Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Tanium-Public_Sector-Full_color.png
Tanium Event

Event Date: May 01, 2024
Hosted By: Tanium & Carahsoft
Location: Glen Allen, VA
...

Archived Events

Tanium-Public_Sector-Full_color.png
Tanium Event

Event Date: April 18, 2024
Hosted By: Tanium
...

Tanium-Public_Sector-Full_color.png
Multi-Vendor Webcast

Event Date: January 31, 2024
Hosted By: Tanium, ServiceNow & Carahsoft
Public sector institutions, managing vast amounts of sensitive data with limited resources, face a heightened risk of cyberattacks. Attendees joined our session on January 31 to explore how ServiceNow and Tanium empower these organizations through efficient IT Asset Management and Vulnerability Management, ensuring accurate ...

Tanium-Public_Sector-Full_color.png
Tanium Webcast

Event Date: October 03, 2023
Hosted By: Tanium, FedInsider & Carahsoft
The Continuous Diagnostics and Mitigation (CDM) program, introduced by the Cybersecurity and Infrastructure Security Agency (CISA) in 2012, has become a vital tool in enhancing federal government cybersecurity. Over the past decade, it has evolved to offer new capabilities, including cybersecurity tools and integration ...

Tanium-Public_Sector-Full_color.png
Multi-Vendor Webcast

Event Date: September 19, 2023
Hosted By: Tanium, ServiceNow & Carahsoft
Sorry we missed you! At this webinar we hosted a fireside chat between leaders at Tanium and ServiceNow and touched on topics including:  ...

Tanium-Public_Sector-Full_color.png
Multi-Vendor Webcast

Event Date: March 07, 2023
Hosted By: Tanium, Microsoft & Carahsoft
Recently, the Department of Defense released the DoD zero trust Strategy and Roadmap which highlighted the importance and the immediate need for Zero Trust implementation across the department. ...

Resources

Screenshot-2022-05-23-120719.jpg
Video

Managing Risk at the Edge: How a Zero Trust Approach Helps Mitigate Risk at the Evolving Perimeter

The enterprise has rapidly adapted to the new, mobile workforce and the walls of legacy security have come down. The endpoint is the new perimeter and data one of our most strategic assets. A Zero Trust approach to security moves beyond the traditional access boundary and relies on just-in-time decisions at the edge. Real-time visibility and control is required for informed access management in a Zero Trust world.


Fill out the form below to view this Resource.