Smart Borders 2014 (past event)

03 - 04 March, 2014

Array

Smart Borders 2014 - 25th June - Collaboration to achieve a aligned border security strategy

08:30 - 09:00 Registration & arrival refreshments in the exhibition area

09:00 - 09:05 Chairperson Opening Remarks

09:05 - 09:25 Proving Necessity: the impact of the EU proposal for an Entry Exit system on the fundamental rights to data protection and privacy

• Presenting concerns of Article 29 Data Protection Working Party regarding the impact on the fundamental rights to data protection and privacy of the proposal for an Entry Exit System.

• Necessity and Proportionality: Understanding the difference between proving the necessity for the system, relative to its impact on privacy, rather than just its added value.

• Can necessity be proven?
o will the EES be truly effective in achieving its aims?
o examining existing alternatives to achieve those aims

• The presentation will also address the fundamental concern of the Working Party with access to the system for law enforcement purposes.

09:25 - 09:45 Case Study: UK BSP Project Update. Evaluating The Future Of Border Technology: Where Do You Need To Invest To Keep Up With The Expanding Travel Market?

The technology systems, products and services built for Border Security are advancing rapidly as officials try to keep up with the growth of travellers and data collection across the globe. The need to manage data and retain security are all prime drivers for future investment – this presentation will consider what the future of border technology looks like and how you can best position yourself in the rapidly expanding market in a cost effective way.
• Overcoming the challenge of finding systems that help create a balance between security and facilitation
• Examples of successful e-Gate projects, Passenger Name Record systems, and biometric data collection
• Tools available to ensure you effectively and accurately identify every traveller and improve the customer experience
• The critical need for officers in addition to machines at the borders to optimise detecting criminals and managing customer expectations
• Building a strong business case to justify spend and get buy in on technology from internal and external stakeholders

09:45 - 10:05 Keynote Presentation: How Can You Fully Exploit The Growth Of Biometrics In Border Security To Provide Assurance Of Security To Your Team And The Customer?

The growing use of biometric technology has created a requirement for more open discourse that allows travellers understand its purpose. This presentation will discuss how you can achieve assurance of security by highlighting the capabilities of biometrics and outlining the best methods to gain support.
•Developing strategies to make biometric technology, retina scans and fingerprint collection the norm for travellers at the border
•Increasing your use of biometrics in entry and exit procedures at the border – the critical methods to ensure high quality data collection
•Assessing the possibility of making biometric chips in passports internationally readable to optimise passenger identification
•Transforming your business case to guarantee investment on new biometric systems in the market
•Looking at other industries to learn best practices in biometric data collection and management – will an increased use lead to greater public compliance?
•Using a Whole-of-Government approach through information sharing

10:05 - 11:00 Panel discussion: Integrating UK Border Security


11:00 - 11:30 Networking Morning Break in the exhibition area

Network with your industry peers and clients from across the globe. These breaks are an exceptional opportunity to trade business cards and continue discussing the issues raised in the early sessions to clarify any areas you are unsure of with other participants.

Synergy Workshops: Technology

11:30 - 12:45 Managing Border Security in Real-Time
Talking Title: How technology will deliver the vision of Smart Border Management

• The importance of a flexible and adaptable Real-Time Data Platform for Border Management
• The Trinity of Security, Time & Value in Border Management
• Dimensions of the Paradigm Shift
• Balancing border crossing performance & risk
• Tackling the Ratio of ‘Signal to Noise’
• Mobile border intelligence
• Approaches to realization of the Real-Time Border Platform



Panel Discussion within the Workshop:
Title: Getting the Best out of the Real-Time Border Platform
Talking Title: Tackling the challenges of a Real-Time Border Platform



Synergy Workshops: Technology

11:30 - 12:45 How To Manage The Influx Of Technology By Creating A Streamline System
Optimise your technologies by integrating and reducing the systems in place.
• Creating scanners that detect all types of materials to retain a seamless customer experience
• Staying ahead of technology advancement in border management systems
• Converging systems that work best together
• Investing in a tailored service to suit your needs
• Justifying the spend on systems to internal and external stakeholders
• Transforming data management across systems to increase quality of passenger data collected

12:45 - 13:45 Networking Lunch Break in the exhibition area

At the event to shop and not just network? But tired of hearing sales pitches with no substance? Then this is your perfect opportunity.

Take 10 minutes out of each refreshment break to experience a live demonstration of a product that stands out for its innovation. How much of an impact can this new technology have on your business? How soon? And can the ROI be quantified? Find out at the Innovation Theatre.

13:45 - 14:05 Eurostar perspective on Security Borders

14:05 - 14:25 Developing Strategies To Combat Cross-Border Crime in Africa

Hear examples of weaknesses facilitating cross-border crime.

• Piracy and Oil Bunkering
• Transnational crime networks
• Connections to terrorism
• Creating a strategy to fight cross-border crime networks on Sea, Air and Land Borders
• Working with private sector and civil society
• Following Borderpol initiatives in Africa

14:25 - 14:45 Overview of developments in eMRTD controls – need to make use of the ICAO PKD

A fast reliable, fast and cost-effective identification of travellers will be one of the major challenges in the coming years. ICAO’s
MRTD programme has therefore changed. This new direction has led to a new strategy that provides a framework for achieving the maximum
benefits of travel documents in the future. The presentation will give a short overview of the new strategy and focus then on the ICAO PKD. The ICAO Public Key Directory (PKD) is part of the new strategy. The presentation will highlight the PKD’s benefits and demonstrate why border control agencies should use this information and how to make best possible use of it.

14:45 - 15:05 Case Study: How To Improve Data Sharing With Governments To Increase Security And Lower Risk

Redefine how you work with government agencies to ensure necessary data is shared and best practices can be established.
• How do we share data to strengthen secure travel on a global basis?
• Using encryption, cloud computing and other advance methods to keep the data shared secure
• Establishing national working groups to manage and advise on the policies
• Tailoring strategies to match the type of borders and carriers
• Navigating conflicting government demands to ensure data shared is in line with international laws


15:05 - 15:25 Networking Afternoon Break in the exhibition area


15:25 - 15:55 Guest Presentation: How Cyber Security Is Redefining Borders – Strategies To Keep Online Borders Secure Against The Rise of Cyber Threats

The internet is fundamentally transnational making cyber threats a cross-border issue. This presentation from two guest speaker who are experts in cyber crime will highlight the priorities you need to deliver a robust cyber security strategy. This session will draw parallels with border security and focus on working with other countries on cross-border law enforcement to eliminate safe havens for cyber criminals.
• The growing need for an integrated cyber security strategy within your border management programmes
• What new challenges are created by the virtual border areas and how can you tackle these?
• How can we define this area and who manages the policies for it?
• What systems do governments currently have in place to protect their virtual borders?
• Will cyber security play an ever growing role in Border Security?

15:55 - 16:40 Closing Keynote Panel: Multi-disciplinary Leaders Forum - The Future Of Border Security And A Roadmap For Collaboration

Hear experts discuss a plan of collaboration as gained from the two days. Planning the next steps going forward and looking towards the future. Panellists will consist of government agencies, carrier companies, associations and product specialist to provide a cross–industry view on the future of Border Security.
• Re-visit aims of the conference and consider if they have been met
• Re-cap on key takeaways from across the two day conference
• Collaborate on a plan for the future of border security
• Reaffirm the points you will take back to the office
• Ask any final questions you feel have not been covered

16:40 - 23:59 Chairperson Closing Remarks