Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Archived Events

DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: April 23, 2026
Hosted By: DarkOwl & Carahsoft
View this webinar recording featuring Jennifer Ewbank, DarkOwl Board Director and Former Deputy Director of CIA for Digital Innovation, and DarkOwl’s Chief Business Officer, Alison Halland, for an exclusive interview-style webinar as they explored darknet data's threat-intelligence capabilities across ...
DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: March 12, 2025
Hosted By: DarkOwl & Carahsoft
Attendees of this webinar learned about how in today's world, Open Source Intelligence (OSINT) plays a critical role in uncovering threats and mitigating risks by leveraging publicly available information. This webinar dove deep into the practical side ...
WireScreen-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: February 26, 2025
Hosted By: WireScreen, DarkOwl & Carahsoft
To request access to the on-demand recording, please reach out to wirescreen@carahsoft.com.
DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: July 10, 2024
Hosted By: DarkOwl & Carahsoft
In the realm of Open Source Intelligence (OSINT), the ability to gather, analyze, and interpret publicly available information is critical. This ...
DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: February 08, 2024
Hosted By: DarkOwl & Carahsoft
Thank you for your interest in this event. Attendees of this webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign ...

Resources


The CyCognito Platform
Datasheet

The CyCognito Platform

The CyCognito platform helps you identify, prioritize and eliminate the most critical risks across your entire attack surface:

  • Network security risks
  • Confidentiality risks
  • Application security risks
  • Reputation risks

Fill out the form below to view this Resource.