuss methods and best practices to combine identity data attributes, identity documents and device intelligence in order to address the most common identity risks. Kimberly Little Sutherland, Senior Director of Identity Management, LexisNexis Risk Solutions, USA The future of federation: Securing identity for government services The Government of Canada is using cutting-edge technology to allow citizens to use already-existing credentials to verify identity; Using trusted services, such as bank credentials, can eliminate password fatigue and create an easy, secure user experience. Andre Boysen, Chief Identity Officer, SecureKey Technologies, Canada 15:00 Case Study – Multi-modal biometric authentication (voice+face) for mobile commercial banking Wells Fargo has successfully launched a way for Wells Fargo corporate customers to login to their banking mobile app utilizing technology from SpeechPro that recognizes individual features of the human voice and face; This presentation discusses the history of this deployment, the key benefits to clients, and the use and effects of ‘token and password-free’ access by account holders. Andy Foote, VP/Strategist, Innovation Research and Development, Wholesale Banking, Wells Fargo, USA Enabling the web economy through trusted identities Douglas D. Thomas, Director of Counterintelligence Operations and Investigations, Lockheed Martin, USA An electronic ID (eID) is needed for citizens to transact online securely, with privacy protection and the same ability to verify identity as in face-toface interactions; Trust that individuals are who they claim to be is necessary to enable the growing web economy, while ensuring the protection of our identities online; Biometric authentication in banking and payments – How Latin America is leading the way 16:35 The State of North Carolina, MorphoTrust and a team of carefully selected partners will collaborate to test a driver license equivalent proof-ofidentity for online transactions. Case study #1 – Fraud prevention by banks using biometrics; Case study #2 – Authentication as a service; What can we learn from these Latin American deployments? David Benini, Vice President of Marketing, Aware Inc., USA Carlos Collodoro, CEO, TSM Technology Ltd., Brazil Moving beyond passwords with active authentication The Active Authentication (AA) platform aims to supplant dependency on legacy passwords and smartcards; The AA platform continuously collects, fuses, scores, and produces layered fidelity rankings based on multiple aspects of an individual; David Ulmer, Chief Information Officer, NC Department of Transportation, USA An overview of novel, software-based cognitive and behavioural modalities currently in advanced research and development, and integrated into the AA platform. Identity as a Service – Trusted, interoperable, user-centric A technical and business overview of the Attribute Exchange Network (AXN), a cloud-based infrastructure for enabling trusted, interoperable, user-centric identity as a service; 16:55 Services include real-time attribute, device, biometric and other attribute verification; Attribute-based access control (ABAC) services can be enabled for federated access to sensitive enterprise content using verified user attributes; online businesses and retailers can verify user affiliation to provide benefits/discounts and enable secure payment transactions. Question and Answer Session 15:45 Afternoon Coffee and Tea Sponsored by: Question and Answer Session The cyber security crisis: Rising to the challenge Physical tokens of trust: Taking secure credentials to the next level 16:10 Session Chairman’s Introduction Session Chairman’s Introduction 16:15 Critical roles of cyber security and counterintelligence in identity management Breeder documents – Closing the gap in the identity management chain Current state and trends of external and internal threats; Breeder documents are quite often counterfeited as forgers and criminals aim at the weakest link in the identity chain; Multi-layer defense strategies; Strong authentication and continuous authentication. Personalization strategies for fraud deterrence in plastic card credentials Personalization technologies are far more than a means to add bearer data to a credential; Specifics of how personalization technologies are applied can affect counterfeit and alteration deterrence; Both laser engraving and thermal personalization can be used in ways that inhibit reproduction by commercial technologies. Debbie W. Waung, Director, Identity Intelligence, Novetta Solutions, USA Joel Zlotnick, Supervisory Physical Scientist, US Department of State, USA Cyber vulnerabilities of biometrics ABC – Challenges for visual security of the physical token Biometric