GovEvents
Join Now, It's Free!
Or Sign in
Go To GovWhitePapers
  • Home
  • Find Events
  • Advertise
  • My Account
  • Blog
  • Add New Event
  • Home
  • Find Events
  • Advertise
  • My Account
  • Blog
  • Add New Event

Tag Archives: Facial analysis

Biometrics: Government Use Cases Identified

Posted on June 12, 2024 by Kerry Rea President of GovEvents

Biometrics, the automated recognition of individuals using unique characteristics, continues to spread into many areas of our everyday lives. We use our faces to unlock our phones, scan our eyes to board a plane, and use fingerprints to access our laptops. As the use of biometrics has become more commonplace, the implications of utilizing physical features, particularly facial features, to grant access to needed services have grown in severity.

Recognition vs Analysis

Facial biometrics fall into two general categories. Facial analysis does not tie a face to a name; rather, it looks for specific characteristics to make a decision on whether or not to grant access. Your iPhone uses facial analysis. A website designed for people 18 and older could use facial analysis to determine if someone is able to access the content. Facial recognition attaches a face to a name. In the case of security, it not only grants access but also connects that access to a specific user. It can also be used to identify a person to confirm or suggest an identity. Facial recognition requires the storage of an original image to compare the biometric scan to, say, a driver's license or passport photo. Continue reading →

Posted in Event News Articles | Tagged anti-fraud capabilities, Biometrics, CA, CAT, CBP, Credential Authentication Technology, data breaches, Del Mar, Department of Homeland Security, Department of Transportation, Facial analysis, facial recognition, Government, Government blog, Government Resources, Government white papers, government-events, GovEvents Blog, Grapevine, Law Enforcement, Login.gov, PUBLIC SECTOR, Reston, San Diego, Transportation Security Administration, TSA, TX, U.S. Customs and Border Protection, VA

CEUs

05/19/2025 - CISSP | Official ISC2 Training Week

05/19/2025 - Perched on the Edge of Chaos

05/20/2025 - Nashville Gemini Secure Workspace Roadshow

05/20/2025 - Alfresco Content & Governance Service...

05/20/2025 - Securing Digital Identities in a Chan...

05/20/2025 - State of the States

05/20/2025 - Hyland Intelligent Automation Forum: Irvine

05/20/2025 - Monarch for State & Local Government:...

05/20/2025 - VETS 2 DPA Training

05/21/2025 - SANS 2025 CTI Survey Webcast & Forum:...

05/21/2025 - SecureWorld Chicago

05/21/2025 - CEIC West: The Official Conference of...

05/21/2025 - Public Sector Low-Code App Engine Inn...

05/21/2025 - AI in the New Administration: Legisla...

05/21/2025 - Information as Influence: How Public...

05/21/2025 - NextGen Government Training Virtual S...

05/21/2025 - Government Legacy IT Modernization: O...

05/21/2025 - Clarifai for Government Webinar Serie...

05/21/2025 - Leveraging Data Automation for Casewo...

05/21/2025 - Learn How to Streamline Cloud Securit...

05/21/2025 - Secure Access, Trusted Intelligence:...

05/21/2025 - Modern Software Delivery for Governme...

05/21/2025 - Smart Labor Costing A Lifeline in Eco...

05/21/2025 - Abandonment and Destruction

05/22/2025 - Kansas City Cybersecurity Conference

05/22/2025 - Denver | Government Contracting FAR ...

05/22/2025 - Strengthen National Security With C3...

05/22/2025 - Cyber Summit 2025

05/22/2025 - Guarding the Guardians: Enabling Safe...

05/22/2025 - FedRAMP Authorized: Take Action with...

05/22/2025 - Google Cloud Public Sector Apigee Roa...

05/22/2025 - Google Workspace & Dito Hartford Roadshow

05/22/2025 - Create Striking Motion Graphics with...

05/27/2025 - Unlocking the Power of Spatial Analyt...

05/28/2025 - Alliant 2 DPA Training

05/28/2025 - Qualys Public Sector Cyber Risk Conference

05/28/2025 - CyberThreats 2025 - Beyond Zero Trust...

05/28/2025 - Cleared for Takeoff: Optimize FAA Ope...

