Smart Borders 2014 (past event)
03 - 04 March, 2014
Array
Day 1
08:30 - 09:00 Registration & arrival refreshments in the exhibition area
09:00 - 09:10 Chairperson Opening Remarks
09:10 - 09:30 Keynote presentation: US Department’s need for balancing security while facilitating lawful trade and travel
• Introduction to the Department of Homeland Security: robust overseas presence, and the Department’s approach to securing and managing the US’s borders.
• Nature of the threats we are seeing
• Layered Security Approach (ESTAs, Passenger Name Record, Advance Passenger Information, National Targeting Center, Immigration Advisory Program)
• Some of the initiatives that DHS has implemented and is working to improve, such as Container Security Initiative, Preclearance, Global Entry, Supply Chain management and Declaration of Joint Principles and Initiative between the Secretary of DHS and Secretary of Commerce
09:30 - 10:00 A European Wide Project: Smart Borders - Challenges And Lessons Learned
•Examining the greatest methods of arranging the project across Europe
•Justifying the 1.1 billion Euro cost to your national teams
•How can other regions learn from the project?
•Responding to critics of the project to gain global support
•Facilitating and reinforcing border check procedures for foreigners and nationals alike
10:00 - 10:30 Presentation: Assess The Value & ROI Of Innovative Border Security Solutions
Following the presentation on border security technology, these quick fire pitches will allow you to hear from market leaders first hand and see their products in real time. This is essential to making an accurate and considered decision on the best products to advance your border security strategy.
•Providing the identity management systems governments need to safeguard citizens and increase data quality
•Tools to balance ease of travel experience with the demand for security
•Systems built for your team at the office, the borders & in-between to increase internal collaboration
•Benefiting from deep skills and innovative products to develop a complete border management system
•Delivering an automated border control solution to streamline travellers, reduce queues and increase security
•Critical customer-centric strategies to drive forward policy and decision-making
10:30 - 11:10 Networking & refreshments in the exhibition area
11:10 - 11:30 Case Study: The Customs Perspective – How Can Collaboration And Data Sharing between Governments and Trade Ignite Security Between Borders?
Customs are responsible for security and safety of cargo transportation across borders. This presentation will explore how the collaboration with Trade and the management of advance cargo data can improve both security at borders and facilitation of Trade.
• A Multi-layered risk management for multi-shaped risks. Assess in advance, control where required
• How advance cargo data transmission from Trade can push back the borders ?
• EU pre-loading cargo data experimentation with the express sector
• Evolution of WCO SAFE framework and EU legislation
• In a growth of trade flows context, Trade has and will further become a foreground partner of customs for securing and facilitating the supply chain (Authorized Economic Operator programme, Mutual Recognition Agreements).
11:30 - 11:50 Case Study: How To Improve Collaboration Between Government Agencies And Aviation Stakeholders To Achieve An Aligned Strategy That Maximises Border Security
•Establishing an effective programme of collaboration between government and airport officials – the aviation industry – raising awareness of global standards on passenger data, Advanced Passenger Information (API) and Passenger Name Records (PNR)
•Working together to provide a fluid space across borders that is both secure and comfortable for customers
•Proven strategies of sharing the cost of data management equipment to alleviate budgets for airlines, airports and government agencies
•Evolving airport passenger security with IATA’s ‘Checkpoint of the Future’
•Identifying types of passenger data officials can share from the 3 million records collected daily to increase security and save time
11:50 - 12:20 Case Study: Adopting Solutions from Outside the Border Security Domain to Improve Border Security at Less Cost
• What is Distributed Acoustic Sensing (DAS)
• How it is being applied to Oil and Gas Pipeline Security, and the impact it is making in that industry/market
• Where it is currently installed as part of an unmanned Border Security System
• Other border security applications and new border security CONOPS not economically feasible before DAS
• How it is helping to improve performance and reduce costs for securing unmanned borders
• Lessons learned for transforming border security by adopting solutions from other industries
12:20 - 12:50 Borders not barriers: How digital technologies offers travellers a fast path to their destination
• How can “trusted” international travelers be better identified and evaluated to improve the passenger experience? What should be “trusted” with respect to biographic and biometric identifiers and passports and tokens—and what remains untrusted?
• How do different countries respond to security threats, and what is the best mitigation? Does large scale investments in centralized information technology help, or is collaboration between agencies and organizations more effective?
• How can biometrics, biographics and background information enable the European Union to deliver “smart borders” at its external frontiers? Will these borders be able to cope with a growing number of travelers, the sophistication of bad actors and the need to remain cost efficient?
12:50 - 13:30 Panel: Delivering Smart Borders: Challenges and Lessons Learned
• The changes required for transformation of border management
• Identifying key challenges facing borders
• What did we learn from the past?
• What can we take from the 2 key lessons
Networking & Lunch Break
13:30 - 14:30 Networking & Lunch BreakPrivate Lunch
13:30 - 14:30 Private Lunch hosted by Accenture in the Churchikk RoomSynergy Workshops: Collaboration
14:30 - 15:45 Security Vs. Facilitation At The Border – Finding The BalanceAs technology increases at the border, how can you ensure the customer experience remains front of mind?