authentication scenarios: Is there a necessary trade-off between convenience and security? Automatic Border Control (ABC) is considered a key requirement in order to cope with the rapidly growing number of international travelers; Cyber-attack vectors that affect biometric authentication systems; How to mitigate the vulnerabilities. Bojan Simic, CTO, HyprKey, USA What level of trust in the automatic inspection process is necessary without reverting to manual inspection? Physical document designs need to be optimized for more reliable manual inspection. John Peters, Marketing & Sales Manager – North America, OVD Kinegram, USA Dave Coxe, CEO, ID Dataweb, USA 15:40 This presentation provides an overview on the current status of breeder documents initiatives, such as ‘ORIGINS’ in Europe. Christian Wagner, Vice President Segment Development Government, SMARTRAC TECHNOLOGY GROUP, Germany Mark DiFraia, Senior Director, Solutions Strategy, MorphoTrust, USA 15:20 Breeder documents need to be brought to a much higher level of security; 17:15 Question and Answer Session 17:20 Keynote Question and Answer Session Introduced by Clark Nelson, Senior Vice President, MorphoTrak Identity: A 21st century gatekeeper for critical infrastructure and beyond A look at the role of identity and how it enables access and protection of critical infrastructure in today’s hyper mobile and digital world; Identity services are the key. Suzanne Spaulding, Under Secretary, National Protection and Programs Directorate, Department of Homeland Security (DHS), USA 17:40 Keynote Question and Answer Session 17:45 End of Day One Tuesday – 24 March 2015 08:45 Lightning Talks (continued) Next generation authentication using on-card gesture recognition On-card gesture recognition technology enables users to authenticate during transactions without the need for any additional infrastructure, simply by capturing their gesture on the surface of the card; Introduction Robert M. Harbour, Chairman and President, International Biometrics & Identification Association, USA 08:50 This concept allows for transactions to be performed with a consistent level of security across any infrastructure. Keynote The FIDO authentication revolution: News from the front Stefan Barbu, Head of Secure ID Americas, NXP Semiconductors, USA Where are we on this journey to the future of online authentication? The post-password era: How to strengthen your identity to avoid a crisis Is FIDO authentication delivering on its promise to be both easier and more secure? Data breaches are occurring daily and passwords are no longer an effective method to protect data; The methods of compromising passwords evolve daily, but the core defensive tactics to secure them remain the same; FIDO Standards Roadmap today and tomorrow. The ‘Post-Password Era’ means moving to a universal, standards-based, multi-authentication system involving more than a password. Brett McDowell, Executive Director, FIDO Alliance, USA 09:10 Keynote Jason Hart, CEO and Director, Identiv, USA Tracking visa overstays: Biometric exit Goodbye password, hello secure identification Congressman Louis J. Barletta, Pennsylvania’s 11th Congressional District, USA How deep can identity go? Iris, facial, fingerprint, text or beyond? How tightly can biometrics be coupled to identity? Can biometrics become revocable? How? What if identification became certain, even absolute? What are some of the likely social, political, economic and environmental implications? Robert E. Stewart, Sr., Chief Operating Officer, Sonavation, USA 09:30 Keynote Question and Answer Session Panel Debate Lightning Talks Border security: Identity matters Next-generation authentication technology for the digital age This panel, introduced by Ramsey Billups, CBP, Federal Systems, 3M Cogent, will examine the mix of complex and interrelated issues involved in effectively managing the flow of people across borders. This includes such issues as security, identification of people, secure credentials, workplace verification, internal enforcement, trade and commerce facilitation. Although we tend to treat these issues as distinct, they are invariably not. Our panelists will help the audience to understand the big picture and learn how various components impact each other. Apex Air Entry Exit Reengineering at US Department of Homeland Security (Invited) U.S. Chamber of Commerce representative (Invited) Bob Davidson, Head, Aviation Facilitation, IATA Richard Outland, Technical Delivery Consultant, Government Programs, Gemalto Gordon Wilson, President, WorldReach Software, Canada 10:35 Coffee, Tea and Sponsored by: Exhibition Viewing Facilitating the hyper-mobility of travellers: Enhancing trust, convenience and security Healthcare: Opening up new