1 year ago

Government Security News August Digital Edition

Winners’ Portraits:

Winners’ Portraits: GSN 2016 Airport, Seaport, Border Security Awa Telos Corporation: 2016 Winner, Best Biometric Identification/Authentication Solution By Chuck Brooks, 2016 Lead Judge It was an honor to judge the recent GSN 2016 Airport, Seaport, Border Security Awards Program and review a wide array of exceptional security technology submissions. I’m very pleased to be discussing the Telos winning entry with Renate Neely, Marketing Director of Telos Corporation, and Dawn E. Lucini, Director of Aviation Security, Telos Identity Management Solutions. I have been aware of the important work of Telos Corporation dating back to the years when I covered national security issues working for the late Senator Arlen Specter on The Hill. As the digital world has involved operationally over the past decade, so has the vulnerability of maintaining security for people, systems and information. Brooks: In the defense, homeland, and intel communities Telos is highly regarded for the generic category of “secure communications” and we know that your solution is advanced, efficient and certainly has the confidence of some of the most important government agencies in the security arena. Can you elaborate on your background in government and some of the communications areas, including mobility, where Telos has contributed solutions? Renate Neely: Thank you, Chuck, for your kind words about Telos Corporation. We do indeed have a long history of supporting federal government clients with solutions for secure communications, as well as cyber security, secure mobility, and identity management. But if I may, I’d like to focus our remarks today not on Telos Corporation, but on Telos Identity Management Solutions LLC (Telos ID). It is this subsidiary rather than the parent Telos Corporation that is the star of the GSN 2016 Airport, Seaport, Border Security award for the Best Biometric Identification or Authentication Solution. Telos ID’s original claim to fame 12 Renate Neely, Marketing Director Dawn E. Lucini, Director of Aviation Security is its long history of supporting the Defense Manpower Data Center’s (DMDC) Common Access Card (CAC) program to provide DoD personnel with identity-based access to secure resources, including communications systems, as well as physical access to secure areas. This has been the springboard for innovative developments in the areas of identity vetting and continuous threat assessment. Brooks: We are living in an era of large and widespread information security breaches. Everyone is vulnerable and networks, including those of government agencies (i.e. OPM) are immune to cyber-attacks. Risk management has become an operational requirement for executive management. What does Telos do in the area of risk assessments

ds Program for networks both in the federal and commercial spaces? Renate Neely: Telos Corporation protects government and commercial enterprises with solutions and services for the full cyber security lifecycle. Our offerings include independent counsel for information security requirements, cyber security consulting services, and enterprise solutions for IT risk management and continuous compliance. But again, let’s focus on Telos ID, which addresses the operational requirements of risk management as well, focusing primarily on the insider threat. An example is the company’s IDVetting service, which provides governments, schools, medical professionals, and commercial organizations with a complete fingerprint background checking solution. These customers use IDVetting services to submit biographic and biometric information from employees, candidates, and contractors to the FBI for criminal history records checks, helping to secure their business environment, reduce risk and cost, and comply with federal, state, and local laws regarding required checks for specific industries and roles. Brooks: The recent terrorist attacks against airport targets demonstrate the need for enhanced security measures, including screening of airport staff, and background checks and badging operations. The trend is for better authentication and biometric layering to mitigate threats. Can you take this opportunity to highlight the current application and futures uses of Telos ID for transportation security? Can you provide more detail about your award winning Telos ID Designated Aviation Channeling service (DAC)? What are the engineering and performance differentiators for the aviation industry? Can you also list Telos ID current applications and some of your key customers as well as future offerings? Dawn Lucini: Airports, airlines, and related services are required to vet the security backgrounds of job applicants and employees who have access to secure areas. Telos ID is one of only three organizations authorized by the TSA to be a designated aviation channeler (DAC), meaning it is certified to collect and send fingerprints and enrollment information to TSA for security threat assessments and criminal history record checks. Telos ID’s DAC service was the first of these third party channeling services to be approved 13 for operation by the TSA, and has continued to win the vast majority of DAC business since its inception. Telos ID DAC is a modular, Webbased offering that lets airports and air carriers select which services they need. The solution can be customized to specific business processes and provide custom reporting and information exports. The Telos ID DAC platform can integrate with other workforce systems to meet additional badging, physical security and personnel administrative needs. Telos ID tailors the secure Web portal, allowing security and badging offices to perform multiple functions on one platform. Telos ID DAC is deployed at more than 50 airports and airlines across the U.S. – including BWI Thurgood Marshall and DFW Dallas/Fort Worth. Here is the full list of current clients: identity-management/aviationchanneling/customers/ Vetting the backgrounds of airport and related personnel is essential to understanding and mitigating the risk of bad actors gaining access to secure areas. But doing this vetting on a periodic basis may allow something to slip through the cracks, a piece of information that just might help avoid disaster. To that end, the More on page 42