contentsexpo.jspargo.com/exhibitor/web/gis/gis2015track_session...evolving cybersecurity threats,...

18
-1- 2015 Global Identity Summit Track and Session Descriptions Last Updated: June 29, 2015 Contents Track Descriptions......................................................................................................................................... 2 Monday Training ........................................................................................................................................... 2 1400: Biometric Technologies .................................................................................................................. 2 1400: Biometric National Information Exchange Model ......................................................................... 2 1500: Biographic Technologies ................................................................................................................ 3 1600: Smart Card Technologies: Defining a Smart Card Security Topography to Meet Combined Physical and Network Access Systems Requirements .............................................................................. 3 1600: History of Digital T-walls and the US Military’s Use of Biometrics ................................................ 3 Tuesday Sessions........................................................................................................................................... 4 Keynote #1 ................................................................................................................................................ 4 Keynote #2 ................................................................................................................................................ 4 Opening Panel ........................................................................................................................................... 4 1100 Block ................................................................................................................................................. 4 1330 Block ................................................................................................................................................. 6 1530 Block ................................................................................................................................................. 7 1630 Block ................................................................................................................................................. 8 Wednesday Sessions ..................................................................................................................................... 8 Keynote #3 ................................................................................................................................................ 8 Federal Focus: DHS................................................................................................................................... 9 0915 Block ................................................................................................................................................. 9 1045 Block ............................................................................................................................................... 10 Lunch Panel ............................................................................................................................................. 11 “Lightning Talks” ..................................................................................................................................... 12 Federal Focus: NIST ................................................................................................................................ 13 1530 Block ............................................................................................................................................... 13 1630 Block ............................................................................................................................................... 14 Thursday Sessions ....................................................................................................................................... 14 Keynote #4 .............................................................................................................................................. 14

Upload: others

Post on 11-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-1-

2015 Global Identity Summit

Track and Session Descriptions

Last Updated: June 29, 2015

Contents Track Descriptions ......................................................................................................................................... 2

Monday Training ........................................................................................................................................... 2

1400: Biometric Technologies .................................................................................................................. 2

1400: Biometric National Information Exchange Model ......................................................................... 2

1500: Biographic Technologies ................................................................................................................ 3

1600: Smart Card Technologies: Defining a Smart Card Security Topography to Meet Combined

Physical and Network Access Systems Requirements .............................................................................. 3

1600: History of Digital T-walls and the US Military’s Use of Biometrics ................................................ 3

Tuesday Sessions ........................................................................................................................................... 4

Keynote #1 ................................................................................................................................................ 4

Keynote #2 ................................................................................................................................................ 4

Opening Panel ........................................................................................................................................... 4

1100 Block ................................................................................................................................................. 4

1330 Block ................................................................................................................................................. 6

1530 Block ................................................................................................................................................. 7

1630 Block ................................................................................................................................................. 8

Wednesday Sessions ..................................................................................................................................... 8

Keynote #3 ................................................................................................................................................ 8

Federal Focus: DHS................................................................................................................................... 9

0915 Block ................................................................................................................................................. 9

1045 Block ............................................................................................................................................... 10

Lunch Panel ............................................................................................................................................. 11

“Lightning Talks” ..................................................................................................................................... 12

Federal Focus: NIST ................................................................................................................................ 13

1530 Block ............................................................................................................................................... 13

1630 Block ............................................................................................................................................... 14

Thursday Sessions ....................................................................................................................................... 14

Keynote #4 .............................................................................................................................................. 14

Page 2: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-2-

Federal Focus: DoD ................................................................................................................................ 14

1015 Block ............................................................................................................................................... 15

1115 Block ............................................................................................................................................... 15

Keynote #5 .............................................................................................................................................. 16

Federal Focus: DOJ ................................................................................................................................. 16

1445 Block ............................................................................................................................................... 16

Track Descriptions Track A. Sessions within the “Technology” Track will focus on discussing the current state of the art and

pending advancements, as well as needs for future research and testing.

Track B. Sessions within the “Operations” Track will focus on sharing insight from operational activities,

with a focus on providing operator’s perspectives on the state of practice, ongoing issues, and future

technology and/or policy needs.

Track C. Sessions within the “Policies and Strategies” Track investigate topical issues from multiple

viewpoints so that common lessons-learned and collaboration opportunities can be identified.

Track D. Sessions within the “Focused Workshops & Special Sessions” Track are focused on advancing

the identity community by working collaboratively to overcome known obstacles. Workshops are small-

group activities that study an issue and work to generate consensus (and momentum) on activities for

the ensuing year. Attendees and Exhibitors are encouraged to participate in the workshops.

