SlideShare a Scribd company logo
1 of 10
Download to read offline
9th Annual
Next Generation Identification:
Speed, Accuracy, Mobility, Durability
www.BiometricsEvent.com
In-Depth Discussion
Will Cover
2015 Featured
Speakers Include:
NGI and Technical Training Day:
January 26th
2015
Main Summit Days:
January 27th
-28th
2015
Sheraton Pentagon City,
Arlington, VA
Jeremy Slavish
Director of Biometrics/
Identification
Michigan State
Police
Paul Good
Assistant Chief
Biometrics
Office of Border
Patrol Enforcement
Systems
Dr. Ken Fritzsche
Director of the Identity
Technology Division (ITD)
Office ofBiometric
Identity Management
(OBIM)
	 NGI System Implementation
	 Modality Breakthroughs
	 Smartphone Biometric
Solutions
	 Rugged Scan Design
	Interoperability
	 Intuitive Design
Make the NGI Transition! Don’t miss this series of interactive
training sessions focused on the newest tools, technologies,
and techniques in biometric identification.
Media Partners:
New for 2015:
Tracked Sessions on
Future Requirements,
and Field Operations
Presentations from Leading
Organizations in Biometrics
U.S. Department of Homeland
Security / OBIM and USCIS
Identity Management and
Immigration System Integrity
Biometrics NETT: U.S. Army Training
and Doctrine Command
FBI Science and Technology Branch
Michigan State Police
Biometrics/Identification
FBI NGI Integration Office
TSA/TWIC Program
Office of Border Patrol Enforcement
Training Operators in the Usage
of the Newest Biometric Devices
In-depth Analysis of the Most
Major Biometrics Systems
Data Clarity, Collection, and
Mobile Solutions
Challenges, Changes, and
Benefits: NGI System
Program Updates and System
Migration
Mobile Biometrics and Emerging
Modality Challenges
NGI and Technical
Training Day
Featured Topics for 2015
NEW!
Dear Colleague:
As you know, Biometrics is an evolving technology for government and law enforcement agencies.
Criminals, terrorists, and other threats are becoming more complex and we must maintain vigilance
by staying armed with the most up-to-date and effective tools, techniques, and technologies in
identification to prevent crimes and security issues before they start.
In order to properly support national security initiatives, biometrics must become flexible and versatile.
It is more necessary than ever that biometrics databases and systems are mobile, multifunctional,
durable, fast, accurate, and easy to use. Our ability to maintain and operate our biometric systems must
grow as dissidents become more proficient at breaching cyber security, spoofing scanners, and flooding
databases with bad data.
The science is critical but it isn’t perfect. Every day that we make progress in the technology new
challenges arise. The 2015 event will help you solve some of the most difficult issues in this space.
As an attendee this year we’ll arm you with information and strategies covering:
·· Hands on training to get your field operators aligned with future requirements
·· Tactics for a seamless integration to Next Generation Identification systems
·· Biometrics file standards
·· The latest developments in smart phone based all in one scanners
·· Newest options for rugged scanners
·· Intuitive biometrics scanners that align to any environment
·· Biometric cyber security
·· Interoperability opportunities
·· Keeping track of changing templates
Biometrics for Government and Law Enforcement is designed for industry practitioners that set program
standards and directions, operators that work hands on using biometrics as a tool in law enforcement
and defense, and software/hardware engineers that advance the capabilities of biometric collection.
Engage in discussions with representatives from DHS, the U.S. Army, CBP, FBI, Michigan State Police,
TSA, USCIS, and others that will amplify your biometrics knowledge and growth.
Don’t miss this year’s agenda that offers focused breakout sessions focused on future requirements,
science and technology, and field operations. No one will get left behind at this year’s program as we
will provide value to every stakeholder in this space.
We look forward to seeing you at the 9th Annual Biometrics for Government and Law Enforcement!
Very respectfully,
Trevor Sosvielle
Program Director
IDGA
P.S. Early registration discounts are
available at www.biometricsevent.com or
by calling 1-800-882-8684.
2 www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
	 32%	 DHS / OBIM
	 21%	 U.S. Army / BIMA
	 15%	 FBI / JIEDDO
	6%	 DIA
	 5%	 Law Enforcement
	 5%	 U.S. Navy
	 5%	 International Government
	 3%	 National Counterterrorism
	Center
	3%	 DoD
	 3%	 U.S. CBP
	 2%	 U.S. Citizenship and
	 Immigration Services
Benchmark with
Identification Experts:
Attendee Profile
9th Annual
Transportation Security
Administration
	 John Schwartz
Program Lead
TSA/TWIC
	 James Loudermilk
Senior Level Technologist
DOJ
Federal Bureau of
investigation
	 William G. McKinsey
Section Chief
FBI/CJIS/MITPS
Department of Homeland
Security
	 Leslie Hope
Biometrics Chief
U.S. Department of Homeland
Security/USCIS
The Department
of Justice
In light of the numerous implementations of NGI Systems this year, changing policy and legislature, and evolving field equipment,
we’re providing our attendees with a special highly focused training module. This section is based on the best practices in training and
aligning your operators to seamlessly transition to new systems and equipment, aligning with current legislature, and improving their
overall speed and accuracy.
Improve Performance, Improve Accuracy, and Reduce Mistakes!
Attend the NGI and Technical Training Day on January 26th
2015
Future Requirements:
Aimed at program, division, and agency leaders, this year’s specialized track sessions will get you in touch with what’s changing in the
space and allow you to benchmark with other agencies. These sessions will arm you with the ability to:
·· Evaluate biometrics solutions
·· Secure agency biometrics funding
·· Reduce costs and improve operator versatility
·· Upgrade legacy databases and improve existing systems
Understand and Influence the Requirements of Future Biometrics Initiatives!
Field Operations:
This year, IDGA is working hard to bring new training, techniques, and strategies to those that work in the field with biometrics to
protect our nation and its cities. With our newest field operations track you will gain the most cutting edge knowledge needed to
achieve your goals. These sessions will help you:
·· Follow best practices in policy and legislature
·· Improve your data collection methodologies, techniques, and situational handling
·· Increase your technical efficiency
·· Reduce error and increase accuracy
Align and Improve Your Collection Efforts
IDGA has brought together the top tier solution providers in the biometrics space to help overcome your biggest biometrics challenges.
This year we will feature high level roundtable discussions in:
·· Developments in modalities
·· Biometric file organization and databases
·· Field scanning improvements
·· Biometric Security Solutions
Advance Your Biometrics Capabilities
Choose Your Track Session During the Main Summit Days on
January 27th
and 28th
2015
Participate in High Level Strategic Roundtable Discussions
3
Maximize Your Time
at the 9th Annual Biometrics for
Government & Law Enforcement
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
8:30 	 Registration and Coffee
