Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

safelogic-microsite-logo.png
SafeLogic

FIPS 140-3 is (Finally) Here


Event Date: November 12, 2024
Hosted By: SafeLogic & Carahsoft

FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming conformance. Companies selling technology with encryption to the public sector often must obtain FIPS 140 certification that their cryptography has been tested and approved for government use. In addition, other security compliance frameworks, including Common Criteria, DoDIN APL, FedRAMP, StateRAMP, CMMC 2.0, CNSA 2.0 and the HIPAA security rule, have adopted FIPS 140 as the gold standard for cryptography.

NIST published FIPS 140-3 in 2019. For cryptography industry insiders, the FIPS 140-3 transition has generated waves of activity. But what about cryptography consumers? After five years, FIPS 140-3 certifications are finally becoming available from the Cryptographic Module Validation Program (CMVP) in sufficient quantities to impact public sector procurements. What does the availability of FIPS 140-3 mean for government agencies, their vendors, and integrators?

During this webinar, attendees learned:

  • How FIPS 140-3 improves upon FIPS 140-2
  • The timeline for the eventual retirement of all FIPS 140-2 certificates
  • The challenges vendors and integrators face to achieve and maintain FIPS 140-3 active validation 
  • Additional requirements NIST is adding to FIPS 140-3 including post-quantum cryptography (PQC) and entropy source validation (ESV)
  • How SafeLogic’s FIPS Validation-as-a-Service expedites and maintains FIPS 140-3 validations over time

Fill out the form below to view this archived event.


Resources


Featured

 Tune in to listen to Keith Nelson of OpenText talk on stage with Jeff Livingston at the Gov AI Summit in October. In this interview, Keith talks about their recent webinar series, AI for the Rest of Government.

OpenText participated at the Gov AI Summit in October. This video showcases who OpenText is and what OpenText does. Tune in to listen to James Willis, Manager of Solution Consulting, Public Sector, OpenText

Article

Voltage Data Security by OpenText provides advanced encryption and tokenization solutions to safeguard sensitive data across various platforms and environments. It helps organizations achieve regulatory compliance and mitigate data breach risks by ensuring data remains protected throughout its lifec...

SMAX SaaS, the OpenText IT Service Management (ITSM) solution, is now available at moderate impact level for the U.S. Federal Risk and Authorization Management Program (FedRamp®). SMAX helps organizations deliver modern IT services, increase IT productivity, and decrease risks and costs.

Datasheet

The NetIQ 8.23 datasheet presents OpenText Cybersecurity's extensive identity and access management (IAM) services, featuring adaptive authentication, identity governance, and advanced authentication for workforce and customer identities. Key features include secure access management, policy orc...

Fortify Application Security by OpenText is a comprehensive suite of tools designed to enhance the security of software applications throughout their development lifecycle. It includes features for vulnerability detection, code analysis, and remediation guidance, ensuring robust protection against c...

ArcSight cyDNA
Datasheet
ArcSight cyDNA by OpenText Cybersecurity revolutionizes cybersecurity with its SaaS-based global signal analytics, unmasking adversarial behavior and providing a bird's eye view of threat actors, ensuring near-time threat analysis and fortified defenses against evolving cyber threats.

Presentation

View Victor Tham’s presentation from our Insider Threat Detection Using AI & ML Webinar. Learn more about the ArcSight, CrowdStrike, and the Insider Threat Landscape.

OpenText IT Operations Management (ITOM) & Cybersecurity solutions not only align flawlessly with DevSecOps principles but also bring forth a unique blend of precision, dedication, and creativity, mirroring the approach we take in crafting the perfect cocktail. Discover the seamless integration of e...

Learn more about how OpenText products can beef up your cyber defenses. From keeping breaches at bay to tightening up your IT system's defenses. OpenText can assist in managing vulnerabilities and exposures across your digital playground.