Monday Training

Pre-conference training on a number of topics is available to all Global Identity Summit attendees.

1400: Biometric Technologies Description: <<Awaiting Finalization>>

Moderator: James N. Albers, Senior Vice President for Government Operations, MorphoTrust

1400: Biometric National Information Exchange Model Description: <<Awaiting Finalization>>

Moderator: Diane Stephens, DHS S&T and Kamran Atri, CSE Corporation

Page 3: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-3-

1500: Biographic Technologies Description: <<Awaiting Finalization>>

Moderator: Keith Miller, MITRE Corporation

1600: Smart Card Technologies: Defining a Smart Card Security Topography to Meet

Combined Physical and Network Access Systems Requirements Description: With the added security concerns about internal and external data breaches and

evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution

that provides an integrated identity management system built on advanced identity credentials

that support strong authentication for access to facilities and networks across multiple locations

and network platforms. This session will explain to security operators and solutions providers

and security integrators how E-PACS solutions meet these advanced requirements using secure

ID credentialing technology, biometric authentication, and digital certificates to secure both

physical and network systems.

Key questions to be answered in this session:

o What are the minimum requirements for any smart card-based enterprise security

system implementation that is capable of supporting and integrated physical and logical

access security system?

o How will a standards-based PIV-I (for government interoperable) or CIV (for commercial)

smart card identity credentials enable strong two-factor authentication for integrated

dual access control for any enterprise?

Moderator: Randy Vanderhoof and Lars Suneborn, Smart Card Alliance

1600: History of Digital T-walls and the US Military’s Use of Biometrics Description: At trial, a United States (US) military recidivist was asked about the specifics

regarding his desertion. The service member replied, “Which one, sir? I have deserted thirteen

times.” Keeping a log of soldiers gone absent without leave and then returning to reenlist, led a

US Army surgeon to propose a biometric catalogue to the US War Department of the 1800s.

Soldiers’ identity information was kept on paper cards, sorted by height and eye color in filing

cabinets. Biometric engineers of that day were doctors, just as in later decades linguists were

the primary biometricians discerning identity based on spoken dialects of German prisoners of

war. Prior to 9/11 the US military had been testing a digital biometric system to keep track of US

personnel, but soon realized that this same technology could help screen individuals applying

for jobs on US bases in Iraq or correlate fingerprints found on IED blast parts in Afghanistan.

Suddenly, the biometric system that was US-centric now had global applicability as emerging,

new threats meant identity screening could no longer happen via an identification card or

military insignia. This presentation will review discoveries of how militaries used biometrics prior

to the present-day dominance of computer-assisted analysis.

Key questions to be answered in this session:

o <<Awaiting Finalization>>

Moderator: Sarah Soliman, Emerging Technology Trends Project Associate, RAND Corporation

Page 4: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-4-

Tuesday Sessions

Keynote #1 Mark DiFraia, Senior Director, Solutions Strategy at MorphoTrust USA

o Description: Industry analysis shows the user authentication market growing at 16%+

for the next 5 years. Yet stolen tax returns, compromised credit cards and a litany of

other identity-related crimes are quickly becoming the “new normal.” Though our

industry is rich with lightning-fast biometric algorithms, device manufacturers, workflow

experts and innovative thinkers, we find ourselves now at crossroad. Will consumers

object to new innovations or demand more regulation because they fear losing control

over their identities? Or will they wholeheartedly embrace new technologies that utilize

identity to unlock new services and conveniences? The next few years will mark a

turning point for our industry as governments, industry and consumers alike pour

money into solving these identity challenges. But can our industry deliver on its

promise? Mark DiFraia, Senior Director of Solutions for MorphoTrust USA, will share

with GIS attendees his vision for how the industry can work collaboratively to break free

of current challenges and unlock the full value of a connected world by porting higher

value transactions to the web. DiFraia will pull valuable insights from other industries,

including his own experience working on Wall Street, to reveal specific strategies that

could help catalyze the industry and ensure that the promise of today’s identity

solutions will deliver on a massive scale.

Keynote #2 Peter Swire, Professor at Georgia Institute of Technology

o Title: Privacy and Identity

o Description: <<Awaiting Finalization>>

Opening Panel Moderator: Chris Miles, Program Manager at DHS S&T

Description: This panel provides a foundation for understanding current identity technologies

and issues, and highlights upcoming activities during the 2015 Global Identity Summit.

