SlideShare a Scribd company logo
1 of 22
Anti-counterfeiting  Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
Who  cares? Who is  responsible for implementing anti-counterfeiting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the impact of counterfeiting? ,[object Object],[object Object],[object Object]
Further trends in counterfeiting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
[object Object],[object Object],[object Object],[object Object],Effective anti-counterfeiting approaches derive their strength from a combination of rigorous system level thinking and technology
The logistics and supply chain ‘system’ Legitimate Illicit
An effective approach requires a clear understanding of the requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An effective approach also needs to understand the capabilities and nature of the counterfeiter and the users  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Effective solutions use a combination of technologies to deter, defend against, and detect the counterfeiter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A combination of  overt  and covert features can be used to provide us with good coverage of the set of requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A combination of overt and  covert  features can be used to provide us with good coverage of the set of requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The development of portable, low-cost instrumentation is a key factor in the success of a number of covert authentication systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bayesian signal processing and information theory approaches provide significant benefits to authentication systems  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Radio Frequency Identification (RFID) technology provides the ability to securely encode a serial number within a device and store a trace history  ,[object Object],[object Object],[object Object]
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Counterfeit products are becoming increasingly prevalent requiring a structured game plan - so is it roulette or chess we want to play?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Looking to the future
[object Object],[object Object],[object Object],Questions?
Contact details: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©  2009 Cambridge Consultants Ltd, Cambridge Consultants Inc. All rights reserved. Commercially Confidential   This Presentation contains ideas and information which are proprietary to Cambridge Consultants Limited and/or Cambridge Consultants Inc: it is given to you in confidence.  You are authorised to open and view any electronic copy we send you of this document within your organisation and to print a single copy.  Otherwise the material may not in whole or in part be copied, stored electronically or communicated to third parties without the prior written agreement of Cambridge Consultants Limited and/or Cambridge Consultants Inc.

More Related Content

What's hot

Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
rcnossen
 

What's hot (20)

Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018
 
Security Awareness in the Enterprise
Security Awareness in the EnterpriseSecurity Awareness in the Enterprise
Security Awareness in the Enterprise
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity Training
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 

Viewers also liked

NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
North Texas Chapter of the ISSA
 

Viewers also liked (10)

Business action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracyBusiness action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracy
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Savelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anrSavelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anr
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
 
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine Benefits
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Anti Counterfeiting - Playing Roulette Or Chess?

Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
The Whole World News
 

Similar to Anti Counterfeiting - Playing Roulette Or Chess? (20)

Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

More from Ruth Thomson

Bio presentation counterfeiting & serialization
Bio presentation   counterfeiting & serializationBio presentation   counterfeiting & serialization
Bio presentation counterfeiting & serialization
Ruth Thomson
 

More from Ruth Thomson (7)

How to develop a novel wearable product?
How to develop a novel wearable product?   How to develop a novel wearable product?
How to develop a novel wearable product?
 
'Does one size fit all?' - presentation on Wearable Technology
'Does one size fit all?'  - presentation on Wearable Technology'Does one size fit all?'  - presentation on Wearable Technology
'Does one size fit all?' - presentation on Wearable Technology
 
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HANWhy Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
 
Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine Benefits
 
Bio presentation counterfeiting & serialization
Bio presentation   counterfeiting & serializationBio presentation   counterfeiting & serialization
Bio presentation counterfeiting & serialization
 
Creating a culture for Open Innovation
Creating a culture for Open InnovationCreating a culture for Open Innovation
Creating a culture for Open Innovation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Anti Counterfeiting - Playing Roulette Or Chess?

  • 1. Anti-counterfeiting Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
  • 2. Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 3. Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
  • 4.
  • 5.
  • 6.
  • 7. Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 8.
  • 9. The logistics and supply chain ‘system’ Legitimate Illicit
  • 10.
  • 11.
  • 12. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 20.
  • 21.
  • 22.