SlideShare a Scribd company logo
1 of 13
Download to read offline
Innovation can be
channeled to solve future challenges.
Michael O’Connell, Vice President and Executive Advisor
NEC Corporation.
3 © NEC Corporation 2019 NEC Confidential
Innovation can be channeled to solve future challenges.
The global challenges:
WEF Global Risk Report 2019
4 © NEC Corporation 2019 NEC Confidential
Innovation can be channeled to solve future challenges.
New challenges:
5 © NEC Corporation 2019 NEC Confidential
Innovation can be channeled to solve future challenges.
Enablers to channel innovation – new structures.
6 © NEC Corporation 2019 NEC Confidential
Strengthen the Cyber Intelligence Collaboration
JC3
Academia
Police
Industry
(Security)
Industry
(End-users)
Participation to Japan Cybercrime Control Center
(JC3) (2014 Nov)
NEC Executive VP is the JC3 Representative Director. NEC leads
this effort. (Established/Joined November, 2014)
“The Cybersecurity Strategic Headquarters”
Dr. Endo (NEC’s Chairman of the board) is playing an active role
as a member of “the Cybersecurity Strategic Headquarters”
established by the cabinet.
Professional Development with Singapore
Government
Develop the Cyber Security Expert with Singapore
Economic Development Board (EDB) (September, 2014)
7 © NEC Corporation 2019 NEC Confidential
Aim is to build Smart and Safer Cities
8 © NEC Corporation 2019 NEC Confidential
Fingerprint
Iris
Ear Acoustic
Palm・Vein
Face
4 Consecutive wins
in NIST*1 Evaluation
(2009,2010,2013,2017)
*1 US Institute of Standards and Technology
5 Consecutive wins
in NIST*1 Evaluation
(2004,2007,2009,2012,2013)
Voiceprint
Rank No.1 in
NIST*1 Evaluation
(2018)
NEC’s Biometrics Recognition Technologies
NIST: National Institute of Standardsand Technology
Non-Regulatory agency of the US Department of Commerce
9 © NEC Corporation 2019 NEC Confidential
NIST:National Institute of Standards and Technology
*Voice recognition technology was also ranked No1.
FpVTE2003
FpVTE2012
Slap Fingerprint Segmentation
Evaluation 2004
MINEX2016
Evaluation of Latent Fingerprint
Technologies 2007(ELFT2007)
NIST Proprietary Fingerprint
Template Testing (PFT2009、PFTⅡ 2013)
Multiple Biometric
Grand Challenge 2009(MBGC2009)
Multiple Biometrics
Evaluation 2010(MBE2010)
Face Recognition Vendor
Test 2013(FRVT 2013)
MBE
Face In Video Evaluation (FIVE)
World-class Technology: US NIST* Benchmark Testing
Fingerprint
recognition
Face
recognition
Iris
recognition
Iris Exchange (IREX) IX 2018
Performance test/ Multispectral Evaluation
10 © NEC Corporation 2019 NEC Confidential
Strengthen the Cyber Intelligence Collaboration
SEC Consult enhance cybersecurity
SEC Consult will consider the provision of security monitoring
services in its Austria, Germany, and Switzerland hubs using
security professionals from NEC and Infosec (April, 2017)
Automated Indicator Sharing(AIS)
Subscription of DHS’s Automated Indicator Sharing(AIS)
which is connected to National Cybersecurity &
Communications Integration Center (NEC is the first vendor to
participate in Japan) . Able to recognize the latest cyber attack
threats and prevent the extent of damages from specific
threats.(March, 2017)
Cyber Threat Alliance (CTA)
NEC joined Cyber Threat Alliance (CTA), a U.S.-based nonprofit
organization that facilitates the sharing of cyber threat information
among member companies in order to improve products and
services and elevate security for customers. (October, 2018)
11 © NEC Corporation 2019 NEC Confidential
NEC’s Cutting-edge AI Technologies Used in Solutions for Society
NEC is already utilizing a technology portfolio and business track record that extends over half a century, including
AI technologies that rank top around the world, in existing Solutions for Society.
Public Safety Marketing
Urban Surveillance
Crowd Behavior Analysis
Management of
Critical Facilities
Citizen ID/
Immigration Control
Operational Innovation
Cyber Security
Water Demand Prediction
Landslide Detection & Prediction
Power Station Failure
Sign Detection
Plant Failure Sign Detection
Power Demand Forecasting
Customer Analysis &
Management
VIP Detection &
Service Support
Voice of Customer (VoC)
Analysis
Predictive Analytics Solution
for Fresh Food Demand
Human Resources
Matching
Image/Weight inspection
Object Recognition
& Traceability
Quality & Performance
Predictive Analysis
Predictive Analytics Solution
for Demand of Repair Parts
ComplianceEnhancement
Solutions
Infrastructure
/PlantManagement
System Invariant Analysis
Optical Vibration
Sensing
Self-learning
Super Resolution
Speech, Emotion
Recognition
Recognizing Textual
Entailment
Autonomous and
Adaptive Control
HeterogeneousMixture
Learning
Face
Recognition
Object
Fingerprint
Crowd Behavior
Analysis
RAPID Machine
Learning
Predictive Robust
Optimization Framework
Visualization Analysis Prescription
Profiling Across
Spatio-Temporal
Data
12 © NEC Corporation 2019 NEC Confidential
NEC’s Solutions for Society
NEC provides IT solutions covering the seabed to outer space.
Cyber Security is required in all IT solutions.
)))))
)
)))))
)
))
)
))
)
))
)
))
)
Seafloor
Airports
Ports
Factories
Rail
Roads
Banks
Companies Broadcasting
towers
Broadcasters
Important
facilities
Hospital
Government
Communications
Retail
stores
Energy
Dams/Water
supply
Space
Seafloor optical
cables
Seafloor
seismographs
Air traffic control
Fingerprint
recognition
Bank ATMs
Diverse business systems
Digital TV transmission
TV studios
Electronic records
Electronic
government
Water
management
Leak detection
POS
Harbor
surveillance
Underwater
surveillance
Production
management
Factory
management
Rail
communications
Traffic
management
Facility
surveillance Logistics
Firefighting
systems Communications
systems
Smart energy
Satellite communications/
Earth observation
Fire
departments
Distribution
centersPost
offices
Next-generation network technologies
High-performance, high-reliability core IT technologies
Diverse sensor and human interface technologies
NEC ICT supporting social infrastructure and systems
Post
sorting
machine
s
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges

