SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Anti-counterfeiting  Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
Who  cares? Who is  responsible for implementing anti-counterfeiting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the impact of counterfeiting? ,[object Object],[object Object],[object Object]
Further trends in counterfeiting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
[object Object],[object Object],[object Object],[object Object],Effective anti-counterfeiting approaches derive their strength from a combination of rigorous system level thinking and technology
The logistics and supply chain ‘system’ Legitimate Illicit
An effective approach requires a clear understanding of the requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An effective approach also needs to understand the capabilities and nature of the counterfeiter and the users  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Effective solutions use a combination of technologies to deter, defend against, and detect the counterfeiter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A combination of  overt  and covert features can be used to provide us with good coverage of the set of requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A combination of overt and  covert  features can be used to provide us with good coverage of the set of requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The development of portable, low-cost instrumentation is a key factor in the success of a number of covert authentication systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bayesian signal processing and information theory approaches provide significant benefits to authentication systems  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Radio Frequency Identification (RFID) technology provides the ability to securely encode a serial number within a device and store a trace history  ,[object Object],[object Object],[object Object]
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Counterfeit products are becoming increasingly prevalent requiring a structured game plan - so is it roulette or chess we want to play?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Looking to the future
[object Object],[object Object],[object Object],Questions?
Contact details: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©  2009 Cambridge Consultants Ltd, Cambridge Consultants Inc. All rights reserved. Commercially Confidential   This Presentation contains ideas and information which are proprietary to Cambridge Consultants Limited and/or Cambridge Consultants Inc: it is given to you in confidence.  You are authorised to open and view any electronic copy we send you of this document within your organisation and to print a single copy.  Otherwise the material may not in whole or in part be copied, stored electronically or communicated to third parties without the prior written agreement of Cambridge Consultants Limited and/or Cambridge Consultants Inc.

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains Aparajita Banerjee
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Ollie Whitehouse
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&AMatt Tortora
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019Trustwave
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthrcnossen
 
Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave
 
Security Awareness in the Enterprise
Security Awareness in the EnterpriseSecurity Awareness in the Enterprise
Security Awareness in the Enterpriseamiable_indian
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingMinsait
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competencyDidik Partono Rudiarto
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
 

Was ist angesagt? (20)

Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019Trustwave Cybersecurity Education Catalog 2019
Trustwave Cybersecurity Education Catalog 2019
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018Trustwave Cybersecurity Education Catalog 2018
Trustwave Cybersecurity Education Catalog 2018
 
Security Awareness in the Enterprise
Security Awareness in the EnterpriseSecurity Awareness in the Enterprise
Security Awareness in the Enterprise
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity Training
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 

Andere mochten auch

Business action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracyBusiness action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracyAltacit Global
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problemBilcareltd
 
Savelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anrSavelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anrAltacit Global
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout Northwest Card Association
 
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...EmmanuelGillet
 
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...Balakrishna Uppala
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...North Texas Chapter of the ISSA
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsRuth Thomson
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingIHS
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Andere mochten auch (10)

Business action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracyBusiness action to stop counterfeiting and piracy
Business action to stop counterfeiting and piracy
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Savelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anrSavelife foundation and; anr vs union of india and anr
Savelife foundation and; anr vs union of india and anr
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
 
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine Benefits
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Ähnlich wie Anti Counterfeiting - Playing Roulette Or Chess?

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler Service2Media
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know Sarah Crabb
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...JustinFinch11
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperMarc St-Pierre
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 

Ähnlich wie Anti Counterfeiting - Playing Roulette Or Chess? (20)

Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler Service2Media: Webinar Security & Management  (17 March 2014) by Derk Tegeler
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

Mehr von Ruth Thomson

How to develop a novel wearable product?
How to develop a novel wearable product?   How to develop a novel wearable product?
How to develop a novel wearable product? Ruth Thomson
 
'Does one size fit all?' - presentation on Wearable Technology
'Does one size fit all?'  - presentation on Wearable Technology'Does one size fit all?'  - presentation on Wearable Technology
'Does one size fit all?' - presentation on Wearable TechnologyRuth Thomson
 
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HANWhy Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HANRuth Thomson
 
Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...Ruth Thomson
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsRuth Thomson
 
Bio presentation counterfeiting & serialization
Bio presentation   counterfeiting & serializationBio presentation   counterfeiting & serialization
Bio presentation counterfeiting & serializationRuth Thomson
 
Creating a culture for Open Innovation
Creating a culture for Open InnovationCreating a culture for Open Innovation
Creating a culture for Open InnovationRuth Thomson
 

Mehr von Ruth Thomson (7)

How to develop a novel wearable product?
How to develop a novel wearable product?   How to develop a novel wearable product?
How to develop a novel wearable product?
 
'Does one size fit all?' - presentation on Wearable Technology
'Does one size fit all?'  - presentation on Wearable Technology'Does one size fit all?'  - presentation on Wearable Technology
'Does one size fit all?' - presentation on Wearable Technology
 
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HANWhy Smart Meters need to define interfaces to the Internet and Consumer HAN
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
 
Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...Innovative product development - how to use technology demonstrators for busi...
Innovative product development - how to use technology demonstrators for busi...
 
Genuine Products, Genuine Benefits
Genuine Products, Genuine BenefitsGenuine Products, Genuine Benefits
Genuine Products, Genuine Benefits
 
Bio presentation counterfeiting & serialization
Bio presentation   counterfeiting & serializationBio presentation   counterfeiting & serialization
Bio presentation counterfeiting & serialization
 
Creating a culture for Open Innovation
Creating a culture for Open InnovationCreating a culture for Open Innovation
Creating a culture for Open Innovation
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

KĂŒrzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Anti Counterfeiting - Playing Roulette Or Chess?

  • 1. Anti-counterfeiting Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
  • 2. Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 3. Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
  • 4.
  • 5.
  • 6.
  • 7. Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 8.
  • 9. The logistics and supply chain ‘system’ Legitimate Illicit
  • 10.
  • 11.
  • 12. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 20.
  • 21.
  • 22.