Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Chainalysis-microsite.png
Chainalysis

Chainalysis Webinar | Technology Funding Opportunities for Your Agency


Event Date: April 08, 2025
Hosted By: Chainalysis & Carahsoft

The FY25 grant season arrived, and navigating the complex state and federal funding world was daunting. Was your agency prepared to secure funding for critical technology upgrades?

Access this on-demand webinar featuring national grant expert Joan Brody, who guided you through the landscape of current technology grants and various other funding avenues available to public safety agencies.

Specifically, attendees learned about:

The grant-seeking process

  • Current and future funding opportunities to support technology solutions

  • Various public and private funding vehicles, including competitive and formula grant funding, and corporate and foundation giving

  • Searching for and applying for federal, state, and private grants

  • Insights on funding to support public safety technology needs

From understanding the grant-seeking process to identifying opportunities for technology solutions, this session is designed to empower your agency to thrive. Don't miss this chance to equip your agency with the knowledge and strategies needed to secure vital funding in 2025 and beyond!


Fill out the form below to view this archived event.


Resources


Mitigate the Risk of Ransomware Attacks Against Critical Infrastructure with XONA
Whitepaper

Mitigate the Risk of Ransomware Attacks Against Critical Infrastructure with XONA

Explore zero-trust OT security with MFA, encryption, and secure gateways to prevent attacks. Cyberattacks on critical infrastructure and industrial control systems are accelerating, with ransomware posing serious safety and economic risks. Traditional OT defenses like network segmentation are no longer sufficient, as attackers increasingly exploit exposed assets, open ports, and vulnerabilities in OEM software. To counter this, OT operators must adopt a zero-trust model with strong encryption, MFA, role-based access controls, and full session logging—especially for remote access. A secure operational gateway is now essential to reduce attack surfaces and defend against credential-based threats.


Fill out the form below to view this Resource.