9:15		Training Operators to use the Newest
Biometrics Devices and The Plymouth County
Pilot Program
	 The Plymouth County Sheriff’s Department has worked with
both BI2 and Morphotrak to develop cutting edge programs in
the Biometrics Space. One key challenge with implementation
is ensuring your operators know how to use the newest
technologies. In this session you will learn to:
·· Incorporate strategies to enable your operators to effectively
use biometrics devices from early understanding to
advanced usage
·· Ensure operator are consistently following end-to-end best
practices to improve databases, resources, and speed to
identification
·· Identify gaps to prevent larger problems from developing
·· Communicate key value of best practices to get your
department “bought in”
	 Paul Souza
Deputy Director
Plymouth County Sheriff BCI
10:45	 Out with the Old and In With the New:
Replacing Legacy Systems
	 Even the most reliable biometrics systems will inevitably have
to be replaced. How you manage this transition can mark
the difference decreased effectiveness or greatly improved
biometrics initiatives. In this session you will learn to:
·· Effectively communicate the departmental needs of your
new biometrics system to ensure your IT talent oversees an
effective rollout.
·· Understand and mitigate costs of systems transitions
·· Communicate change and train your department to utilize
new resources
·· Transition analog and obsolete file types to your
newest system
	 Dr. Benham Bavarian
President and Principal Consultant
AFIS and Biometrics Consulting, Inc.
12:00 	Lunch
1:15	 Building Interoperability Exchange and
Implementing Biometric Standards
	 A national biometrics program is only as capable as it’s ability
to quickly and effectively share and contribute data to all
peer agencies and programs that are committed to providing
national health, security, and safety. In this session you will
learn:
·· Key considerations in aligning your program with national
biometric quality standards
·· How to prime your organization to benefit from and make
valuable contributions to national biometrics efforts
·· NIEM, its data structures, and opportunities it provides.
·· The current state of interoperability and what to expect from
NIEM 3.0
	 Kamran Atri
Chief Technology Officer
CSE-Corp
	 Kimberly Jackson
Chief Technology Officer
OBIM
2:45 	 Bringing the US to a Biometric Immigration
Exit Solution
	 For 17 years and over the course of eight statutes, the US has
worked to fulfill federal law mandates for an exit solution.
Most agree that an air solution is possible, and many argue
whether a land solution is even feasible. But what happens if
government and industry work in tandem towards a solution?
	 Janice Kephart
CEO
SIBA
Director of the Americas
BorderPol
4:00	 End of Training Day
4
Monday, January 26th
, 2015
NGI and Technical
Training Day
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
It is impossible to provide adequate public safety without biometrics. Hundreds
of thousands of crimes would go unsolved each year if we were not able to
ascertain an offender’s identity through the use of biometrics such as fingers,
palms, DNA, or faces.
- Jeremy Slavish, Director of Biometrics/Identification, Michigan State Police
7:30 	 Registration and Coffee
8:15 	 Chairpersons Opening Remarks
8:30 	 Biometrics at the State Level: How the
Michigan State Police are Using Biometrics
as a Key Component to Get their State
Back on Track
·· See how Michigan utilized technology to become less
dependent on “bricks and mortar”
·· The importance of best practices and capturing high
quality biometric samples at time of arrest
·· Learn what other law enforcement programs Michigan
has positioned alongside their biometric systems to
maximize efficiencies
	 Jeremy Slavish
Director of Biometrics/Identification
Michigan State Police
9:15	 KEYNOTE PRESENTATION:
Unconstrained Resolution, Occlusion,
Pose, and Aging (UROPA) Challenge For
Real-World Facial Recognition
	 There are still significant basic scientific technology gaps
with face recognition for both law enforcement and defense
applications.We will define and attempt to address the UROPA
challenge that law enforcement encounters on a daily bases.
These include:
·· Low Resolution Image Enhancement via Single image Super-
resolution
·· Robust Periocular Recognition in extreme challenging
CONOPS
·· Matching faces that are partially occluded
·· Use cases and examples (Boston Marathon etc.)
	 Dr. Marios Saviddes
Research Professor
Carnegie Mellon University
10:15 	 Networking and Refreshment Break
Main Summit
Day One
Tuesday, January 27th
, 2015
5
11:00	 Track Sessions Begin
Track 1: Future Requirements Track 2: Field Operations
11:00 The FBI and Biometrics: 2015 Outlook
The past year has unquestionably been a banner year
for biometrics initiatives at the FBI. This session will look
at requirements and initiatives moving forward. We will
explore:
·· Success of NGI integration and lessons learned
·· Development of the Biometrics Technology Center and
what it represents for interoperability
·· Future directions and technology focuses for the FBI
Steve Morris
Assistant Director
FBI – CJIS Division
AF DBIDS - Sharing Authoritative LE data and
Biometrics
AF DBIDS is the premiere entry control system for the airforce
where identification cards can be verified against databases
or restricted lists. This session will explore:
·· Utilization of a DoD access control system, DBIDS
·· Sharing of AF LE data at the installation perimeter
·· Expansion of DBIDS from local to CONUS to global
·· Incorporation of authoritative NCIC felony Wants and
Warrants and credential revocation data
Scott Ulrich
Chief Architect
AF DBIDS Airforce
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
12:30	 Networking Lunch
1:30 	 Enterprise Biometric Identity Services at DHS
	 The Office of Biometric Identity Management (OBIM) provides
biometric identity services to DHS and its mission partners that
advance informed decision making by producing accurate,
timely, and high fidelity biometric identity information. In the
session, you will hear more about:
·· OBIM’s Role as DHS Biometric Identity Services Provider
·· Support to the Department of Homeland Security and
Mission Partners
·· IDENT System Improvements and Performance
	 Dr. Ken Fritzsche
Director of the Identity Technology Division (ITD)
Office of Biometric Identity Management (OBIM)
2:15 	 Transportation Worker Identification
Credential (TWIC®): A Program Update and
System Migration Expertise
	 In this session you will learn:
·· Core considerations from Implementing TWIC cards and the
“OneVisit” initiative
·· What’s changes in the TSA/TWIC infrastructure statistics,
enrollment center expansion, TWIC reader certification
effort, TWIC reader rule
·· Migration strategies from TWIC legacy system to multi-
program TSA Infrastructure Modernization (TIM) system:
what it is and lessons learned
	 John Schwartz
Program Lead
TSA/TWIC
3:00	 Networking and Refreshment Break
3:45	 Interactive Roundtable Discussions
	 Choose from four interactive roundtable discussions allowing
for extended dialogue among small, targeted groups. These
dynamic exchanges will allow for timely and important
feedback, engaging and comprehensive discussions, and
targeted networking with colleagues of similar interests.
	
