2020 Session Recordings Now Available
Thank you for attending GovSummit. Video recordings of all sessions are available – Click the session links below to access the recordings!
Procurement officials and industry representatives discuss the latest federal contracting trends, policy developments, regulations and GSA contract changes related to security products and critically important to both security practitioners and suppliers
After three years of astonishing innovation, facial recognition is powering a vast array of emerging government use cases, especially on-edge 1:1 verification and 1:N search, security surveillance and powerful law enforcement, military, border control, critical infrastructure, air travel and school safety solutions. Simultaneously, despite U.S. law enforcement’s 20+ year operating history of rudimentary technology without any example of a mistaken arrest or imprisonment, facial recognition faces public outcry and concern around government use of the technology, particularly with respect to overall accuracy, racial bias concerns and potential omnipresent real-time mass surveillance.
This session will explore the current state of the science and emerging real-world government applications, focusing on how today’s tiny template sizes, fast enrollment speeds and highly accurate algorithms were developed and are now revolutionizing applications relating to identity, safety, security and convenience. Also discussed will be appropriate regulatory limitations on use by law enforcement, in commercial application and by government users broadly, and the productive role industry can play policy development. Properly guided, facial recognition can create a safer, better place for everyone.
Panelists will examine the complementary nature of privacy and security, and the role of regulations, legislation and best practices.
In 2018, Congress and President Trump granted the U.S. Department of Justice (DOJ) and the U.S. Department of Homeland Security new legal authorities to employ counter-UAS measures to perform certain missions and protect certain critical assets against unauthorized drones. Since the legislative authorization, U.S. Attorney General William Barr recently issued guidance for the DOJ’s use of counter-drone authorities and technologies, ensuring that the department continues to carry out its law enforcement and national security missions while respecting individuals’ privacy, civil rights and civil liberties. This session will provide update on the current guidance and next steps for counter-drone technology implementations.
The year 2020 marks the 25th anniversary of two key events that have significantly impacted the government and the public- and private-sector entities that work to provide security to federal facilities – the bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, and the creation of the Interagency Security Committee (ISC). In this keynote presentation, ISC Chief Daryle Hernandez will highlight how the ISC is working to meet the mandates of Executive Order 12977 to enhance the security in and protection of federal facilities in an environment of both traditional and emerging threats.
Understanding the ever-changing and expanding landscape of protecting high-security facilities with new technology and identifying the keys to building the right infrastructure to support it is critical for leaders in the government space. In this session, attendees will gain insight into how the task of protecting mission-critical environments is changing with the introduction of new technologies. Visual solutions, such as video surveillance cameras and door controls, are often prioritized over “back-end” technology such as storage, but this shouldn’t be the case. The backbone of any video surveillance infrastructure is storage, and intelligent infrastructure enables the modernization of data center and data storage needs. Illustrated with anecdotes of video storage challenges, the session will explore how modernizing video/IT storage architectures will save money, enable the implementation of intelligent analytics and reduce video losses, complexity and cost.
Last year, the need to modernize physical access control systems was underscored in discussions at SIA GovSummit. This year, experts from government agencies and the security software industry will share the lessons learned in their efforts to modernize government security systems. Specifically, the panel will discuss how they standardized legacy technologies like access control, video management and other physical security systems and integrated data silos from those systems to provide centralized visibility and improved safety for their facilities. In addition to sharing their experiences, insights and road maps in architecting these systems, the panel will also discuss the changes in policies that were needed to address the challenges and risks that face highly secured government facilities.
The cybersecurity landscape changes every day with threats to both new and legacy technology, making it difficult to know whether your physical security technology is creating a potential vulnerability for your network. It is crucial to understand what the real threats are and how to secure your systems from them. This session will review the major cyber threats from the last six months, explain their possible impact on the physical security industry and government facilities and explore emerging standards and methods to secure embedded video surveillance devices, such as IP cameras and network video recorders.
Related to IP video surveillance the session will explore the confluence of cybersecurity, new federal procurement rules and ONVIF conformance, and how these topics, individually and collectively, are impacting security and IT professionals involved in protecting government facilities. Presenters will introduce various technologies and features to specify for future upgrades that are specifically designed to enhance cybersecurity.
The Women in Biometrics Awards recognize top female leaders in the biometric identity and security industry. Nominees and past winners include those working for biometric companies, peripheral suppliers, system integrators, academia, government and security and IT departments at a variety of organizations in the United States and internationally.