More Related Content

What's hot

Cisco Internet of Things and WC june 2014
Cisco Internet of Things and WC  june 2014Cisco Internet of Things and WC  june 2014
Cisco Internet of Things and WC june 2014Vasily Ryzhonkov
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Bessie Wang
 
Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Brian K. Buntz
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAli Nezhad
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...Bosnia Agile
 
Python and the internet of things
Python and the internet of thingsPython and the internet of things
Python and the internet of thingsAdam Englander
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected WorldSyam Madanapalli
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of governmentSyam Madanapalli
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...AI Frontiers
 
Atagg2015 iot internet of things - get ready to test the connected future ata...
Atagg2015 iot internet of things - get ready to test the connected future ata...Atagg2015 iot internet of things - get ready to test the connected future ata...
Atagg2015 iot internet of things - get ready to test the connected future ata...Agile Testing Alliance
 
An Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsAn Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsTestingXperts
 

What's hot (20)

Cisco Internet of Things and WC june 2014
Cisco Internet of Things and WC  june 2014Cisco Internet of Things and WC  june 2014
Cisco Internet of Things and WC june 2014
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
What is io t
What is io tWhat is io t
What is io t
 
Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...
IoT IMPLEMENTATION CHALLENGES and the future of IoT connectivity by Matija Pu...
 
