Security Checkpoints: Evolving Technology and Planning Considerations
|
|
- Marcia Richardson
- 6 years ago
- Views:
Transcription
1 Security Checkpoints: Evolving Technology and Planning Considerations 2018 Work March 14, 2018
2 Agenda Yesterday / Today Ongoing / Near-Term Future Long-term Recommendations
3
4 Yesterday / Today Current State Standard lanes ( Mod set ) Mobile boarding passes TSA Pre-Check 3.5%/year growth; 6M enrolled; 10M total Trusted Traveler TSA s Checkpoint Design Guide (CDG) Bare minimum => Optimal configuration Continuous updates, with supplement Canine Teams Very good excellent rate of success High volume periods Specific queue configurations Air flow requirements
5 Ongoing / Near-Term TSA s Innovation Task Force (ITF) Pilot Programs Automated Screening Lanes ( Program of Record ) Multiple vendors / configurations
6 Ongoing / Near-Term TSA s Innovation Task Force (ITF) Pilot Programs Next Generation Advanced Imaging Technology Walkthrough millimeter wave (pilot: LAX) Passenger position correction Stand-off detection Checkpoint Computed Tomography (CT) Checked Baggage Technology Multiple manufacturers; varying stages of certification Various test sites (stand-alone configuration) BOS, PHX, OAK (soon) Plan: 145 units in airports Upcoming: Integrated w/ ASL
7 Ongoing / Near-Term Biometrics Fingerprints; Facial Recognition Credential Authentication Technology Holograms Real-Time Queue Management Bluetooth Technology Video Analytics
8 Ongoing / Near-Term TSA Office of Acquisition and Program Management (OAPM)* Standing up Programs of Record (POR) Project-based budgets Office-wide Integrated Master Schedule (IMS) Improved projected equipment needs Office-wide prioritization framework Passenger Screening Program (PSP) Transition from procurement to sustainment by 2020 * March 20 th ASAC Checkpoint Report Working Group - Recommendations Briefing
9 Long-Term TSA ITF Broad Agency Announcements (BAA) Rolling submissions; next release: end of 2018 CT, ASLs increase throughput Machine learning Automatic threat detection vs. auto assist Improved (longer?) re-composure Networked/consolidated remote screening Innovative configurations
10 Long-Term
11 Long-Term Accessible Property Security Screening (APSS) TSA, through contract support, developing simulation models for new technology evaluation ASLs with AT, CT As detailed as possible with vendor specifications Value: effective risk analysis and evaluation of impact on life cycle costs (labor, capital, O&M, ILS, RMA, etc.) for subsystems and system as a whole
12 Long-Term Blast & Congestion Mitigation Strategies National SafeSkies Alliance Program For Applied Research In Airport Security (PARAS) ongoing projects? PARAS 0013: Managing Congestion in Public Areas to Mitigate Security Vulnerabilities PARAS 0014: Blast Mitigation Strategies for Non-Secure Areas at Airports
13 Long-Term Biometrics fingerprints, facial recognition, retinal scans, etc. Multi-layered security for advanced threat detection & prevention ( curb to gate ) Non-passenger access to airside (DEN hotel; PIT) TSA Integration CDG: start with optimal configuration, work back (similar to Planning Guidelines & Design Standards for Checked Baggage Inspection Systems (PGDS) Security Technology Integration Program (STIP): remote download of Field Data Recording System (FDRS) information; upload of new algorithms Robust cybersecurity infrastructure
14 Long-Term APEX Screening at Speed DHS Science & Technology (S&T) Directorate Double the throughput Reduce checkpoints Reduce divestiture/re-composure Autonomous
15 Recommendations Involve TSA early (and often) in the design process Design for worst case (actual checkpoint, HVAC, AND support space) Power & data everywhere New construction: consider underfloor electrical systems (Walkerduct, etc.) to avoid future swiss cheese Maintain up-to-date as-built documentation (BIM model, etc.) Consider developing a detailed system model with best available information Contemplate the operation & passenger mix; not just the equipment throughput Mitigate congestion, bottlenecks, as best as possible Volunteer/register to be an ITF pilot site
16 Thank You
Airport Consultants Council
Airport Consultants Council Jose Bonilla Innovation Task Force: Future of Security Airport Consultants Council July 20, 2016 Innovating the Future of Aviation Security Cybersecurity Cybersecurity Requirements;
More informationPassenger Screening Program
Passenger Screening Program Mario Wilson Division Director Airport Consultants Council July 20, 2017 Key Topics Passenger Screening Program Funding Priorities Planned Funding Activities Planned Funding
More informationRCA and APM Update. Latetia Henderson, APM Austin Gould, RCA Keith Goll, RCA
RCA and APM Update Latetia Henderson, APM Austin Gould, RCA Keith Goll, RCA 1 Non-Materiel Materiel Capability Lifecycle RCA functions primarily in the early stages of capability development and acts as
More informationAGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor August 13, :30 a.m.
AGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor 9:30 a.m. Minutes Approval of Minutes: Regular Commission Meeting July 9, 2014 Executive Director Approval
More informationOffice of Acquisition Program Management (OAPM)
Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)
More informationAir Entry/Exit Re-engineering (AEER)
Air Entry/Exit Re-engineering (AEER) Homeland Security Science & Technology Advisory Committee (HSSTAC) April 8, 2014 Bob Burns Director, Apex AEER Project Homeland Security Advanced Research Projects
More informationTWIC Update to Sector Delaware Bay AMSC 8 June 2018
TWIC Update to Sector Delaware Bay AMSC 8 June 2018 Agenda TWIC Program Metrics TWIC Next Generation (NexGen Physical Features) Credential Modes of Operation Canceled Card List Mobile App TWIC Assessments
More informationBeyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness
Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of
More informationYour single source for a safe, secure, and sustainable airport
Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every
More informationRisk-based security in practice Turning information into smart screening. October 2014
Risk-based security in practice Turning information into smart screening October 2014 Organizations charged with securing our society s vital functions transit, commerce, communication have expansive missions
More informationSolution. Imagine... a New World of Authentication.
A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationBiometric Entry-Exit. July 11, 2017
Biometric Entry-Exit July 11, 2017 CBP Assumes Biometric Exit Mission in 2013 1996 Congress passed legislation mandating the creation of a biographic entry and exit system 2001 Post 9/11 Congress passed
More informationTSA Pre Creative Toolkit Contents
TSA Pre Creative Toolkit Contents Brand Positioning & Brand Promise Advertising Assets Print Ads Full Page & ½ Page Online Units Animated & static Collateral Assets Brochure Comparison Chart on Trusted
More informationEnabling Compliance for Physical and Cyber Security in Mobile Devices
Enabling Compliance for Physical and Cyber Security in Mobile Devices Brandon Arcement & Chip Epps HID Global Sept 12, 2016 1630-1730 ET Agenda Smart Devices vs. Traditional Cards Mobility Infrastructure
More information2018 Biometric Technology Rally
DHS SCIENCE AND TECHNOLOGY 2018 Biometric Technology Rally November 2017 Maryland Test Facility (MdTF) Department of Homeland Security Science and Technology Directorate Overview 2018 Biometric Technology
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationChecked Baggage. Mario Wilson Division Director. Airport Consultants Council July 20, 2016
Checked Baggage Mario Wilson Division Director Airport Consultants Council July 20, 2016 Innovating the Future of Aviation Security Cybersecurity Cybersecurity s; Technical Solutions Innovation Operational
More informationWORK PROGRAMME
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Michel LACROIX European Commission DG CONNECT Software & Services, Cloud michel.lacroix@ec.europa.eu From FP7 to H2020 Preparation
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationSecurity Technology October 31, Overview
Security Technology October 31, 2005 Overview Passenger Screening Current Passenger Screening Technology Improvement Goals Emerging Technologies Screening Current Screening Technology Improvement Goals
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationAPEX in Security. AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016
APEX in Security AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016 Two different programmes with the common objective of improving security Airport Excellence (APEX) A peer review process
More information6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview.
2015 ACC / TSA Security Capabilities Workshop June 16-18, 2015 #SecurityCapabilities THANK YOU TO OUR SPONSORS 2015 ACC/TSA Security Capabilities Workshop June 24-26 Arlington, VA #SecurityCapabilities
More informationTest Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event
Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Mr. George Rumford Deputy Director Major Initiatives and Technical Analyses Test Resource Management Center January
More informationDepartment of Homeland Security Science and Technology Directorate
Department of Homeland Security Science and Technology Directorate Overview Presented to the Transportation Research Board Infrastructure and Geophysical Division Science and Technology Directorate Department
More informationBaker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Cybersecurity and HIPAA update Agenda Introductions Cybersecurity Overview
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationOffice of Security Capabilities Cybersecurity Management Framework
Transportation Security Administration Office of Security Capabilities Version 1.5 Updated: August 10, 2015 The contents of this framework draw from and are in alignment with requirements identified in
More informationThe security challenge in a mobile world
The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario
More informationLeveraging the LincPass in USDA
Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass
More informationCincinnati/Northern Kentucky International Airport. Partnership for Nuclear Security Insider Threat Summit September, 2015
Cincinnati/Northern Kentucky International Airport Partnership for Nuclear Security Insider Threat Summit September, 2015 Cincinnati USA Story 2 28 th largest metropolitan area in the USA with 2.1M population
More informationTransguard Group. Security Services
Transguard Group Security Services Transguard Security Services Transguard s Integrated Solutions provide a single system model to meet all your security needs. We work in partnership with commercial and
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationTHE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE
THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration
More informationSolving Safety and Security Concerns at Meetings and Events
Solving Safety and Security Concerns at Meetings and Events Chris Gernentz Safety and Security, Carlson Rezidor Hotel Group 22 years in Safety and Security Hospitality, manufacturing, petro chem, medical.