Panelists:

o Mark DiFraia, MorphoTrust

o Peter Swire, Georgia Institute of Technology

o Paul Grassi, NSTIC

o Nick Megna, FBI

o Suzanne Barber, UT-Austin Center for Identity

1100 Block Track A – Biographic Technologies

o Description: The majority of identity systems are based on non-biometric PII. This

session discusses the current state of biographic technologies, highlights anticipated

advancements, and shares insight on needs and issues from operators

o Key questions to be answered in this session

Page 5: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-5-

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Moderator: Keith Miller, Principal Artificial Intelligence Engineer at MITRE

Track B – Global Commerce

o Description: The financial services sector transfers trillions of dollars each day, and has

multiple layers that require sound identity proofing. This session provides an overview

on the use of identity within this sector and highlights changes that we may all be seeing

in the near future.

o Key questions to be answered in this session

How can we enable secure mobile transactions in a way that is user friendly

while reducing risk to financial institutions? From a bank perspective, can we

finger print devices and users to reduce authentication friction and enhance the

user experience for a given transactional risk? How to reduce the dependency

on user name password in a secure manner?

What is the role of biometric mobile devices in user enrollment and identity

proofing? How can mobile devices be used to reduce risk and fraud to Financials

while protecting clients’ constituents information and privacy?

o Moderator: Abbie Barbir, Senior Security Advisor, AIS Security Innovation Group, Aetna

Track C – Online Identity

o Description: <<Awaiting Finalization>>

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Moderator: Paul Grassi, Senior Standards and Technology Advisor at NIST/NSTIC

Track D – Special Session: Predictive Biometrics

o Moderator: Mark Burge, Program Manager at IARPA

o Description: The identification of an unknown individual poses a difficult problem to

investigators. DNA fingerprinting allows for an investigator to determine a person’s

identity based on their CODIS DNA profile. However, when that profile does not exist in

a database, DNA still provides the ability to predict physical characteristics of the

individual. Advanced DNA analytical methods have allowed investigations of genomic

correlations to an individual’s biographic ancestry, visible traits, age and more recently,

an individual’s craniofacial morphology. Ultimately, the potential exists for this type of

technology to cross biometric domains. By attempting to predict the face of an

unknown individual, this capability proposes the question of if and how this technology

would benefit the face biometric community. This session will initiate the dialogue for

the identity community to understand the technology behind the predicted appearance,

its potential usefulness to the identity mission and the limitations of the current

capabilities

o Key Questions to be answered:

What is the state of research in this area?

What challenges exist that hinder achieving these investigative capabilities?

Page 6: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-6-

1330 Block Track A – DNA

o Description: The DNA session will include a discussion on Next Generation Sequencing

(NGS) applications for human identification in addition to an update on Rapid DNA

technology development and booking station integration for law enforcement.

o Key questions to be answered in this session

What is the state of Rapid DNA instrument development and booking station

integration?

Are there Next Generation Sequencing applications for human DNA

identification?

o Moderator: Tom Callaghan, Senior Biometric Scientist at FBI

Track B – Privacy in Practice

o Description: Many organizations struggle to translate the intentions of their

organizational policy on privacy in tangible design decisions. New work on privacy risk –

including frameworks and assessment methods – are helping organizations turn a more

sophisticated understanding of potential privacy problems into actionable engineering

tasks.

o Key questions to be answered in this session

What is privacy risk, and who is contributing to the field?

What kind of privacy risks are emerging in modern identity systems, and what

are possible techniques for mitigating them?

o Moderator: Sean Brooks, Privacy Engineer at NIST

Track C – Identity Discovery

o Description: The key to success in discovery of an identity is understanding how

disparate data elements combine to form a conclusive identity. A remote (online or

mobile) application for access or services could be from the true person or a stolen or

fictitious identity. Good identity verification uses a broad range of data elements to

verify the applicant’s identity, including self-reported data from the application,

corroborating proprietary data sources, and information from user behavior and other

analytics.

Data from multiple sources can be overwhelming. Without a structured

“backbone” to organize the data, it is just noise. Linking unstructured data to

structured, known data points allows you to use many additional facts to

properly identify users.

Corroborating a remote identity against trusted sources is the best way to

validate that the identity is real and that the person is who they say they are.

Analytics like user behavior patterns, velocity checks, and device recognition

help validate both the identity and its trustworthiness.

o Key questions to be answered in this session

What are the current best practices in identity discovery?

