Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: May 21, 2024
Hosted By: BeyondTrust & Carahsoft
...

Archived Events

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: April 23, 2024
Hosted By: BeyondTrust & Carahsoft
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: March 26, 2024
Hosted By: BeyondTrust & Carahsoft
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases.  ...

Webcast

Event Date: March 05, 2024
Hosted By: BeyondTrust, SailPoint & Carahsoft
BeyondTrust, SailPoint, and Carahsoft are excited to invite you to join us after WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies.  ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: February 27, 2024
Hosted By: BeyondTrust & Carahsoft
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the ...

BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: December 19, 2023
Hosted By: BeyondTrust, ServiceNow & Carahsoft
Thousands of organizations worldwide rely on ServiceNow solutions for service management across IT, human resources, facilities, field service, and other disciplines. Implementing BeyondTrust and ServiceNow solutions together provide a more automated, efficient, and secure ITSM solution. During this session and live demo, you ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: November 14, 2023
Hosted By: BeyondTrust & Carahsoft
With the increase in sophisticated cyberattacks, it is imperative to revamp cybersecurity processes and re-focus security beyond the perimeter. In their Special Publication, 800-207 Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter. ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: October 31, 2023
Hosted By: BeyondTrust & Carahsoft
In the eerie world of cybersecurity, it can often feel like you're the protagonist in a spine-tingling horror movie. But fear not, our spooky solutions sorcerer will give a technical product clinic and live demo that promises to unveil the secrets of strategically extending privileged access security. ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: September 26, 2023
Hosted By: BeyondTrust & Carahsoft
80 to 100% of Microsoft's critical vulnerabilities in 2022 could be mitigated by removing admin rights, yet many organizations are hesitant to do so because of concerns about hindering end user productivity. Watch this on-demand recording to learn how state and local agencies can remove admin rights reduce cyber risk, ...

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: August 29, 2023
Hosted By: BeyondTrust & Carahsoft
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security.  ...

Resources

Buyers_Guide.jpg
Guide

Buyer’s Guide for Complete Privileged Access Management (PAM)

BeyondTrust is the only vendor that delivers what industry experts consider to be the complete spectrum of privileged access management capabilities. This adds tremendous value to your security stack – from centralizing management and policy to integrating reporting and threat analytics with your trusted security/service desk tools.

If you’re interested in learning more, check out our full PAM Buyer’s Guide and set up time to review our interactive PAM Buyer’s checklist with our team.


Fill out the form below to view this Resource.