Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Virtual Event

From AI-Curious to AI-Capable: Bridge the AI Readiness Gap with Evolve 365


Event Date: October 23, 2025
Hosted By: Planet Technologies & Carahsoft

AI is transforming the modern workplace at an unprecedented pace, as the internet and smartphones once redefined how we work. Microsoft's latest Work Trend Index shows that 82% of leaders agree it is critical to rethink operations with AI, but the gap between AI adoption and workforce readiness continues to grow. As agencies rush to implement AI tools, they are often left wondering where to start, how to effectively use these tools, and how to integrate them into daily workflows.

Watch the on-demand webinar with Planet Technologies and hear from Jennifer Mason, VP of Workforce Transformation & Learning, and Demetrias Rodgers, CTO for SLED, who share actionable strategies to help your organization's workforce evolve from AI-curious to AI-capable.

Specifically, discover how to:

  • Prepare employees to manage AI agents, reimagine workflows, and build trust in AI-powered tools like Microsoft Copilot
  • Foster a culture of fluency and experimentation across the organization
  • Scale training efforts and align AI initiatives with workforce goals

Fill out the form below to view this archived event.


Resources


Featured

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

In this article, learn about the Modernization of Datacenters. Why it is important and why HashiCorp is on the cutting edge of helping businesses achieve this milestone.

ActiveState has evolved its long-standing expertise in open-source security to address the growing challenge of vulnerabilities in cloud-native container deployments. Recognizing the need for a quick solution for vulnerable container images, ActiveState is excited to introduce Secure Containers. The...

The Department of Defense has been a source of remarkable innovations. Despite that reputation, the United States Space Force (USSF) struggled to adapt workflows to their evolving mission while relying on legacy systems. In this Atlassian case study, learn how the USSF used DevSecOps-compliant softw...

Disconnected communications and systems delay projects, stifle accountability and foster frustration. These issues only multiply as agencies grow. In this case study, learn how the National Security Service (NSA) united teams using Atlassian’s powerful technology suite, ensuring consistent, sc...

View this resource to learn more about cloud computing, the cloud and data protection. This resource will break down Core Level Security tactics, and different uses of the Edge.