What are the current issues, and future needs, of identity discovery activities in

a number of sectors?

o Moderator: Sally Ewalt, Director at Equifax

Page 7: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-7-

1530 Block Track B – Opportunities and Issues in Mobile Technologies.

o Description: The world is increasingly going mobile. From social networks to paying

bills, individuals use mobile applications more than computers. The requirements for

setting and verifying identities within these applications also continue to grow, though

in stovepiped solutions.

o Key questions to be answered in this session

What are the practical roadblocks to widespread adoption of Mobile Technology

in Identity Verification and Authentication?

What practical progress in pilots, procurements and standards that point out a

pragmatic path forward?

o Moderator: Don Thibeau, Chairman at Open Identity Exchange

Track C – Identity Matching

o Description: The primary goal of an identity-based system is to verify (or determine) an

individual’s identity based on prior information so that subsequent actions can be

determined. No matching process, whether biometric or biographical, is going to be

100% accurate however. This session reviews various approaches used by operational

systems to be as accurate as possible, while minimizing the impact of mistakes.

o Key questions to be answered in this session

What are the current deficiencies in identity matching and the impact those

have on the mission?

What’s new in identity matching and where are we going in the next 10 years?

o Moderator: Glenn Wood, Civilian Intelligence Director at Oracle National Security

Group

Track D – Workshop: Emerging Identity Workforce

o Description: The identity workforce responsible for collecting, storing, managing,

securing and using PII is growing quickly and facing new challenges on a daily basis. This

identity workforce and these new challenges are present in every organization — law

enforcement, government agencies, and corporations from the 16 DHS Critical

Infrastructure Sectors. The Center for Identity recently embarked on an effort to

characterize the identity workforce. The Center plans to deliver an annual report to the

community describing the current identity workforce and projecting its future. This

workshop will provide insight into the Center’s initial workforce findings for a report due

in January 2016 and present a new Master of Science in Identity Management and

Security at The University of Texas, meeting the educational needs of working

professionals. Additionally, the workshop aims to engage the Global Identity Summit’s

thought leaders to examine current workforce staffing, existing gaps, and future trends.

Workshop results will be included in the Center for Identity’s workforce report, with

consenting workshop participants recognized for their contributions to this ongoing

effort.

o Key questions to be answered in this session

What knowledge, skills and abilities are required to build an effective identity

workforce?

Page 8: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-8-

What changes do industry leaders expect to see in the identity workforce in the

next several years?

o Moderator: Katie Stephens, Education Program Manager at UT Center for Identity

1630 Block Track C – Federal Identity Data and Screening

o Description: The Patriot Act of 2001 served as a catapult for advancing technology

within the USG to overcome policy and agency trust issues that were barriers to

effectively safeguarding the homeland from national security threats and violent crime.

Followed by a series of Presidential Directives and the reality that many dangerous

people in the world would like to cause harm to the US and our international partners

the federal government has made great strides in collaboration. The results of federal

and international efforts provide a comprehensive identity screening solution that

assists in preventing atrocious tragedies like those that occurred on September 11th.

But the world remains a perilous place and the threat landscape continues to evolve.

Data grows in a variety of forms at each of the agencies requiring further advancements

in technology and cooperation. This panel will discuss interoperability achievements

and challenges with a focus on the critical new threats that require continued

interagency cooperation.

o Key questions to be answered in this session

What is the state-of-affairs of each agency’s large-scale identity screening

solution?

What are the critical challenges facing their respective systems, with respect to

data formats and volumes as well as data sharing challenges?

o Moderator: Scott Swann, Senior Director of Innovation at Safran Morpho

Wednesday Sessions

Keynote #3 Keynote: John Wagner, Deputy Assistant Commissioner of U.S. Customs and Border Protection

o Description: As the frontline defense for the United States, U.S. Customs and Border

Protection (CBP) guards the nation’s physical and economic security. In particular, the

Office of Field Operations (OFO) has a diverse border mission to enforce customs,

immigration, and agriculture laws and regulations of the United States, and hundreds of

laws on behalf of numerous federal agencies. OFO’s primary mission is anti-terrorism

while at the same time facilitating the lawful flow of goods and people into the United

States. As passenger volume and cargo containers continue to increase at our borders

in a world of constantly changing threats, CBP has developed a flexible posture to

optimize resources, transform its business model, and deploy advanced capabilities like

biometrics to secure and facilitate travel through accurate identification technology.

DAC Wagner will discuss how CBP has adopted a strategy that embraces opportunities

Page 9: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-9-

to streamline the inspection process at the borders while combatting threats to the

nation’s security.

