Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

invicti-black-logo-slogan_microsite.png
Invicti Virtual Event

Event Date: August 14, 2025
Hosted By: Invicti & Carahsoft
In this session, attendees learned: Key challenges federal agencies face in testing their full attack ...
invicti-black-logo-slogan_microsite.png
Invicti Virtual Event

Event Date: June 05, 2025
Hosted By: Invicti & Carahsoft
Attendees in this session learned:  Common challenges that federal agencies face in discovering and testing their entire attack surface How technology-agnostic automated scanning with a DAST-first approach can maximize the scope of security testing, including APIs Best ...
invicti-black-logo-slogan_microsite.png
Invicti Virtual Event

Event Date: March 20, 2025
Hosted By: Invicti & Carahsoft
Attendees of this webinar learned: Key drivers behind software supply chain security risks How to identify, manage, and mitigate web vulnerabilities in both your applications and third-party software How integrating DAST into your application security strategy can help build ...
invicti-black-logo-slogan_microsite.png
Invicti Virtual Event

Event Date: November 09, 2023
Hosted By: Invicti, Guidepoint & Carahsoft
View the webinar with Carahsoft, GuidePoint and Invicti on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST).   Mark Townsend, Invicti’s VP of Professional Services ...

Resources


How EDB Can Help Organizations Along Their Zero Trust Journey
Whitepaper

How EDB Can Help Organizations Along Their Zero Trust Journey

Database security is critical for protecting the digital assets of any organization. In an age where data is currency, databases are a prime target for cybercriminals using techniques like SQL injection and brute-force attacks to gain unauthorized access to sensitive information. As such, securing critical data—from customer information to intellectual property—requires implementing robust security measures to prevent unauthorized access, modification, or destruction. Download this whitepaper to learn more and discover how to protect your organization's most vital data with EDB.


Fill out the form below to view this Resource.