How to find usdirections
About the HUBs
biometric ID:HUB is one of three simultaneous conferences at connect:ID.
biometric ID:HUB will focus in-depth on this highly-topical and fast-moving area, but, where relevant, will bring together audiences to discuss cross-over issues with mobile ID:HUB and secure ID:HUB. Conference attendees can follow one conference or mix and match tracks across the HUBs.
About biometric ID:HUB
Biometric technologies are empowering countless organizations in their quest to authenticate customers, identify citizens, protect valuable assets, or enhance national security. Individual consumers, meanwhile, are becoming liberated through new biometric functionality now becoming standard on a wide range of mobile/smart devices.
From borders to banks, law enforcement toeducation - and many other applications beside - this conference will examine the new paradigm within which biometric technology now exists, where new solutions are offering capabilities almost unthinkable just a few years ago - and with them a number of potentially sensitive policy issues. Exponential improvements in technical capabilities, combined with an increasing societal willingness (with caveats) to embrace this technology, are leading to a future where biometrics - often in combination with a variety of other disruptive technologies - will make a transformative difference in the physical, mobile and digital domains.
The biometricID:HUB 2017 conference program will be available spring 2017
For information, the biometricID:HUB 2016 program is below:
Monday, March 14, 2016
Opening keynote address
|1.00 pm||Questions and answers|
|2.00 pm||Session Chairman’s Introduction
- The crucial intersection between biometrics, screening technologies and emerging identity trends;
|2.50 pm||Question and Answer Session|
3.00pm Refreshment Break sponsored by
Keynote - How will tomorrow’s security stay one step ahead?
As cyber threats expand globally and exponentially, so does the necessity for strong, integrated security solutions. The focused, deliberate collaboration and convergence of Mobile, Biometrics and Security is urgent and imperative.
|3.40 pm||Keynote Question and Answer Session|
|4.05 pm||Keynote Question and Answer Session|
|4:10 pm||Session Chairman’s Introduction|
CASE HISTORY - The future of borders and travel experience: a single biometric token to streamline passenger flow
- The onset of a new era in border security: How Happy Flow is altering travel across borders through pre-clearance;
- Using a single biometric identification token to enhance security and streamline border crossings for passengers;
- Solving the challenge of involving all travel and border security stakeholders while guaranteeing secure information sharing and assuring passengers’ privacy.
Biometric Exit – Lessons learned and path forward
Introduced by Teresa Wu, Director of Strategic Marketing and Government Relations, MorphoTrak
- Air Entry/Exit Re-engineering (AEER) background and approach;
- Lessons learned at the Maryland Test Facility (MdTF);
- CBP’s path forward for biometric entry/exit.
Live AEER/Industry interaction session
Moderated by Teresa Wu, Director of Strategic Marketing and Government Relations, MorphoTrak
Tuesday March 15, 2016
|9:00 am||Chairman’s Introduction
Keynote: Mission ready – U.S. Customs and Border Protection’s tailored approach to implementing a biometric exit program
- CBP is conducting extensive testing and analysis of new, cutting-edge biometrics to further enhance our ability to combat threats, streamline the inspection process, and expedite the flow of travel and trade;
- CBP has deployed targeted biometric entry/exit projects towards the goal of a comprehensive entry/exit system;
- CBP will continue to enhance our biographic data systems to support our biometric capabilities;
- CBP is looking to industry to help us develop solutions that best meets the exit challenge – mainly where the biometric capture technology would be placed, and how the data is collected – so that the agency has a high assurance the traveler departed the United States.
|9:30 am||Keynote Question and Answer Session|
- Border security
- Biometric exit
- Visa waiver program (VWP)
10.40pm Refreshment Break sponsored by
Session Chairman’s Introduction
Identification, anonymity, and data integration in next generation traveller processing
- Efficient and secure airport travel requires a large amount of data about travellers and conveyances, both identity-based and anonymous;
- Security depends on convenient, cost effective, and unobtrusive identification technologies at appropriate points in the process flow;
- Efficiency depends on availability of anonymous data about volumes of travellers, transit times, and arrival timing of conveyances (planes in this case).
Global trends in modernizing air travel: How biometrics enhance security and facilitation
- The accurate identity information border authorities need to better assure immigration entry and exit processing also enables travelers, airlines and security personnel to create a less stressful, faster experience;
- Projects using biometrics as token throughout the border, security, baggage and boarding processes are being deployed in Asia;
- In the face of the escalating threat to world travel, biometric technologies integrated into air travel processes balance increased security and travel facilitation.