1
Roundtable 1: Tools of the Trade: The newest
options in multi-modal scanning
	
2
Roundtable 2: Keeping it Organized: File systems
and databases to keep your biometric data easily
index able and searchable
	
3
Roundtable 3: Back to the Lab: Techniques and
opportunities for getting rapid results from DNA
	
4
Roundtable 4: On the Road: Methods, systems,
and applications for improving your field scanning
initiatives
4:45 	 Chairpersons Closing Remarks
5:00 	 End Main Day One
Day One: Continued
6
11:45 The Mobile Revolution: How Mobile
Devices Can Offer an Affordable and
Versatile Biometrics Solution
Biometric Scanning Solutions can be expensive, particularly when
distribution must occur across an entire agency to operators in the
field. One cost saving trend has been found within the mobile
market. In this session you will hear about how:
·· Historical progression of the FBI “mobile” biometric capture
platforms, communications, and respective configurations
have greatly enhanced the ability to support on-target data
acquisitions
·· The FBI’s CJIS Division is taking advantage of the latest
changes in their enterprise mobile infrastructure/cellular
technology has greatly reduced application and/or peripheral
hardware costs
·· Future expectations and migration of various modalities is
achievable with the power and cost savings related to mobile
software and hardware development
Christopher Del Greco
Supervisor / Program Manager Federal Bureau of
Investigation
Criminal Justice Information Services Division
Frank A. Lukez
Supervisory Special Agent
FBI CJIS/Global Initiatives Unit
The Latest in Facial Recognition and Iris
Scanning
The FBI Biometric Center of Excellence is the FBI’s program for
exploring and advancing the use of new and enhanced biometric
technologies and capabilities for integration into operations. Every
day, the BCOE strives to deliver state-of-the-art biometric tools and
technologies to law enforcement and intelligence personnel working
in communities around the world. In this session we will explore:
·· Progress and advancements in facial recognition
·· The current state of iris recognition
·· Emerging possibilities and modalities
Nick Megna
Unit Chief
Biometric Center of Excellence (BCOE)
Criminal Justice Information Services
Division (CJIS)
Federal Bureau of Investigation (FBI)
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
7:45 	 Registration and Coffee
8:15 	 Chairpersons Opening Remarks
8:30	 Interoperability and Performance Evaluation
·· Recognition Engines: Open and Closed Systems.
·· Data and Methods Sharing,
·· Image Quality and Uncontrolled Settings
·· Machine Learning and Pattern Recognition
	 Harry Wechsler
Department of Computer Science
George Mason University
9:15	 Major Biometrics Systems – Looking
Backwards  Looking Forwards
	 This session will give you an in depth look at the work the
FBI has done with Biometrics. What challenges these systems
faced in the past, how upgrade and replacement decisions
were made, and what’s planned for the future. In this session
you will learn:
·· Details of three complete cycles of analysis, development
and fielding of large scale biometric systems with lessons
learned at each stage
·· Future Technology policy, governance, training, quality
assurance and service provider requirements
·· Growing needs for innovation and refreshment
	 James Loudermilk
Senior Level Technologist
DOJ
10:15 	 Networking and Refreshment Break
11:00 	 Roundtable Discussions
	 Choose from four interactive roundtable discussions allowing
for extended dialogue among small, targeted groups. These
dynamic exchanges will allow for timely and important
feedback, engaging and comprehensive discussions, and
targeted networking with colleagues of similar interests.
	
