14.03.2016 Views

Edition

1U0X4kV

1U0X4kV

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

can then be used to alert countries. INTERPOL solutions need to be used and<br />

populated by member countries; this will be outlined in statistics showing the use<br />

of these databases. In conclusion the talk will put forward recommendations for<br />

increased use and sharing of data through INTERPOL secure network.<br />

<br />

<br />

<br />

Overview of AFIS gateway and success;<br />

Development of face program;<br />

Biometrics for migration, terrorism and finding fugitives.<br />

Biography<br />

Mark Branchflower joined New Scotland Yard fingerprint branch in England<br />

in 1984 as a trainee fingerprint officer. After qualifying as a fingerprint expert<br />

in 1989 he left the UK and, in 1990, became a fingerprint officer with INTERPOL<br />

at its headquarters in Lyon France. Since 1990, he has participated in many<br />

INTERPOL European and International working groups on fingerprint standards,<br />

AFIS, training, disaster victim identification and DNA. Currently, as Head of the<br />

Fingerprint Unit, his main duties are the organisation of INTERPOL fingerprint<br />

AFIS services, organisation of meetings and conferences and Identification<br />

projects. Currently. Mr Branchflower is involved in several projects concerning<br />

the exchange of fingerprint information between INTERPOL member countries,<br />

increasing the use of INTERPOL AFIS services, and developing the new facial<br />

identification service.<br />

John B. Dowden<br />

NECAM Biometrics Product Manager, USA<br />

<br />

<br />

<br />

Time: 12:40pm<br />

Law enforcement: The benefits and challenges of<br />

multi-modal and the cloud<br />

Architecture;<br />

Use cases and workflow;<br />

Networking and security.<br />

Biography<br />

Since 2012, John Dowden has been the Senior Product Manager for NEC<br />

Corporation of America Biometrics Solutions Division and Law Enforcement<br />

Solution Owner for NEC Global Safety Division. He has over 20 years of specific<br />

industry experience planning and developing multi-modal biometrics products<br />

and solutions for implementation and operation across the world. Before<br />

working in biometrics, he was both a military officer with the Air Force, and an<br />

electrical engineer within private industry for mass transit control and inflight<br />

entertainment systems. When John isn’t working, he enjoys spending time with his<br />

family and friends running, hiking, mountain climbing and playing golf and tennis<br />

The mobile workforce – Technological<br />

challenges, new solutions<br />

Room 207B<br />

Time: 11.45am<br />

Session Chairman: Benji Hutchinson, Senior Director, NEC Corporation of<br />

America, USA<br />

Chris Trytten<br />

Market Solutions Manager, Crossmatch, USA<br />

Time: 11:50am<br />

<br />

<br />

<br />

Identity is the new perimeter; it is no longer the physical walls of the office<br />

or reach of the network plug;<br />

The trade-off between ease of use and security is no longer acceptable in<br />

today’s environment;<br />

New identity-based security models are required, and low-friction<br />

authentication factors including biometrics play an integral role and will<br />

be discussed.<br />

Biography<br />

Chris Trytten has more than two decades of technical and managerial<br />

experience in systems and security at leading companies in Silicon Valley,<br />

including positions with Crossmatch, DigitalPersona, Interlink Networks, Apple,<br />

Siemens and Amdahl.<br />

In his current position as Market Solutions Manager at Crossmatch, he is using<br />

his experience serving the Financial and Retail markets by guiding the product<br />

and market teams to address the security needs of these industries. Mr Trytten<br />

is the author of multiple security white papers and frequent contributor to<br />

related articles.<br />

Hildegard Ferraiolo<br />

Time: 12:15pm<br />

Senior Computer Scientist, National Institute of Standards and<br />

Technology (NIST), USA<br />

Derived PIV credential – A USG eAuthentication<br />

approach from mobile devices<br />

This presentation introduces the USG approach to eAuthentication for mobile<br />

devices to satisfy Homeland Presidential Directive -12. It summarises the<br />

opportunities and challenges in defining a government-wide credential that is<br />

interoperable across government and, at the same time, can be adopted by the<br />

diverse set of mobile devices. The presentation closes with future work and an<br />

outlook for the years to come.<br />

<br />

<br />

<br />

Introduction to the USG approach to e-authentication for mobile devices to<br />

satisfy Homeland Presidential Directive -12;<br />

Challenges and opportunities;<br />

Future works and outlook.<br />

Biography<br />

Hildegard Ferraiolo is a Senior Computer Scientist at National Institute of<br />

Standards and Technology (NIST), where she leads the PIV Program activities,<br />

including the recent completed revision 2 of Federal Information Processing<br />

Standard (FIPS) 201—the USG standard for identity verification of federal<br />

employees and contractors that has close to 5 million federal subscribers.<br />

Recently, Hildegard led and co-authored several NIST publications in the FIPS<br />

201 standard suite, including SP 800-157 Derived PIV Credentials for Mobile<br />

Device, its Conformance Test Requirements document (SP 800-166), and<br />

associated issuer accreditation document (SP 800-79-2).<br />

Deep Bhatia<br />

Staff Product Manager, Qualcomm Technologies, USA<br />

Time: 12:40pm<br />

Flexibility, security and time – Creating optimal<br />

mobile workforce solutions<br />

Mobility + Work: Identity as the new perimeter<br />

Identity is the new perimeter. The castle wall model of security is inadequate<br />

to secure corporate assets. The sheer number of devices, actors, applications,<br />

systems and access points to be secured has overwhelmed traditional<br />

perimeter security. New identity based security models are required, and lowfriction<br />

authentication factors including biometrics play an integral role and<br />

will be discussed.<br />

<br />

<br />

<br />

<br />

Technology advancements have made our world more accessible; from the<br />

creation of the internet, cars, smartphones, to the internet of things;<br />

Mobile technology advancements enable workforce flexibility; however,<br />

security cannot be compromised;<br />

Breaches are occurring and must be secured to enable a fully effective and<br />

safe mobile workforce;<br />

Leveraging biometric technology, liveness detection, and an improved<br />

secure architecture, we will enable a secure mobile workforce.<br />

35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!