Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

AWS-Color-Smile-Logo-Cropped_80.png
Multi-Vendor

Cybersecurity in the Age of AI: How to Defend


Event Date: February 26, 2026
Hosted By: Abnormal AI, AWS, CrowdStrike, Tekistry & Carahsoft
Location: Irvine, CA
Join Tekistry, Abnormal AI, CrowdStrike, and AWS on February 26th for an exclusive half-day session designed for public sector leaders navigating today’s evolving cyber threat landscape.
Attendees will gain insights into:
  • Expert perspectives on AI-driven cyber threats and real-world case studies
  • Practical strategies to defend your people, endpoints, and cloud environments
  • Hands-on lab scenarios leveraging CrowdStrike SIEM solution
  • Interactive discussions with peers and security leaders
  • How California public agencies are adopting AI securely
Don’t miss this opportunity to hear directly from leading innovators and walk away with actionable steps to safeguard your organization in the age of AI. 
Register now!

Register Now

Resources


Featured

When Lexmark needed to incorporate machine learning into their new industrial gateways, Edge Impulse was the immediate solution.

Keysight’s vTaps and Vision ONE solutions enhance network visibility for government agencies transitioning to highly virtualized environments. By deploying virtual taps (vTaps) and network packet brokers (NPBs), agencies can overcome blind spots in east-west traffic and ensure secure, efficien...

Discover a step-by-step guide to implementing a smart building strategy to improve efficiency, occupant experience, and environmental impact. Access this eBook to begin your journey to smarter facilities.

This ebook explores how to build a Unified Namespace (UNS) for Industrial IoT using MQTT, enabling real-time data flow across systems. It provides best practices and insights to help organizations improve interoperability, scalability, and operational efficiency.

Technology is transforming workforce safety, security,
and efficiency while delivering massive ROI. Download the latest State of Connected Operations Report to learn more.

Download the 2025 Riskiest Devices Report to gain valuable insights into the most vulnerable devices impacting your network security. This comprehensive report identifies the top risks associated with IoT, OT, and IT devices and provides actionable recommendations to safeguard your infrastructure. S...

The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30% of devices often unmanaged, visibility remains a major hurdle. Security risks—from ou...

Explore how Xona secures OT, ICS, and IT with zero-trust access and protocol isolation. As critical infrastructure becomes more connected, the risk to OT, ICS, and IT systems grows—especially as traditional access methods like VPNs and jump servers fall short. The Xona Platform addresses these...

Tenable One is the leading AI-powered exposure management platform designed to help organizations unify security across their entire digital environment. By identifying, prioritizing, and addressing vulnerabilities in real time, Tenable One provides actionable insights that reduce risk, improve comp...

Armis Centrix™ assists DIB members in maintaining CMMC compliance. It’s extensive solution identifies IT, OT, IoT and IoMT assets and brings a visibility into assets in the network that is like no other. Armis provides customers with important compliance insights from the start.