Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
State and local governments are increasingly adopting Artificial Intelligence (AI) to modernize operations, improve citizen services, and strengthen public safety. During this post-launch AI Security webinar, Zscaler explored how agencies can embrace AI innovation while managing the growing risks related to Shadow AI, data exposure, and regulatory compliance through a Zero Trust approach.
The session highlighted how Zscaler supports secure and responsible AI adoption across the full lifecycle—from development to deployment—helping agencies protect data, maintain trust, and meet compliance requirements as AI usage scales.
Attendees received an overview of Zscaler’s latest AI security innovations designed to improve visibility, resilience, and governance. The discussion focused on how agencies can discover and manage AI systems, proactively test defenses, and implement safeguards that protect AI workflows in real time.
Key takeaways from the webinar included:
The webinar also featured a discussion of the top AI use cases across state and local government, alongside a practical playbook for securing AI deployments—including public, private, agentic, and citizen-facing services.
U.S. military leaders have grave concerns about security within their technology supply chain. Digital systems are inherently vulnerable to some level of cybersecurity risk. When those systems support national security, the risk is heightened and magnified.
The Defense Department is actively working to strengthen cyber resilience in its supply chain partners and across the Defense Industrial Base, or DIB. It’s raising the bar for aerospace and defense contractors through the continual evolution of CMMC, the Cybersecurity Maturity Model Certification.
Identity and access management stand at the core of the cyber resilience effort. In order to meet the challenge of CMMC, defense contractors can modernize their identity and access strategies, leveraging cloud and as-a-service offerings with an emphasis on Zero Trust.
Fill out the form below to view this Resource.