|
6th Annual Security Printing Conference
November 16-18, 2009
Sheraton Baltimore City Center Hotel
Baltimore, Maryland
Program Coverage and Schedule
Monday, November 16, 2009 |
  11:00 a.m. | Conference Registration |
  1:00 p.m. | Session 1 - Security Printing - Why Are We Interested? |
WELCOME AND INTRODUCTIONS
Alvin G. Keene, President, Information Management Institute, Inc., Carrabassett Valley, Maine
Harold Schofield, Schofield Imaging Associates, Narragansett, Rhode Island
SECURITY PRINTING IN PERSPECTIVE
Harold Schofield, Schofield Imaging Associates, Narragansett, Rhode Island
- Security Printing Industry Update
- Digital Document Security
- Protecting Against Alteration & Counterfeiting
- Technology & Compliance Trends
- Security Market Perspective
- Security Printing Economics: What Are The Costs & Who Pays?
- Conference Highlights
SECURITY MARKET OVERVIEW
Richard H. Ward, Principal and Managing Member, Buena Vista Resources LLC, Buena Vista, Colorado
- "Security" Market is Very Broad
- Many Segments are Underserved
- High Level Overview & Discussions on
- How to Analyze Markets Needs
- How to Turn "Market Needs" Information into Meaningful Solutions
- Why Don't Suppliers Make the Products Buyers Want?
- Why Do Products Fail to Meet Expectations?
- Why Do Buyers Lose Interest in Technologies?
- Strategies for Buyer/Vendor Teaming to Develop Solutions
SECURITY PRINTING IN PACKAGING
Jim Mauro, Product Manager, Prinect Press Products, Heidelberg USA, Inc., Kennesaw, Georgia
- Assessment of the Threat
- Value to be Protected
- Guideline for Selecting Appropriate Security Features for Given Packaging Applications
- Overt & Covert Security Features
- Samples showing Special Substrates, Inks, Coatings and/or Processes
- Impact on Package Design & Appearance
- Latest Developments in Packaging Security Printing
SECURING ID AND FINANCIAL TRANSACTIONS
John Stearns, President, Magellan Consulting, Bloomington, Minnesota
- Snapshot of ID & Financial Card Industry
- MagnePrint Technology
- Machine Readable Technology
- Already on Magnetic Stripe
- Low Cost, Secure Authentication
- Global Application
RFID ENABLED SECURITY APPLICATIONS
Elaine A. Bresnick, President, Bresnick Consulting, Newton, Massachusetts
- What is RFID?
- How Does it Work?
- Market Size & Applications
- RFID Application Categories
- Track & Trace (Retail, Healthcare)
- Access Control (EZ Pass, Car Entry, Building Access)
- Personal Identification (Passport, Driver's License, Pets)
- Security Applications Focus on UHF
- Personal ID (Kids on School Busses, Elderly & Infirmed-Alzheimers' Patients, Patient ID-BPOC)
- Access Control (High Voltage Workers, Medicine Cabinet)
- Track & Trace (E Pedigree-Pharma)
- Assessment of RFID for Security Applications
- Security & Privacy Concerns
- UHF Gaining Traction
- Standards Exist
- Closed Loop Apps Work Best
- Combining with Other Sensors for Tracking Environmental Conditions (Food, Pharma)
TOOLS TO DEFINE BRAND PROTECTION STRATEGY - How Does One Eat
an Elephant?
Dr. James Williams, Founder & Chairman, Polyonics Inc., Westmoreland, New
Hampshire
- Brand-owners Face Daunting Task when Confronted with the Reality of Taking Action against Threats to their Brand Integrity
- Developing Structured Process for Organizing Strategies to Protect Brands
- Fundamental Axioms across all Industries - What are some of the Lessons Learned from Successful (and unsuccessful) Programs to Prevent Product Counterfeiting
- Risk Analysis
- Impact on Company & its Reputation (i.e. "ROI" as a Goal?)
- ROI vs. Corporate Liability
- Available Technologies
- Acceptance of "Layered Protection" as the Effective Paradigm
- Brief Overview of Technologies
- Decision Analysis/Tradeoffs which you Must Face
- Which Technology, i.e. Overt, Covert, Forensic?