opportunities with 21st century identity technology Session Chairman’s Introduction Session Chairman’s Introduction Biometric credit card consumer feedback; The future of today’s travel documents What comes next…a global rollout. Secure document technologies; Secure ID tokens alleviate the root cause of misidentification and inaccurate patient data Robert Fee, Director, Sales & Business Development, Zwipe, USA Passport standards; Biometric-based credit cards: Fact or fiction? Zwipe Mastercard project, from concept to pilot; Identity On-line: IEEE P2410 (BOPS) versus FIDO Differences and similarities between BOPS and FIDO; Important: End-to-end security goes well beyond identity! Why the BOPS approach succeeded through the IEEE approvals process. Scott Streit, Professor of Computer Engineering and Computer Science, Villanova University, USA 11:00 Supporting infrastructure components to secure borders and identities. Robert MacDonald, Senior Manager, Product Marketing, Entrust, USA One root cause of healthcare waste, fraud and abuse starts with unreliable ID management; The significance of interoperable identity for the government, insurance companies and providers using credentialing tokens; How ID tokens meet healthcare regulations while establishing the foundation for protecting against fraud, diminishing keystroke errors and misidentification, and eliminating the creation of duplicate records. David Batchelor, Vice Chair and Acting Chairman of Health and Human Services Council, Board Member Smart Card Alliance, and Co-Company Founder of Medical Identity Fraud Alliance, USA 11:30 Integrating air, land and sea borders through the use of biometrics and self-service The confluence of healthcare portals, identity, and costs savings Self-service biometric collection is the key to technology adoption at border crossings; Rarely mentioned in the discussion surrounding healthcare identities (or credentials) is the value and cost savings online identities generate for healthcare providers and public sector entities; New multi-biometric airport systems address multiple use cases by playing on the strengths and weaknesses of individual modalities; Government is the orchestrator of border security schemes deployed at air and land locations where one solution does not fit all. Jeff Lennon, Director Global Business Development, VisionBox, Portugal 11:50 Five major airports in the UAE will benefit from advanced border control technology to facilitate trade and travel; Secure and convenient patient authentication solutions can reduce medical errors and minimize fraudulent access to healthcare; Steve Vinsik, Vice President, Criminal Justice and Public Security Business Unit, MorphoTrak, USA 12:10 Question and Answer Session 12:20 Keynote 13:45 Fishbowl Debate: Identity in the service of development Session Leader Introduction: Alan Gelb, Senior Fellow, Center for Global Development, USA ID systems in developing countries: Effective but trusted? Digital ID technology is increasingly used in developing countries and promises large gains; This trend exposes ‘legal gaps’ in data privacy legislation and the rule of law; The identity industry needs to help ensure that its products are trusted, as well as effective. Alan Gelb, Senior Fellow, Center for Global Development, USA Biometrics to optimise governance Peter McDonald, Public Health Practice Leader, Experian, USA Securing access for patients and providers: Assured authentication in healthcare Learn how centralized management of eGate technology provides real-time visibility into operations. Lunch and Sponsored by: Exhibition Viewing This session focuses on the rise of online identities in healthcare, their drivers, and the ways in which identities provide great value and cost benefit to providers and public sector entities. UAE border control – A successful past and a promising future Discover how advances in contactless biometrics (face, finger, and iris) enable rapid processing at border crossings; 12:45 Governments are increasingly using multi-modal technology platforms not only to count citizens, but also to optimize governance; Fragile states are establishing a direct relationship with their citizens cutting out the intermediaries. The result: a reduction of trust deficit between State and Citizens and improved service delivery; How Pakistan created one of the world’s largest multi-biometric citizens’ data warehouses. Tariq Malik, Former Chairman, National Database & Registration Authority, Pakistan; Senior Consultant, Government Systems Teradata Corporation, USA Biometric authentication in medical dispensing can streamline workflows and control drug diversion; The role of identification in the post-2015 development agenda and the World Bank