Federal Focus: DHS Description: <<Awaiting Finalization>>

Key questions to be answered in this session

o <<Awaiting Finalization>>

o <<Awaiting Finalization>>

Panelists:

o Leslie Hope, Chief of Biometrics Division at United States Citizenship and Immigration

Services

o Michael Hardin, Deputy Director of Entry/Exit Office at Customs and Border Protection,

Office of Field Operations

o Steve Yonkers, Director of Identity Management and Biometrics at Screening

Coordination Office

0915 Block Track A – Understanding e-PACS – How Enterprise Physical Access Control Systems Protect a

Changing Access Security Landscape

o Description: Historically, the systems used to secure access to physical facilities were

different than those technologies used to secure access to internal network assets. In

recent years, the demands placed on IT security professionals to protect against

increasing cyber security threats from weak password-based internal controls has led to

a convergence around a common identity credential to integrate the access control

systems that protect both physical and network systems. The requirements to strongly

authenticate credentials in real time have resulted in a new generation of ID security

solutions based on PKI-based digital certificates and known as Enterprise Physical Access

Control Systems or E-PACS. This session will explain this security architecture and

describe how digital credentials are established and used within the system to support

both physical and logical access across the enterprise.

o Key questions to be answered in this session

What are the key components and security architecture of E-PACS?

How do you configure an E-PACS system to leverage digital certificates to

strongly authenticate ID credentials in real-time to ensure maximum protection

from perimeter and cyber-threats?

o Moderator: Randy Vanderhoof, Executive Director at Smart Card Alliance

Track B – Border Security

o Description: The process to obtain a visa and gain admissibility at a border crossing

involves the convergence of a unique mix of factors – from managing security and

ensuring the smooth flow of travel to interacting with diverse cultures and customs.

Ultimately, this critical and timely process is all for the sole purpose of accurately

identifying travelers are whom they claim to be and are eligible for entry. In a time of

constantly changing threats and limited resources, the fusion of biographic and

Page 10: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-10-

biometric data and strengthening strategic partnerships are vital to addressing the

challenges posed by increasing amounts of travel to the United States and other popular

destinations each year.

o Key questions to be answered in this session

What approaches exist to address the unique challenges of accurately

identifying passengers on arrival and departure in all modes of travel?

How can we identify best practices in the collection of arrival and departure

data that can be applied to a number of complex operational environments?

o Moderator: John Wagner, Deputy Assistant Commissioner, Office of Field Operations,

CBP

Track C – Federal and State Identity Documents

o Description: This session provides a qualitative comparison between identity cards (IDs)

issued by states and IDs issued to the public by the Federal Government. Panelists will

discuss the public appeal and potential trend for each of these models, including

acceptance by local law enforcement and commercial enterprises required to confirm

identities for retail sales.

o Key questions to be answered in this session

Will the public move toward preferring passports, and specifically the wallet

sized “Pass Card” issued by the Department of State over state-issued

identification or is the REAL ID model of applying Federal minimum security

standards to the issuance and production of state-issued IDs viable through the

coming decade?

How do the federal processes for the issuance and production of IDs compare to

state processes and how are biometrics being used in the issuance of IDs and

what are the prospects for public acceptance of IDs that incorporate biometric

tools?

o Moderator: Brian Zimmer, President at Coalition for a Secure Driver's License

Track D – Workshop: Introducing New Identity Technologies

o Description: Workshop on the challenges associated with the introduction of new

biometric modalities into deployment.

o Key questions to be answered:

How do challenges to deployment vary as a function of maturity?

What are the most common challenges faced during identity technology

adoption?

o Moderator: Rick Lazarick, Chief Scientist of Identity Labs at CSC

1045 Block Track A – Liveness Detection

o Description: Liveness detection and other methods which determine user presence

have been suggested as means to protect authentication systems from vulnerabilities,

such as presentation attacks by spoofed biometric samples or attacks by computers

acting as humans. This session will consider the state-of-the-art in liveness detection

Page 11: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-11-

techniques/methods and will include the perspective of government, academia and

industry.

o Key questions to be answered in this session

What is the state-of-the-art in liveness detection technology for biometrics and

other authentication technologies?

