Journey to Peak Performance. Mountain Point. NCTA Mobility Network Agile Methodologies

Size: px
Start display at page:

Download "Journey to Peak Performance. Mountain Point. NCTA Mobility Network Agile Methodologies"

Transcription

1 Journey to Peak Performance Mountain Point NCTA Mobility Network Agile Methodologies

2 Background 2000: Inception U.S. Army Biometric Program 2003: Biometrics could be used to prevent the enemy in Iraq and Afghanistan from hiding behind a web of multiple identities 2006: Capability was firmly in place, and DOD saw biometrics as an operational tool playing a key role in enabling intelligence operations!2

3 Red Force Encounter Based System!3

4 Red Force Encounter Based System!3

5 Background Data Query!4

6 Background Data Query Subtractive!4

7 Background Data Query Subtractive It s walking up to a haystack and systematically removing everything that's not a needle.!4

8 Background Data Science!5

9 Background Data Science Discovery!5

10 Background Data Science Discovery!5

11 Background Data Science Discovery It's about walking up to the haystack, grouping all of the needles together in one pile and all of the hay together in another, and looking for relationships between the two.!5

12 Background Data Science Discovery It's about walking up to the haystack, grouping all of the needles together in one pile and all of the hay together in another, and looking for relationships between the two.!5

13 Background Data Science Discovery It's about walking up to the haystack, grouping all of the needles together in one pile and all of the hay together in another, and looking for relationships between the two. In data science, the data leads us to the question, as opposed to letting our leading questions sort the data in search of a needle.!5

14 Background Data Science Discovery It's about walking up to the haystack, grouping all of the needles together in one pile and all of the hay together in another, and looking for relationships between the two. In data science, the data leads us to the question, as opposed to letting our leading questions sort the data in search of a needle.!5

15 Blue (Friendly) Force What if we could identify the haystack?!6

16 Three Factor Authentication What you have. What you know. Who you are. Pin! ****!7

17 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository. Enroll!8

18 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository.!8

19 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository. Verify!8

20 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository.!8

21 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository. Identify!8

22 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository.!8

23 IDProTECT - Case Study DoD Biometric Identity Management Agency (BIMA) Timeframe: 6 Month Rapid Prototype Proof of Concept " Mission: Create a Blue Force identity management system to extend root identity stored in DMDC s CAC repository. Extract!8

24 Success Extending the root identity stored in DMDC data centers by enrolling 10 Prints, 5 Facial Images, and Iris Images to perform verification, identification, and extraction of finger and iris biometric templates to a local physical access control system granting access to a secure location using either Fingerprint or Iris. DMDC" Monterey, CA BIMA" Clarksburg, WV" IDProTECT Identity Management " System NWCDD" Dahlgren, VA" Enrollment" Physical Access Control System"!9

25 Clock Starts No requirements 6 Months Geographically Dispersed Team Government, Contractors, Vendors!10

26 Clock Starts 6 Months Geographically Dispersed Team Government, Contractors, Vendors!10

27 Clock Starts Geographically Dispersed Team Government, Contractors, Vendors!10

28 Clock Starts Government, Contractors, Vendors!10

29 Clock Starts!10

30 Clock Starts Waterfall Was Not an Option!10

31 Clock Starts Agile!10

32 Building the Team Trust Team Building!11

33 Building the Team Trust!11

34 Building the Team Trust Cowboy Coders!11

35 Breaking down barriers Communication Terminology!12

36 Breaking down barriers Communication!12

37 Breaking down barriers Communication Documentation!12

38 Breaking down barriers Communication!12

39 Breaking down barriers Communication Meetings!12

40 Minimum Viable Product (MVP) Focus Eliminate Distractions!13

41 Minimum Viable Product (MVP) Focus!13

42 Minimum Viable Product (MVP) Focus Sprint Planning!13

43 Minimum Viable Product (MVP) Focus!13

44 Minimum Viable Product (MVP) Focus Visualization!13

45 Opening Doors Trust Communication Focus "!14

46 Continuous Improvement!15

47 Contact Andrew Rieser, President " " 222 S. Church St Suite 300 Charlotte, NC 28202!16

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,

More information

Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013

Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013 Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013 Rod Beatson President, Transaction Security, Inc. Rod.Beatson@crypto-sign.com

More information

Practical Challenges in Adopting PIV/PIV-I

Practical Challenges in Adopting PIV/PIV-I UNCLASSIFIED Practical Challenges in Adopting PIV/PIV-I Hank Morris UNCLASSIFIED 2 UNCLASSIFIED // FOUO Purpose and Agenda Purpose: Explore the policy, process, and mechanisms to securely leverage biometrics

