Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Lookout-Logo-TM-Pref-7L-Full-Pos-RGB-01.png
Lookout Onsite Event

Event Date: May 21, 2025
Hosted By: Lookout, FedInsider & Carahsoft
CPE credit available
Location: Reston, VA
Join the Lookout Federal Forum to explore the latest in mobile security for government agencies. Don't miss this two-part event to gain actionable insights and strengthen your agency's mobile security posture.
LaunchDarkly-microsite.png
LaunchDarkly Virtual Event

Event Date: May 21, 2025
Hosted By: LaunchDarkly & Carahsoft
CPE credit available
Federal agencies, currently under pressure to deliver software quickly with smaller staff and tighter budgets, need tools that help them move faster while staying in control. Traditional deployment methods often bring unnecessary risk and delays, making it harder to respond quickly to critical mission ...
salesforce_logo_updated.png
Salesforce Virtual Event

Event Date: May 21, 2025
Hosted By: Carahsoft
Join us for an insightful webinar where we’ll explore how AI-driven solutions and a connected digital platform can revolutionize airport operations. Learn how personalized experiences, real-time communication, and data integration can improve traveler satisfaction, increase revenue, and streamline airport ...
logo-blackbird-Black.png
Blackbird.AI Virtual Event

Event Date: May 21, 2025
Hosted By: Blackbird.AI & Carahsoft
CPE credit available
In today's complex information environment, narratives have emerged as strategic assets and potential threat vectors. As adversaries employ coordinated campaigns, synthetic media and bot networks to advance their objectives, public sector organizations must ...
XMCyber-Microsite-Logo.png
XM Cyber Virtual Event

Event Date: May 21, 2025
Hosted By: XM Cyber & Carahsoft
CPE credit available
Is your current vulnerability management strategy failing to deliver the protection your organization needs? Join us on Wednesday, May 21st, at 11:00 AM ET for our webinar, "Beyond Vulnerability Management: Controlling the ...
Wiz-Federal-microsite.png
Multi-Vendor Virtual Event

Event Date: May 21, 2025
Hosted By: Wiz, Armis and Carahsoft
CPE credit available
As cloud environments grow more complex, security teams need smarter ways to manage risk and remediation. Join Wiz and Armis for a live webinar where we’ll dive into how our joint solutions transform cloud security operations.
ivanti-logo-red.svg
Ivanti Virtual Event

Event Date: August 22, 2024 - August 28, 2025
Hosted By: Ivanti & Carahsoft
During our Live Tech Demo, attendees explored how Ivanti Neurons for RBVM can: Prioritize vulnerabilities based on real-world exploit risk, asset criticality, and threat intelligence. Reduce remediation time by focusing on the vulnerabilities most likely to be ...
Conceal-microsite.png
Conceal Virtual Event

Event Date: May 22, 2025
Hosted By: Conceal & Carahsoft
CPE credit available
Join Conceal and Carahsoft to explore how ConcealSearch empowers professionals to safely perform research from anywhere in the world without the risk of attribution or exposure. Our featured speakers will ...
Axonius-Microsite-Logo.png
Axonius Federal Systems Virtual Event

Event Date: May 22, 2025
Hosted By: Axonius Federal Systems & Carahsoft
CPE credit available
This webinar will explore Axonius Federal Systems and their achievement in becoming FedRAMP authorized. Also, discussing how Axonius is enabling federal agencies to deploy the Axonius Asset Cloud and its ...

Archived Events

Armis-microsite.png
Armis Virtual Event

Event Date: March 26, 2025
Hosted By: Armis & Carahsoft
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems. Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to ...

Resources


Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

In this article, learn about the Modernization of Datacenters. Why it is important and why HashiCorp is on the cutting edge of helping businesses achieve this milestone.

The Department of Defense has been a source of remarkable innovations. Despite that reputation, the United States Space Force (USSF) struggled to adapt workflows to their evolving mission while relying on legacy systems. In this Atlassian case study, learn how the USSF used DevSecOps-compliant softw...

Disconnected communications and systems delay projects, stifle accountability and foster frustration. These issues only multiply as agencies grow. In this case study, learn how the National Security Service (NSA) united teams using Atlassian’s powerful technology suite, ensuring consistent, sc...

View this resource to learn more about cloud computing, the cloud and data protection. This resource will break down Core Level Security tactics, and different uses of the Edge.

This datasheet provides an overview of Jaspersoft commercial edition. You can read about the key features and the additional benefits of using Jaspersoft commercial edition.