- Where to Use it, i.e. Packaging, On the Product, In the Product or In the Process?
- What Tradeoffs do you Face in these Decisions?
- A Decision Tree as a Useful Tool
SECURING HARDCOPY DEVICES WITH THE IEEE 2600™ SERIES OF STANDARDS
Don Wright, Director of Standards, Lexmark International, Lexington, Kentucky
- IEEE 2600™ Series of Standards Define Security Requirements for Manufacturers, Users & Others
- Covers Selection, Installation, Configuration & Usage of Hardcopy Devices & Systems
- Printers, Copiers & Multifunction Devices Included
- Issues Addressed Encompass Authentication, Authorization, Data Privacy, Data Integrity & Device Management
- Testing & Certification
- Protection Profiles for Specific Operational Environments
- What's Next?
  5:30 p.m. |
Reception in Display Area |
Tuesday, November 17, 2009 |
  7:30 a.m. | Continental Breakfast |
  9:00 a.m. | Session 2 - Security Printing Issues & Options |
DESIGNING HIGH PERFORMANCE BRAND PROTECTION/BRAND SECURITY SOLUTIONS
Robert S. Taylor, General Manager, Kodak Security and Design-to-Launch Solutions, Business Services and Solutions Group, Eastman Kodak Co., Rochester, New York
- Effective Brand Protection: Sound Strategy for a ComplexProblem
- Assessment
- Plan: Prevention & Protection
- Protect: Tools, Security Solution Design
- Monitor & Enforce
- Business Case for a Brand Protection Solution
- Defensive, Direct ROI, Offensive & Analysis Examples
- Designing a Brand Protection Solution
- Balancing Requirements for a High Performance Security Solution
- Customer Needs: Effectiveness, Ease of Use, Economical
- Regulatory Compliance
- Technical Requirements: Deliverables & Constraints
- Performance & Effectiveness Specifications
- Technical Specifications for a Well-designed Security Solution
- Brand Protection Tools & the Questions they Answer
- Forensic, Covert & Overt Authentication Tools: Uses & Attributes
- Ultra-covert, Covert, Semi-covert: Uses & Attributes
- Ultra-covert: New Approach, Benefits - More than High Security
- Layering Tools to Answer Complex Problems
- A Unique Layering Approach
DOCUMENT & PRODUCT PROTECTION - PROVIDING INTEGRATED SOLUTIONS
Stephan von Schilcher , Joel Global Product & Brand Security, Annapolis, Maryland & Johannas von Schilcher, Joel Global Product & Brand Security, Berg, Germany
- Document Security: The Paper, Security Features, Security Stamping Ink, Crypto Print & Crypto Trace
- Product Security: Security Threads, New Up-Conversion (Detectable with & without Laser), Trace Tag, Random Structure Surface Structures, Intra-gram, Crypto Print, Crypto Trace (Print & Laser Engraved) & Color Twister
NEW INK JET PERSONALIZATION TECHNOLOGY & HIGHLIGHTS FOR GOVERNMENT ISSUED DOCUMENTS & REVENUE COLLECTION
Tom Jay, Vice President, Sales & Marketing, SICPA Securink Corporation, Springfield, Virginia
- New Ink Jet Technology Description & Capabilities
- New Innovations in Security Technologies for Government-run Programs
- Best Practices for Selecting Technology
- Implementing a Comprehensive Program for Security
CHALLENGES OF IMPLEMENTING SECURITY CHANGES IN VITAL RECORDS OFFICES
Chuck Hardester, Security Consulting, National Association for Public Health Statistics & Information Systems (NAPHSIS), Silver Springs, Maryland
- NAPHSIS: Membership, Goals & Programs
- Vital Records Responsibilities
- Registration & Certification of Vital Events in 57 Jurisdictions
- Model Vital Statistics Act & Regulation: 1992 Version
- Customer Constituent Service
- Preserving Records
- Factors Contributing to Security Problems in Vital Records Offices
- Open Record States
- 6400 Issuing Agents - Lack of Control at Local Level
- 14,000 Variations of Certification Documents
- Lack of Security Features in Certification Documents
- Failure to Adopt Federal Regulations of the Intelligence Reform & Terrorism Prevention Act of 2004 (INTEL)
- Meeting the Security Challenges
- Revision to the Model Vital Statistics Act & Regulations
- Development of a NAPHSIS Security Guideline Manual (Document Security Features, Physical Plant Security & Issuance/Registration Procedures
- Electronic Verification of Vital Events (EVVE)
- Piloting a Fraud Early Warning System
- Supporting the Adoption of the Federal INTEL Regulations
|
|
  1:30 p.m. | Session 3 - Forensic Analysis Tools, Techniques & Needs |
CHALLENGES FACED WHEN EXAMINING FORENSIC EVIDENCE
Lorie L, Gottesman, Forensic Document Examiner, FBI Laboratory, Quantico, Virginia (Co-author: Joseph Stephens, Forensic Document Examiner, USSS Laboratory, Washington, DC)
- Forensic Tools & Procedures for Identifying Counterfeit Documents & Other Items
- Forensic Databases for Linking Evidence & Cases
- Forensic Issues for Ink Jet & Laser Technologies
- How can Security Printing Technologies Work for Us?
