Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

cloud_wordmark_color_80px.png
Multi-Vendor Webcast

Event Date: May 18, 2023
Hosted By: Google Cloud & Carahsoft
In this webinar, attendees heard about: Latest Incident Response Metrics Evolving Threat Groups Cyber Operations During Wartime New Red Team Findings Growing Network Vulnerabilities Actionable Security Best Practices

Mandiant-microsite.png
Mandiant Webcast

Event Date: October 27, 2022
Hosted By: Mandiant & Carahsoft
“Worldwide, 80% of organizations suffered one or more breaches that they could attribute to a lack of cybersecurity skills and/or awareness.”(2022 Cybersecurity Skills Gap Global Research Report – Fortinet)On Thursday, October 20th, Carahsoft and the Mandiant Team shared ways you can help your ...

Mandiant-microsite.png
Mandiant Webcast

Event Date: April 27, 2022
Hosted By: Mandiant & Carahsoft
From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. We learned to understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense ...

Mandiant-microsite.png
Mandiant Webcast

Event Date: March 29, 2022
Hosted By: Mandiant & Carahsoft
Experts shared the steps to implement Zero Trust Architecture to comply with the cyber security Executive Order. The cyber security Executive Order, driven by the escalation of zero-day attacks from Solar Winds to Colonial Pipeline to Microsoft, aims to modernize U.S. government security ...

Mandiant-microsite.png
Mandiant Carahsoft SE Webinar

Event Date: February 23, 2022
Hosted By: Mandiant & Carahsoft
This was a complementary Demo Desk to learn more on how we can provide the right solution for your Zero Trust Network Architecture.Organizations face an expanding attack surface with all the people and devices that connect to or exist on their networks. With the rise of trends such as the ...

Resources

gitlab-log4j.jpg
Blog

How to use GitLab security features to detect log4j vulnerabilities

In light of the recently discovered log4j vulnerabilities, this blog demonstrates how GitLab can be used to assess and remediate the log4j vulnerability as well as other security vulnerabilities that may exist in your projects.

The solutions shared here are:

  • Dependency Scanning (Ultimate)
  • Container Scanning (Ultimate)
  • Cluster image scanning (Ultimate)
  • Advanced Search (Premium)

Fill out the form below to view this Resource.