GovEvents
Join Now, It's Free!
Or Sign in
Go To GovWhitePapers
  • Home
  • Find Events
  • Advertise
  • My Account
  • Blog
  • Add New Event
  • Home
  • Find Events
  • Advertise
  • My Account
  • Blog
  • Add New Event

Tag Archives: Login.gov

20 Years of Securing Our World

Posted on October 2, 2024 by Kerry Rea President of GovEvents

October was first named Cybersecurity Awareness Month in 2004 through a joint effort of the National Cybersecurity Alliance and the U.S. Department of Homeland Security. In the following two decades, the campaign has evolved into a valuable way to spotlight the role everyday citizens have in the effort to "Secure Our World."

The campaign's consumer outreach focuses on the top four ways to stay safe online:

  • Use strong passwords and a password manager
  • Turn on multifactor authentication
  • Recognize and report phishing
  • Update software

While these practices are commonplace in government agencies, security teams are constantly evolving how they implement and manage cyber efforts including in the areas of identity management, phishing, and software updates. Continue reading →

Posted in Event News Articles | Tagged Arlington, Austin, CISA's zero trust maturity model, Cybersecurity Awareness Month, DC, Department of Veterans Affairs, FCC, Federal Communications Commission, Government, Government blog, Government Resources, Government white papers, government-events, GovEvents Blog, ID.me, identity management, Login.gov, Multifactor authentication, National Cybersecurity Alliance, phishing, PUBLIC SECTOR, Reston, stay safe online, TX, U.S. Department of Homeland Security, VA, Washington

Biometrics: Government Use Cases Identified

Posted on June 12, 2024 by Kerry Rea President of GovEvents

Biometrics, the automated recognition of individuals using unique characteristics, continues to spread into many areas of our everyday lives. We use our faces to unlock our phones, scan our eyes to board a plane, and use fingerprints to access our laptops. As the use of biometrics has become more commonplace, the implications of utilizing physical features, particularly facial features, to grant access to needed services have grown in severity.

Recognition vs Analysis

Facial biometrics fall into two general categories. Facial analysis does not tie a face to a name; rather, it looks for specific characteristics to make a decision on whether or not to grant access. Your iPhone uses facial analysis. A website designed for people 18 and older could use facial analysis to determine if someone is able to access the content. Facial recognition attaches a face to a name. In the case of security, it not only grants access but also connects that access to a specific user. It can also be used to identify a person to confirm or suggest an identity. Facial recognition requires the storage of an original image to compare the biometric scan to, say, a driver's license or passport photo. Continue reading →

Posted in Event News Articles | Tagged anti-fraud capabilities, Biometrics, CA, CAT, CBP, Credential Authentication Technology, data breaches, Del Mar, Department of Homeland Security, Department of Transportation, Facial analysis, facial recognition, Government, Government blog, Government Resources, Government white papers, government-events, GovEvents Blog, Grapevine, Law Enforcement, Login.gov, PUBLIC SECTOR, Reston, San Diego, Transportation Security Administration, TSA, TX, U.S. Customs and Border Protection, VA

CEUs

06/23/2025 - SSCP | Official ISC2 Training Week

06/23/2025 - ISC2 + Cyber Leadership Institute: Cy...

06/23/2025 - Virtual AI Forum: Leading with Respon...

06/24/2025 - SECURE Washington, DC

06/24/2025 - Ansible Automates: DC

06/24/2025 - State of SaaS Security

06/24/2025 - Spreadsheets to Solutions: Empower No...

06/24/2025 - Enabling Crypto-Agility for Your PQC...

06/24/2025 - Safeguarding AI: Smart, Secure Innova...

06/24/2025 - Government Marketing - Beyond the Playbook

06/24/2025 - WIDS in the Public Sector for Today's...

06/24/2025 - Observability That Works for Everyone...

06/24/2025 - How CA State Agencies Leverage Foresc...

06/24/2025 - Charting the Course: A Buyer's Guide...

06/24/2025 - The Strategy Behind Meeting CMMC Requ...

06/24/2025 - Unlock Generative AI innovation to sp...

06/24/2025 - Proofpoint Core Email Protection API

06/24/2025 - Under Pressure: Navigating Federal Co...

06/25/2025 - Data/Analytic Forum 2025

06/25/2025 - Public Sector Low-Code App Engine Inn...

06/25/2025 - Tableau Calculations Explained: Maste...

06/25/2025 - Accelerating AI from Experimentation...

06/25/2025 - Shaping the Future of Education Toget...