1
Roundtable 1: Secure Operations: Newest
security solutions for biometrics
	
2
Roundtable 2: In the Cloud: The newest options
for cloud based storage and retrieval
	
3
Roundtable 3: Rolling with the Punches: Rugged
solutions for protecting your biometric resources
	
4
Roundtable 4: Doing the legwork: Third parties
that can alleviate your processing efforts
12:00 	 Networking Lunch
1:00 	 Track Sessions Begin
Main Summit
Day Two
Wednesday, January 28, 2015
7
Track 1: Future Requirements Track 2: Field Operations
1:00 Building on a Legacy: Understanding Your
Options for Upgrading Your Existing Systems
Many agencies have been using the same biometrics tracking
systems for upwards of ten years. While it’s easy to take an “if it isn’t
broken don’t fix it” mentality, it can mean missed opportunities for
an effective agency. In this session you will learn to:
·· Chose replacement systems for your biometrics databases,
scanners, and other tools
·· Ensure that your data and operability will smoothly carry over
from one system to the next
·· Rapidly incorporate major changes to harness the benefits of a
new system with minor delays
Wayne Towson
Chief Technology Officer
Interpol Washington
DoD ABIS 1.2: Lessons Learned and Newest
Implementations
·· Improvements in availability numbers and inconclusive match rates
·· Using multimodal fusion to increase the likelihood of a match
·· Downstream matching effects as a result of having bad data from
the field
Erik J. Bowman
Chief Engineer, DoD ABIS Program Technical Fellow
Northrop Grumman Corporation
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
Thursday, December 18th, 2014
8
1:45 Interoperability: How Strong Databases and
Standardized File Systems Can Improve Agency
Effectiveness and Reduce Costs and Time
While agencies working harmoniously can mean big things
for crime and terrorism prevention, these benefits are only as
good as their accessibility. How can we maximize the returns of
interagency coordination? In this session you will learn to:
·· Create standardized database formats from agency to agency
that will allow any operator from any agency retrieve data with
ease
·· Conduct background checks and collect preliminary information
to establish records and track individuals
·· Best usage of data for law enforcement
Leslie Hope
Biometrics Chief
U.S. Department of Homeland Security/USCIS
Best Methods for Multi Modal Data Collection:
With the latest advances of speed and accuracy of biometrics
scanning, there have also been major improvements in ease of use. In
this session you will learn to:
·· Understand what new methods are available for rapid DNA
verification
·· Learn best practices for getting accurate facial and iris scans
·· Understand how multiple types of biometric data integrate and
contribute to successful identification
Paul W. Good
Assistant Chief Biometrics
Office of Border Patrol Enforcement Systems
2:30 	 Refreshment and Networking Break
3:00	 Intuitive Adaptation: Creating Systems that
Align Themselves to Challenging Conditions
	 In order for biometric scanning to be a viable field solution for
field verification we must understand that operators do not
always have the luxury of a controlled environment. In this session
you will learn:
·· Create scanners that adapt to any lighting condition at any
time of day
·· Enhance scanning adaptability to unstable environments such
as a warzone or at sea
·· Incorporate predictive software that helps operators in
challenging environments get accurate scans quickly
	 Thirimachos Bourlai
Director: Multispectral Imagery Lab (MILab) (Dept. of Forensic
and Investigative Sciences), Assistant Professor (Biometrics/
Biomedical - LCSEE
West Virginia University
3:45 	 Layered Biometric Security
	 While biometrics has become a pivotal science in crime tracking
and detection it also offers a wealth of opportunity within
physical security. In this session we will explore what you can do
in the wake of these situations. In this session you will learn to:
·· Incorporate the latest technologies in access control and
credentialing
·· Utilize a multitude of modalities to create a complex biometrics
access system
·· Harness Biometrics as one facet of a larger overall security
system
·· Understand what challenges still need to be addressed in
biometric security
	Kathy Wojciechowski
Chief, Law Enforcement/Air Provost
US Air Force, HQ ACC/A7S
4:30 	 Closing Remarks
4:45		End of Conference
Day Two: Continued
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
“As a part of the Next Generation Identification System, FBI CJIS deployed the
Repository for Individuals of Special Concern (RISC) Rapid Search capability.
RISC is a national mobile-identification system made up of biographical and
fingerprint information associated with wanted persons, and other individuals of
special interest. RISC includes 1.7 million sets of fingerprints, including 600,000+
individuals on the National Sex Offender Registry and is available to process
searches 24 hours a day, 7 days a week.”
- Brian L. Edgell, Unit Chief Implementation and Transition Unit, Federal Bureau of Investigation
Register Online, by Email,
Phone, Fax or Mail
Government, Military and Law Enforcement
Academia and Non-Profit
Vendors: Consultants, Solution Providers
Web: 	 www.BiometricsEvent.com
Email: 	 enquiry@iqpc.com
Phone: 	1-800-882-8684
Fax: 	 212-973-1042
Mail:	IDGA
535 5th Avenue, 8th Floor
New York, NY 10017
Dress Code: Military personnel are kindly
requested to be in uniform. Appropriate attire
for Industry is business casual.
MAKE CHECKS PAYABLE IN U.S.DOLLARS
TO: IDGA
A $99 processing charge will be assessed to all
registrations not accompanied by credit card
payment at the time of registration.
* CT residents or people employed in the state
of CT must add 6.35% sales tax.
*The small roundtable will be positioned in a separate high traffic area during the main conference.
**Upon registering for the Branding Pass or Networking Pass you will be contacted by IDGA to collect the required information.
***Team Discounts are off of the standard rates and can not be combined with any other offers
Details for making payment via EFT or wire
transfer:
JPMorgan Chase
Penton Learning Systems LLC dba IQPC:
937-332641
ABA/Routing #: 021000021
Reference: Please include the name of the
attendee(s) and the event number: 12984.008
Payment Policy: Payment is due in full at the
time of registration and includes lunches and
refreshments. Your registration will not be
confirmed until payment is received and may be
subject to cancellation.
Please refer to www.idga.org/cancellation for
cancellation, postponement and substitution
policy
Special Dietary Needs: If you have a dietary
restriction, please contact Customer Service at
1.800.882.8684 to discuss your specific needs.
@2014 IDGA. All Rights Reserved. The format,
design, content and arrangement of this
brochure constitute a trademark of IDGA.
Unauthorized reproduction will be actionable
under the Lanham Act and common law
principles.
IDGA is not affiliated with the U.S. Government
or any branch of the Armed Forces.
Location  Lodging
Information
Package Standard Price
2 Day Main Summit $400
Pre-Summit Focus Day $125
Team Discounts (Vendors Only)*** Savings
3 to 4 20%
5 to 6 25%
7 or more 30%
Package Standard Price
2 Day Main Summit $1,595
3 Day All-Access Pass $1,895
Pre-Summit Focus Day $645
Package Standard Price
2 Day Main Summit $1,695
3 Day All-Access Pass $ 1,995
Pre-Summit Focus Day $645
Branding Pass
Includes:
•	3 Day All-Access Pass
•	Company Logo on Biometrics event website
•	50 word company or product description on Biometrics event website
$1,995 (only 20 passes available)
Networking Pass
Includes:
•	3 Day All-Access Pass
•	Company Logo on Biometrics event website
•	50 word company or product description on Biometrics event website
•	Small roundtable to demonstrate product or service to all event
attendees
$3,495 or (only 10 passes available)
Pricing  Registration
For more information contact
Chris Ritchie at 212-885-2799 or
sponsorship@idga.org
·· Register for the event
·· Download the complete program
agenda
·· View the complete speaker roster and
biographies
·· Gain free access to relevant podcasts,
videos, articles, interviews, whitepapers,
and past presentations at our resource
center
·· Learn more about the location, venue,
and hotel discounts
·· Learn more about our sponsors,
exhibitors, and media partners
·· Plus much more!
www.SpecialOperationsSummit.com 	 | 	 1.800.882.8684 	 | 	 idga@idga.org
Sponsorship and Exhibition
Opportunities Still Available!
Stay Connected!
Visit www.BiometricsEvent.com today to
9 www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
Sheraton Pentagon City
900 South Orme Street
Arlington, VA 22204
Group Rate:
$139 plus 13.00% tax per each night
Please identify you are part of the
“IQPC – Biometrics for Government 
Law Enforcement” group to ensure the
special rate. Note that you are eligible
for this rate three day prior and three
days post the event, based on availability.
Book your room prior to January 5, 2014
to ensure you receive the group rate,
based on availability.
Reservations Telephone:
1-800-325-3535
Register Now!
Yes! Please register me:
Name ___________________________________________________________________________________________________________________________________
Job Title _________________________________________________________________________________________________________________________________
Organization _____________________________________________________________________________________________________________________________
Address _________________________________________________________________________________________________________________________________
City ______________________________________________________________ State ____________ County _____________________ Zip Code ______________
Phone _______________________________________________________________________________ Fax ________________________________________________
E-Mail ___________________________________________________________________________________________________________________________________
Approving Manager _______________________________________________________________________________________________________________________
Please register me for: q All Access q Two Day Main Summit q Focus Day q Branding Pass q Networking Pass
q Please keep me informed via email about this and other related events.
q Check enclosed for $__________________________________________ (Payable in U.S. Dollars to IDGA)
q AmEx q Visa q Master Card q Discover
Card #_______________________________________________________________________________ Exp Date:_______/________CVM Code:_________________
Details for making payment via EFT or wire transfer can be found on preceding page.
* GROUP DISCOUNTS AVAILABLE! Contact Customer Service at 1-800-882-8684 *
PLEASE PHOTOCOPY THIS FORM FOR TEAM REGISTRATIONS
12984.008/JL
www.SpecialOperationsSummit.com 	 | 	 1.800.882.8684 	 | 	 idga@idga.org10
Supporting a Stronger, Smarter, Changing Global SOF Community
9th Annual
NGI and Technical Training Day:
January 26th
2015
Main Summit Days:
January 27th
-28th
2015
Sheraton Pentagon City,
Arlington, VA
www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
Next Generation Identification: Speed, Accuracy, Mobility, Durability

More Related Content

What's hot

Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityCynergisTek, Inc.
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDoug Copley
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™CPaschal
 
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsEnclaveSecurity
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy James Deiotte
 
Validation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effortValidation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effortVeeva Systems
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesAlgoSec
 

What's hot (20)

Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare Cybersecurity
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Marc Crudgington Who I Am
Marc Crudgington Who I AmMarc Crudgington Who I Am
Marc Crudgington Who I Am
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
Validation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effortValidation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effort
 
