Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: April 14, 2026
Hosted By: BeyondTrust & Carahsoft
CPE credit available
When 911 dispatch slows, a water utility loses visibility, a transit system cannot operate safely, or a district cannot deliver services, leaders ask the same three questions immediately: Who had access? What did they touch? Why was it not controlled? As operational ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: May 05, 2026
Hosted By: BeyondTrust & Carahsoft
CPE credit available
State and local governments sit at the center of critical infrastructure outcomes. In many jurisdictions, they own and operate essential services like water and wastewater systems, emergency services, Government and education facilities and transportation operations. We see every day that when there is a cyber ...

Archived Events

BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: February 24, 2026
Hosted By: BeyondTrust & Carahsoft
In government and education environments, AI agents are already showing up in service desks and IT operations to reset passwords and triage tickets, in citizen and student service workflows to answer requests and update records, and in security operations to investigate alerts and recommend or trigger response ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: February 12, 2026
Hosted By: BeyondTrust & Carahsoft
Government agencies face sprawling identity ecosystems — employees, contractors, service accounts, workloads, and now AI agents. Fragmented tools create blind spots that attackers exploit, leaving privilege paths unchecked. On Thursday, ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: January 22, 2026
Hosted By: BeyondTrust & Carahsoft
Managing thousands of endpoints across campuses while meeting classroom demands isn’t easy. Nash County Public Schools joined BeyondTrust to explore how modern remote support can transform IT operations. In this conversation, Tremain McQueen (CTO) and JR Williams (Sr. Network Engineer) from Nash County ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: January 22, 2026
Hosted By: BeyondTrust
Federal agencies face relentless cyber threats targeting endpoints—the most vulnerable and widespread attack surface in government environments. Implementing Least Privilege is no longer optional; it is a mission-critical strategy to meet Zero Trust mandates, reduce risk and comply with ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: December 09, 2025
Hosted By: BeyondTrust & Carahsoft
Government organizations were past strategy and deep into execution. Privileged access sat at the center of every Zero Trust program, and leaders needed a practical way to reduce risk, satisfy audits, and move faster. This virtual session showcased Zero ...
RSA_NewLogo_Red_RGB.png
Multi-Vendor Onsite Event

Event Date: November 19, 2025
Hosted By: BeyondTrust, RSA & Carahsoft
As cyberattacks grew more sophisticated, traditional security perimeters were no longer enough. Identity became the new frontline, and privileged accounts remained the highest-value target. Without strong identity security and Privileged Access Management (PAM), Zero Trust initiatives fell short. At Zero Trust DMV Day, ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: November 04, 2025
Hosted By: BeyondTrust, Optiv+Clearshark & Carahsoft
As government agencies continue to modernize their IT infrastructure and align with executive mandates for Zero Trust Architecture (ZTA), identity security becomes a critical pillar for cyber resilience. This webinar, hosted by BeyondTrust and Optiv + ClearShark, explored how government agencies can formalize and ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: October 21, 2025
Hosted By: Ariento, BeyondTrust & Carahsoft
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and ...

Resources


5 Risks of Maintaining Legacy ITSM Platforms
Solutions Brief

5 Risks of Maintaining Legacy ITSM Platforms

For organizations operating in highly regulated industries, relying on a legacy ITSM platform poses significant risks to compliance, security, and overall business resilience. Modern ITSM platforms offer a crucial advantage, providing tools and features specifically designed to manage these risks effectively.

By accessing this content, you agree to receive promotional communications and/or news alerts from Carahsoft and Atlassian and acknowledge the Atlassian Privacy Policy.


Fill out the form below to view this Resource.