More information

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

The State of DoD Biometrics

The State of DoD Biometrics The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics

More information

Operational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA

Operational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA Identity Management: Operational and Policy Considerations Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA IdM Operations and Policy Who Are You? Identifying Friend

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

Strong Authentication for PIV and PIV-I using PKI and Biometrics

Strong Authentication for PIV and PIV-I using PKI and Biometrics Strong Authentication for PIV and PIV-I using PKI and Biometrics Adam Shane PSP, Product Manager and Sr. Systems Design Architect AMAG Technology Bob Fontana CSCIP/G, Vice President-Federal Identity Codebench/HID

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1000.25 March 2, 2016 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

10 Things to Know Before You Hire a Background Screening Firm

10 Things to Know Before You Hire a Background Screening Firm 10 Things to Know Before You Hire a Background Screening Firm Contact Safe Hiring Solutions: Toll Free 888-215-8296 www.safehiringsolutions.com info@safehiringsolutions.com 1 P a g e 10 Things to Know

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

For Official Use Only (FOUO)

For Official Use Only (FOUO) The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and

More information

Product Testing Programs

Product Testing Programs Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,

More information

Hospital Certified Electronic Health Record (EHR) Technology Questionnaire

Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Page 1 of 10 Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire. The Office of Inspector General (OIG) is conducting this

More information

BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer

BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center Executive Officer 1 Purpose of Briefing To present the selection and acquisition process for biometric devices at the BFC. 2 Briefing

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Defense Manpower Data Center (DMDC) Identity Web Services (IWS) Business Guide

Defense Manpower Data Center (DMDC) Identity Web Services (IWS) Business Guide Defense Manpower Data Center (DMDC) Identity Web Services (IWS) Business Guide Abstract This guide is designed to help Identity Web Services customers select among the available services, and to assist

More information

Issuance and use of PIV at FAA

Issuance and use of PIV at FAA Issuance and use of PIV at FAA Presented to: Government Smart Card Interagency Advisory Board By: Ed Ebright, Division Manager, ID Media Division Date: May 2011 Agenda What we use PIV Card Status FAA HSPD-12

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting

More information

Accessing the bank account without card and password in ATM using biometric technology

Accessing the bank account without card and password in ATM using biometric technology Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum

More information

IDENTITY SOLUTIONS FOR A BETTER WORLD

IDENTITY SOLUTIONS FOR A BETTER WORLD IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

Navy Contributions to Identity Management

Navy Contributions to Identity Management Navy Contributions to Identity Management CAPT John M. Boyd Director, Dept of the Navy Identity Management Capability Biometric Consortium Conference 22 September 2009 UNCLASSIFIED Applications UNCLASSIFIED

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

Smart Cards and Biometrics in Physical Access Control Systems

Smart Cards and Biometrics in Physical Access Control Systems Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product

More information

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRIC SOLUTIONS 2013 ISSUE BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

If using your phone for audio, please dial in: 201-479- 4595 Mee9ng ID: 289-34- 406# Tweet with us using #VAMobileHealth

If using your phone for audio, please dial in: 201-479- 4595 Mee9ng ID: 289-34- 406# Tweet with us using #VAMobileHealth If using your phone for audio, please dial in: 201-479- 4595 Mee9ng ID: 289-34- 406# Thank you for joining, we will begin shortly. Tweet with us using #VAMobileHealth VA Mobile Contrac9ng Brent Dalton,

More information

DoD Enterprise Email (DEE) Contact Information Updates Tactics, Techniques and Procedures (TTP)

DoD Enterprise Email (DEE) Contact Information Updates Tactics, Techniques and Procedures (TTP) DoD Enterprise Email (DEE) Contact Information Updates Tactics, Techniques and Procedures (TTP) Version 2.0 Defense Information Systems Agency Enterprise Services Directorate Enterprise Applications Contact

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006 HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure

More information

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE

More information

Defense Security Service

Defense Security Service Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Arkansas Department of Information Systems Arkansas Department of Finance and Administration Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state

More information

Your responses will be saved every time you click the NEXT button.