Stakeholder Debate: Automating airports with next-generation identity technologies
12:50 pm Exhibition Viewing and lunch sponsored by
Panel: DHS identity services of tomorrow
This panel discussion will focus on how DHS could leverage a future full-scale multimodal biometric identity services capability to meet their growing mission needs.
Identix - the Next Generation Multi-Modal Biometric & Authentication Platform
|3:10 pm||Session Chairman’s Introduction
Designing cyber security for the next decade & beyond
- We are on the verge of a new era of smart connected things, generating a wealth of information about ourselves and our environment;
- Global attack vectors have become exponentially greater as connected things are increasing in number and awareness;
- Now more than ever Governments, Commercial Enterprises, and End-Users need a robust, trusted environment that preserves their safety, security & privacy;
- It’s urgent that we design the next generation of critical cyber security solutions that adapt and thrive in the digitally connected world we live in.
Utilizing trusted identities in an online environment
Shutting the panoptic eye: Privacy-preserving citizen identity initiatives
- While we hear a lot about government surveillance, we don’t often hear about the government’s policies and technical implementations to not know about its citizens’ activities;
|4:15 pm||Question and Answer Session|
4:20pm Refreshment Break sponsored by
- Current state of law affecting biometrics used in K-12 schools
A message from evening reception sponsors, HID Global
5:35-6:45 pm Drinks reception in Exhibition Hall sponsored by
Wednesday March 16, 2016
|9:00 am||Session Chairman’s Introduction
Biometrics: Privacy threat or privacy enabler?
- Efforts to ban or regulate biometrics are on the agenda of privacy advocates around the world;
|9:30 am||Keynote Question and Answer Session|
|9:45 am||Session Chairman’s Introduction
Payments, Technology, and Security
- Layered security – tokenization, encryption;
- The road to ubiquity – where are we now in terms of mobile payment adoption, and what needs to happen before mobile payments hit the mainstream;
- Hidden opportunities – how can mobile payments providers add value at the point of sale (geo-location, rewards, in-store check-out).
Biometric authentication in payments
- ‹‹Visa’s view on why biometrics authentication for payments could provide a template for success;
- Lessons learned from deployments to date;
‹‹- The path ahead.
Mobile wallets and fraud: Leveraging strong authentication to protect consumer accounts
- As with any new form of financial technology, mobile wallets came under siege by fraudsters almost immediately after introduction;
- Financial institutions were unprepared for the attempts to circumvent their controls, contributing to unusually high losses and reputational damage;
- The use of mobile wallets is expected to exceed $50 billion by 2018, making them even more attractive fraud targets;
- By leveraging strong authentication technologies geared specifically for the mobile channel, wallet enrolment and use can be secured against these attacks – preventing fraud and preserving trust in this nascent financial technology.
|11:05 am||Question and Answer Session|
11:15 am Refreshment Break sponsored by
|11:45 am||Session Chairman’s Introduction
Advancing biometrics: Aims and ambitions for the FBI’s Biometric Center of Excellence
INTERPOL Biometrics (Face and Fingerprints exchange)
- Overview of AFIS Gateway and success
- Development of Face program
- Biometrics for migration, terrorism and finding fugitives
Law enforcement: The benefits and challenges of multi-modal and the cloud
- Use cases and workflow;
- Networking and security.
|1:05 pm||Question and Answer Session|
1:10 pm Exhibition Viewing and lunch sponsored by
Born This Way: What “Digital Natives” are teaching us about Digital Identity- If the voice of the customer helps smart organizations improve business processes and deliver better products and services, what are the voices of digital natives, the generation born fully immersed in digital technologies, teaching organizations about digital identity and their expectations for digital interactions?
- In this session, learn the top lessons that millennial customers are teaching commercial organizations and government agencies about digital identity processes and authentication;
- Understand how millennial customers will not just impact, but transform security processes in your organization and the role millennials expect both mobile devices and biometrics to play in the customer experience.
SPECIAL TOPIC: US/EU visions on privacy: Contrasting approaches. Practical implications…
SPECIAL TOPIC: Homeland security – The challenge of identifying malevolent actors
4:30 pm Close of Conference