SlideShare a Scribd company logo
1 of 20
Download to read offline
Walter Lee
Evangelist and Government Relations Leader
NEC Corporation
Identity Verified
Welcome Back, Pamela
2 © NEC Corporation 2018 Discussion in Confidence
Top Three Trends On Security
IOT
Internet Of
Things/Threats
IAC
Inter-Agency
Collaboration
ICP
Integration of
Cyber and Physical
INTEGRATED DIGITAL IDENTITY
3 © NEC Corporation 2018 Discussion in Confidence
Next Generation Security Solutions
Counter
Terrorism
(Used by Police Forces)
Border
Control
(Used by Customs & Immigration)
City
Surveillance
(Used by City Ops)
IAC(Inter-Agency
Collaboration)
IOT(Internet Of Thing)
ICP(Integration of Cyber-
Physical)
4 © NEC Corporation 2018
Value Creation by Combining Various data and AI Technologies
Real World
Over-
whelming
efficiency
Speed
Accuracy
Automation
Enhanced
Suggestion
To humans
Support human
Bird's-eye view
Optimization
Identify human and objects
from data in the real world
Acquire knowledge by
combining various information
Visualization Analysis
Control optimally using
prediction and reasoning
Real World
Digitalization,
Improvement
of data quality
Recognition &
Identification
using
the five senses
Human
Things
Understanding
of meaning &
intent
Contexts
Analysis with
interpretation
High-precision
analysis
Planning &
optimization
Prescription
Discussion in Confidence
5 © NEC Corporation 2018
AI, Big-Data, and IOT
6 © NEC Corporation 2018
7 © NEC Corporation 2018
Framework for Cyber Defence
8 © NEC Corporation 2018
Evolution of Cyber Defence
9 © NEC Corporation 2018
Three Critical Domains of Defence
10 © NEC Corporation 2018
IT and OT transformed by IoT
Advanced security Technologies
Terminal Authentication
Concealment Calculation
Behavior
Analysis
Personal
Authentication
Authentication Encryption
IoT
System
OT
System
IT
System
CountermeasuresThreats
Illegal terminals
Intruders &
Inside jobs
Cyber attack
Automated Security
Intelligence
Detecting unknown attacks
and failures
OT=Operational Technology
Detecting
spoofing terminals
Preventing intruders
and inside jobs
Protecting
communication
Preventing information
leakage
Detecting and Prescribing
cyber attack
Detecting and Prescribing
instrument
11 © NEC Corporation 2018
Why is A.I. Necessary?
▌Increasing Threat of Cyberattacks Due to
Industrialization and AI Technology
12 © NEC Corporation 2018
Using AI to assist in Cyber Defence playbook
13 © NEC Corporation 2018
NEXT GEN: Using A.I. to detect anomaly
14 © NEC Corporation 2018 Discussion in Confidence
IOT VERSUS IOT
INTERNET OF THINGS
CoTRoT
INTERNET OF THREATS
DoT
15 © NEC Corporation 2018 Discussion in Confidence
New Characteristics
Democratization of Threats
Randomness of Threats
Contagion of Threats
Source: Esri,
16 © NEC Corporation 2018 Discussion in Confidence
A Biometric-Secured Digital Identity
Facilitate payment &
transactions electronically.
Facilitate Seamless Travel
Future - Digital Passport
Finger
Iris
Face
GOVERNMENTBFSIAviation
Using Biometric capabilities,
we are able to bring Trusted
Digital ID closer to reality
Facilitate transaction with
Government Agencies
Voice
Ear
Biometric
Digital ID
17 © NEC Corporation 2018 Discussion in Confidence
LIVENESS DETECTION
is an anti-spoofing measure built
into a given biometric solution
meant to identify whether the
body part submitted for
authentication is real. With
adequate liveness-detection, a
biometric system can resist
break-in attempts made via fake
fingerprints, masks, high
definition pictures, and voice or
video recordings.
Liveness: Spoof-proof Solutions
- FINDBIOMETRICS, 2017
Quote:
“Improved liveness detection should be a priority for
the consumer facing biometrics industry.”
92% of respondents agree that
liveness detection should be taken as a
priority in the biometric industry
Source: Biometrics Year in Review: The Need for Liveness Detection, 2016
“
18 © NEC Corporation 2018 Discussion in Confidence
Getting Physical with Cyber Security
INTERNET OF THINGS DRIVES INTER-
AGENCY COLLABORATION
))))))
))))))
))) )))
))) )))
Seafloor
Airports
Harbor
Factories
Rail
Roads
Banks
Companies Broadcasting towers
Broadcasters
Important facilities
Post
offices
Distribution centers
Hospitals
Government
Fire departments
Communications
Retail
stores
Energy
Dams/ water supply
Space
Seafloor optical cables
Seafloor seismographs
Air traffic control
Fingerprint recognition
Bank ATMs
Diverse business systems
Digital TV transmission
TV studios
Electronic records
Electronic
government
Water
management
Leak detection
POS
Harbor
surveillance
Underwater
surveillance
Production
management
Factory
management
Rail
communication
s
Traffic management Facility
surveillance
Post sorting
machinesLogistics
Firefighting
systems Communications
systems
Smart energy
Satellite communications / Earth
observation
Next-generation network technologies
High-performance, high-reliability core IT technologies
Diverse sensor and human interface technologies
19 © NEC Corporation 2018 Discussion in Confidence
Adaptive Real-time Integration of Security Environments (A.R.I.S.E)
Security
Environments (L2)
Integration &
Analytics (L3)
Calibrated
Response
IAC (L4)
Intelligent Sensors (L1)
NOC
Situational Awareness
Info Dissemination
Risk Assessment
Recommendation
Resource Dispatch
1) Data Aggregation
2) Analytics
3) Risk Assessment Engine
4) Recommendation
Engine
5) Authorization
Organization A
Organization B
Corporate SOC
PSOC
External Source
CSOC
SCALABLE
ADAPTIVE
SCADA
Physical Surveillance
Sensors
Cybersecurity
Sensors
IoT
Identity/Profile
Workflow
Business Rule
Ticketing System
REAL-TIME
Top trends in security, AI and digital identity