3 02
3 023 02
3 02
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management Migraines
 

Similar to BiometricsMAIN13

Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Databricks
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management FrameworkJoseph Wynn
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Leading Change in Financial Services
Leading Change in Financial ServicesLeading Change in Financial Services
Leading Change in Financial ServicesNICSA
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018Pistoia Alliance
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxwrite5
 
Rothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The DetailsRothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The DetailsBen Rothke
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Advanced Solutions For Website Compliance
Advanced Solutions For Website ComplianceAdvanced Solutions For Website Compliance
Advanced Solutions For Website ComplianceADA Site Compliance
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 

Similar to BiometricsMAIN13 (20)

Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Leading Change in Financial Services
Leading Change in Financial ServicesLeading Change in Financial Services
Leading Change in Financial Services
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018
Joint Pistoia Alliance & PRISME AI in pharma webinar 18 Oct 2018
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
 
Rothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The DetailsRothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The Details
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Asc overview 7 8-13
Asc overview 7 8-13Asc overview 7 8-13
Asc overview 7 8-13
 
Advanced Solutions For Website Compliance
Advanced Solutions For Website ComplianceAdvanced Solutions For Website Compliance
Advanced Solutions For Website Compliance
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 

More from Trevor Sosvielle

More from Trevor Sosvielle (8)

AutoCarsSV19
AutoCarsSV19AutoCarsSV19
AutoCarsSV19
 
MilitaryRadar2016v8
MilitaryRadar2016v8MilitaryRadar2016v8
MilitaryRadar2016v8
 
AutonomousTrucks2015MAIN30
AutonomousTrucks2015MAIN30AutonomousTrucks2015MAIN30
AutonomousTrucks2015MAIN30
 
AutonomousCars29
AutonomousCars29AutonomousCars29
AutonomousCars29
 
AdditiveManDefense21
AdditiveManDefense21AdditiveManDefense21
AdditiveManDefense21
 
AdvContentMktgMAIN10
AdvContentMktgMAIN10AdvContentMktgMAIN10
AdvContentMktgMAIN10
 
MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12
 
AdditivesManufacturing18
AdditivesManufacturing18AdditivesManufacturing18
AdditivesManufacturing18
 

