Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Nozomi-Networks-Microsite-Logo.png
Nozomi Networks Virtual Event

Event Date: January 22, 2026
Hosted By: Nozomi Networks & Carahsoft
CPE credit available
Airports are some of the most complex and interconnected environments in the world — blending IT, OT, and IoT systems across everything from baggage handling and lighting, to fueling and passenger operations. As these systems become more connected, the risk of cyber disruption grows. A single OT outage can ground ...

Archived Events

logo-light_Atlassian_logo_brand_RGB_-2x.png
Multi-Vendor Training

Event Date: November 14, 2025
Hosted By: Atlassian, Clovity & Carahsoft
Agencies face ongoing challenges in streamlining HR onboarding while meeting compliance requirements. In this session, Atlassian and Clovity demonstrate how public sector teams can use Jira Service Management to automate key HR workflows, connect ...
Samsara-Microsite-Logo.png
Samsara Virtual Event

Event Date: November 12, 2025
Hosted By: Asset Mapping Events
Local governments face significant challenges in ensuring compliance for Parks and Recreation facilities due to limited resources, coordination issues, and data management complexities. The lack of accurate and timely compliance reporting can lead to legal repercussions, jeopardize public safety, and diminish community ...
GarlandTechnology-microsite.png
Multi-Vendor Virtual Event

Event Date: November 06, 2025
Hosted By: Garland & Forescout & Carahsoft
Security teams have faced mounting pressure to reduce risk, maintain compliance and manage an ever-expanding number of connected IoMT devices.
Nozomi-Networks-Microsite-Logo.png
Nozomi Networks Virtual Event

Event Date: November 06, 2025
Hosted By: Nozomi Networks & Carahsoft
Tribal governments oversee a diverse mix of critical systems — from water treatment plants and healthcare facilities to casinos and education networks. This unique combination makes them an ideal target for cybercriminals because they face tight budgets, limited cybersecurity resources, and high visibility within their ...
InsaneCyber-microsite.png
Insane Cyber Virtual Event

Event Date: October 21, 2025
Hosted By: Insane Cyber & Carahsoft
When it comes to securing industrial environments, host and network data are two halves of the same story. Network data shows you what’s moving, where it’s going, and how it flows, but ...
Armis-microsite.png
Armis Onsite Event

Event Date: October 14, 2025 - October 15, 2025
Hosted By: Armis & Carahsoft
Location: Columbia, MD
Attendees joined Armis for an introduction to Armis On-Prem and its usage within DoD and IC type CPS/CS networks. This 1 and 1/2 day course included useful information, whiteboard discussions, and hands-on (remote) lab access to enhance familiarity with the Armis On-Prem systems and help ...
OpenText-resized-logo.png
OpenText Government Solutions Virtual Event

Event Date: October 14, 2025 - October 15, 2025
Hosted By: OpenText & Carahsoft
Curious how AI and IoT are transforming real-world operations across sectors? From critical infrastructure to complex supply chains, attendees discovered how public and private organizations are applying connected intelligence to unify data, anticipate disruptions, and modernize ...
Asimily-microsite.png
Asimily Virtual Event

Event Date: October 14, 2025
Hosted By: Asimily & Carahsoft
In this critical discussion, we covered the five pillars of a comprehensive IoT/OT strategy, including: Inventory, Visibility, and Vulnerability Prioritizing Risk on Every Connected Device Threat and Response Device Configuration and Ongoing ...
DeviceAuthority-Microsite-Logo.png
Device Authority Virtual Event

Event Date: September 17, 2025
Hosted By: Device Authority & Carahsoft
Connected devices are now critical to nearly every industry—but they are also one of the fastest-growing attack vectors. Many ship with default credentials, weak provisioning, and no way to verify identity or integrity. Device Authority solves ...

Resources


Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

In this article, learn about the Modernization of Datacenters. Why it is important and why HashiCorp is on the cutting edge of helping businesses achieve this milestone.

ActiveState has evolved its long-standing expertise in open-source security to address the growing challenge of vulnerabilities in cloud-native container deployments. Recognizing the need for a quick solution for vulnerable container images, ActiveState is excited to introduce Secure Containers. The...

The Department of Defense has been a source of remarkable innovations. Despite that reputation, the United States Space Force (USSF) struggled to adapt workflows to their evolving mission while relying on legacy systems. In this Atlassian case study, learn how the USSF used DevSecOps-compliant softw...

Disconnected communications and systems delay projects, stifle accountability and foster frustration. These issues only multiply as agencies grow. In this case study, learn how the National Security Service (NSA) united teams using Atlassian’s powerful technology suite, ensuring consistent, sc...

View this resource to learn more about cloud computing, the cloud and data protection. This resource will break down Core Level Security tactics, and different uses of the Edge.