Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events


No events were found. Please try another search.

Resources


Featured

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

This resource provides an overview of EdgeRunner AI, a military-specific AI solution offering capabilities such as offline, multi-step, multi-turn interactions tailored for warfighters. It highlights features like EdgeRunner Athena for document summarization and domain-specific adapters with LoRA fi...

Access this Cohesity eBook to uncover six key predictions shaping the future of AI, data security, and cloud. As AI rapidly transforms industries, it brings both opportunities and risks—Cohesity experts provide actionable insights to help you stay ahead. Explore practical takeaways and valuabl...

This Alteryx and Cloudera resource highlights their joint solution for seamless data integration, advanced analytics, and scalable machine learning. It emphasizes key benefits such as efficient data processing, secure collaboration, and regulatory compliance, helping businesses optimize decision-mak...

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,

This article discusses how cyber- privileges affect access to educational institutions data. Phishing, Malware and Lack of Awareness can play a major factor in poor self-defense against cyber-attacks.

WEST 2025 brought together members of government, industry, and academia to discuss pressing challenges facing the Sea Services. This year’s theme was "Are Acquisition and Readiness on Pace to Meet Global Security Demands

A new era of cyber threats has emerged with the rise of the “enterprising adversary,” as highlighted in the CrowdStrike 2025 Global Threat Report. This new breed of threat actor distinguishes itself through sophisticated and scalable tactics designed to execute attacks with calculated, b...

This resource is our new e-book guide to creating and maintaining AI data pipelines. It provides a thorough overview of AI data preparation, pipeline architecture, and maintenance.