Your responses will be saved every time you click the NEXT button. Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire The Office of Inspector General (OIG) is conducting this survey as part

More information

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries

More information

Secure Access at the Speed of Life. JASON SMITH Programmer Authorized LAURA WILLIAMS Account Manager Authorized

Secure Access at the Speed of Life. JASON SMITH Programmer Authorized LAURA WILLIAMS Account Manager Authorized Secure Access at the Speed of Life JASON SMITH Programmer Authorized LAURA WILLIAMS Account Manager Authorized Secure Access at the Speed of Life FST Biometrics Secure Access at the Speed of Life In a

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Agile Techniques and Tools. White Paper

Agile Techniques and Tools. White Paper Agile Techniques and Tools White Paper Agile Techniques and Tools Synopsis This section provides an overview of a number of techniques and tools that are commonly used by agile development teams. These

More information

Biometrics Unique, simple, convenient

Biometrics Unique, simple, convenient Biometrics Unique, simple, convenient Biometrics Unique personal identification.. Simply place your finger on the sensor - job done! As convenient as it gets. 2 Why biometrics? Your benefits at a glance

More information

Time Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI

Time Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI Time Clocks for Employee Attendance Tracking Attendance on Demand, Inc. Farmington Hills, MI Time clocks record employee attendance information including start, end, and lunch break times. This information

More information

IDaaS: Managed Credentials for Local & State Emergency Responders

IDaaS: Managed Credentials for Local & State Emergency Responders IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com

More information

Sept 10, 2013. The Agile Business Analyst

Sept 10, 2013. The Agile Business Analyst Sept 10, 2013 The Agile Business Analyst Maureen McVey, CBAP Head of Learning & Development, IIBA 16+ BA Experience I.T. industry for over 25 years. 20+ Experience in learning and development Founding

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

Report No. DODIG-2012-069 April 2, 2012. Action is Needed to Improve the Completeness and Accuracy of DEERS Beneficiary Data

Report No. DODIG-2012-069 April 2, 2012. Action is Needed to Improve the Completeness and Accuracy of DEERS Beneficiary Data Report No. DODIG-2012-069 April 2, 2012 Action is Needed to Improve the Completeness and Accuracy of DEERS Beneficiary Data Additional Copies To obtain additional copies of this report, visit the Web site

More information

How to Update your Information in the DoD Enterprise Email (DEE), Global Address List (GAL). Army users know it as Enterprise Email

How to Update your Information in the DoD Enterprise Email (DEE), Global Address List (GAL). Army users know it as Enterprise Email How to Update your Information in the DoD Enterprise Email (DEE), Global Address List (GAL). Army users know it as Enterprise Email Presented by: Michael J. Danberry Last Revision / review: 04 June 2015

More information

How to Identify Military Veterans and Service Members

How to Identify Military Veterans and Service Members How to Identify Military Veterans and Service Members John D. Baker Attorney at Law Baker Williams, LLP Fighting for Those Who Fought for Us 2097 County Road D East Suite C-200 Maplewood, MN 55109 Phone:

More information

DATA. Big Data Operational Excellence Ahead in the Cloud. Detect Patterns with Mass Correlation. Limit Surprise with Smart Data

DATA. Big Data Operational Excellence Ahead in the Cloud. Detect Patterns with Mass Correlation. Limit Surprise with Smart Data FY11 FY12 FY13+ DATA Big Data Operational Excellence Ahead in the Cloud Detect Patterns with Mass Correlation Limit Surprise with Smart Data Accelerate Discovery with Visual Analytics Ira A. (Gus) Hunt

More information

Description of the Business Problem and Solution

Description of the Business Problem and Solution 2014 NASCIO State IT Recognition Awards Cover Page Title: Category: Contact: idata Project - Phase II HCPF Executive Analytics Dashboard Fast Track Solutions Dianna Anderson Chief Data Officer Governor

More information

Identity - Privacy - Security

Identity - Privacy - Security Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy

More information

For More Information

For More Information THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT This PDF document was made available from www.rand.org as a public service of the RAND Corporation. Jump down to document6 HEALTH AND

More information

ImageWare Systems, Inc.

