Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Logo-redhat-color-375.png
Red Hat

Securing the DevSecOps Pipeline for DoD Agencies


Event Date: January 13, 2021
Hosted By: Red Hat, TrueZero & Carahsoft
The current challenge for open source users is trusting community software security, often perceived as having vulnerabilities for agencies. Combining the principles of security and DevOps, with software supply chain management, drives complete visibility into software, open source and its dependencies through the Trusted Software Supply Chain (TSSC).

Hear from industry experts to learn how Red Hat delivers capability to the DoD DevSecOps Reference Design by establishing complete trust for all software in production.

  • Hear Red Hat's perspective of what a DevSecOps pipeline for the DoD should be and how you can integrate an automated security policy
  • Discover how the Red Hat TSSC automates the security artifact creation and collection of supporting evidence for internal accreditation
  • Learn how to create a standard DevOps workflow organization-wide, while allowing for the implementation of differing tools
Watch the recording to achieve mission outcomes quicker than the competition driven by your adoption of enterprise open source software.

Fill out the form below to view this archived event.


Resources


Modernize Public Sector Networks with Trusted SD-WAN
Resources

Modernize Public Sector Networks with Trusted SD-WAN

Across the public sector, agencies are laying the groundwork for cloud-smart adoption. 97% of agencies have a cloud strategy, with 37% of them actively using multiple clouds. Federal leaders are also looking at edge solutions to realize the potential of specialized IoT devices such as cameras and sensors, and 5G services to connect them. As public cloud adoption and the number of applications continues to grow, so do the number of security threats.


Download PDF