Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

Onsite Event

Event Date: May 19, 2026
Hosted By: Strider Technologies & Carahsoft
CPE credit available
Location: Tampa, FL
Strider Technologies and Carahsoft are excited to invite you to join us for our SOF Week 2026 Executive Briefing Series!   Economic risk is now part of the battlespace—and the war with Iran has made that clear. In just weeks, we’ve seen how targeting energy ...
Carahsoft Tradeshow

Event Date: May 19, 2026
Hosted By: SpyCloud & Carahsoft
CPE credit available
Location: Tampa, FL
SpyCloud and Carahsoft are excited to invite you to join us for our SOF Week 2026 Executive Briefing Series!  
Carahsoft Tradeshow

Event Date: May 20, 2026 - May 21, 2026
Hosted By: IACP
Location: Ft.Worth, TX
Carahsoft and Partners at IACP Tech 2026!   Carahsoft will be in booth #220 participating with 6 demoing partners at IACP Tech 2026, May 20-21, in Ft. Worth, TX.   Thank you to our demoing ...
DeepMedia-microsite.png
Deep Media Virtual Event

Event Date: May 27, 2026
Hosted By: Deep Media & Carahsoft
CPE credit available
Defense and intelligence operators are currently overwhelmed by a flood of multi-media data across social platforms, online marketplaces and ad networks. Traditional tools often fail to capture critical signals hidden in non-textual content or foreign language exchanges. This ...

Archived Events

DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: April 23, 2026
Hosted By: DarkOwl & Carahsoft
View this webinar recording featuring Jennifer Ewbank, DarkOwl Board Director and Former Deputy Director of CIA for Digital Innovation, and DarkOwl’s Chief Business Officer, Alison Halland, for an exclusive interview-style webinar as they explored darknet data's threat-intelligence capabilities across ...
Datenna-Microsite-Logo.png
Datenna Virtual Event

Event Date: April 15, 2026
Hosted By: Datenna & Carahsoft
This focused discussion was tailored for professionals operating at the intersection of China-focused analysis, counterintelligence and technology protection. This session highlighted how analysts and CI teams can better understand the ...
Threat-Digital-Microsite-Logo.png
Threat Digital Virtual Event

Event Date: April 09, 2026
Hosted By: Threat Digital & Carahsoft
DilgenAI delivers automated screening and monitoring solutions across billions of multilingual data sources, using large language models to summarize risk information. By combining LLM-driven precision with human-like research, DilgenAI bridges the gap between manual analysis and fully automated due ...
Forescout-Logo-Color.png
Forescout Virtual Event

Event Date: February 26, 2026 - April 07, 2026
Hosted By: Forescout, DataOculus & Carahsoft
The quantum clock is ticking and adversaries aren't waiting.   Join us for an essential session on quantum risk and post-quantum cryptography (PQC), where we'll cut through the complexity and show you exactly what's at stake and what to do about ...
Seerist-Microsite-200.png
Seerist Virtual Event

Event Date: April 07, 2026
Hosted By: Seerist & Carahsoft
Mega-events such as major sporting events, global summits and large public gatherings introduce complex security challenges that extend far beyond the venue itself. Risk signals often emerge days or weeks before an event, across digital platforms, regional developments, protest mobilization networks and infrastructure ...
Onsite Event

Event Date: April 02, 2026
Hosted By: Carahsoft
State, local and federal law enforcement agencies are facing increasing operational demands, tighter oversight and more complex digital environments. The 2026 Law Enforcement Innovation Summit brings together government and industry for a ...

Resources


Featured

In the search for solutions to modernize legacy systems, federal agencies can consider integrations between Fortinet Federal and Garland Technology. Read highlights from the recent Better Together webinar with leading experts in IT and OT networks, Zero Trust architecture and federal ecosystems.

When Lexmark needed to incorporate machine learning into their new industrial gateways, Edge Impulse was the immediate solution.

Keysight’s vTaps and Vision ONE solutions enhance network visibility for government agencies transitioning to highly virtualized environments. By deploying virtual taps (vTaps) and network packet brokers (NPBs), agencies can overcome blind spots in east-west traffic and ensure secure, efficien...

Discover a step-by-step guide to implementing a smart building strategy to improve efficiency, occupant experience, and environmental impact. Access this eBook to begin your journey to smarter facilities.

This ebook explores how to build a Unified Namespace (UNS) for Industrial IoT using MQTT, enabling real-time data flow across systems. It provides best practices and insights to help organizations improve interoperability, scalability, and operational efficiency.

Technology is transforming workforce safety, security,
and efficiency while delivering massive ROI. Download the latest State of Connected Operations Report to learn more.

Forescout Research – Vedere Labs analyzed millions of devices across IT, OT, IoT, and IoMT environments to identify the most vulnerable connected devices of 2026. 75% of the riskiest device types weren't on the list just two years ago. Download the report to see which 20 device types made ...

Download the 2025 Riskiest Devices Report to gain valuable insights into the most vulnerable devices impacting your network security. This comprehensive report identifies the top risks associated with IoT, OT, and IT devices and provides actionable recommendations to safeguard your infrastructure. S...

The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30% of devices often unmanaged, visibility remains a major hurdle. Security risks—from ou...

Explore how Xona secures OT, ICS, and IT with zero-trust access and protocol isolation. As critical infrastructure becomes more connected, the risk to OT, ICS, and IT systems grows—especially as traditional access methods like VPNs and jump servers fall short. The Xona Platform addresses these...