TRENDS IN DIGITALLY PRINTED COUNTERFEIT BANK NOTES
Yvette Monson, Counterfeit Specialist, United States Secret Service, Washington, DC
- Introduction to USSS Counterfeit Note Classification System & Role of Counterfeit Specialists
- Information on Growing Problem of Digitally Produced Counterfeit Notes
- Challenges Inherent to Classification of Digital Notes & Possible Solutions
- Current Trends in Digital Counterfeits
- Mixed Process Notes
- Simulation of Security Features
- Note Variations
- Bleaching
- Linking Digital Counterfeit Notes Forensically
- Association through Identifiers & Defects
- Evolution of Counterfeit Note Families from Traditional to Digital Print Processes
AUTOMATED QUALITY CONTROL FOR SECURITY PAPER
Dr. Jochen Koenig, Managing Director, Schenk Vision, Woodbury, Minnesota
- Security Papers Require Highly Stable Production Process to Meet Quality Requirements for Currency & Other Security Products
- WebFeat Automated Inspection System
- Developed in Cooperation with Leading Security Paper Manufacturers
- Recognizes all state-of-the-art Security Features
- Flexible Design enables Inclusion of New Parameters as New Security Features Evolve
- Key Benefits & Advantages
- High Resolution CCD Line-scan Cameras (Realistic, Microscope-like Defect Images; Easy Calibration, Robust & Maintenance-free compared to Laser Systems
- Transparency of Project & Product (Customer Involvement at early Planning Stage, Full Transparency of Features & Operating Principles and No Black Box)
- Tailor Made & Flexible for Future Enhancements (Designed according to Client Specifications, Enhanced Defect Classifications aligned with Customer Terminology & Open to Future Editions as Products Evolve)
- Reliably Detects Defects in Paper Material plus Monitors Presence, Position & Properties of Incorporated Security Features
- Measures the geometry of the Paper Sheets as an In-line System
- Works on Real-time Basis enabling Immediate Root-cause Analysis & Corrective Action
HYPERSPECTRAL IMAGING FOR QUESTIONED DOCUMENT EXAMINATION
Trey White, Sales Representative, ChemImage, Pittsburgh, Pennsylvania
- Determination of Number & Types of Ink
- Hyperspectral Imaging in Visible & Near Infrared Spectral Range (400-1100nm)
- Technology Methods for Non-destructive Analysis
- Ink Discrimination
- Identification of Alterations or Forgeries
- Visualization of Hidden Security Features
- Imaging of TLC Plates
- Hyperspectral Imaging Research Provides Advantage over Current Practices
SUPPLIERS' FORUM: 5-Minute Presentations Related To Technology, Capabilities, Services, New Product Introductions, etc. In combination with having a display, this provides an opportunity to present your technology, products or services to all conference participants. Contact Al Keene at IMI al@imiconf.com for information on having a display and signing up for the Suppliers' Forum.