What innovations, standards, and test methodologies are underway to advance

modern liveness detection and foster adoption?

o Moderator: Stephanie Schuckers

Track B/C – Federal Focus on CIO/FICAM and Information Sharing

o Description: <<Awaiting Finalization>>

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Co-Moderators: Mike Kennedy, Executive for Assured Interoperability at Office of the

Director of National Intelligence and Jim Sheire, Director of Identity Assurance and

Trusted Access at General Services Administration

Track D – Workshop: Advancing Contactless Fingerprint Systems

o Description: The USG has pursued technologies to provide touchless fingerprint

acquisition capabilities for decades and this gap in capability has been listed as a top

research initiative in both releases of the National Biometric Challenge publication

released from the NSTC Subcommittee on Biometrics and Identity Management.

Multiple research endeavors have been initiated to advance beyond the traditional

optical live-scan systems that are most prominently used today in Law Enforcement,

Defense, Border Protection, and within the Civil Applicant Sectors but no solutions have

fully addressed the needs advocated by the USG. This workshop will assess the

advances made to date in contactless fingerprint acquisition from multiple vendors and

discuss strategies that will assist in further advancing the technology into consumable

products. The outcomes of this workshop will be documented in a report from industry

to the USG.

o Key questions to be answered in this session

What are the recommendations from industry to the USG to assist in bringing

contactless fingerprint technology to market?

What hurdles have been expressed by the USG to industry in bringing

contactless fingerprint technology to market and how might they be overcome?

o Moderator: Scott Swann, Senior Director of Innovation at Safran Morpho

Lunch Panel Description: The panel follows-up last year’s standing room-only session that explored the

future of identity. Panelists from Government, Commerce, and Academia will present their

thoughts on the future and the role of identity, and discuss areas of growth that will help the

community to properly evolve.

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

Page 12: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-12-

Moderator: Katie Suchma, Physical Scientist at FBI Laboratory Division

“Lightning Talks” Description: “Lightning Talks” are opportunities for a small number of attendees to present

their thoughts on a number of topics. Each topic will have a designated room and slots for four

ten-minute verbal (no PowerPoint) presentations. Attendees are able to reserve one of the

speaking slots on a first-come, first-served basis during conference registration. Additional

notes:

o A proctor will be in each room to manage time allocations, ensure presentations are on-

subject, and do not contain marketing or slandering of others.

o Press are not allowed to attend lightning talks.

Lightning Talks

o “I wish the federal government would…”

Room Number: 7

Proctor: TBD

o “I need technology providers to…”

Room Number: 9

Proctor: TBD

o “Protecting Privacy: It’s easier/harder than it looks”

Room Number: 10

Proctor: TBD

o “The data that researchers need more than anything else is…”

Room Number: 11

Proctor: TBD

o “Evolving Trends in State & Local Law Enforcement Identity Issues”

Room Number: 12

Proctor: Clark Nelson (MorphoTrak)

o “Identity and the Cloud”

Room Number: 13

Proctor: Abby Mackness (MorphoTrust)

o “Identity and the IoT”

Room Number: 14

Proctor: Sprague?

o Biometrics & e-authentication: how to get over the hump?

Room Number: 15

Proctor: Cathy Tilton (Daon)

o TBD

Room Number: 5

Proctor: TBD

o TBD

Room Number: 6

Proctor: TBD

o TBD

Page 13: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-13-

Room Number: 16

Proctor: TBD

Federal Focus: NIST Description: NIST has assembled a world-class team leading strategic areas of identity that

together will strength authentication in emerging identity frameworks. Session will include a

panel of NIST experts from Biometrics, NCCoE, NSTIC, PIV, & Privacy.

Key questions to be answered in this session

o What is NIST doing (together) to strengthen authentication?

o What are the gaps that challenge stronger authentication, and what is needed to fill

those gaps?

Panelists:

o Sean Brooks, Privacy Engineer at NSTIC

o William Fisher, Security Engineer at National Cybersecurity Center of Excellence

o Paul Grassi, Senior Standards and Technology Advisor at NSTIC

o Patrick Grother, Biometrics Testing Project Leader at ITL/IAD

o Matt Scholl, Division Chief at ITL/CSD-PIV

1530 Block Track A -- Face

o Description: The face recognition (FR) community has been very successful in

developing algorithms that deliver high performance for facial images taken under

controlled circumstances (e.g., passport photos). While these developments have led to

the wide-scale deployment of FR systems in applications for law enforcement and fraud

prevention, a number of challenges remain in the field. This Face Recognition session

will focus on two fundamental challenges: unconstrained face recognition and human

adjudication of potential match pairs. This session will answer the question of where

does the current state of the art stand in resolving the unconstrained face recognition

issue and what sort of applications might this help address. The session will then pivot

to address the question of determining how well do forensic examiners perform the task

of adjudicating potential match pairs, and what steps are being taken to develop this

growing field of forensic facial examination.

o Key questions to be answered in this session

Where does the current state of the art stand in resolving the unconstrained

face recognition issue and what sort of applications might this help address.