This globally-recognized program co-founded by the Security Industry Association (SIA) and SecureIDNews and co-presented with sponsors IDEMIA, Biometric Update and the SIA Women in Security Forum recognizes innovative women advancing biometric technologies are fundamental to securing physical and digital identities in today’s society and to helping protect our cities, businesses, schools and citizens.
In this session, participants will hear firsthand about challenges and solutions associated with designing a modern operations centers, including design and implementation strategies. The session will explore direct and indirect challenges experienced during development, implementation and operation of a 24/7 operations center, including the complex interdependence of HVAC, lighting, architecture and cutting-edge video management/switching technologies.
The use of audio analytics along with video can provide faster comprehension of what is happening during a security incident, better and faster decision making, reduced false alarms and the ability reexamine the scene both by viewing video and listening to what happened.
In many situations, a security team has difficulty interpreting the scene they are observing. Audio in many cases can help bridge that gap providing actionable metadata in both real-time and forensic analysis to better understand the observed scenarios. The current state and future prospects of these technologies will be discussed:
- Sound detection like gunshots, breaking glass, door slamming and more
- Keyword detection – to identify violent behavior
- Voice analysis – to identify people under duress like panic, crying, shouting
We are all in exciting times when it comes to emerging technologies like “The Cloud, IoT, Sensors and Smart Buildings,” but at the same time these technologies can increase vulnerabilities if not vetted correctly.
Leveraging the SIA community’s knowledge and the experience of a global leader in the space, this session will provide insight on how to strategically incorporate new technologies for building safety and security systems.
Security, safety and data privacy have traditionally been addressed in disconnected way across many systems and organizational silos, resulting in unmanageable complexity, overlaps, inefficiency, cost and risk. This session explores how Identity is becoming the way to manage convergence across all areas of an organization to ensure compliance, mitigate risk and enhance security.
This session will also cover how emerging trends like cloud, the Internet of Things and digital transformation can be leveraged to address this huge problem and how forward-looking organizations are trail blazing the path to achieve their vision of future proofing security, safety, data privacy and making security a true business enabler, including:
- A reference design that government agencies and programs can use to increase security and efficiency in managing access to their interconnected devices and facilities
- How a converged identity and access management (IdAM) system allows rapid provisioning and de-provisioning of access from a centralized platform, so utility personnel can spend more time on other critical tasks
- How these reference designs can help improve a government agencies and programs security posture by tracking and auditing access requests and other IdAM activity across all networks
The management of events with catastrophic impacts requires coordination between the public and private sectors. In order to be effective, these partnerships need to be forged long before an event occurs and should be underpinned by trust and a shared approach to risk assessment, situational awareness, risk mitigation, response and recovery. From a resilience perspective, Covid-19 has demonstrated how brittle we are and has made us more vulnerable to a range of other threats. This session aims to start a discussion about what ought to be achieved in the next 2 years to fundamentally improve the resilience of western nations, including the USA. The three imperatives outlined in the session will be the need for honest risk assessments, event agnostic resilience, and effective public private partnerships.
Homeland security and antiterrorism efforts have largely driven the demand for perimeter security and physical barriers over the past 20 years. In response to vicious attacks involving runaway trucks, suicide bombers, asset destruction, mass attacks on crowds and more, high-security barriers have had to rapidly adapt and stay ahead of terrorist strategies to attack government installations, public gatherings, learning institutions and places of worship. Many components of physical security barriers are governed by regulatory agencies, such as ASTM International, the U.S. Department of Defense (DOD) and UFC. Requirements are ever-changing to meet the security needs of DOD, state and federal agencies and the public at large, including response rates, crash ratings, cycle times, life cycle costs, deployment speeds, controls and more. Protecting assets, personnel and facilities using high-security solutions that are affordable and reliable is a continuing challenge.
This session provides an overview of current codes and guidelines and looks at various issues and solutions that are being installed stateside and around the world today. Pros and cons, benefits, concerns and costs for different products (not brand-specific) will be discussed, as well as case studies demonstrating various products in use and how they have succeeded or failed in achieving their desired security goals.
Throughout the country, a number of school districts are evaluating and deploying facial recognition technology as a promising way to help enhance existing safety and security measures that protect students and staff. This session features insights gleaned though a pilot project in one district, explores commonly sought capabilities and system configurations relevant to the school environment and highlights the crucial role of accompanying processes, polices, training and procedures.