06/25/2025 - Alliant 2 DPA Training

06/25/2025 - PPMS Familiarization

06/25/2025 - Responsible AI in Practice

06/25/2025 - Reducing Your Cyber Exposure With Arm...

06/25/2025 - Deploy Faster, Operate Smarter: OpenS...

06/25/2025 - Gen AI Innovations in Disconnected En...

06/26/2025 - Tampa Cybersecurity Conference

06/26/2025 - Defense One Tech Summit 2025

06/26/2025 - 2025 Effective Market Research (MRAS)

06/26/2025 - Talking Tech: Simplifying STIG Compli...

06/26/2025 - One Screen, All Networks: A Simpler A...

06/26/2025 - Introducing: Horizon Identity, OSINT...

06/26/2025 - Next Generation Forms

06/26/2025 - Time Series Intelligence - Falkonry S...

06/26/2025 - Real Time Crime Centers Made Easy

06/26/2025 - Mission Secure: Enabling OPORD 8600 S...

06/26/2025 - F5 ADC 3.0: Revolutionizing Applicati...

06/26/2025 - Boosting Federal Efficiency: Work Sma...

06/26/2025 - Navigating Return-to-Office Mandates:...

06/26/2025 - When AI Learns to Breach and Quantum...

06/26/2025 - ATO in a Box: Simplify Your Compliance

06/26/2025 - Tactical Intelligence: Accelerating N...

06/26/2025 - Advancing Mission Readiness with AI-P...

06/26/2025 - Securing Defense Systems with Automat...

06/26/2025 - National Security Onsite Training

06/26/2025 - FAST 2025: Information Technology Cat...

06/26/2025 - How to Get Your Unanet Implementation...

06/27/2025 - Mobile Security: The Human Layer is t...

06/27/2025 - Mobile Security Series: Securing the...

07/01/2025 - Streamline Your Compliance Journey an...

07/01/2025 - Data Engineering with Databricks

07/08/2025 - Mission-Centered Design for Real Worl...

07/08/2025 - Data Efficiency in the Age of AI

07/09/2025 - SANS 2025 SOC Survey Webcast & Forum

07/09/2025 - The 3 Tech Tenors: Harmonizing Securi...

07/09/2025 - Service Contract Act Training

07/09/2025 - Smarter Document Signing: Streamline,...

07/09/2025 - How to Get Your Security Aligned with...

07/09/2025 - Harnessing the World's Largest Distri...

07/10/2025 - Orange County Cybersecurity Conference

07/10/2025 - Empowering Sheriff's Offices with Dat...

07/10/2025 - Unlocking Enhanced Law Enforcement In...

07/10/2025 - Leveraging Data & Analytics for Creat...

07/10/2025 - The Modern Endpoint - It's Personal

07/14/2025 - Certificate of Cloud Security Knowled...

07/14/2025 - CISSP | Official ISC2 Training Week

07/14/2025 - CGRC | Official ISC2 Training Week

07/14/2025 - SANSFIRE 2025

07/14/2025 - Federal Mobile Driver's License (mD...

07/15/2025 - Hyland Public Sector Innovation Forum

07/15/2025 - Flash Forward: Smarter Storage at Sca...

07/15/2025 - Predict Human Source Value Before You...

07/15/2025 - From Zero to Hero: Mastering Tableau...

07/15/2025 - Non-Human Identity (NHI) Summit 2025

07/15/2025 - Achieving Decision Dominance in a Mul...

07/15/2025 - The Definitive Red Hat Enterprise Lin...

07/15/2025 - Getting to Continuous Authorization t...

07/16/2025 - Understanding and Navigating the Serv...

07/16/2025 - The Two-Edged Sword of AI in Cybersecurity

07/17/2025 - Zero Trust Training | CCZT

07/17/2025 - Securing the Blind Spots of On-Prem S...

07/17/2025 - Defending the DON: Validating Cyber R...

07/21/2025 - FLGISA 2025 Annual Conference

07/21/2025 - CCSP | Official ISC2 Training Week

07/22/2025 - SANS 2025 Government Security Forum

07/22/2025 - Accelerate Government IT Modernizatio...

07/22/2025 - Cloud Public Safety & Emergency Manag...

07/22/2025 - Google Defense Roadshow: AI Mission A...

07/22/2025 - Identifying Hidden Cracks: Strengthen...

07/22/2025 - Mobile Device Investigator Training

07/22/2025 - Stopping Credential-Based Attacks and...

07/22/2025 - Securing Government Systems at Scale:...

07/22/2025 - AI-Powered Log Management

07/22/2025 - Revolutionizing Government with Googl...