How well do forensic examiners perform the task of adjudicating potential

match pairs, and what steps are being taken to develop this growing field of

forensic facial examination?

o Moderator: Richard Vorder Bruegge, Senior Photographic Technologist at FBI

Track B - Healthcare

o Description: Healthcare is an ever-growing segment of spending, and is becoming more

and more personalized. This session reviews identity-specific lessons learned from the

Page 14: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-14-

roll-out of the ACA as well as insights from various perspectives from the healthcare

industry in the U.S. and internationally.

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Moderator: <<Awaiting Finalization>>

Track C – Identity Theft

o Description: <<Awaiting Finalization>>

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Moderator: Sean McCleskey, Program Manager at UT Center for Identity (and Retired

US Secret Service)

Track D – Identity Standards

o Description: This special session provides an update on national and international

standards development activities, conformity assessment tools, and implementation

issues

o Key questions to be answered in this session

What are the principal issues that need to be standardized in management of

human identities?

What are the major players doing to help resolve the situation?

o Moderator: Brad Wing, Biometric Standards Coordinator at NIST

1630 Block Track C – Killing the Password

o Description: <<Awaiting Finalization>>

o Key questions to be answered in this session

<<Awaiting Finalization>>

<<Awaiting Finalization>>

o Moderator: Paul Grassi, Senior Standards and Technology Advisor at NIST/NSTIC

Thursday Sessions

Keynote #4 Don Thibeau, Chairman at Open Identity Exchange

Description: <<Awaiting Finalization>>

Federal Focus: DoD Description: <<Awaiting Finalization>>

Key questions to be answered in this session

o <<Awaiting Finalization>>

o <<Awaiting Finalization>>

Page 15: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-15-

Moderator: Jerry Reimers, Defense Intelligence Senior Leader, Defense Forensics and

Biometrics Agency

1015 Block Round-table Discussions – Agencies and Technologies

o Description: “Roundtables” are opportunities to meet and have informal discussions

with other attendees that have similar interests. There are two blocks of roundtable

discussion times within the agenda, each having a variety of topics to choose from.

Attendees can reserve a seat at their preferred table on a first-come, first-served basis.

Discussions at the roundtable are designed to be informal and off-the-record, though in

some cases a table may decide via unanimous consent to share their discussion’s key

points via a written document that will be made publicly available after the event.

Additional notes:

Attendees are not required to register for a roundtable seat in either session.

There will be a panel presentation for observation as an alternative activity.

Each table will have a “host” who will help facilitate the conversation

Press are not allowed to attend roundtable discussions.

Private Sector Panel: Outreach and Public Perception Issues

o Description: Identity technologies, especially biometrics, can be controversial. For all of

the clear benefits strong authentication stands to bring to users in both the vertical and

consumer markets, these technologies are plagued by issues of unfamiliarity and public

perception. From privacy concerns voiced by parents of school children and battles

between employers and workers unions, to public skepticism written by journalists for

prominent publications like NPR and InfoWeek, many who live outside of the industry

show resistance to biometric adoption. At the same time, the potential for increased

usage of these technologies has never been higher because of their inclusion in

ubiquitous handheld devices. This panel serves to discuss the community’s outreach

and public perception issues, and what must be done to overcome them.

o Questions to be answered:

What are the most pressing public concerns regarding identity technologies?

What is the impact of these concerns, and what can the community do to

overcome them?

o Moderator: Peter O’Neill, President & CEO at FindBiometrics.com

1115 Block Round-table Discussions – Private Sector and Cross-Cutting Issues

o Description: “Roundtables” are opportunities to meet and have informal discussions

with other attendees that have similar interests. There are two blocks of roundtable

discussion times within the agenda, each having a variety of topics to choose from.

Attendees can reserve a seat at their preferred table on a first-come, first-served basis.

Discussions at the roundtable are designed to be informal and off-the-record, though in

some cases a table may decide via unanimous consent to share their discussion’s key

Page 16: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-16-

points via a written document that will be made publicly available after the event.

Additional notes:

Attendees are not required to register for a roundtable seat in either session.

There will be a panel presentation for observation as an alternative activity.

Each table will have a “host” who will help facilitate the conversation

Press are not allowed to attend roundtable discussions.