  5:30 p.m. |
Reception in Display Area |
Wednesday, November 18, 2009 |
  7:30 a.m. | Continental Breakfast |
  8:30 a.m. | Session 4 -
Do New Security Printing Techniques Offer Economically Viable Solutions?
|
NanoChromics™ PRINTED SECURITY SOLUTIONS: APPLICATIONS TO IDENTIFICATION, AUTHENTICATION & TRACKING/INTEGRITY
Dr. Alain C. Briançon, Chief Technology Officer, NTERA, Inc., Radnor, Pennsylvania
- NanoChromics Displays (NCD™) Technology & Principles of Operation
- Solid State Electrochromic Phenomena
- Electrochromic Molecules & Nanomaterial Formulations
- Self-erasing, Metastable (Persistent Image) & Irreversible Color Changes
- NCD Manufacturing Utilizes Additive All-print Process & can be made using Standard Printing Processes (Ink Jet, Flexographic, Screen, etc.) on Substrates from Polyester Films to Paper
- NCD Designs can be used for Security Application Functions such as
- One Time Passcodes for Two Factor Authentication
- Dynamic Color Changes for Covert to Overt Authentication
- Dynamic High Resolution Biometric Images
- Tamper Detectors
- Watermarkings
- Device Trackers
- & Many More
- Inks Designed to Mix with Existing Security Ink & Film Solutions Enabling Further Advanced Solutions
- Potential Use in Advanced Security Applications
WATER BASED INK JET PRINTABLE INKS: DEVELOPMENT APPROACH & PRODUCTION ENABLING METHODOLOGY
Frank St. John, Methode Electronics, Inc. Harwood Heights, Illinois
- Development: Water Based Ink Jet Printable Ink
- Thick Film Expertise: Micro-size Composition, Screen Print Production, Industries & Applications
- Water Based Conductive Ink Jet Material Development: Nano-size Composition, Compatible Substrates, Ink Jet Production, Ink Characterization
- Enabling Implementation - Ink Jet
- Industries & Applications: Variable Data Advantage & Variable Production Batch Size Advantage
- Development Support: Microelectronics Industry & Printing Industry, Thermal & Piezo Ink Jet Printheads & Cartridges, Scalable Engineering Thermal Desk Top Systems
- Production: Industrial Systems & Product Volume Considerations
- Security Printing Applications & Future Directions
- Ink Jet Printable Ink Development
- Enabling Industry Application Development
INK JET CHEMISTRIES FOR SECURITY PRINTING
Dr. Kay Jeong, Technical Inkjet Manager, Xennia Technology Ltd., Letchworth, Hertfordshire, UK
- Role of Ink Jet for Security Printing
- Types of Materials that can be Ink-jetted to Enable Security Features
- Formulating Ink for Covert & Overt Security Printing
- Applying Ink Jet Materials for Security Applications in Production Environments
- Single Pass High Speed Printing
- Printing of Multi-layer Composites
- Key Success Criteria for Reliable Printing Solutions
- Ink Jet Integration Challenges & Opportunities
- Future for Ink Jet & Security: Novel Materials & New Applications
INNOVATIVE NEW TECHNOLOGIES IN SECURITY PROTECTION & BRAND PROTECTION
Jeffrey Strahl, Vice President, H. W. Sands Corporation, Jupiter, Florida
- Estimated Annual Sales of Counterfeit Products Exceed $750 Billion Worldwide, resulting in
- Financial Loss
- Damage to Brand Name Products
- Damage to Health & Life from Faulty Counterfeit Products
- SANDS-SECURE® Security Products, Solutions & Technologies
- Offering Multiple Products to Create Layers of Security - Key to Staying Ahead of Counterfeiters
- Overt Technologies
- Color Shift Inks
- Holograms
- Photochromic Inks
- Thermochromic Inks
- Smart Holograms Optically Programmable Sensors TM (SHOPS)
- Covert Technologies
- Fluorescent Dyes
- Scrambled Indicia - SI® Embedded Security Technology
- Polarized Hidden-Image Tech (PTEC)
- Forensic Technologies
- Forensic Taggants
- Implementation Examples
LASER DIGITAL IMAGEABLE MEDIA WITH DUAL VESICULAR & INFRARED
IMAGES
Dr. Steve Carlson, President & CEO, Optodot Corporation, Allston,
Massachusetts
- Nearly Invisible IR Laser Digital Imageable Coatings for Security Applications
- Capabilities to Form either an IR Image only or Dual Vesicular - Bubble & IR Images Readable in the Visible & IR Range
- Laser Energy Conditions Needed to Produce Both Types of Digital Images
- Application as Authentication Agent in ID Cards, Documents, Tags & More by Variety of Coating & Laminating Methods
COVERT BARCODES HANDLE ON-THE-SPOT BRAND & DOCUMENT AUTHENTICATION
John R. Hattersley, President, InData Systems, Skaneateles, New York
- Why Covert Barcodes?
