|World e-ID and Cybersecurity||Innovation Live|
PLENARY GRAND OPENING
SECURING GLOBALLY CONNECTED SOCIETY
2.00pm: EXHIBITION OPENING
Technologies & Enterprise
Countries & Use cases
|Mobile ID Implementation:
Status and Outlook
|ID for Development: Quo Vadis 2016
Statelessness & Inclusion
Identity Theft & e-Crime Observatory
Exhibition & Demos
|New Trust Architectures for Digital ID||ID4D: Civil Registration
|ID4D: Digital Identity,
Democracy & Peace
Exhibition & Demos
Smart Security Week Awards Ceremony
|eIDAS: Trust for Digital Transformation||ID4D: Public & Private Sector
|Digital Identity in Europe||Exhibition & Demos, Business meetings|
|Next Gen Secure Documents|
|Exhibition & Demos, Business meetings|
Today’s dynamic nature of organizations contributes to complexity for monitoring and controlling access and identity cyber-risks. Solution: Apply continuous learning, reasoning and human interact-ability to Identity and Access management domain.
Mr. Went will present his holistic view on ‘identity’, from the why an identity, the impact of no identity, the right to an identity and the ‘foodchain’ of an identity. The latter is relevant in that there are layers of identity, from ‘simple’ breeder documents, to national ID documents to international (traveler) documents. Conventionally international (traveler) documents are physical documents like a passport, but ‘blockchain’ could be a consideration here.
|Track 1: Technologies & Enterprise|
Speaker: Sridhar Bhupathiraju
As government and private sectors initiatives are flourishing, what are the key trends emerging in terms of technologies, standards, privacy issues, etc.
|Track 2: Countries & Use cases|
Election technologies are booming in Africa. Under which conditions do these technologies confer credibility on the polls ? What are the potentialities and limits of biometric voter registration? Based on the case of Chad, this presentation will show that biometric voter registration raises a lot of expectations but does not prevent rigging when the social and political conditions are not right.
Since 2013 and the arrival of the iPhone 5s on the market, more and more mobile devices for the consumer market arrive with biometric features for user authentication: fingerprints, face, iris, voice and so on. But what about the real security level of such devices and especially their trade-off between user convenience and security? User convenience is the major concern in such consumer market for manufacturers and end-users adoption with compulsory low false rejection rate and extremely fast recognition process. This may only be possible with compromising on the security level: intrinsic increase of the false acceptance rate and very weak, or even bypassed, liveness detection measures. This talk will highlight weaknesses of most recent biometric-enabled phones and other portable devices; will outline different liveness detection techniques and will present a wearable with so-called “augmented biometrics” with effective liveness detection which allow excellent user convenience without compromising the security.