Python and the internet of things
Python and the internet of thingsPython and the internet of things
Python and the internet of things
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected World
 
IoT
IoTIoT
IoT
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
 
Atagg2015 iot internet of things - get ready to test the connected future ata...
Atagg2015 iot internet of things - get ready to test the connected future ata...Atagg2015 iot internet of things - get ready to test the connected future ata...
Atagg2015 iot internet of things - get ready to test the connected future ata...
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
An Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsAn Insight on Testing the IoT Applications
An Insight on Testing the IoT Applications
 

Similar to NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges

NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety
 
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)MicheleNati
 
NexOptic Corpoorate Presentation - December 2021
NexOptic Corpoorate Presentation - December 2021NexOptic Corpoorate Presentation - December 2021
NexOptic Corpoorate Presentation - December 2021Adnet Communications
 
Nex optic presentation-edits_8244_final
Nex optic presentation-edits_8244_finalNex optic presentation-edits_8244_final
Nex optic presentation-edits_8244_finalAdnet Communications
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsSoftware Park Thailand
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)Marc Jadoul
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlow
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlowFIWARE Global Summit - Factory Shop Floor Digitalization using FogFlow
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlowFIWARE
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...Intland Software GmbH
 
Software Sustainability: The Challenges and Opportunities for Enterprises and...
Software Sustainability: The Challenges and Opportunities for Enterprises and...Software Sustainability: The Challenges and Opportunities for Enterprises and...
Software Sustainability: The Challenges and Opportunities for Enterprises and...Patricia Lago
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Ray Bugg
 
IoT Developer Survey 2017
IoT Developer Survey 2017IoT Developer Survey 2017
IoT Developer Survey 2017Ian Skerrett
 

Similar to NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges (20)

NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
 
NexOptic Corpoorate Presentation - December 2021
NexOptic Corpoorate Presentation - December 2021NexOptic Corpoorate Presentation - December 2021
NexOptic Corpoorate Presentation - December 2021
 
Nex optic presentation-edits_8244_final
Nex optic presentation-edits_8244_finalNex optic presentation-edits_8244_final
Nex optic presentation-edits_8244_final
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlow
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlowFIWARE Global Summit - Factory Shop Floor Digitalization using FogFlow
FIWARE Global Summit - Factory Shop Floor Digitalization using FogFlow
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...
Advanced System Engineering in the Automotive Industry - Dr Alain Pfouga (pro...
 
Software Sustainability: The Challenges and Opportunities for Enterprises and...
Software Sustainability: The Challenges and Opportunities for Enterprises and...Software Sustainability: The Challenges and Opportunities for Enterprises and...
Software Sustainability: The Challenges and Opportunities for Enterprises and...
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015
 
IoT Developer Survey 2017
IoT Developer Survey 2017IoT Developer Survey 2017
IoT Developer Survey 2017
 

More from NEC Public Safety

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety
 

More from NEC Public Safety (11)