ImageWare Systems, Inc. ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

Biometrics in Identity as a Service

Biometrics in Identity as a Service Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions

More information

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored

More information

Government Information Security System with ITS Product Pre-qualification

Government Information Security System with ITS Product Pre-qualification Government Information Security System with ITS Product Pre-qualification Wan S. Yi 1, Dongbum Lee 2, Jin Kwak 2, Dongho Won 1 1 Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong,

More information

ATTACHMENT 1 GUIDANCE ON THE USE OF THE SSN BY THE DEPARTMENT OF DEFENSE

ATTACHMENT 1 GUIDANCE ON THE USE OF THE SSN BY THE DEPARTMENT OF DEFENSE ATTACHMENT 1 GUIDANCE ON THE USE OF THE SSN BY THE DEPARTMENT OF DEFENSE 1. OVERVIEW a. The SSN has been used as a means to efficiently identify and authenticate individuals. Expanded use of the SSN has

More information

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Naval VAMOSC Public Key Infrastructure/ Common Access Card (PKI/CAC) Registration and Log in Please Note: A PKI-enabled browser is required for certificate registration and to

More information

RAPIDS Self Service User Guide

RAPIDS Self Service User Guide Page 1 RAPIDS Self Service User Guide https://www.dmdc.osd.mil/self_service Page 2 Introduction The RAPIDS Self Service (RSS) application provides sponsors with the capability to generate a DD Form 1172-2

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n

More information

Enabling Social Change Through Cloud Computing

Enabling Social Change Through Cloud Computing Enabling Social Change Through Cloud Computing Four Megatrends Will Dominate the Next Decade Mobility Social Cloud BI/big data 91% of organizations expect to spend on mobile devices in 2012 In 2012, mobile

More information

An Operational Architecture for Federated Identity Management

An Operational Architecture for Federated Identity Management An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

How Agile Development Can Transform Defense IT Acquisition

How Agile Development Can Transform Defense IT Acquisition How Agile Development Can Transform Defense IT Acquisition Brig. Gen. Angelo Messina Vice Capo Reparto CIS SME IV RL Deputy Chief Army General Staff Logistic Department Pete Modigliani, MITRE Corp pmodigliani@mitre.org

More information

2006-1403: INTEGRATION OF MEDICAL INFORMATICS INTO COMPUTER SCIENCE CURRICULUM

2006-1403: INTEGRATION OF MEDICAL INFORMATICS INTO COMPUTER SCIENCE CURRICULUM 2006-1403: INTEGRATION OF MEDICAL INFORMATICS INTO COMPUTER SCIENCE CURRICULUM Amjad Zaim, University of Texas-Brownsville Juan Iglesias, University of Texas-Brownsville Mahmoud Quweider, University of

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

DMDC Learning Site. DMDC LMS User Guide. November 2012

DMDC Learning Site. DMDC LMS User Guide. November 2012 DMDC Learning Site DMDC LMS User Guide Department of Defense (DoD) Center Monterey Bay 400 Gigling Road Seaside, CA 93955-6671 http://www.dmdc.osd.mil Distributed by Defense Manpower Data Center DMDC Support

More information

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information

More information

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE EXECUTIVE SUMMARY Information governance incorporates the policies, controls and information lifecycle management processes organizations and government agencies utilize to control cost and risk. With

More information

Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time.

Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. H22120, page 1 Job Description- Manager, Data and Analytics Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. FUNCTIONAL

More information

The Internet of Things System Integration Offerings

The Internet of Things System Integration Offerings The Internet of Things System Integration Offerings Helping you turn customers into subscribers. Whether you call it Machine-to-Machine (M2M), Internet of Things (IoT), or Internet of Everything (IoE),

More information

Using the Morpho fingerprint reader with Net2

Using the Morpho fingerprint reader with Net2 Using the Morpho fingerprint reader with Net2 How does it work? Net2 This innovative system stores fingerprint information on the user s own Mifare card. The data is encoded by means of a Sagem fingerprint

More information

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX White Paper Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX April 2010 Cy Hay Product Manager, Synopsys Introduction The most important trend

More information

SAVING $4.8 MILLION DOLLARS, MORE THAN DOUBLE THE SYSTEM COST INCLUDING ALL OF THE ENHANCEMENTS

SAVING $4.8 MILLION DOLLARS, MORE THAN DOUBLE THE SYSTEM COST INCLUDING ALL OF THE ENHANCEMENTS CASE STUDY Time and Attendance Solution Dallas Independent School District Dallas, TX Customer Profile: Dallas Independent School District is the second largest school district in Texas and the twelfth

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

MITC Employee Handbook. A Reference Guide for MITC Solutions Most Commonly Used by Employees

MITC Employee Handbook. A Reference Guide for MITC Solutions Most Commonly Used by Employees A Reference Guide for MITC Solutions Most Commonly Used by Employees MITC Monday, September 16, 2013 This handbook belongs to: Name www.mitcsoftware.com 1 P a g e Table of Contents 1. Introduction... 3

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

2. APPLICABILITY AND SCOPE

2. APPLICABILITY AND SCOPE Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,

More information