BiometricsMAIN13

  • 1. 9th Annual Next Generation Identification: Speed, Accuracy, Mobility, Durability www.BiometricsEvent.com In-Depth Discussion Will Cover 2015 Featured Speakers Include: NGI and Technical Training Day: January 26th 2015 Main Summit Days: January 27th -28th 2015 Sheraton Pentagon City, Arlington, VA Jeremy Slavish Director of Biometrics/ Identification Michigan State Police Paul Good Assistant Chief Biometrics Office of Border Patrol Enforcement Systems Dr. Ken Fritzsche Director of the Identity Technology Division (ITD) Office ofBiometric Identity Management (OBIM) NGI System Implementation Modality Breakthroughs Smartphone Biometric Solutions Rugged Scan Design Interoperability Intuitive Design Make the NGI Transition! Don’t miss this series of interactive training sessions focused on the newest tools, technologies, and techniques in biometric identification. Media Partners: New for 2015: Tracked Sessions on Future Requirements, and Field Operations Presentations from Leading Organizations in Biometrics U.S. Department of Homeland Security / OBIM and USCIS Identity Management and Immigration System Integrity Biometrics NETT: U.S. Army Training and Doctrine Command FBI Science and Technology Branch Michigan State Police Biometrics/Identification FBI NGI Integration Office TSA/TWIC Program Office of Border Patrol Enforcement Training Operators in the Usage of the Newest Biometric Devices In-depth Analysis of the Most Major Biometrics Systems Data Clarity, Collection, and Mobile Solutions Challenges, Changes, and Benefits: NGI System Program Updates and System Migration Mobile Biometrics and Emerging Modality Challenges NGI and Technical Training Day Featured Topics for 2015 NEW!
  • 2. Dear Colleague: As you know, Biometrics is an evolving technology for government and law enforcement agencies. Criminals, terrorists, and other threats are becoming more complex and we must maintain vigilance by staying armed with the most up-to-date and effective tools, techniques, and technologies in identification to prevent crimes and security issues before they start. In order to properly support national security initiatives, biometrics must become flexible and versatile. It is more necessary than ever that biometrics databases and systems are mobile, multifunctional, durable, fast, accurate, and easy to use. Our ability to maintain and operate our biometric systems must grow as dissidents become more proficient at breaching cyber security, spoofing scanners, and flooding databases with bad data. The science is critical but it isn’t perfect. Every day that we make progress in the technology new challenges arise. The 2015 event will help you solve some of the most difficult issues in this space. As an attendee this year we’ll arm you with information and strategies covering: ·· Hands on training to get your field operators aligned with future requirements ·· Tactics for a seamless integration to Next Generation Identification systems ·· Biometrics file standards ·· The latest developments in smart phone based all in one scanners ·· Newest options for rugged scanners ·· Intuitive biometrics scanners that align to any environment ·· Biometric cyber security ·· Interoperability opportunities ·· Keeping track of changing templates Biometrics for Government and Law Enforcement is designed for industry practitioners that set program standards and directions, operators that work hands on using biometrics as a tool in law enforcement and defense, and software/hardware engineers that advance the capabilities of biometric collection. Engage in discussions with representatives from DHS, the U.S. Army, CBP, FBI, Michigan State Police, TSA, USCIS, and others that will amplify your biometrics knowledge and growth. Don’t miss this year’s agenda that offers focused breakout sessions focused on future requirements, science and technology, and field operations. No one will get left behind at this year’s program as we will provide value to every stakeholder in this space. We look forward to seeing you at the 9th Annual Biometrics for Government and Law Enforcement! Very respectfully, Trevor Sosvielle Program Director IDGA P.S. Early registration discounts are available at www.biometricsevent.com or by calling 1-800-882-8684. 2 www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com 32% DHS / OBIM 21% U.S. Army / BIMA 15% FBI / JIEDDO 6% DIA 5% Law Enforcement 5% U.S. Navy 5% International Government 3% National Counterterrorism Center 3% DoD 3% U.S. CBP 2% U.S. Citizenship and Immigration Services Benchmark with Identification Experts: Attendee Profile 9th Annual Transportation Security Administration John Schwartz Program Lead TSA/TWIC James Loudermilk Senior Level Technologist DOJ Federal Bureau of investigation William G. McKinsey Section Chief FBI/CJIS/MITPS Department of Homeland Security Leslie Hope Biometrics Chief U.S. Department of Homeland Security/USCIS The Department of Justice
  • 3. In light of the numerous implementations of NGI Systems this year, changing policy and legislature, and evolving field equipment, we’re providing our attendees with a special highly focused training module. This section is based on the best practices in training and aligning your operators to seamlessly transition to new systems and equipment, aligning with current legislature, and improving their overall speed and accuracy. Improve Performance, Improve Accuracy, and Reduce Mistakes! Attend the NGI and Technical Training Day on January 26th 2015 Future Requirements: Aimed at program, division, and agency leaders, this year’s specialized track sessions will get you in touch with what’s changing in the space and allow you to benchmark with other agencies. These sessions will arm you with the ability to: ·· Evaluate biometrics solutions ·· Secure agency biometrics funding ·· Reduce costs and improve operator versatility ·· Upgrade legacy databases and improve existing systems Understand and Influence the Requirements of Future Biometrics Initiatives! Field Operations: This year, IDGA is working hard to bring new training, techniques, and strategies to those that work in the field with biometrics to protect our nation and its cities. With our newest field operations track you will gain the most cutting edge knowledge needed to achieve your goals. These sessions will help you: ·· Follow best practices in policy and legislature ·· Improve your data collection methodologies, techniques, and situational handling ·· Increase your technical efficiency ·· Reduce error and increase accuracy Align and Improve Your Collection Efforts IDGA has brought together the top tier solution providers in the biometrics space to help overcome your biggest biometrics challenges. This year we will feature high level roundtable discussions in: ·· Developments in modalities ·· Biometric file organization and databases ·· Field scanning improvements ·· Biometric Security Solutions Advance Your Biometrics Capabilities Choose Your Track Session During the Main Summit Days on January 27th and 28th 2015 Participate in High Level Strategic Roundtable Discussions 3 Maximize Your Time at the 9th Annual Biometrics for Government & Law Enforcement www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
  • 4. 8:30 Registration and Coffee 9:15 Training Operators to use the Newest Biometrics Devices and The Plymouth County Pilot Program The Plymouth County Sheriff’s Department has worked with both BI2 and Morphotrak to develop cutting edge programs in the Biometrics Space. One key challenge with implementation is ensuring your operators know how to use the newest technologies. In this session you will learn to: ·· Incorporate strategies to enable your operators to effectively use biometrics devices from early understanding to advanced usage ·· Ensure operator are consistently following end-to-end best practices to improve databases, resources, and speed to identification ·· Identify gaps to prevent larger problems from developing ·· Communicate key value of best practices to get your department “bought in” Paul Souza Deputy Director Plymouth County Sheriff BCI 10:45 Out with the Old and In With the New: Replacing Legacy Systems Even the most reliable biometrics systems will inevitably have to be replaced. How you manage this transition can mark the difference decreased effectiveness or greatly improved biometrics initiatives. In this session you will learn to: ·· Effectively communicate the departmental needs of your new biometrics system to ensure your IT talent oversees an effective rollout. ·· Understand and mitigate costs of systems transitions ·· Communicate change and train your department to utilize new resources ·· Transition analog and obsolete file types to your newest system Dr. Benham Bavarian President and Principal Consultant AFIS and Biometrics Consulting, Inc. 12:00 Lunch 1:15 Building Interoperability Exchange and Implementing Biometric Standards A national biometrics program is only as capable as it’s ability to quickly and effectively share and contribute data to all peer agencies and programs that are committed to providing national health, security, and safety. In this session you will learn: ·· Key considerations in aligning your program with national biometric quality standards ·· How to prime your organization to benefit from and make valuable contributions to national biometrics efforts ·· NIEM, its data structures, and opportunities it provides. ·· The current state of interoperability and what to expect from NIEM 3.0 Kamran Atri Chief Technology Officer CSE-Corp Kimberly Jackson Chief Technology Officer OBIM 2:45 Bringing the US to a Biometric Immigration Exit Solution For 17 years and over the course of eight statutes, the US has worked to fulfill federal law mandates for an exit solution. Most agree that an air solution is possible, and many argue whether a land solution is even feasible. But what happens if government and industry work in tandem towards a solution? Janice Kephart CEO SIBA Director of the Americas BorderPol 4:00 End of Training Day 4 Monday, January 26th , 2015 NGI and Technical Training Day www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com It is impossible to provide adequate public safety without biometrics. Hundreds of thousands of crimes would go unsolved each year if we were not able to ascertain an offender’s identity through the use of biometrics such as fingers, palms, DNA, or faces. - Jeremy Slavish, Director of Biometrics/Identification, Michigan State Police
