Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Fivecast-microsite.png
Multi-Vendor

Narrative Attacks Don’t Go Viral on Their Own: Tracking the Behaviors Behind the Narrative


Event Date: January 14, 2026
Hosted By: Fivecast, Blackbird.ai & Carahsoft

In this information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is that these intelligence workflows often treat them as separate problems that threat intelligence and social listening can’t follow.

This session drew expertise from Lawson Ferguson, Tradecraft Lead at Fivecast, and Daniel González, Narrative Intelligence Advisor at Blackbird.AI, to explore a critical new threat vector called narrative attacks: what gets missed when you monitor engagement without narrative context, or track narratives without understanding who is behind them.

During this webinar, attendees learned:

  • How threat actors cause harm to executives and organizations through coordinated narrative attack campaigns
  • The challenge of discerning high-impact narratives amid high-volume noise
  • What happens when disinformation, malign influence and operational threats converge in real time
  • How Narrative Intelligence can provide visibility into the harmful narratives targeting your organization and executives, the threat actors behind them, the bot influence that amplifies them and the threat actors and nation-states that influence them.

Fill out the form below to view this archived event.


Resources


NetFlow-Logic-Microsite-Logo.png
Blog

CUI on the Wire: How NetFlow Telemetry Maps and Monitors Controlled Unclassified Information Flows

In this blog, NetFlow Logic demonstrates how organizations can track and understand the flow of Controlled Unclassified Information (CUI) across their networks using advanced flow telemetry. By correlating network activity with contextual data, teams can pinpoint where sensitive information is traveling and quickly surface potential risks or policy gaps. This enables stronger data protection, streamlined compliance efforts, and more informed security decision-making.


Fill out the form below to view this Resource.