05/28/2025 - Getting Started with Agentic AI: Iden...

05/28/2025 - Timekeeping Software Options for Gove...

05/28/2025 - CTEM In Action: Providing Compliance,...

05/28/2025 - F5 Red Hat Tech on Tap

05/28/2025 - AI Agents Developers Trust: Scaling A...

05/29/2025 - Unlocking the Power of Redis with Goo...

05/29/2025 - Smarter IT for State & Local Governme...

05/29/2025 - Data & Digital Tools Workshop

05/29/2025 - Safeguarding Students, Responders and...

05/29/2025 - Why Privilege Matters: Stopping Cyber...

05/29/2025 - Optimizing Operations with Next-Gener...

05/29/2025 - CyberThreats 2025 - State & Local Req...

05/29/2025 - 2025 Effective Market Research (MRAS)

05/29/2025 - The New Perimeter: Enforcing Security...

05/29/2025 - Avoiding Pitfalls in Costpoint Time a...

05/29/2025 - CTO Session: Instersection of Quantum...

05/29/2025 - DHS Virtual Training

05/30/2025 - SANS Ransomware Summit 2025

06/01/2025 - Joint Annual Scientific Meeting of th...

06/02/2025 - CSSLP | Official ISC2 Training Week

06/02/2025 - Practical Cloud Security: Hands-On Ri...

06/02/2025 - Accelerating Naval Advantage with Clo...

06/03/2025 - Government Customer Experience ...

06/03/2025 - Government Customer Experience ...

06/03/2025 - Endpoint Security in Higher Education...

06/03/2025 - Identity Gaps are the New Insider Threat

06/03/2025 - OASIS+ Delegation of Procurement Auth...

06/03/2025 - Acquiring Personal Property in PPMS

06/03/2025 - GSA GWACs for IT Services-Based Solut...

06/03/2025 - Data is the New Jackpot: Unlocking Gr...

06/03/2025 - Securing IT/OT Convergence: Lessons f...

06/03/2025 - 2025 Government Customer Experience ...

06/03/2025 - Google Cloud Public Sector Arizona In...

06/03/2025 - Quantum Computing in Government A Pan...

06/03/2025 - Government Customer Experience ...

06/03/2025 - AI-Powered Space Defense: How Slingsh...

06/04/2025 - Google Workspace Los Angeles County R...

06/04/2025 - Transforming Clinical Documentation:...

06/04/2025 - Next Generation HSM: Modernize Securi...

06/04/2025 - Overcoming Infrastructure Challenges:...

06/05/2025 - Pittsburgh Cybersecurity Conference

06/05/2025 - Neo4j Good to Great: Graph Database W...

06/05/2025 - F5 API Security Lab Day

06/05/2025 - Hybrid Cloud Evolution: Balancing Inn...

06/05/2025 - Neo4j Good to Great Graph Database Workshop

06/05/2025 - Ensuring Critical Control Systems Sta...

06/05/2025 - HHS Virtual Event

06/05/2025 - Generative AI Workshop

06/05/2025 - Building Secure, Modern Applications...

06/05/2025 - AI-Powered Legal Tech in the Public Sector

06/06/2025 - Health Innovation Summit 2025

06/09/2025 - Certificate of Cloud Security Knowled...

06/09/2025 - 4-Part Adobe Webinar Series: Redefine...

06/10/2025 - Accelerating Air Force Innovation wit...

06/10/2025 - DefenseTech Live: Accelerating Missio...

06/10/2025 - Humans + AI = Prioritizing Higher Val...

06/10/2025 - From Manual to Automated in Just One...

06/10/2025 - The Power of AI Agents for Document P...

06/10/2025 - AI-Powered Automation for Efficient R...

06/11/2025 - Enabling Efficiencies in Higher Educa...

06/11/2025 - Delivering Azure at the Tactical Edge

06/11/2025 - Navy Transformation, Modernization is...

06/11/2025 - Cloud Trust Summit 2025

06/12/2025 - Artificial Intelligence and Machine L...

06/12/2025 - Accelerating Federal Decision-Making...

06/12/2025 - Navigating the New HIPAA Landscape: W...

06/12/2025 - Transforming Federal Financial Report...