More Related Content

What's hot

IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Italy
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Francisco Maroto
 
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner BiographyNextNet Partners
 
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson
 
7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) 7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) Parveen Goel
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130Francisco Maroto
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepagerDeepika Jha
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overviewengIT
 
IoT for Organizations: Avoiding Common Pitfalls
IoT for Organizations: Avoiding Common PitfallsIoT for Organizations: Avoiding Common Pitfalls
IoT for Organizations: Avoiding Common PitfallsMark Benson
 
Top io t trends in 2019
Top io t trends in 2019Top io t trends in 2019
Top io t trends in 2019Pixel Crayons
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Tyrone Systems
 
Gartner artificial intelligence 2017 trends
Gartner artificial intelligence 2017 trendsGartner artificial intelligence 2017 trends
Gartner artificial intelligence 2017 trendsAntonio Sanchez Guitian
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain3G4G
 
Internet of Things - Internet day - Camera Commercio Peugia
Internet of Things - Internet day - Camera Commercio PeugiaInternet of Things - Internet day - Camera Commercio Peugia
Internet of Things - Internet day - Camera Commercio PeugiaStefano Rossi
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)MicheleNati
 

What's hot (20)

IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner Biography
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
 
7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) 7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT)
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepager
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overview
 
IoT for Organizations: Avoiding Common Pitfalls
IoT for Organizations: Avoiding Common PitfallsIoT for Organizations: Avoiding Common Pitfalls
IoT for Organizations: Avoiding Common Pitfalls
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
 
Top io t trends in 2019
Top io t trends in 2019Top io t trends in 2019
Top io t trends in 2019
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
 