07/23/2025 - AI Acquisition Forum 2025

07/23/2025 - Navigating Supply Chain Risks: Strate...

07/23/2025 - Cloud Public Safety & Emergency Manag...

07/23/2025 - Exploring AI's Impact on Your Gover...

07/23/2025 - F5 ADC 3.0: Revolutionizing Applicati...

07/24/2025 - Denver Cybersecurity Conference

07/24/2025 - Public Sector Women in IT Summit

07/24/2025 - Cloud Public Safety & Emergency Manag...

07/24/2025 - Secure Access to Generative AI Tools...

07/24/2025 - 7th Annual ATO & Cloud Security Summit

07/24/2025 - Unlocking New Possibilities with HPE,...

07/24/2025 - Tableau Data Modeling Explained: Rela...

07/24/2025 - Discover How to Operationalize Data w...

07/27/2025 - AGA's 2025 Professional Development T...

07/29/2025 - Workforce Technology Workshop

07/29/2025 - AI Without the Chaos: Cut the Waste....

07/29/2025 - 3rd Annual DevSecOps Conference

07/29/2025 - Mobile Threat Intelligence: Rethinkin...

07/30/2025 - INTERFACE Montana 2025

07/30/2025 - F5 Red Hat Tech on Tap

07/31/2025 - 13th Annual 930gov

07/31/2025 - San Diego | Government Contracting FA...

07/31/2025 - Fixed Wireless Access: The Path to 5G...

08/02/2025 - Black Hat USA 2025

08/06/2025 - Supply Chain Tracing for Forced Labor...

08/06/2025 - Closing the Federal Early-Talent Cybe...

08/07/2025 - Navy Transformation, Modernization is...

08/07/2025 - Integrated Identity Intelligence for...

08/11/2025 - CISSP | Official ISC2 Training Week

08/13/2025 - Public Sector Low-Code App Engine Inn...

08/14/2025 - Omaha Cybersecurity Conference

08/14/2025 - INTERFACE Kansas City 2025

08/18/2025 - Certificate of Cloud Security Knowled...

08/18/2025 - CISSP | Official ISC2 Training Week

08/18/2025 - SSCP | Official ISC2 Training Week

08/20/2025 - 2025 5G Summit - What's Happening Tod...

08/21/2025 - Salt Lake City Cybersecurity Conference

08/21/2025 - Public Sector Application Modernizati...

08/21/2025 - SANS 2025 Cloud Security Exchange

08/22/2025 - SANS 2025 Multicloud Survey Webcast ...

08/25/2025 - CCSP | Official ISC2 Training Week

08/25/2025 - CSSLP | Official ISC2 Training Week

08/28/2025 - INTERFACE Boise 2025

09/04/2025 - Charlotte Cybersecurity Conference

09/04/2025 - SANS 2025 AI Survey Webcast & Forum:...

09/04/2025 - Enhancing Logistics with Supply Chain...

09/06/2025 - Blue Team Con

09/08/2025 - CCSP | Official ISC2 Training Week

09/08/2025 - Workiva Amplify 2025

09/10/2025 - San Diego Cybersecurity Conference

09/10/2025 - 20th Annual AFCEA Oklahoma City Cyber...

09/15/2025 - Certificate of Cloud Security Knowled...

09/15/2025 - SANS Raleigh 2025

09/15/2025 - CSSLP | Official ISC2 Training Week

09/16/2025 - FedForward: Empowering Government Missions

09/17/2025 - Digital Transformation Summit 2025

09/17/2025 - 2025 SANS Zero Trust Survey Webcast ...

09/17/2025 - The Redstone Edge Conference 2025

09/18/2025 - Boston | Government Contracting FAR ...

09/18/2025 - INTERFACE Salt Lake City 2025

09/22/2025 - CISSP | Official ISC2 Training Week

09/22/2025 - Strengthening Cybersecurity Through I...

09/22/2025 - Protect 2025

09/24/2025 - Internal Control & Fraud Prevention T...

09/24/2025 - Public Sector Law Enforcement Summit

09/25/2025 - Des Moines Cybersecurity Conference

09/25/2025 - Zero Trust Training | CCZT

09/30/2025 - Health IT + Digital Health + RCM Conference

10/03/2025 - SANS CloudSecNext Summit Solutions Tr...

10/05/2025 - Innovate Cybersecurity Summit 2025

10/09/2025 - Columbus Cybersecurity Conference

10/13/2025 - CISSP | Official ISC2 Training Week

10/15/2025 - Public Sector Low-Code App Engine Inn...

10/16/2025 - INTERFACE Spokane 2025

10/20/2025 - Certificate of Cloud Security Knowled...