  • 5. 7:30 Registration and Coffee 8:15 Chairpersons Opening Remarks 8:30 Biometrics at the State Level: How the Michigan State Police are Using Biometrics as a Key Component to Get their State Back on Track ·· See how Michigan utilized technology to become less dependent on “bricks and mortar” ·· The importance of best practices and capturing high quality biometric samples at time of arrest ·· Learn what other law enforcement programs Michigan has positioned alongside their biometric systems to maximize efficiencies Jeremy Slavish Director of Biometrics/Identification Michigan State Police 9:15 KEYNOTE PRESENTATION: Unconstrained Resolution, Occlusion, Pose, and Aging (UROPA) Challenge For Real-World Facial Recognition There are still significant basic scientific technology gaps with face recognition for both law enforcement and defense applications.We will define and attempt to address the UROPA challenge that law enforcement encounters on a daily bases. These include: ·· Low Resolution Image Enhancement via Single image Super- resolution ·· Robust Periocular Recognition in extreme challenging CONOPS ·· Matching faces that are partially occluded ·· Use cases and examples (Boston Marathon etc.) Dr. Marios Saviddes Research Professor Carnegie Mellon University 10:15 Networking and Refreshment Break Main Summit Day One Tuesday, January 27th , 2015 5 11:00 Track Sessions Begin Track 1: Future Requirements Track 2: Field Operations 11:00 The FBI and Biometrics: 2015 Outlook The past year has unquestionably been a banner year for biometrics initiatives at the FBI. This session will look at requirements and initiatives moving forward. We will explore: ·· Success of NGI integration and lessons learned ·· Development of the Biometrics Technology Center and what it represents for interoperability ·· Future directions and technology focuses for the FBI Steve Morris Assistant Director FBI – CJIS Division AF DBIDS - Sharing Authoritative LE data and Biometrics AF DBIDS is the premiere entry control system for the airforce where identification cards can be verified against databases or restricted lists. This session will explore: ·· Utilization of a DoD access control system, DBIDS ·· Sharing of AF LE data at the installation perimeter ·· Expansion of DBIDS from local to CONUS to global ·· Incorporation of authoritative NCIC felony Wants and Warrants and credential revocation data Scott Ulrich Chief Architect AF DBIDS Airforce www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
  • 6. 12:30 Networking Lunch 1:30 Enterprise Biometric Identity Services at DHS The Office of Biometric Identity Management (OBIM) provides biometric identity services to DHS and its mission partners that advance informed decision making by producing accurate, timely, and high fidelity biometric identity information. In the session, you will hear more about: ·· OBIM’s Role as DHS Biometric Identity Services Provider ·· Support to the Department of Homeland Security and Mission Partners ·· IDENT System Improvements and Performance Dr. Ken Fritzsche Director of the Identity Technology Division (ITD) Office of Biometric Identity Management (OBIM) 2:15 Transportation Worker Identification Credential (TWIC®): A Program Update and System Migration Expertise In this session you will learn: ·· Core considerations from Implementing TWIC cards and the “OneVisit” initiative ·· What’s changes in the TSA/TWIC infrastructure statistics, enrollment center expansion, TWIC reader certification effort, TWIC reader rule ·· Migration strategies from TWIC legacy system to multi- program TSA Infrastructure Modernization (TIM) system: what it is and lessons learned John Schwartz Program Lead TSA/TWIC 3:00 Networking and Refreshment Break 3:45 Interactive Roundtable Discussions Choose from four interactive roundtable discussions allowing for extended dialogue among small, targeted groups. These dynamic exchanges will allow for timely and important feedback, engaging and comprehensive discussions, and targeted networking with colleagues of similar interests. 1 Roundtable 1: Tools of the Trade: The newest options in multi-modal scanning 2 Roundtable 2: Keeping it Organized: File systems and databases to keep your biometric data easily index able and searchable 3 Roundtable 3: Back to the Lab: Techniques and opportunities for getting rapid results from DNA 4 Roundtable 4: On the Road: Methods, systems, and applications for improving your field scanning initiatives 4:45 Chairpersons Closing Remarks 5:00 End Main Day One Day One: Continued 6 11:45 The Mobile Revolution: How Mobile Devices Can Offer an Affordable and Versatile Biometrics Solution Biometric Scanning Solutions can be expensive, particularly when distribution must occur across an entire agency to operators in the field. One cost saving trend has been found within the mobile market. In this session you will hear about how: ·· Historical progression of the FBI “mobile” biometric capture platforms, communications, and respective configurations have greatly enhanced the ability to support on-target data acquisitions ·· The FBI’s CJIS Division is taking advantage of the latest changes in their enterprise mobile infrastructure/cellular technology has greatly reduced application and/or peripheral hardware costs ·· Future expectations and migration of various modalities is achievable with the power and cost savings related to mobile software and hardware development Christopher Del Greco Supervisor / Program Manager Federal Bureau of Investigation Criminal Justice Information Services Division Frank A. Lukez Supervisory Special Agent FBI CJIS/Global Initiatives Unit The Latest in Facial Recognition and Iris Scanning The FBI Biometric Center of Excellence is the FBI’s program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations. Every day, the BCOE strives to deliver state-of-the-art biometric tools and technologies to law enforcement and intelligence personnel working in communities around the world. In this session we will explore: ·· Progress and advancements in facial recognition ·· The current state of iris recognition ·· Emerging possibilities and modalities Nick Megna Unit Chief Biometric Center of Excellence (BCOE) Criminal Justice Information Services Division (CJIS) Federal Bureau of Investigation (FBI) www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
  • 7. 7:45 Registration and Coffee 8:15 Chairpersons Opening Remarks 8:30 Interoperability and Performance Evaluation ·· Recognition Engines: Open and Closed Systems. ·· Data and Methods Sharing, ·· Image Quality and Uncontrolled Settings ·· Machine Learning and Pattern Recognition Harry Wechsler Department of Computer Science George Mason University 9:15 Major Biometrics Systems – Looking Backwards Looking Forwards This session will give you an in depth look at the work the FBI has done with Biometrics. What challenges these systems faced in the past, how upgrade and replacement decisions were made, and what’s planned for the future. In this session you will learn: ·· Details of three complete cycles of analysis, development and fielding of large scale biometric systems with lessons learned at each stage ·· Future Technology policy, governance, training, quality assurance and service provider requirements ·· Growing needs for innovation and refreshment James Loudermilk Senior Level Technologist DOJ 10:15 Networking and Refreshment Break 11:00 Roundtable Discussions Choose from four interactive roundtable discussions allowing for extended dialogue among small, targeted groups. These dynamic exchanges will allow for timely and important feedback, engaging and comprehensive discussions, and targeted networking with colleagues of similar interests. 1 Roundtable 1: Secure Operations: Newest security solutions for biometrics 2 Roundtable 2: In the Cloud: The newest options for cloud based storage and retrieval 3 Roundtable 3: Rolling with the Punches: Rugged solutions for protecting your biometric resources 4 Roundtable 4: Doing the legwork: Third parties that can alleviate your processing efforts 12:00 Networking Lunch 1:00 Track Sessions Begin Main Summit Day Two Wednesday, January 28, 2015 7 Track 1: Future Requirements Track 2: Field Operations 1:00 Building on a Legacy: Understanding Your Options for Upgrading Your Existing Systems Many agencies have been using the same biometrics tracking systems for upwards of ten years. While it’s easy to take an “if it isn’t broken don’t fix it” mentality, it can mean missed opportunities for an effective agency. In this session you will learn to: ·· Chose replacement systems for your biometrics databases, scanners, and other tools ·· Ensure that your data and operability will smoothly carry over from one system to the next ·· Rapidly incorporate major changes to harness the benefits of a new system with minor delays Wayne Towson Chief Technology Officer Interpol Washington DoD ABIS 1.2: Lessons Learned and Newest Implementations ·· Improvements in availability numbers and inconclusive match rates ·· Using multimodal fusion to increase the likelihood of a match ·· Downstream matching effects as a result of having bad data from the field Erik J. Bowman Chief Engineer, DoD ABIS Program Technical Fellow Northrop Grumman Corporation www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com