Gartner artificial intelligence 2017 trends
Gartner artificial intelligence 2017 trendsGartner artificial intelligence 2017 trends
Gartner artificial intelligence 2017 trends
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
 
Internet of Things - Internet day - Camera Commercio Peugia
Internet of Things - Internet day - Camera Commercio PeugiaInternet of Things - Internet day - Camera Commercio Peugia
Internet of Things - Internet day - Camera Commercio Peugia
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
 

Similar to Top trends in security, AI and digital identity

NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Platinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
Platinum Sponsorship Keynote: Driving Innovation with Artificial IntelligencePlatinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
Platinum Sponsorship Keynote: Driving Innovation with Artificial IntelligenceHPCC Systems
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Biometrics as-a-service market 2019
Biometrics as-a-service market 2019Biometrics as-a-service market 2019
Biometrics as-a-service market 2019swatikale6
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
Ces 2018 Trends to Watch
Ces 2018 Trends to WatchCes 2018 Trends to Watch
Ces 2018 Trends to WatchRob Blaauboer
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfSachinSadgir1
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Matt Stubbs
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Bahaa Abdulhadi
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018UNLOQ
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...Jenna Murray
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBahaa Abdulhadi
 

Similar to Top trends in security, AI and digital identity (20)

NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Platinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
Platinum Sponsorship Keynote: Driving Innovation with Artificial IntelligencePlatinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
Platinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Biometrics as-a-service market 2019
Biometrics as-a-service market 2019Biometrics as-a-service market 2019
Biometrics as-a-service market 2019
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Ces 2018 Trends to Watch
Ces 2018 Trends to WatchCes 2018 Trends to Watch
Ces 2018 Trends to Watch
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdf
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdf
 
IOT Demystified
IOT DemystifiedIOT Demystified
IOT Demystified
 
IoT in healthcare
IoT in healthcareIoT in healthcare
IoT in healthcare
 

More from NEC Public Safety

NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety
 

More from NEC Public Safety (9)

NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Recently uploaded

Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 

Recently uploaded (20)

Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 

Top trends in security, AI and digital identity

  • 1. Walter Lee Evangelist and Government Relations Leader NEC Corporation Identity Verified Welcome Back, Pamela
  • 2. 2 © NEC Corporation 2018 Discussion in Confidence Top Three Trends On Security IOT Internet Of Things/Threats IAC Inter-Agency Collaboration ICP Integration of Cyber and Physical INTEGRATED DIGITAL IDENTITY
  • 3. 3 © NEC Corporation 2018 Discussion in Confidence Next Generation Security Solutions Counter Terrorism (Used by Police Forces) Border Control (Used by Customs & Immigration) City Surveillance (Used by City Ops) IAC(Inter-Agency Collaboration) IOT(Internet Of Thing) ICP(Integration of Cyber- Physical)
  • 4. 4 © NEC Corporation 2018 Value Creation by Combining Various data and AI Technologies Real World Over- whelming efficiency Speed Accuracy Automation Enhanced Suggestion To humans Support human Bird's-eye view Optimization Identify human and objects from data in the real world Acquire knowledge by combining various information Visualization Analysis Control optimally using prediction and reasoning Real World Digitalization, Improvement of data quality Recognition & Identification using the five senses Human Things Understanding of meaning & intent Contexts Analysis with interpretation High-precision analysis Planning & optimization Prescription Discussion in Confidence
  • 5. 5 © NEC Corporation 2018 AI, Big-Data, and IOT
  • 6. 6 © NEC Corporation 2018
  • 7. 7 © NEC Corporation 2018 Framework for Cyber Defence
  • 8. 8 © NEC Corporation 2018 Evolution of Cyber Defence
  • 9. 9 © NEC Corporation 2018 Three Critical Domains of Defence
  • 10. 10 © NEC Corporation 2018 IT and OT transformed by IoT Advanced security Technologies Terminal Authentication Concealment Calculation Behavior Analysis Personal Authentication Authentication Encryption IoT System OT System IT System CountermeasuresThreats Illegal terminals Intruders & Inside jobs Cyber attack Automated Security Intelligence Detecting unknown attacks and failures OT=Operational Technology Detecting spoofing terminals Preventing intruders and inside jobs Protecting communication Preventing information leakage Detecting and Prescribing cyber attack Detecting and Prescribing instrument
  • 11. 11 © NEC Corporation 2018 Why is A.I. Necessary? ▌Increasing Threat of Cyberattacks Due to Industrialization and AI Technology
  • 12. 12 © NEC Corporation 2018 Using AI to assist in Cyber Defence playbook
  • 13. 13 © NEC Corporation 2018 NEXT GEN: Using A.I. to detect anomaly
  • 14. 14 © NEC Corporation 2018 Discussion in Confidence IOT VERSUS IOT INTERNET OF THINGS CoTRoT INTERNET OF THREATS DoT
  • 15. 15 © NEC Corporation 2018 Discussion in Confidence New Characteristics Democratization of Threats Randomness of Threats Contagion of Threats Source: Esri,
  • 16. 16 © NEC Corporation 2018 Discussion in Confidence A Biometric-Secured Digital Identity Facilitate payment & transactions electronically. Facilitate Seamless Travel Future - Digital Passport Finger Iris Face GOVERNMENTBFSIAviation Using Biometric capabilities, we are able to bring Trusted Digital ID closer to reality Facilitate transaction with Government Agencies Voice Ear Biometric Digital ID
  • 17. 17 © NEC Corporation 2018 Discussion in Confidence LIVENESS DETECTION is an anti-spoofing measure built into a given biometric solution meant to identify whether the body part submitted for authentication is real. With adequate liveness-detection, a biometric system can resist break-in attempts made via fake fingerprints, masks, high definition pictures, and voice or video recordings. Liveness: Spoof-proof Solutions - FINDBIOMETRICS, 2017 Quote: “Improved liveness detection should be a priority for the consumer facing biometrics industry.” 92% of respondents agree that liveness detection should be taken as a priority in the biometric industry Source: Biometrics Year in Review: The Need for Liveness Detection, 2016 “
  • 18. 18 © NEC Corporation 2018 Discussion in Confidence Getting Physical with Cyber Security INTERNET OF THINGS DRIVES INTER- AGENCY COLLABORATION )))))) )))))) ))) ))) ))) ))) Seafloor Airports Harbor Factories Rail Roads Banks Companies Broadcasting towers Broadcasters Important facilities Post offices Distribution centers Hospitals Government Fire departments Communications Retail stores Energy Dams/ water supply Space Seafloor optical cables Seafloor seismographs Air traffic control Fingerprint recognition Bank ATMs Diverse business systems Digital TV transmission TV studios Electronic records Electronic government Water management Leak detection POS Harbor surveillance Underwater surveillance Production management Factory management Rail communication s Traffic management Facility surveillance Post sorting machinesLogistics Firefighting systems Communications systems Smart energy Satellite communications / Earth observation Next-generation network technologies High-performance, high-reliability core IT technologies Diverse sensor and human interface technologies
  • 19. 19 © NEC Corporation 2018 Discussion in Confidence Adaptive Real-time Integration of Security Environments (A.R.I.S.E) Security Environments (L2) Integration & Analytics (L3) Calibrated Response IAC (L4) Intelligent Sensors (L1) NOC Situational Awareness Info Dissemination Risk Assessment Recommendation Resource Dispatch 1) Data Aggregation 2) Analytics 3) Risk Assessment Engine 4) Recommendation Engine 5) Authorization Organization A Organization B Corporate SOC PSOC External Source CSOC SCALABLE ADAPTIVE SCADA Physical Surveillance Sensors Cybersecurity Sensors IoT Identity/Profile Workflow Business Rule Ticketing System REAL-TIME