10/21/2025 - CyberTalks 2025

10/22/2025 - SANS 2025 Attack Surface & Vulnerabil...

10/23/2025 - Milwaukee Cybersecurity Conference

10/23/2025 - Zero Trust Training | CCZT

10/23/2025 - Public Sector Zero Trust Summit, Fall 2025

10/26/2025 - Imagine Nation ELC 2025

10/27/2025 - CCSP | Official ISC2 Training Week

10/27/2025 - Beyond Cyber - Navigating Global Mark...

11/04/2025 - 14th Annual Tech, Cyber, & Tactical E...

11/05/2025 - 24th Annual Tech & Cyber Expo at Nell...

11/06/2025 - Atlanta Cybersecurity Conference

11/06/2025 - 2025 Technology & Transformation Summit

11/06/2025 - INTERFACE Omaha 2025

11/07/2025 - 2nd Annual AFCEA Silicon Valley Cyber...

11/10/2025 - CSSLP | Official ISC2 Training Week

11/10/2025 - CISSP | Official ISC2 Training Week

11/13/2025 - Phoenix Cybersecurity Conference

11/17/2025 - Certificate of Cloud Security Knowled...

11/19/2025 - DefenseTalks

11/20/2025 - Boston Cybersecurity Conference

11/20/2025 - Public Sector Workforce Experience Summit

11/20/2025 - Zero Trust Training | CCZT

11/20/2025 - Public Sector Workforce Modernization...

12/01/2025 - Certificate of Cloud Security Knowled...

12/03/2025 - SANS 2025 Detection and Response Surv...

12/04/2025 - Austin Cybersecurity Conference

12/04/2025 - Dallas/Ft. Worth | Government Contrac...

12/08/2025 - CCSP | Official ISC2 Training Week

12/08/2025 - CGRC | Official ISC2 Training Week

12/10/2025 - Nashville Cybersecurity Conference

12/10/2025 - Public Sector Low-Code App Engine Inn...

12/11/2025 - INTERFACE Seattle 2025

12/11/2025 - Public Sector CIO Summit

12/15/2025 - CISSP | Official ISC2 Training Week

12/15/2025 - SSCP | Official ISC2 Training Week

03/04/2026 - Zero Trust World 2026

05/17/2026 - Joint Annual Scientific Meeting of th...

View All

CFPs

28th Annual Systems & Mission Enginee...
Due Date: 06/23/2025

5th Tech Summit on Big Data, Data Sci...
Due Date: 06/23/2025

2025 NGB A2/6 Operational Alignment C...
Due Date: 06/23/2025

Conference on Applied Machine Learnin...
Due Date: 06/27/2025

FS-ISAC Americas Fall Summit 2025
Due Date: 07/29/2025

CyberBay 2025
Due Date: 07/30/2025

Test Instrumentation in a Spectrum Co...
Due Date: 08/01/2025

SC25
Due Date: 08/05/2025

15th Annual Peak Cyber Symposium for...
Due Date: 08/11/2025

2025 Undersea Warfare Fall Conference
Due Date: 08/25/2025

11th Edition of International Confere...
Due Date: 08/29/2025

29th Colloquium: Cybersecurity Educat...
Due Date: 08/31/2025

Carbon Capture, Utilization and Stora...
Due Date: 08/31/2025

Triangle InfoSeCon
Due Date: 09/19/2025

2025 GRF Summit on Security & Third-P...
Due Date: 11/03/2025

AI + Cybersecurity Briefings & Trainings
Due Date: 11/28/2025

9th European Public Health Conference
Due Date: 12/18/2025

14th European Oncology Conference 2026
Due Date: 02/28/2026

View All

Recent Posts

  • It’s Really Time for REAL ID June 18, 2025
  • Evolving Disaster Response in Our Communities June 4, 2025
  • Funding Security at the Local Level May 28, 2025
  • Next Generation Procurement Reform May 21, 2025
  • 5 Keys to Getting the Most Out of Event Attendance May 15, 2025

Categories

  • Contributing Authors
  • Event Editorial Media
  • Event Editorials
  • Event News
  • Event News Articles
  • Event News Media
  • Gov/Mil News
  • Gov/Mil News Articles
  • Gov/Mil News Media

Archives

  • Home
  • About Us
  • Find Events
  • Advertise With Us!
  • Contact Us
  • Terms Of Service
  • Privacy Policy
  • Sitemap
Copyright ©2025 GovEvents, LLC. All rights reserved.
Join GovEvents.
Membership is Free!
Or Join Now

Please enter your email and password:





Keep me signed in