Group’s ID4D initiative Ways to meet the Electronic Prescriptions for Controlled Substances (EPCS) requirement for two-factor authentication will be discussed. Recognizing that identity is a key enabler for achieving development outcomes, the World Bank Group has recently launched the Identification for Development (ID4D) initiative; The ID4D agenda builds on previous efforts led by World Bank teams in collaboration with external partners and client counterparts; Greg Sarrail, VP Solutions Business Development, Biometrics, HID Global, USA The presentation will describe the cross-sectoral approach to work closely with other development partners in providing unified technical and financial support to low- and middle-income countries on ID4D activities. Question and Answer Session Mariana Dahan, ID4D Working Group Coordinator, The World Bank, USA Creating a sustainable person-centric identity management solution – Take a step back and look at the foundations Introduced by John Mears, IBIA Director, Lockheed Martin Senior Fellow CRVS – The impact on international travel and the risks of building without a foundation; Working together to counter the cyber threat A sound CRVS system as a facilitation and safety mechanism at borders – It’s all about the data; Today’s cyber actors pose new and increasingly complex threats to our country; From nation states to criminal groups and individuals, these cyber actors find themselves virtually unrestricted, able to launch attacks from all over the world at literally the speed of light; CRVS as the foundation of a Digital ID. Sophie Taylor, Programme Lead - Civil Registration and Vital Statistics, De La Rue, UK 15:00 Afternoon Tea, Coffee and Sponsored by: Exhibition Viewing Join Assistant Director Joseph M. Demarest as he conveys the many ways that you and the FBI can work together to identify, pursue, and defeat the cyber adversary. Joseph M. Demarest, Assistant Director, Cyber Division, Federal Bureau of Investigation’s (FBI), USA 12:40 Keynote Question and Answer Session Today’s cyber actors pose new and increasingly complex threats to our country The internet of ‘everybody’ and ‘everything’: Identity matters in a hyper-connected world Countering identity fraud: Technologies and techniques 15:25 Session Chairman’s Introduction Session Chairman’s Introduction 15:30 Internet of Things and digital identities, the perfect combination Technology in preventing identity fraud: Friend or foe? Internet of Things (IoT) is the enabler for Digital Identities; A road-map for connecting your enterprise to the IoT ecosystem; Will mobile authentication and digital identities merge? Denis Joannides, CEO, Onegini, The Netherlands 15:50 Wearable biometric identity – Identity gets very personal Integration of biometric technology into smart mobile devices (iPhone and Samsung Galaxy etc.) has proved the case for consumer-orientated biometric authentication and identity; The next wave of biometric integration into consumer techology will be for wearable devices, smart watch, bands, glasses, ear pods and even cloths; Backed up by Goode Intelligence’s research data, this speech will highlight how the combination of biometrics and wearable technology can be leveraged for identity and authentication purposes. 16:30 Wearing your identity – The future of wearables and identity management Wearable technology is taking identity management out of the hands of professionals and into the hands of amateurs; Understanding the interactions between identity, wearable technology and privacy is critical to knowing what is possible, what is desirable and what should be forbidden; Our presentation will discuss real project examples where we’ve seen wearable tech and identity management converge and address the issues and opportunities that have arisen. Rupen Mehta and Justin Hughes, Managing Consultants, PA Consulting, USA Why eService success depends on Government Why governments should (and will) play a central role in the development of public and commercial eServices; An analysis of the various models of government involvement (i.e. NSTIC, UK Identity Assurance Program, Estonia, UAE and others); ID technology – A helpful tool or a replacement for the personal touch? A look at the different approaches to authentication around the world and the corresponding levels of assurance (EU, US and Rest of World); Pros and cons of technology vs. human interaction; The holistic approach – Proper use of technological solutions. Ian Westwood, Immigration Consultant, UK Why eID and authentication are not the same thing and the problems (and potential implications) of confusing the two; The role of effective document authentication in creating trustworthy ID eco-systems The opportunity to use