Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Thales_LOGO_.png
Multi-Vendor

Zero Trust Best Practices for Federal Agencies


Event Date: July 31, 2025
Hosted By: Thales TCT, Menlo Security & Carahsoft

In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a more resilient, "never trust, always verify" approach. 

This exclusive webinar provided an in-depth exploration of how Menlo Security, Votiro and Thales Trusted Cyber Technologies (TCT) align with CISA's Zero Trust Maturity Model. You'll gain valuable insights into how each of these solutions can enhance your agency's security posture and help you stay compliant with federal mandates. 

The speakers discussed best practices including:

  • Aligning with CISA's Zero Trust Maturity Model 
  • Building a FedRAMP- Compliant Security Ecosystem 
  • The Role of Automation and Orchestration in Zero Trust 
  • Closing the Gaps in Device and Network Security 
  • Visibility & Analytics

Fill out the form below to view this archived event.


Resources


Blog

Google Workspace has received Provisional Authorization (PA) from the Defense Information Systems Agency (DISA) for the U.S Department of Defense’s (DoD) at Impact Level 4 (IL4), allowing government agencies to fully utilize the capabilities of Google Workspace to meet mission needs.

Google Workspace includes custom email and all of the productivity apps government agencies already use—Gmail, Calendar, Drive, Docs, Sheets, Slides, Meet, Forms, Sites, Chat, and more—all in one place. Whether government employees are returning to the office, working from home, on the frontlines wi...

Peter Guo, the CIO for the U.S. Navy Ship Repair Facility (SRF) in Japan, has harnessed the power of Google Workspace to drive cultural transformation and innovation within his diverse team supporting global fleet operations. Guo emphasizes that people are the most valuable asset and that technology...

To determine the best path for opioid treatment for communities across the state, Oklahoma turned to the Opioid Response Solution, building on its reservoir of data.

This blog from Google Cloud Threat Intelligence highlights how phishing campaigns are evolving to specifically target industrial and operational technology (OT) environments. Using realistic lures like shipment updates and engineering documents, attackers aim to bypass traditional defenses and deliv...

This blog from Google Cloud Threat Intelligence explores real-world ransomware trends and shares practical containment strategies to reduce impact during an attack. It emphasizes the importance of early detection, segmentation, and backup readiness, drawing from active threat research and frontline ...

The blog highlights how educational institutions are leveraging Google's AI tools, such as Gemini and NotebookLM, to enhance learning and administrative efficiency. From real-time study assistance at San Diego State University to grant writing support in Albuquerque Public Schools, these tools a...

Discover how Google for Education transformed learning in 2024! Explore inspiring stories, innovative tools, and AI-powered solutions that empowered educators and students worldwide. See the impact firsthand in this Year in Review blog post.

Guide

This resource is a quick-start handbook for effective prompts to increase efficiency and productivity in the public sector.

This Google Cloud guide outlines a practical, four-stage approach to defending against ransomware attacks: Identify, Protect, Detect, and Respond & Recover. It includes best practices and architectural recommendations tailored to cloud environments, helping organizations strengthen their overall...