For technology leaders responsible for identity, risk and trust, understanding the types of attacks biometric systems face (and how to defend against them) is imperative.