More informationSan Francisco Department of Public Health. IT and Epic Project Update
San Francisco Department of Public Health IT and Epic Project Update Health Commission, April 16, 2019 IT: Infrastructure Accomplishments Sweeping Improvements Across DPH Thousands of devices are Epic
More informationFederal Mobility: A Year in Review
Federal Mobility: A Year in Review Link: https://www.dhs.gov/csd-mobile Link: https://www.dhs.gov/publication/csd-mobile-device-security-study Vincent Sritapan Cyber Security Division Science and Technology
More informationCRS Report for Congress
Order Code RL32531 CRS Report for Congress Received through the CRS Web Critical Infrastructure Protections: The 9/11 Commission Report August 16, 2004 John Moteff Specialist in Science and Technology
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationAre You Flirting with Risk?
Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}
More informationLDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance
LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance Overview Current generation of epassports Benefits and Limits of an epassport Overview of the next generation epassport Applications
More informationUsing the Prototype TWIC for Access A System Integrator Perspective
Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationTransit Safety and Security. Lynn Spencer Director, Office of System Safety Office of Transit Safety and Oversight May 16, 2016
Transit Safety and Security Lynn Spencer Director, Office of System Safety Office of Transit Safety and Oversight May 16, 2016 Overview MAP-21 FAST Act Revisiting Transit Security After 9/11 FTA s Bus
More informationCamera Surveillance at Logan International. Francis Anglin BOS ACI BIT Committee September 25, 2010
Camera Surveillance at Logan International Francis Anglin BOS ACI BIT Committee September 25, 2010 Camera Systems Have Proliferated Historically, systems have accompanied individual facilities projects
More informationOptimizing the Passenger Throughput at an Airport Security Checkpoint
nd International Conference on Education, Sports, Arts and Management Engineering (ICESAME 017) Optimizing the Passenger Throughput at an Airport Security Checkpoint Jiaqi Chen1,a, Shengnan Xu,b Liangbi
More informationFace recognition for enhanced security.
Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology
More informationFighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities
Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques
More informationAUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE
Agenda Report TO: FROM: SUBJECT: Honorable Mayor and City Council Department of Information Technology AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationHow Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity
How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity Why is the NIST framework important? GOH Seow Hiong Executive Director, Global Policy & Government Affairs, Asia Pacific
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationCybersmart Buildings: Securing Your Investments in Connectivity and Automation
Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationMission Analysis Division Overview. June 16, 2015
Mission Analysis Division Overview June 16, 2015 Increased Integration Slide 3 What is MAD s Vision? MAD is a forward-looking technical division that aims to focus on adjacent and transformational investments
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationTWIC Transportation Worker Identification Credential. Overview
TWIC Transportation Worker Identification Credential Overview TWIC Program Vision Goals Improve the security of identity management by establishing a system-wide common credential, universally acceptable
More informationPREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT
PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security
More informationFPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details
FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details 2 FPM IT 420B: FAC P/PM IT Planning & Acquiring Operations of IT Systems FPM-IT-420B: FAC-P/PM-IT PLANNING & ACQUIRING
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationState of South Carolina Interim Security Assessment
State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is
More informationCYBERSECURITY IN THE POST ACUTE ARENA AGENDA
CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities
More informationDuo End User Education Templates
Duo End User Education Email Templates Table of Contents Email Communication Best Practices Email Templates Email #1 - Duo is coming soon, no immediate action required. Email #2 - Duo is coming on ,
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationBiometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities
Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange LTC Eric Pavlick PM, Biometric Enabling Capabilities 30 JULY 2013 BEC Inc 1 Agenda Program Overview LTC Eric Pavlick, Product
More informationSession 5311 Critical Testing Programs for Security Operations
Session 5311 Critical Testing Programs for Security Operations Introduction Neil Lakomiak UL Rodney Thayer Smithee Spelvin Agnew & Plinge, Inc. Coleman Wolf Environmental Systems Design, Inc. Testing Programs
More informationFTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA
FTE Asia IATA Workshop Vinoop Goel Regional Director, APCS IATA Passenger satisfaction level at the different touchpoints 100% 80% 60% 40% 20% 0% -20% -40% -60% -80% -100% Satisfied Not Sastisfied Airport
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationThe Beyond the Border Action Plan
The Beyond the Border Action Plan 1 Beyond the Border: A Shared Vision For Perimeter Security and Economic Competitiveness Part 1: Addressing Threats Early Part 2: Trade Facilitation, Economic Growth,
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationMitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment
Mitigating Risk with Ongoing Cybersecurity Risk Assessment Scott Moser CISO Caesars Entertainment CSO50 Presentation Caesars Entertainment Cybersecurity Risk Management Scott Moser Chief Information Security
More informationWill Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?
Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California
More informationNeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest
NeoFace Watch High Performance Face Recognition John Smith Missing Person Eva Christina Person of Interest Answering the need for Robust Face Recognition For real-time or post-event, handling the most
More informationAre You Flirting with Risk?
Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market
More informationMobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019
Powering the trusted identities of the world s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April
More informationGUIDING THE PATH TO GREEN. The Business Case for Green
The Business Case for Green Since 1999, Transwestern has been the leader in sustainability. Through partnerships with the Environmental Protection Agency (EPA) and the U.S. Green Building Council (USGBC),
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationDevelopment Authority of the North Country Governance Policies
Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...
More informationThe Beyond the Border Action Plan
The Beyond the Border Action Plan Updates on Key Initiatives Presentation at the Eastern Border Transportation Coalition (EBTC) Workshop April 19, 2016 The objective of this presentation is: To provide
More informationeplus Managed Services eplus. Where Technology Means More.
eplus Managed Services We Believe Managed Services Broker IT Innovation Superior IT Solutions IT Service Excellence Clear Business Outcomes Exceed Customer Expectations Customers tell us they need managed
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationTWIC Operational Biometric Solution. Presented by Terry Wheeler
www.identicacorp.com TWIC Operational Biometric Solution Presented by Terry Wheeler President Identica Holdings Corporation May 5, 2009 Agenda HVPR Modality Overview TWIC - HVPR - Operational Biometric
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationDefining IT Security Requirements for Federal Systems and Networks
Defining IT Security Requirements for Federal Systems and Networks Employing Common Criteria Profiles in Key Technology Areas Dr. Ron Ross 1 The Fundamentals Building more secure systems depends on the
More informationSecuring the New Perimeter:
Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size
More informationGovernance for the Public Sector Cloud
Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked
More informationIdentity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp.
Identity and Access Management Michael Sheketoff Senior Solutions Architect, Unisys Corp. Agenda Unisys Step Zero Identification and Credentialing Who are you giving that badge to? Access Control logical
More informationA Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface
A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just
More informationYOUR CONDUIT TO THE CLOUD
COLOCATION YOUR CONDUIT TO THE CLOUD MASSIVE NETWORKS Enterprise-Class Data Transport Solutions SUMMARY COLOCATION PROVIDERS ARE EVERYWHERE. With so many to choose from, how do you know which one is right
More informationOpening Remarks. Carolina Ramírez-Taborda Global Director, Aviation Security & Facilitation IATA
Opening Remarks Carolina Ramírez-Taborda Global Director, Aviation Security & Facilitation IATA Security on the Ground Moderator Kaarlo Karvonen Panelists Christopher Bidwell Richard Duncan Olafur Olafsson
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationIT Vulnerabilities: What an IT Auditor Should be Thinking About
IT Vulnerabilities: What an IT Auditor Should be Thinking About Evolving in a Changing Landscape OCTOBER 23-25 HOTEL NIKKO - SF Agenda 1. About the Speaker 2. IT Vulnerability: The Term Defined 3. Identification
More informationIntegrating 3rd Party Scoring Services into your Enterprise KRIs
Integrating 3rd Party Scoring Services into your Enterprise KRIs A Year of Lessons Learned Joe Corsi Sr. Manager, Enterprise Security Paychex Inc. Tony Karakashian Project Lead, Enterprise Security Paychex
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationWater Information Sharing and Analysis Center
SUPERCHARGE YOUR SECURITY Water Information Sharing and Analysis Center DHS Hunt and Incident Response Team September 12, 2018 SUPERCHARGE YOUR SECURITY Presenter Brian Draper, DHS NCCIC HIRT Slides and
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More information