06/12/2025 - PSHC Office Hours: CALC+ Pricing Suite

06/12/2025 - Transforming Global Development Work...

06/12/2025 - Accelerating AI Adoption: Bridging Fe...

06/12/2025 - Securing and Optimizing the Unified Network

06/12/2025 - The Path to Modernization & Productiv...

06/12/2025 - Optimizing Data with GenAI: A USAF Wo...

06/12/2025 - Palo Alto Networks Prisma Access Brow...

06/12/2025 - Hyland Public Sector Innovation Forum

06/12/2025 - Stop Advanced Threats: Unify Endpoint...

06/12/2025 - Building a Future-Ready Federal Workf...

06/12/2025 - Beyond VPNs: Identity-First Zero Trus...

06/16/2025 - CISSP | Official ISC2 Training Week

06/16/2025 - ICS Summit Solutions Track 2025

06/16/2025 - CCSP BaseCamp | 2-Day Prep + Self-Pac...

06/17/2025 - AI Without the Chaos: Cut the Waste....

06/17/2025 - Smart Security for Smarter Campuses:...

06/18/2025 - Public Sector Cyber AI Convergence Summit

06/18/2025 - AI Branches Out into New Solutions

06/18/2025 - F5 API Security Lab Day

06/18/2025 - Hands On, Threats Down: Cyber Defense...

06/23/2025 - SSCP | Official ISC2 Training Week

06/23/2025 - ISC2 + Cyber Leadership Institute: Cy...

06/24/2025 - SECURE Washington, DC

06/24/2025 - State of SaaS Security

06/25/2025 - Public Sector Low-Code App Engine Inn...

06/26/2025 - Tampa Cybersecurity Conference

06/26/2025 - Defense One Tech Summit 2025

06/26/2025 - 2025 Effective Market Research (MRAS)

06/26/2025 - Talking Tech: Simplifying STIG Compli...

07/09/2025 - SANS 2025 SOC Survey Webcast & Forum

07/10/2025 - Orange County Cybersecurity Conference

07/10/2025 - Empowering Sheriff's Offices with Dat...

07/14/2025 - Certificate of Cloud Security Knowled...

07/14/2025 - CISSP | Official ISC2 Training Week

07/14/2025 - CGRC | Official ISC2 Training Week

07/16/2025 - Understanding and Navigating the Serv...

07/16/2025 - The Two-Edged Sword of AI in Cybersecurity

07/17/2025 - Zero Trust Training | CCZT

07/21/2025 - FLGISA 2025 Annual Conference

07/21/2025 - CCSP | Official ISC2 Training Week

07/22/2025 - SANS 2025 Government Security Forum

07/23/2025 - AI Acquisition Forum 2025

07/24/2025 - Denver Cybersecurity Conference

07/24/2025 - Public Sector Women in IT Summit

07/27/2025 - AGA's 2025 Professional Development T...

07/31/2025 - 13th Annual 930gov

07/31/2025 - San Diego | Government Contracting FA...

08/02/2025 - Black Hat USA 2025

08/06/2025 - Supply Chain Tracing for Forced Labor...

08/11/2025 - CISSP | Official ISC2 Training Week

08/13/2025 - Public Sector Low-Code App Engine Inn...

08/14/2025 - Omaha Cybersecurity Conference

08/18/2025 - Certificate of Cloud Security Knowled...

08/18/2025 - CISSP | Official ISC2 Training Week

08/20/2025 - 2025 5G Summit - What's Happening Tod...

08/21/2025 - Salt Lake City Cybersecurity Conference

08/21/2025 - Public Sector Application Modernizati...

08/21/2025 - SANS 2025 Cloud Security Exchange

08/22/2025 - SANS 2025 Multicloud Survey Webcast ...

08/25/2025 - CCSP | Official ISC2 Training Week

09/04/2025 - Charlotte Cybersecurity Conference

09/04/2025 - SANS 2025 AI Survey Webcast & Forum:...

09/04/2025 - Enhancing Logistics with Supply Chain...

09/06/2025 - Blue Team Con

09/08/2025 - CCSP | Official ISC2 Training Week

09/10/2025 - San Diego Cybersecurity Conference

09/10/2025 - 20th Annual AFCEA Oklahoma City Cyber...