  • 8. Thursday, December 18th, 2014 8 1:45 Interoperability: How Strong Databases and Standardized File Systems Can Improve Agency Effectiveness and Reduce Costs and Time While agencies working harmoniously can mean big things for crime and terrorism prevention, these benefits are only as good as their accessibility. How can we maximize the returns of interagency coordination? In this session you will learn to: ·· Create standardized database formats from agency to agency that will allow any operator from any agency retrieve data with ease ·· Conduct background checks and collect preliminary information to establish records and track individuals ·· Best usage of data for law enforcement Leslie Hope Biometrics Chief U.S. Department of Homeland Security/USCIS Best Methods for Multi Modal Data Collection: With the latest advances of speed and accuracy of biometrics scanning, there have also been major improvements in ease of use. In this session you will learn to: ·· Understand what new methods are available for rapid DNA verification ·· Learn best practices for getting accurate facial and iris scans ·· Understand how multiple types of biometric data integrate and contribute to successful identification Paul W. Good Assistant Chief Biometrics Office of Border Patrol Enforcement Systems 2:30 Refreshment and Networking Break 3:00 Intuitive Adaptation: Creating Systems that Align Themselves to Challenging Conditions In order for biometric scanning to be a viable field solution for field verification we must understand that operators do not always have the luxury of a controlled environment. In this session you will learn: ·· Create scanners that adapt to any lighting condition at any time of day ·· Enhance scanning adaptability to unstable environments such as a warzone or at sea ·· Incorporate predictive software that helps operators in challenging environments get accurate scans quickly Thirimachos Bourlai Director: Multispectral Imagery Lab (MILab) (Dept. of Forensic and Investigative Sciences), Assistant Professor (Biometrics/ Biomedical - LCSEE West Virginia University 3:45 Layered Biometric Security While biometrics has become a pivotal science in crime tracking and detection it also offers a wealth of opportunity within physical security. In this session we will explore what you can do in the wake of these situations. In this session you will learn to: ·· Incorporate the latest technologies in access control and credentialing ·· Utilize a multitude of modalities to create a complex biometrics access system ·· Harness Biometrics as one facet of a larger overall security system ·· Understand what challenges still need to be addressed in biometric security Kathy Wojciechowski Chief, Law Enforcement/Air Provost US Air Force, HQ ACC/A7S 4:30 Closing Remarks 4:45 End of Conference Day Two: Continued www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com “As a part of the Next Generation Identification System, FBI CJIS deployed the Repository for Individuals of Special Concern (RISC) Rapid Search capability. RISC is a national mobile-identification system made up of biographical and fingerprint information associated with wanted persons, and other individuals of special interest. RISC includes 1.7 million sets of fingerprints, including 600,000+ individuals on the National Sex Offender Registry and is available to process searches 24 hours a day, 7 days a week.” - Brian L. Edgell, Unit Chief Implementation and Transition Unit, Federal Bureau of Investigation
  • 9. Register Online, by Email, Phone, Fax or Mail Government, Military and Law Enforcement Academia and Non-Profit Vendors: Consultants, Solution Providers Web: www.BiometricsEvent.com Email: enquiry@iqpc.com Phone: 1-800-882-8684 Fax: 212-973-1042 Mail: IDGA 535 5th Avenue, 8th Floor New York, NY 10017 Dress Code: Military personnel are kindly requested to be in uniform. Appropriate attire for Industry is business casual. MAKE CHECKS PAYABLE IN U.S.DOLLARS TO: IDGA A $99 processing charge will be assessed to all registrations not accompanied by credit card payment at the time of registration. * CT residents or people employed in the state of CT must add 6.35% sales tax. *The small roundtable will be positioned in a separate high traffic area during the main conference. **Upon registering for the Branding Pass or Networking Pass you will be contacted by IDGA to collect the required information. ***Team Discounts are off of the standard rates and can not be combined with any other offers Details for making payment via EFT or wire transfer: JPMorgan Chase Penton Learning Systems LLC dba IQPC: 937-332641 ABA/Routing #: 021000021 Reference: Please include the name of the attendee(s) and the event number: 12984.008 Payment Policy: Payment is due in full at the time of registration and includes lunches and refreshments. Your registration will not be confirmed until payment is received and may be subject to cancellation. Please refer to www.idga.org/cancellation for cancellation, postponement and substitution policy Special Dietary Needs: If you have a dietary restriction, please contact Customer Service at 1.800.882.8684 to discuss your specific needs. @2014 IDGA. All Rights Reserved. The format, design, content and arrangement of this brochure constitute a trademark of IDGA. Unauthorized reproduction will be actionable under the Lanham Act and common law principles. IDGA is not affiliated with the U.S. Government or any branch of the Armed Forces. Location Lodging Information Package Standard Price 2 Day Main Summit $400 Pre-Summit Focus Day $125 Team Discounts (Vendors Only)*** Savings 3 to 4 20% 5 to 6 25% 7 or more 30% Package Standard Price 2 Day Main Summit $1,595 3 Day All-Access Pass $1,895 Pre-Summit Focus Day $645 Package Standard Price 2 Day Main Summit $1,695 3 Day All-Access Pass $ 1,995 Pre-Summit Focus Day $645 Branding Pass Includes: • 3 Day All-Access Pass • Company Logo on Biometrics event website • 50 word company or product description on Biometrics event website $1,995 (only 20 passes available) Networking Pass Includes: • 3 Day All-Access Pass • Company Logo on Biometrics event website • 50 word company or product description on Biometrics event website • Small roundtable to demonstrate product or service to all event attendees $3,495 or (only 10 passes available) Pricing Registration For more information contact Chris Ritchie at 212-885-2799 or sponsorship@idga.org ·· Register for the event ·· Download the complete program agenda ·· View the complete speaker roster and biographies ·· Gain free access to relevant podcasts, videos, articles, interviews, whitepapers, and past presentations at our resource center ·· Learn more about the location, venue, and hotel discounts ·· Learn more about our sponsors, exhibitors, and media partners ·· Plus much more! www.SpecialOperationsSummit.com | 1.800.882.8684 | idga@idga.org Sponsorship and Exhibition Opportunities Still Available! Stay Connected! Visit www.BiometricsEvent.com today to 9 www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com Sheraton Pentagon City 900 South Orme Street Arlington, VA 22204 Group Rate: $139 plus 13.00% tax per each night Please identify you are part of the “IQPC – Biometrics for Government Law Enforcement” group to ensure the special rate. Note that you are eligible for this rate three day prior and three days post the event, based on availability. Book your room prior to January 5, 2014 to ensure you receive the group rate, based on availability. Reservations Telephone: 1-800-325-3535
  • 10. Register Now! Yes! Please register me: Name ___________________________________________________________________________________________________________________________________ Job Title _________________________________________________________________________________________________________________________________ Organization _____________________________________________________________________________________________________________________________ Address _________________________________________________________________________________________________________________________________ City ______________________________________________________________ State ____________ County _____________________ Zip Code ______________ Phone _______________________________________________________________________________ Fax ________________________________________________ E-Mail ___________________________________________________________________________________________________________________________________ Approving Manager _______________________________________________________________________________________________________________________ Please register me for: q All Access q Two Day Main Summit q Focus Day q Branding Pass q Networking Pass q Please keep me informed via email about this and other related events. q Check enclosed for $__________________________________________ (Payable in U.S. Dollars to IDGA) q AmEx q Visa q Master Card q Discover Card #_______________________________________________________________________________ Exp Date:_______/________CVM Code:_________________ Details for making payment via EFT or wire transfer can be found on preceding page. * GROUP DISCOUNTS AVAILABLE! Contact Customer Service at 1-800-882-8684 * PLEASE PHOTOCOPY THIS FORM FOR TEAM REGISTRATIONS 12984.008/JL www.SpecialOperationsSummit.com | 1.800.882.8684 | idga@idga.org10 Supporting a Stronger, Smarter, Changing Global SOF Community 9th Annual NGI and Technical Training Day: January 26th 2015 Main Summit Days: January 27th -28th 2015 Sheraton Pentagon City, Arlington, VA www.BiometricsEvent.com • 1.800.882.8684 • enquiry@iqpc.com Next Generation Identification: Speed, Accuracy, Mobility, Durability