Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Archived Events

BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: September 26, 2023
Hosted By: BeyondTrust & Carahsoft
80 to 100% of Microsoft's critical vulnerabilities in 2022 could be mitigated by removing admin rights, yet many organizations are hesitant to do so because of concerns about hindering end user productivity. Watch this on-demand recording to learn how state and local agencies can remove admin rights reduce cyber risk, ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: August 29, 2023
Hosted By: BeyondTrust & Carahsoft
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security.  Identity and access security talks to the tools, processes, and policies that ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: July 25, 2023
Hosted By: BeyondTrust, Tenable & Carahsoft
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote ...
BeyondTrust-microsite.png
BeyondTrust Virtual Event

Event Date: July 13, 2023
Hosted By: BeyondTrust & Carahsoft
View the on-demand recording as BeyondTrust discusses our ability to help your Public Sector customers secure Operational Technology environments.  BeyondTrust Privileged Remote Access enables organizations to secure critical infrastructure and OT environments without disrupting operations, compromising safety, ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: June 13, 2023
Hosted By: BeyondTrust, ServiceNow & Carahsoft
Thousands of organizations worldwide rely on ServiceNow solutions for service management across IT, human resources, facilities, field service, and other disciplines. Implementing BeyondTrust and ServiceNow solutions together provide a more automated, efficient, and secure ITSM solution. During this session and live ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: June 01, 2023
Hosted By: BeyondTrust, SailPoint, Ping & Carahsoft
The entire concept of zero trust can be boiled down to four words – never trust, always verify. But short, simple statements usually have a lot of moving parts to make them reality. When the Office of Management and Budget issued its Federal Zero Trust Strategy in January 2022, it set the end of Fiscal Year 2024 – ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: May 09, 2023
Hosted By: BeyondTrust, Sailpoint & Carahsoft
Identity governance solutions help IT teams answer “who has access to what?” The integrated BeyondTrust and SailPoint solution allows organizations to answer “is that access appropriate for privileged users?” and “is that privileged access being used appropriately?” Attendees ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: April 18, 2023
Hosted By: BeyondTrust, Tenable & Carahsoft
Cybersecurity is usually framed in terms of IT – from malware to phishing to ransomware, federal agencies are paying attention to securing their networks and endpoints. But leaders often overlook security measures for operational technology (OT) and industrial control systems (ICS), such as building automation systems, ...
BeyondTrust-microsite.png
Multi-Vendor Virtual Event

Event Date: March 29, 2023
Hosted By: FedInsider, BeyondTrust, SailPoint, Ping Identity, and Carahsoft
Much of cybersecurity is focused on protecting users’ identities and personal information. This approach has numerous benefits, not just for the individual users but for the systems with which they interact – it protects people from malicious activities such as identity theft, while it also cuts down on bad actors ...

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

Collibra has been named a Leader in The Forrester Wave™: Data Governance Solutions, Q3 2025 report, recognized for its strong vision and comprehensive capabilities. Download the report to explore emerging trends, evaluation criteria for governance tools, and why Collibra stands out in today&rs...

Ready to fast-track your implementation? The Road to Go-Live Handbook reveals proven strategies, expert tips, and step-by-step guidance to help you launch with confidence and deliver results faster. View this essential playbook for turning process insights into real business impact—download no...

Government agencies are facing increasing demands to provide services more efficiently, transparently, and with limited resources. To support this transformation, we're thrilled to share that Accela has acquired ePermitHub—marking a significant advancement in streamlining permitting and pl...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

ActiveState’s Open Source Security Posture Management platform enables DevOps, InfoSec and Development teams to improve security status to deliver secure applications faster. Learn how ActiveState and Carahsoft have partnered up to provide comprehensive open-source management solutions in the ...

This resource provides an overview of EdgeRunner AI, a military-specific AI solution offering capabilities such as offline, multi-step, multi-turn interactions tailored for warfighters. It highlights features like EdgeRunner Athena for document summarization and domain-specific adapters with LoRA fi...

Access this Cohesity eBook to uncover six key predictions shaping the future of AI, data security, and cloud. As AI rapidly transforms industries, it brings both opportunities and risks—Cohesity experts provide actionable insights to help you stay ahead. Explore practical takeaways and valuabl...

This Alteryx and Cloudera resource highlights their joint solution for seamless data integration, advanced analytics, and scalable machine learning. It emphasizes key benefits such as efficient data processing, secure collaboration, and regulatory compliance, helping businesses optimize decision-mak...