Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Enhancing Election Integrity: The Role of Coordinated Vulnerability Disclosure in Elections
HackerOne

A Government Framework for Proving Cybersecurity ROI


Event Date: July 23, 2025
Hosted By: HackerOne & Carahsoft

Government cybersecurity investments are under greater scrutiny than ever.

Agencies must secure mission-critical systems, meet complex compliance requirements and defend against escalating threats while justifying every dollar spent. Yet, traditional ROI models fall short when it comes to measuring the true value of risk reduction and prevention.

Watch this webinar to learn more about Return on Mitigation (RoM), a novel framework designed to help federal, state and local agencies quantify the financial impact of security programs in terms of avoided loss and measurable return on public investment, not abstract risk scores.

This session featured real-world breach case studies, an actionable RoM methodology and a live demo of HackerOne’s RoM Calculator.

Attendees learned how public sector teams can use RoM to:

  • Prevent disruptions to critical infrastructure and public services
  • Protect sensitive data from breaches and ransomware
  • Align investments with NIST RMF, FISMA and FedRAMP
  • Quantify the impact of proactive security measures
  • Justify offensive security program budgets with metrics that resonate across leadership, procurement and audit

Fill out the form below to view this archived event.


Resources


Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

In this article, learn about the Modernization of Datacenters. Why it is important and why HashiCorp is on the cutting edge of helping businesses achieve this milestone.

ActiveState has evolved its long-standing expertise in open-source security to address the growing challenge of vulnerabilities in cloud-native container deployments. Recognizing the need for a quick solution for vulnerable container images, ActiveState is excited to introduce Secure Containers. The...

The Department of Defense has been a source of remarkable innovations. Despite that reputation, the United States Space Force (USSF) struggled to adapt workflows to their evolving mission while relying on legacy systems. In this Atlassian case study, learn how the USSF used DevSecOps-compliant softw...

Disconnected communications and systems delay projects, stifle accountability and foster frustration. These issues only multiply as agencies grow. In this case study, learn how the National Security Service (NSA) united teams using Atlassian’s powerful technology suite, ensuring consistent, sc...

View this resource to learn more about cloud computing, the cloud and data protection. This resource will break down Core Level Security tactics, and different uses of the Edge.