09/15/2025 - Zero Trust Training | CCZT

09/16/2025 - FedForward: Empowering Government Missions

09/17/2025 - Digital Transformation Summit 2025

09/17/2025 - 2025 SANS Zero Trust Survey Webcast ...

09/17/2025 - The Redstone Edge Conference 2025

09/18/2025 - Boston | Government Contracting FAR ...

09/22/2025 - Certificate of Cloud Security Knowled...

09/22/2025 - CISSP | Official ISC2 Training Week

09/22/2025 - Strengthening Cybersecurity Through I...

09/24/2025 - Internal Control & Fraud Prevention T...

09/24/2025 - Public Sector Law Enforcement Summit

09/25/2025 - Des Moines Cybersecurity Conference

10/03/2025 - SANS CloudSecNext Summit Solutions Tr...

10/05/2025 - Innovate Cybersecurity Summit 2025

10/09/2025 - Columbus Cybersecurity Conference

10/15/2025 - Public Sector Low-Code App Engine Inn...

10/20/2025 - Certificate of Cloud Security Knowled...

10/21/2025 - CyberTalks 2025

10/22/2025 - SANS 2025 Attack Surface & Vulnerabil...

10/23/2025 - Milwaukee Cybersecurity Conference

10/23/2025 - Zero Trust Training | CCZT

10/26/2025 - Imagine Nation ELC 2025

10/27/2025 - CCSP | Official ISC2 Training Week

10/27/2025 - Beyond Cyber - Navigating Global Mark...

11/06/2025 - Atlanta Cybersecurity Conference

11/07/2025 - 2nd Annual AFCEA Silicon Valley Cyber...

11/13/2025 - Phoenix Cybersecurity Conference

11/17/2025 - Certificate of Cloud Security Knowled...

11/19/2025 - DefenseTalks

11/20/2025 - Boston Cybersecurity Conference

11/20/2025 - Public Sector Workforce Experience Summit

11/20/2025 - Zero Trust Training | CCZT

12/01/2025 - Certificate of Cloud Security Knowled...

12/03/2025 - SANS 2025 Detection and Response Surv...

12/04/2025 - Austin Cybersecurity Conference

12/04/2025 - Dallas/Ft. Worth | Government Contrac...

12/08/2025 - CCSP | Official ISC2 Training Week

12/10/2025 - Nashville Cybersecurity Conference

12/10/2025 - Public Sector Low-Code App Engine Inn...

03/04/2026 - Zero Trust World 2026

05/17/2026 - Joint Annual Scientific Meeting of th...

View All

CFPs

AI Agent Event
Due Date: 05/30/2025

28th Annual Systems & Mission Enginee...
Due Date: 06/23/2025

Test Instrumentation in a Spectrum Co...
Due Date: 08/01/2025

SC25
Due Date: 08/05/2025

15th Annual Peak Cyber Symposium for...
Due Date: 08/11/2025

2025 Undersea Warfare Fall Conference
Due Date: 08/28/2025

11th Edition of International Confere...
Due Date: 08/29/2025

2nd World Congress on Animal Science...
Due Date: 10/23/2025

2025 GRF Summit on Security & Third-P...
Due Date: 11/03/2025

View All

Recent Posts

  • 5 Keys to Getting the Most Out of Event Attendance May 15, 2025
  • New AI Guidance, Similar Goals May 9, 2025
  • Introducing FedRAMP 20x April 30, 2025
  • Event Spotlight: Gartner Security & Risk Management Summit April 23, 2025
  • Navigating Government Event Travel and Spending Restrictions April 9, 2025

Categories

  • Contributing Authors
  • Event Editorial Media
  • Event Editorials
  • Event News
  • Event News Articles
  • Event News Media
  • Gov/Mil News
  • Gov/Mil News Articles
  • Gov/Mil News Media

Archives

  • Home
  • About Us
  • Find Events
  • Advertise With Us!
  • Contact Us
  • Terms Of Service
  • Privacy Policy
  • Sitemap
Copyright ©2025 GovEvents, LLC. All rights reserved.
Join GovEvents.
Membership is Free!
Or Join Now

Please enter your email and password:





Keep me signed in