- In-the-field Track, Trace & Authentication
- Types of Data in Invisible Marks
- Multilayer Protection Combines Covert Mark + Encoded Serialization
- 3 Legged Stool of Covert Security Solutions
- Reliable Ink & Marking Methods
- User Friendly In-field Scanners
- Data System Integration/Tracking
- Reliable Methods Now Widely Available
- Digital & Ink Jet Printing, Thermal Transfer
- Different Ink-specific Technologies
- Affordable, Durable Field Scanners
ENCAPSULATED AUTHENTICATION
Mike Caffrey, Security Business Development Manager, Technical Papers Division - Security Papers, Appleton, Appleton, Wisconsin
- Encapsulation Methods
- Chemical
- Physical
- Release Methods
- Pressure
- Temperature
- Chemical
- Benefits of Micro-encapsulation
- Raw Material Savings
- Productivity
- New Functionality
- Security Authentication
- Time Release & Markers
- Patented Detection System
- Patented Authentication System
- Case Studies
GRAPHENE INKS FOR PRINTED ELECTRONICS
John Crain, Vice President Strategy & Business Development, Vorbeck Materials Corporation, Jessup, Maryland
- Graphene: a Rapidly Rising Star on the Horizon of Materials Science & Condensed-Matter Physics
- Strongest, most Thermally Conductive Material with Exceptional Mechanical, Electrical Properties
- Vor-ink TM: Graphene Inks for Printed Electronics
- Sinter-free Processing
- Robust Films with Excellent Conductivity after Repeated Flex/Crease
- Printed Antennae, Backplanes, Bus Bars, Interconnects on Paper, Paperboard, PET, PC, PMMA, Glass
- RFID, Smart Packaging, Displays, TFPV
|
|
Download the PDF version of this program Security Printing 09.pdf
Speaking Opportunities at IMI Conferences
If you have a potential topic for presentation at this or another IMI conference, please submit your proposed presentation topic and a brief outline to Al Keene at IMI (Email to imi@imiconf.com or fax to +1-207-235-2226) for review.
IMI is always looking for potential speakers for upcoming conference programs and will be pleased to discuss your ideas for potential presentation topics.
Product Demonstrations & Free Displays
Security printing and product demonstrations/displays by both conference speakers and registrants are encouraged. IMI will cooperate with all interested parties to provide appropriate space so products can be displayed and demonstrated during the conference breaks. There is no charge in addition to the conference registration fee to have a display table. Interested companies should contact Al Keene at al@imiconf.com to ensure that proper arrangements are made for product displays and demonstrations.
Hotel Information
IMI's 6th Annual Security Printing Conference is being held at the Sheraton Baltimore City Center Hotel in Baltimore, Maryland. Hotel reservations are the responsibility of each meeting registrant. To receive the special meeting rate of $129 for single or double occupancy, you may call +1-866-837-5182 to make hotel reservations. Identify yourself as a member of the IMI-6th Annual Security Printing Conference group. Early booking is advised as the reduced rate is guaranteed only until October 26, 2009 and will be on a space available basis after October 26, 2009.
|
|
Location
|
The Sheraton Baltimore City Center Hotel is located in the heart of Baltimore's thriving downtown business and cultural district and only a few blocks from Baltimore's famous Inner Harbor, National Aquarium, Science Center plus exciting shopping, dining and historical sites - yet only 10 miles from Baltimore-Washington International Airport (Airport shuttle service available via SuperShuttle upon arrival at BWI Airport). Hotel amenities include complimentary high speed internet in the sleeping rooms, self & valet parking for $18 daily (normally $28/$35), Sheraton Sweet Sleeper bed and 24 hour fitness center. The Sheraton Baltimore City Center Hotel is home to popular Baltimore eateries - Shula's Steak House (one of America's top-rated steak houses) and Shula's 2 (sports bar).
