Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Logo-redhat-color-375.png
Red Hat Event

Event Date: June 17, 2024 - June 18, 2024
Hosted By: Red Hat & Carahsoft
Join Red Hat at the MOSA Industry & Government Summit & Expo from June 17-18 at the Gaylord Convention Center in National Harbor, Maryland. Engage first-hand with top government offices on initiatives as well as leading Industry executives and authorities implementing MOSA. Learn how DoD is actively pursuing MOSA in ...

cloud_wordmark_color_80px.png
Google Webcast

Event Date: June 11, 2024 - June 21, 2024
Hosted By: Google Cloud & Carahsoft
As summer approaches, attendees beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Attendees heard from Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.

anchore_logo.png
Anchore Training

Event Date: June 17, 2024
Hosted By: Anchore & Carahsoft
Location: Reston, VA
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. ...

NEW_Veeam_Logo_Oct_2023-png.png
Veeam Networking Reception

Event Date: June 17, 2024 - July 17, 2024
Hosted By: Veeam, Exagrid, CDW-G & Carahsoft
Location: Temecula, CA
Join Veeam, Exagrid and CDW-G for the Ransomware Preparedness Strategies Social Event. This event will bring together industry leaders and experts from Veeam, ExaGrid, and CDWG to discuss innovative strategies for defending against ransomware and ...

SailPoint-Logo-RGB-Color_transparent_resize.png
SailPoint Technologies Webcast

Event Date: June 18, 2024
Hosted By: SailPoint & Carahsoft
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, ...

Adobe_Corporate_Horizontal_Lockup_Red_HEX_1.png
Adobe Webcast

Event Date: June 18, 2024
Hosted By: Adobe & Carahsoft
Adobe and Carahsoft are excited to invite you to join us in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies.  ...

Archived Events

Webcast

Event Date: June 04, 2024
Hosted By: NTIA, NVIDIA, VAST Data, Lambda, FedInsider & Carahsoft
On June 4th, Carahsoft hosted the first session of our AI for Government Summit Webinar Series: AI Infrastructure – Modernizing the Data Center. Moving from a data center to the cloud is not about replicating the data center in the cloud, and incorporating artificial intelligence introduces new considerations. ...

Constella-Microsite-Logo.png
Constella Intelligence Webcast

Event Date: June 18, 2024
Hosted By: Constella & Carahsoft
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web.  ...

BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: June 18, 2024
Hosted By: BeyondTrust, Ping Identity & Carahsoft
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication ...

Webcast

Event Date: June 18, 2024
Hosted By: Cohesity, Department of Energy, Google, HPE Aruba, USCIS, FedInsider & Carahsoft
...

Resources

Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Lineaje Third Party Management (TPRM) provides a solution that reduces the risks in the technology purchased. TPRM analyzes security risks in each device by automatically detecting the security policy violations. Some noticeable capabilities are secure SBOM exchange, Automated Risk Analysis, Auto-up...

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

Lineaje Open-Source Manager helps to keep software components into one organization platform. AppSec teams, software developers and CPOs, CIOs, and CISOs looking to simple and secure ways to organize the software could benefit from OSM,

SBOM360 shows you "what's in your software" by recognizing its software supply chain while looking for risks. Lineaje AI produces solutions and plans if the vulnerabilities of the software are exposed. Reducing risks and cost by 40%.

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

This resource is our new e-book guide to creating and maintaining AI data pipelines. It provides a thorough overview of AI data preparation, pipeline architecture, and maintenance.

Written by Resiliant's Chief Growth Officer, Victoria Cerrone, the following article discusses Biden's Executive Orders on Digital Activity, highlighting the need to manage AI risks and safeguard personal data. The lack of legislation addressing data privacy and security standards is a pressing conc...