the eID document/secure element to add a further level of assurance for commercial eService access and transactions; Document Authentication practices yesterday and today (strengths and weaknesses); Identity Authentication Management Systems. Recent implementations in North America; An overview of the current SIA Proof of Concept – Achievement of QAA4 level according to STORK referential (Qualified ID). Ecosystem of Trust parallels between people and things. How to use best practices to ensure improved safeguarding. Stephanie Delabriolle, Director, Secure Identity Alliance, France Jean-Claude Perrin, Secretary General, Secure Identity Alliance, France Patrick W. Hearn, CEO, Endeavor Worldwide, USA 16:50 Question and Answer Session 17:00 Panel Session Question and Answer Session Enabling DHS missions through biometrics: OBIM customers and services Alan Goode, Managing Director, Goode Intelligence, UK 16:10 Speaker to be confirmed. The Office of Biometric Identity Management (OBIM) will host an interactive presentation with several existing current OBIM customers within the Department of Homeland Security to provide an overview of how biometric identity services are embedded into and enable these critical missions. An ID connected life A focus on the identity of things and how an effective identity relationship management strategy will allow agencies to provide the right people with access to trusted services while managing risk; A discussion on current initiatives underway, including NSTIC, Connect.gov etc.; How agencies can best prepare for what’s to come – The train has left the station and is coming down the track. Are you prepared? Kolin Whitley, Director, Experian, USA This session will highlight OBIM services and standards, the role of identity management within DHS, and the recent onboarding of new several new organizations. Session led by Kenneth Gantt, Acting Deputy Director, Office of Biometric Identity Management (OBIM), Department of Homeland Security (DHS), USA 17:45 Evening Reception Party Sponsored by: 18:45 Close of Day Two Internet of Things and digital identities, the perfect combination Wednesday – 25 March 2015 09:00 13:00 Moderator: B. Scott Swann, Senior Director of Innovation, MorphoTrak, USA Meet the Media John B. Morris, Jr., Associate Administrator and Director of Internet Policy, Office of Policy Analysis and Development, National Telecommunications & Information Administration, USA Hosted by Juan Williams and introduced by Bill Maheu, Senior Director of Strategic Development, Qualcomm, USA master QC logo (c:100, m:60, y:0, k:0) Eric Hess, Senior Biometric Product Manager, Face Recognition, NEC Corporation of America, USA Sponsored by This exciting session is hosted by renowned journalist and political analyst for Fox News – Juan Williams. He will lead a wide-ranging discussion with prominent journalists, covering issues of great importance to the identification technology industry – including borders and immigration, big data and privacy, and cybersecurity. This is a rare opportunity for conference attendees to experience a unique perspective, as the panel members share their thoughts, based on years of experience, expertise, and first-hand relationships with the key decision makers in DC. 10:00 Coffee, Tea and Sponsored by: Exhibition Viewing 10:30 Expert Discussion – The why behind complex privacy controls An interactive look at privacy by design and why protections must be built into future 21st century systems. Take part in a dynamic discussion about the use of privacy controls for biometric identity services, impacts to Personably Identifiable Information (PII), and how safeguards can protect an individual’s privacy and civil rights and civil liberties. Kathleen Carroll, VP Corporate Affairs, HID Global, USA Scott Greenwood, Constitutional Rights Attorney, General Counsel, American Civil Liberties Union, USA 14:00 14:25 Session Chairman’s Introduction 14:30 Advancements in mobile ID technology Smart phones and tablets are now widely deployed in lawenforcement agencies; What are the requirements for smart phone-based mobile identification solutions and what are the challenges; Understand the various hardware options and the latest multimodal technology that will empower these mobile devices for field identification and even investigation. John Dowden, Senior Product Manager, NEC Corporation of America, USA 14:50 Chris Calabrese, Senior Policy Director, Center of Democracy and Technology (CDT), USA 11:30 Frank Fernandez, Vice President, Market Solutions Manager, Law Enforcement and Defense, Crossmatch, USA 15:10 Question and Answer Session Mobile identity in the digital realm 15:20 Keynote Challenges in current authentication solutions and how mobile