Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

CrowdStrike-microsite.png
CrowdStrike Webcast

Event Date: June 05, 2024
Hosted By: CrowdStrike & Carahsoft
...

CrowdStrike-microsite.png
Multi-Vendor Webcast

Event Date: June 11, 2024
Hosted By: CrowdStrike, Mimecast & Carahsoft
You’re invited to a CrowdStrike | Mimecast Higher Education webinar on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike will discuss how you can help secure your customer’s environments from ...

Archived Events

proofpoint_logo.png
Multi-Vendor Event

Event Date: May 13, 2024
Hosted By: Proofpoint, CrowdStrike & Carahsoft
Location: Reston, VA
...

AWS-Color-Smile-Logo-Cropped_80.png
Multi-Vendor Event

Event Date: May 09, 2024
Hosted By: AWS & Carahsoft
Location: Atlanta, GA
AWS subject matter experts discussed AWS solutions and how they can help you unleash the powers of digital transformation without disruption by harnessing the proper tools to help your agency thrive. Topics included organizational intelligence, generative AI, modernization, security, and more.

Zscaler_BrandAssets_LogoLockup_80px.png
Multi-Vendor Event

Event Date: April 25, 2024
Hosted By: Okta, Zscaler, CrowdStrike, Splunk & Carahsoft
Location: Richmond, VA
Thank you for your interest in our 1st Virginia Public Sector Cybersecurity Networking Happy Hour on Thursday, April 25th. Attendees joined us for an afternoon of networking hosted by Okta, Zscaler, Crowdstrike, and Splunk. ...

oktamicrosite.png
Multi-Vendor Event

Event Date: April 17, 2024
Location: Indianapolis, IN
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. ...

Mimecast-microsite.png
Multi-Vendor Webcast

Event Date: April 11, 2024
Hosted By: Mimecast, CrowdStrike & Carahsoft
...

ExtraHop2024-Logo_color_medium.png
Multi-Vendor Event

Event Date: April 10, 2024
Hosted By: Cyberuptive, ExtraHop, Gigamon, Crowdstrike & Carahsoft
Location: Honolulu, HI
Cyberuptive, ExtraHop, Gigamon and CrowdStrike welcomed attendees to learn our Joint Solution - Better Together - Our Mission to Stop Breaches with Improved Visibility and MTTR XDR/EDR/NDR/SIEM! ...

logo_splunk_1color_K.png
Multi-Vendor Networking Reception

Event Date: April 08, 2024 - April 09, 2024
Hosted By: Splunk, Blackwood & Carahsoft
Location: Seattle, WA
...

CrowdStrike-microsite.png
Multi-Vendor Event

Event Date: March 26, 2024
Hosted By: Abnormal Security, CrowdStrike & Carahsoft
Location: Brownsville, TX
Modern attacks are stealthy, persistent, fast and sophisticated, with the average breakout time being less than 84 minutes. With an increase in access broker activity on the dark web increasing 112% – the identity landscape has become complex for a variety of reasons. Multiple standalone tools are not effective in ...

Resources

CrowdStrike_Protect_Your_Hybrid.PNG
Whitepaper

Protect Your Hybrid Workforce From Ransomware With CrowdStrike and Zscaler

Shifting resources to the cloud in support of modern hybrid work adds agility and scalability. But for cybersecurity teams, an “anywhere, anytime, any device” workforce means a dramatically expanded attack surface. Threat actors, eager to take advantage, have redoubled their efforts to break through these expanding, hard-to-defend perimeters. Whether the attacks come from nation-states or dedicated criminal gangs, the highest-profile goal of this unauthorized access is ransomware: holding your assets hostage for an easy payoff.

In the past, simple ransomware attacks that locked down a user’s computer or files could often be reversed by a trained professional. Today’s ransomware attacks are much more complex and premeditated, and victims often have little choice but to pay the ransom. In a typical modern attack, hackers breach your security and exfiltrate sensitive data, then encrypt it and offer to provide a decryption key in exchange for a payment (usually in untraceable cryptocurrency).

Even if you had the foresight to back up your data, you’re not off the hook. Threat actors can leak that private data — which can include partner data, customer credit cards and personally identifiable information — unless you pay up. This is known as “double extortion,” and it’s just one example of the ever-evolving complexity of ransomware attacks. With hybrid work here to stay, organizations are struggling with how to provide the seamless access that remote and on-premises workforces need while safeguarding enterprise data from cyberthreats.


Fill out the form below to view this Resource.