Interagency Panel: Technical, Operational, and Policy Issues

o Description: This panel will consist of a mixture of federal officials from diverse

Departments that will discuss trends, issues and opportunities for identity from a whole-

of-government perspective.

o Key questions/topics to be addressed in this session:

How will the White House Cybersecurity goal “replacing passwords with more

secure technologies” impact access control technology and systems?

Is the inclusion of biometric sensors on top-of-the-line Smartphones changing

the public’s expectations in interacting with government?

Is there a need to tie biometric recognition on mobile devices to a high

assurance biometric(s) in back end systems?

Is NSPD-59/HSPD-24 implementation complete?

Integration of biometric and biographic systems?

Cross-agency and international data sharing?

Privacy and anonymity protection as biometrics are more widely used?

o Moderator: Jim Loudermilk, Senior Level Technologist at FBI

Keynote #5 Mark Branchflower, Head of Fingerprint Unit, Interpol

o Description: <<Awaiting Finalization>>

Federal Focus: DOJ Description: <<Awaiting Finalization>>

Key questions to be answered in this session

o <<Awaiting Finalization>>

o <<Awaiting Finalization>>

Panelists

o <<Awaiting Finalization>>, US Marshals Service

o <<Awaiting Finalization>>, Federal Bureau of Investigation

1445 Block Track A – Iris

o Description: Iris recognition, as currently practiced, proceeds along a path: iris image

capture, segmentation/normalization, demodulation/template generation, template

matching, decision. Segmentation/ normalization is, arguably, the most difficult of

these steps. The current methods for segmentation/normalization have been

Page 17: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-17-

successful to date. However, as we deploy larger scale systems with larger populations

in more challenging environments, we need to consider improvements to the

segmentation/normalization process that will enable us to improve the separation

between imposter and authentics distributions, particularly for cases where the imagery

is not pristine. This session will focus on these challenges.

o Key questions to be answered in this session

How significant – with respect to recognition – are deviations from the linear,

reversible rubber sheet model?

What methods are available to deal with such deviations?

o Moderator: Jim Matey, Iris Technologies Engineer at NIST

Track A2 – Advanced Technology Research

o Description: The goal of this session is to discuss the recent technological

advancements made in the field of identity authentication and human recognition that

can be leveraged for use in future applications. In particular, the speakers in the session

will present novel identity management methods in the field of forensics, biometrics,

cyberspace, and robotics.

o Key questions to be answered in this session

How will the concept of “personal identity” evolve over the next few years in

order to keep up with recent technological advancements?

What type of identity management technologies will have to be developed for

future use in the context of forensics, biometrics, cybersecurity and robotics?

o Moderator: Arun Ross, Associate Professor at MSU

B – Law Enforcement and Forensics

o Description: This session will discuss key identity topics of importance within the

criminal justice community. Criminal justice executives and practitioners will

provide first hand experiences and perspectives on the current state of biometric best

practices, challenges, and opportunities and discuss plans for future operational

implementations of identification technologies. The session will also provide insight on

forensic science activities, including the recent formation of the Organization of

Scientific Area Committees and 100 years of the International Association for

Identification.

o Key questions to be answered in this session

What do criminal justice executives and practitioners view as the next biometric

or identification technology that will increase their operational successes?

How should criminal justice agencies implement or apply biometric technology

into identification processes to increase the operational effectiveness and

efficiency?

o Moderator: Nick Megna, Unit Chief for Biometrics Center of Excellence at FBI

D – Workshop: Biometrics for Department of Defense Law Enforcement Agencies

o Description: DoD Law Enforcement is charged with protecting critical technologies and

information, preventing terrorism, detecting and mitigating threats, conducting major

criminal investigations, and engaging adversaries and threats offensively. Biometric

technologies and services are instrumental in executing these mission critical

capabilities. This session will present operational challenges of DoD Law Enforcement,

Page 18: Contentsexpo.jspargo.com/exhibitor/web/gis/GIS2015Track_Session...evolving cybersecurity threats, CISOs and CSOs are seeking an enterprise access security solution that provides an

-18-

with particular emphasis on biometric technologies/systems and information sharing.

Participants will be looked upon to share ideas, solutions, tools/technologies, and best

practices to address the issues.

o Key questions to be answered:

What tools, technologies and services from the private sector and academia can

be leveraged to increase information sharing and improve operational use of

biometric information for DoD Law Enforcement?

What strategies can be applied to aid defense criminal investigative

organizations in fulfilling their functions?

o Moderator: Valerie Evanoff, CEO at CrossResolve