and operators can solve these issues Digital identity is one of today’s key strategic issues for governments, regulators and commercial organizations across the world. But as the number of digital identities grows, so do the risks; The challenge is to ensure citizens are adequately protected online – and this requires the development of identity management solutions that extend beyond user name and password; Mobile identity represents a powerful platform through which to achieve these aims. Introduced by Rick Nelson, Vice President Global Business Development for Crossmatch, USA Mobility, identity and homeland defense Threats to the US are embracing worldwide mobility; Cross-disciplinary efforts are needed to thwart modern threats; Mobile identity management: Beyond the device Mobile identity management devices are proliferating at a rapid rate across multiple verticals and applications, and with this mobilization comes a unique set of challenges; This presentation discusses these mobile identity management challenges beyond the device (cell phone, tablet, purpose-built handheld, etc.); What are the applications, workflows, security and management software requirements when deploying and administering identity management solutions in a mobile environment? Panelists: Michael Garcia, Deputy Director, National Strategy for Trusted Identities in Cyberspace, National Institute of Standards and Technology, US Department of Commerce, USA Coffee, Tea and Sponsored by: Exhibition Viewing Mobile identity in the field of play Moderator: Emily Andrew, Senior Privacy Officer, National Protection and Programs Directorate, Department of Homeland Security (DHS), USA Kathryn Suchma, Science and Technology Advisor/Physical Scientist, Office of the Director of National Intelligence (ODNI)/FBI Laboratory, USA connect:ID Spotlight: Facial recognition Janne Jutila, Personal Data, Director, GSM Association, Finland 15:40 Digital identity on the go Who are you? The importance of digital credentials in a mobile world; What are you? Securing connected devices; Mobile tools that establish identity can deny adversaries’ mobility. Authentication using virtual smart cards, derived PIV credentials and machine certificates. Don Salo, Director, Defense Forensics and Biometrics Agency, Department of Defense (DoD), USA Chris Edwards, CTO, Intercede, UK 11:50 Keynote Question and Answer Session 16:00 Question and Answer Session 12:00 Lunch and Sponsored by: Exhibition Viewing 16:05 Closing Remarks 16:10 Close of Conference Conference Registration Form Please register online at: www.connectidexpo.com/delegate-booking or complete the form below and send to: Claire Walker, connect:ID Conference Secretariat, Science Media Partners, Suite 6, Pine House, The Square, Stow-on-the-Wold, Glos, GL54 1AF, UK Tel: +44 1451 830129 or (USA) 202 386 6751 • Fax: +44 (0)870 199 1100 or (USA) 202 386 6751 • Email: c.walker@sciencemediapartners.com Title: Prof, Dr, Mr, Mrs, Ms (Delete as applicable) connect:ID Conference First Name:_________________________________________ Last Name:____________________________________ Position/Job Title:____________________________________ Company:______________________________________ Address:_________________________________________________________________________________________ City:______________________Post/Zip Code:____________________ Country:________________________________ Tel:________________________________________________ Fax:__________________________________________ Standard Registration Rate: $999.00 IBIA Member Rate: $725.00 Government Registration Rate: $650.00 (Accredited government/law enforcement officers only – All registrations are subject to accreditation by the organizers.) Developing Nation Rate: $450.00 Email:____________________________________________________________________________________________ Declaration Special Dietary or access requirements:_________________________________________________________________ I have read and agree to abide by the payment and cancellation terms, and I understand that this form confirms my conference booking. Payment Details Total payment required:___________________ Please invoice me Please charge my Visa/MasterCard/Amex* (*delete as applicable) Card No:__________________________________________________________________________________________ Expiry Date:_________________ Security Code:__________________ Today’s Date:____________________________ Name and address of cardholder (if different from above):__________________________________________________ ________________________________________________________________________________________________ Signed:________________________________________ Date:_________________________________________ Please note that unsigned forms cannot be accepted Data protection notice: The personal information that you provide on this form will be stored by the event organisers Science Media Partners Limited. We respect your privacy and do not rent, sell or disclose your personal information to any non-affi liated third party without your consent. NB A surcharge of 3% is applicable to all purchases made by credit card. Terms and Conditions Registration fees are payable in advance of the conference and include access to the paid-for conference sessions and exhibition area, Exhibition Reception, conference materials, mid-session refreshments and lunch, where stated. Confirmation of your credit or debit card payment along with registration confi rmation documents will be sent to you by (air)mail. If you do not receive confirmation of your registration 7 days prior to the event, please contact the Conference Secretariat. Receipt of online booking, inclusive or exclusive of payment constitutes formal agreement to attend and acceptance of our terms and conditions. Cancellations Substitutions may be made at any time but please advise the Conference Secretariat of a change of name. If you find it necessary to cancel the registration completely, please notify the Conference Secretariat immediately. Provided written notice is received 28 days before the start of the event, a 50% refund will be given. It is regretted for registrations cancelled within 28 days of the conference, or for no-shows at the conference, the full fee (100% cancellation charges) will be payable. In the unlikely event that Science Media Partners Ltd shall deem it necessary to cancel the conference, all pre-paid registration fees will be reimbursed. Science Media Partners Ltd reserves the right to alter the listed speakers or programme. Science Media Partners Ltd shall Confirmed Exhibitors (Correct at time of printing, February 2015.) The Venue For all Exhibition and Sponsorship inquiries, please contact: Janine Bill, Exhibition & Sponsorship Manager, connect:ID; Tel: +44 (0)1189 843209 or (USA) 202 386 6751 Fax: +44(0)2920 946850 or (USA) 202 386 6751; Email: j.bill@sciencemediapartners.com A world-class venue, The Walter E. Washington Convention Center stands in the heart of Washington, DC. The contemporary building has an air of style and sophistication and provides the perfect backdrop for connect:ID’s multi-stream conference and fully-featured exhibition hall. •3M not be liable for reimbursing the cost of travel or accommodation arrangements made by companies or individual delegates. Details are correct at the time of going to print. Science Media Partners reserves the right to change any session in the fi nal programme. This conference is being organised by Science Media Partners Ltd, a limited liability company formed under English company law and registered in the UK no. 5965531. Our VAT number is GB 891 2025 35 •Identification International Inc •NovaTeqni •Oberthur Technologies •Aware, Inc. •Identification Technology Partners. Inc. •BIO-key International •ImageWare Systems •OVD Kinegram AG •Center for Identification Technology Research •INNOVATRICS •Qualcomm •Integrated Biometrics •Regula Baltija Ltd •SABIC Speciality Film & Sheet •ColorID •International Biometrics & Identification Association (IBIA) •SICPA Securink Corp Free Visitor Registration •Crossmatch •Iris ID Systems, Inc •Smart Sensors Ltd •DESKO GmbH •IriTech, Inc. •Sonavation •Entrust Datacard •Lumidigm •SpeechPro Inc •Gemalto •Mentalix Inc •SRI International connect:ID is delighted to announce that you are able to register to attend its fully-featured exhibition - for free… Meet an international audience, innovative companies in the biometric and identity space, and be part of Washington DC’s largest identity event of the year. Register to attend the Exhibition at: http://www.connectidexpo.com/visitor-registration •GenKey •MODIvision •Suprema Inc •Green Bit S.p.A •Morpho •Homeland Security Investigations •NEC Corporation of America •Teslin® Substrate by PPG Exhibition Opening Times •Ultra Electronics ID Tuesday March 24, 2015: 09:15–18:45 (Evening Reception: 17:45–18:45) •Hoyos Labs •NexID Biometrics •Vision-Box SA Wednesday March 25, 2015: 09:15–16:00 •ACCESS-IS •AuthenticID •CMITech •Cognitec Systems •Novetta •OpSec Security Group www.connectidexpo.com Science Media Partners Ltd., 25 Horseshoe Park, Horseshoe Rd, Pangbourne, Reading, RG8 7JW, UK Lawmakers, senior government decision makers, global banking agencies, and countless associations and corporation headquarters lie within easy walking distance of this venue, whilst DC itself is a major international domestic and international hub, providing easy access and a warm welcome to all. Powered by