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges

  • 1. Innovation can be channeled to solve future challenges. Michael O’Connell, Vice President and Executive Advisor NEC Corporation.
  • 2.
  • 3. 3 © NEC Corporation 2019 NEC Confidential Innovation can be channeled to solve future challenges. The global challenges: WEF Global Risk Report 2019
  • 4. 4 © NEC Corporation 2019 NEC Confidential Innovation can be channeled to solve future challenges. New challenges:
  • 5. 5 © NEC Corporation 2019 NEC Confidential Innovation can be channeled to solve future challenges. Enablers to channel innovation – new structures.
  • 6. 6 © NEC Corporation 2019 NEC Confidential Strengthen the Cyber Intelligence Collaboration JC3 Academia Police Industry (Security) Industry (End-users) Participation to Japan Cybercrime Control Center (JC3) (2014 Nov) NEC Executive VP is the JC3 Representative Director. NEC leads this effort. (Established/Joined November, 2014) “The Cybersecurity Strategic Headquarters” Dr. Endo (NEC’s Chairman of the board) is playing an active role as a member of “the Cybersecurity Strategic Headquarters” established by the cabinet. Professional Development with Singapore Government Develop the Cyber Security Expert with Singapore Economic Development Board (EDB) (September, 2014)
  • 7. 7 © NEC Corporation 2019 NEC Confidential Aim is to build Smart and Safer Cities
  • 8. 8 © NEC Corporation 2019 NEC Confidential Fingerprint Iris Ear Acoustic Palm・Vein Face 4 Consecutive wins in NIST*1 Evaluation (2009,2010,2013,2017) *1 US Institute of Standards and Technology 5 Consecutive wins in NIST*1 Evaluation (2004,2007,2009,2012,2013) Voiceprint Rank No.1 in NIST*1 Evaluation (2018) NEC’s Biometrics Recognition Technologies NIST: National Institute of Standardsand Technology Non-Regulatory agency of the US Department of Commerce
  • 9. 9 © NEC Corporation 2019 NEC Confidential NIST:National Institute of Standards and Technology *Voice recognition technology was also ranked No1. FpVTE2003 FpVTE2012 Slap Fingerprint Segmentation Evaluation 2004 MINEX2016 Evaluation of Latent Fingerprint Technologies 2007(ELFT2007) NIST Proprietary Fingerprint Template Testing (PFT2009、PFTⅡ 2013) Multiple Biometric Grand Challenge 2009(MBGC2009) Multiple Biometrics Evaluation 2010(MBE2010) Face Recognition Vendor Test 2013(FRVT 2013) MBE Face In Video Evaluation (FIVE) World-class Technology: US NIST* Benchmark Testing Fingerprint recognition Face recognition Iris recognition Iris Exchange (IREX) IX 2018 Performance test/ Multispectral Evaluation
  • 10. 10 © NEC Corporation 2019 NEC Confidential Strengthen the Cyber Intelligence Collaboration SEC Consult enhance cybersecurity SEC Consult will consider the provision of security monitoring services in its Austria, Germany, and Switzerland hubs using security professionals from NEC and Infosec (April, 2017) Automated Indicator Sharing(AIS) Subscription of DHS’s Automated Indicator Sharing(AIS) which is connected to National Cybersecurity & Communications Integration Center (NEC is the first vendor to participate in Japan) . Able to recognize the latest cyber attack threats and prevent the extent of damages from specific threats.(March, 2017) Cyber Threat Alliance (CTA) NEC joined Cyber Threat Alliance (CTA), a U.S.-based nonprofit organization that facilitates the sharing of cyber threat information among member companies in order to improve products and services and elevate security for customers. (October, 2018)
  • 11. 11 © NEC Corporation 2019 NEC Confidential NEC’s Cutting-edge AI Technologies Used in Solutions for Society NEC is already utilizing a technology portfolio and business track record that extends over half a century, including AI technologies that rank top around the world, in existing Solutions for Society. Public Safety Marketing Urban Surveillance Crowd Behavior Analysis Management of Critical Facilities Citizen ID/ Immigration Control Operational Innovation Cyber Security Water Demand Prediction Landslide Detection & Prediction Power Station Failure Sign Detection Plant Failure Sign Detection Power Demand Forecasting Customer Analysis & Management VIP Detection & Service Support Voice of Customer (VoC) Analysis Predictive Analytics Solution for Fresh Food Demand Human Resources Matching Image/Weight inspection Object Recognition & Traceability Quality & Performance Predictive Analysis Predictive Analytics Solution for Demand of Repair Parts ComplianceEnhancement Solutions Infrastructure /PlantManagement System Invariant Analysis Optical Vibration Sensing Self-learning Super Resolution Speech, Emotion Recognition Recognizing Textual Entailment Autonomous and Adaptive Control HeterogeneousMixture Learning Face Recognition Object Fingerprint Crowd Behavior Analysis RAPID Machine Learning Predictive Robust Optimization Framework Visualization Analysis Prescription Profiling Across Spatio-Temporal Data
  • 12. 12 © NEC Corporation 2019 NEC Confidential NEC’s Solutions for Society NEC provides IT solutions covering the seabed to outer space. Cyber Security is required in all IT solutions. ))))) ) ))))) ) )) ) )) ) )) ) )) ) Seafloor Airports Ports Factories Rail Roads Banks Companies Broadcasting towers Broadcasters Important facilities Hospital Government Communications Retail stores Energy Dams/Water supply Space Seafloor optical cables Seafloor seismographs Air traffic control Fingerprint recognition Bank ATMs Diverse business systems Digital TV transmission TV studios Electronic records Electronic government Water management Leak detection POS Harbor surveillance Underwater surveillance Production management Factory management Rail communications Traffic management Facility surveillance Logistics Firefighting systems Communications systems Smart energy Satellite communications/ Earth observation Fire departments Distribution centersPost offices Next-generation network technologies High-performance, high-reliability core IT technologies Diverse sensor and human interface technologies NEC ICT supporting social infrastructure and systems Post sorting machine s