Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

CostPerform-microsite.png
CostPerform

Running Government as a Business: Cost Transparency for State and Federal Agencies


Event Date: March 03, 2026
Hosted By: CostPerform & Carahsoft

How does your agency use cost information today? Is cost data mainly used for allocation and reporting, or does it actively support decisions across mission delivery and IT services?

Join us for a live webinar to learn how state and Federal agencies are running government as a business by applying cost transparency to both mission operations and IT. Through real-world Federal use cases, this session shows how agencies move beyond traditional cost allocation to improve decision-making, accountability, and resource utilization. Whether you work in IT, finance, or operations, this webinar will highlight practical approaches used by Government organizations today.

 What to expect during this webinar:

  • Why "running Government as a business" is increasingly relevant for state and Federal agencies
  • How agencies move from cost allocation to decision-oriented cost transparency
  • A live Q&A session with costing experts Sander den Hartog and Lim Vermeer
  • An IT-focused use case highlighting service catalogues and unit pricing
  • A mission-focused use case from a Federal agency

Don't miss out on your opportunity to gain insight with this live webinar and Q&A – Register now!


Register Now

Resources


BeyondTrust-microsite.png
Whitepaper

NIST SP 800-207

This guide has been prepared so that IT and security administrators can understand how BeyondTrust Privileged Access Management (PAM) solutions map into guidelines set forth in the NIST Special Publication (SP) 800-2017 on Zero Trust Architecture. NIST defines these core concepts as follows:

  • Zero Trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources.
  • Zero Trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows.

Fill out the form below to view this Resource.