Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Ntrepid-New-Gold-Microsite-Logo.png
Ntrepid Virtual Event

Event Date: December 04, 2025
Hosted By: Ntrepid & Carahsoft
CPE credit available
In this webinar, attendees will learn about: Managing online attribution and protecting investigator digital fingerprints on the surface, deep, and dark web Authentic device signatures for secure, cover-consistent operations  Persistent and non-persistent environments to ...
Datenna-Microsite-Logo.png
Datenna Virtual Event

Event Date: December 10, 2025
Hosted By: Datenna & Carahsoft
CPE credit available
Export’s Hidden Pipeline: Mapping Illicit Supply Chains into the U.S. Illicit supply chains are evolving fast — using front companies, falsified records, and complex routing to smuggle ...
System-High-Microsite-Logo.png
System High Virtual Event

Event Date: December 18, 2025
Hosted By: ManageYOURiD & Carahsoft
CPE credit available
High-profile individuals—across both public and private sectors—face escalating digital risks that can quickly evolve into physical threats. Doxing, targeting, harassment and metadata-driven reconnaissance have lowered the barrier for adversaries to act, making 
Fivecast-microsite.png
Multi-Vendor Virtual Event

Event Date: January 14, 2026
Hosted By: Fivecast, Blackbird.ai & Carahsoft
CPE credit available
In today’s information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is ...
Factal-microsite-logo.png
Factal Virtual Event

Event Date: January 28, 2026
Hosted By: Factal & Carahsoft
CPE credit available
In a world where global security and risk intelligence increasingly depend on artificial intelligence, the need for thoughtful, secure and responsible AI practices has never been greater. Join Factal's Co-Founder and ...
Scorelate-Microsite-Logo.png
Scorelate Virtual Event

Event Date: February 12, 2026
Hosted By: Scorelate & Carahsoft
CPE credit available
Discover how intel agencies are transforming their human sourcing and recruitment strategies with Scorelate’s AI platform—delivering 100% accuracy in predicting risks, value, and suitability of human sources before engagement. See how agencies have leveraged ...

Archived Events

TextOre-Microsite-Logo.png
TextOre Virtual Event

Event Date: November 20, 2025
Hosted By: TextOre & Carahsoft
Attendees joined TextOre, Inc. for a webinar unveiling the latest edition of the most comprehensive reference on PRC military leadership — the successor to the widely respected Directory of PRC Military Personalities that generations of PLA watchers have relied on. During this webinar, ...
FinchAI-horiz-COLOR_80px_microsite.png
Finch AI Virtual Event

Event Date: November 18, 2025
Hosted By: Finch AI & Carahsoft
In this webinar, we explored a repeatable, scalable approach for integrating agentic AI into your mission workflows. Through live demonstrations, real-world examples, Finch AI CTO Scott Lightner and Data Science Architects Bob Flagg, PhD, and Mike Freeman, PhD, showed how agentic AI is already being used ...
Silobreaker-Microsite-Logo.png
Silobreaker Virtual Event

Event Date: November 13, 2025
Hosted By: Silobreaker & Carahsoft
Thank you for your interest in our Silobreaker webinar:
Semantic-Visions-Microsite-Logo-Updated.png
Semantic Visions Virtual Event

Event Date: November 12, 2025
Hosted By: Semantic Visions & Carahsoft
In today's volatile geopolitical landscape, the U.S. defense sector relies on thousands of Tier 2 and Tier 3 subcontractors for everything from missile systems to advanced AI chips. Yet, most traditional procurement and threat-monitoring tools fail to detect early signals of instability in these vendors, especially when ...

Resources


Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

In this article, learn about the Modernization of Datacenters. Why it is important and why HashiCorp is on the cutting edge of helping businesses achieve this milestone.

ActiveState has evolved its long-standing expertise in open-source security to address the growing challenge of vulnerabilities in cloud-native container deployments. Recognizing the need for a quick solution for vulnerable container images, ActiveState is excited to introduce Secure Containers. The...

The Department of Defense has been a source of remarkable innovations. Despite that reputation, the United States Space Force (USSF) struggled to adapt workflows to their evolving mission while relying on legacy systems. In this Atlassian case study, learn how the USSF used DevSecOps-compliant softw...

Disconnected communications and systems delay projects, stifle accountability and foster frustration. These issues only multiply as agencies grow. In this case study, learn how the National Security Service (NSA) united teams using Atlassian’s powerful technology suite, ensuring consistent, sc...

View this resource to learn more about cloud computing, the cloud and data protection. This resource will break down Core Level Security tactics, and different uses of the Edge.