•Redefining strategies to see technology as a service element rather than the driver of your security policies
•Transforming machines at the borders to actually increase the customer experience
•Creating open yet secure borders in a most effective and efficient way
•Justifying specialist projects to get customers on board
•Harmonising the priorities of your country and the EU to make progress
Synergy Workshops: Collaboration
14:30 - 15:45 Risk Scoring of Passengers and Cargo for Improved Customs Targets• Watch-list processing uses powerful matching technology, combined with data quality tools, to identify travellers whose names or details appear on different records such as passports, advanced passenger information, passenger name records and visa information. This technology is used in many countries to identify passengers, companies and freight that exist on government and non-government lists of people and things of interest.
• Risk scoring uses analytical techniques to create profiles of legitimate passengers and cargo using techniques such as clustering, segmentation, patterns of activities and associations.
• A powerful risk-scoring combination
Watch-list processing and risk scoring are two complimentary techniques that contribute to the risk scores being generated. The models incorporate multiple risk indicators, including travel patterns (potentially over several years, if legislation allows), connections with other high-risk individuals or organisations, and intelligence derived from any other source.
Other data-driven analytical methods are also employed – such as looking for anomalies in behaviour or data. Analytics from SAS helps to further validate the intuition of human experts, allowing users to keep track of which variables are most effective in predicting high-risk travellers and cargo. This enables them to continually monitor and improve the performance of their traveller and freight screening, keeping pace with changes and attempts to outwit the system. Predictive analytics provides objective, data-driven risk screening to identify high risk and low risk travellers and freight thus improving overall performance of borders and customs operations.
Synergy Workshops: Collaboration
14:30 - 15:45 How To Manage The Growing Threats Of Smuggling, Terrorism & Counterfeit GoodsDiscuss how to overcome growing threats or crime at your borders through collaboration and innovative technology
•Eliminating threats that impact security and stability
•Improving your strategy to address the growth of criminal activity
•Investing in critical technology that identifies criminal activity
•Working with Interpol, Europol and neighbouring border police to share live information on criminal activity
•Fully exploiting the systems built and the work of border officials to detect threats and reduce crime
15:45 - 16:15 Afternoon Coffee & networking in the exhibition area
Stream A: Gladstone Library
16:15 - 17:35 Transformational Projects On National Levels That Optimise Keeping Borders SecureDiscover how you can work with associations as advisors to fully utilise the systems already in place.
•Why has the role of national agencies developed into an advisory role – identifying the critical turn points
•Promoting the need for a workable plan to protect the security of passengers worldwide
•Eliminating the reactive policy making trend after the 2006 transatlantic airport plot and recognising issues before they arise to mitigate risk
•Reforming policies of information sharing across Europe and internationally to increase security – will Viviane Reding’s EU reforms pass?
•Recognising the countries who are leading in border management and encouraging knowledge sharing of the projects
Tom Dowdall, Deputy Director, National Crime Agency, UK
Stream B: River Library
16:15 - 17:35 How To Control Irregular Migration At Your Borders To Better Identify Patterns Of Migration And Reduce Illegal ActivitiesDevelop a strategy to transform migration control in transit and eliminate crime between borders.
•Systems built to define the patterns of migration at each form of border
•Increasing carrier and government collaboration to better monitor migration
•Improving data collection post-arrival to reduce future crime
•Best methods and technologies to crack down on illegal migration in transit
•Recognising the greatest areas of growth and collaborating internationally to reduce them
Stream C: Meston Library
16:15 - 17:35 Autonomy Of Control At The Border - Who Is Best Placed To Control, Protect, Manage and Security At The Borders?Hear examples of countries that are piloting schemes of autonomous border control and discuss how you could benefit from a similar strategy.
•Is the European IBM concept an effective response to achieve open, but controlled and secured borders?
•Achieving effective management at the borders through autonomous control
•Reducing obstacles and problems of intra-agency collaboration and governmental coordination to increase efficiency of border management
•Developing a system to work in practice that improves intra-agency governmental collaboration
•Redefining the roles of border guards, customs, enforcement, and immigration officials to match today’s requirements
17:35 - 18:20 Workshop Key Takeaways: Sharing Lessons Learnt And Determining The Next Steps
•Applying lessons learnt to specific policies
•Taking the next steps in developing your border management strategies
•Increasing collaboration on a national level to drive projects forward
•Addressing budgetary constraints and fully utilising current resources
•Creating a plan to take back to the office that addresses identified gaps in your policy
18:20 - 23:59 Cocktail Reception in the exhibition area
Discuss the day over a drink.
This is your opportunity to discuss the day over a glass of wine and develop your relationships with contacts you made during the day
Why attend?
•Crucial for sharing your findings from the roundtables and discussing with your peers their experiences in tackling border security challenges
•Meet additional contacts you were unable to meet during the day and relax with your peers from across the globe