The Sheraton City Center Hotel plus the City of Baltimore www.baltimore.org and the State of Mayland www.mdisfun.org provide an excellent opportunity to extend your visit into a memorable vacation experience.
|
Dress for IMI's 6th Annual Security Printing Conference will be casual.
The Sheraton Baltimore City Center Hotel address is:
Sheraton Baltimore City Center Hotel
101 West Fayette Street
Baltimore, MD 21201 USA
Phone: +1-410-752-1100
Fax: +1-410-752-0832
Reservations Phone: +1-866-837-5182
Information Management Institute
Information Management Institute, Inc. is a leading worldwide sponsor of conferences designed to assist the digital printing industry in understanding technology developments, markets and applications requirements. IMI conferences offer a unique opportunity for leading hardware, consumables, software and user companies representatives to network and develop a more comprehensive understanding of current as well as future developments in the digital printing industry. Since 1990, IMI has held over 400 programs and each year over 2,000 technical, marketing and management personnel from over 600 companies worldwide attend IMI programs.
IMI conference programs are designed to enable attendees to obtain the latest technical, market and application information while allowing time to network with other attendees in a time and cost efficient manner. Attendance at an IMI conference enables attendees to meet with the digital printing industry's leading experts in a single location over a short period of time thus maximizing information transfer efficiency and minimizing travel and time expenses.
For further details, contact Information Management Institute:
Information Management Institute, Inc.
1106 Valley Crossing
Carrabassett Valley, ME 04947
USA
Phone: +1-207-235-2225
Fax: +1-207-235-2226
Email: imi@imiconf.com
Web Site: www.imiconf.com
|
|
Registration Update:
Over 75 conference registrants from the following companies and organizations represent eight countries (Australia, Canada, France, Germany, Japan, The Netherlands, UK & US):
Appleton, Bayer Material Science, Beard Group, Brandstein Consulting, Bresnick Consulting, Brother International, Buena Vista Resources, Burdge, Inc., ChemImage, Chesapeake Resource Group, Collins Ink, Data Management, Inc., Datacard, Dept. of Defense, Dept. of Homeland Security/ICE, Eastman Kodak, Eli Lilly & Company, FBI Laboratory, FLEXcon, Fontys University of Applied Technology, Foster + Freeman USA, FUJIFILM Corporation, Gemalto, H.W. Sands, Heidelberg, InData Systems, Information Management Institute, Ironsides Technology, JOEL Global Product & Brand Protection, LANXESS Corporation, Lexmark International, MACtac, Magellan Consulting, Methode Electronics, NAPHSIS, Nipson America, NPC, Inc., Nosco, NTERA, Oce North America, Optodot, Oxonica Materials, Polyonics, Prime Genetics, Printco, Quality Engineering Associates, Schenk Vision, Schofield Imaging Associates, Seybold Report, SICPA, Silberline, Treibacher Industries, Troy Group, Tullis Russell, U.S. Secret Service, United Color Manufacturing, Vorbeck Materials, Weldon-Williams & Lick, Inc. and Xennia Technology
|
PAST CONFERENCE BINDER & CD-ROM
- The binder and CD-ROM for this completed program, containing handout materials from all speakers plus a registration list with names, addresses and phone numbers, may be purchased for:
- $300 US including shipping by Federal Express
Note: $50 Shipping Fee automatically added to non-US, Completed Program Binder orders only. Appears as $50 Shipping charge in the Shopping Cart
Contact IMI by email (imi@imiconf.com) to place your order or call (207) 235-2225.
|
|
Return to Information Management Institute Master Schedule
|
|