Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Virtual Event

Transitioning from FIPS 140-2 to 140-3: What Technology Providers Need to Know


Event Date: April 24, 2025
Hosted By: SafeLogic & Carahsoft

NIST FIPS 140, Security Requirements for Cryptographic Modules, applies to technology products performing data encryption that the federal government purchases. Technology providers must obtain FIPS 140 certification that the cryptography in their products has been tested and approved for government use. As the U.S. federal government moves from FIPS 140-2 to FIPS 140-3, these providers must navigate evolving cryptographic validation requirements to maintain compliance and maintain eligibility for federal contracts.

This webinar provided a concise, actionable roadmap for software, hardware and cybersecurity vendors who must update their encryption modules to meet the new standards.

Topics covered included:

  • Key Differences Between FIPS 140-2 and 140-3 – Understanding the new validation criteria and security enhancements
  • Compliance Timelines & Risks – Why failing to transition could mean losing eligibility for federal procurements
  • Strategic Approaches to Migration – Best practices for testing, revalidation, and maintaining certification
  • Common Pitfalls & How to Avoid Them – Lessons learned from organizations undergoing this transition

Attendees joined us for a deep dive into the FIPS 140-3 transition and to ensure that their encryption solutions will remain viable in the federal market.

Resources


Featured

When Lexmark needed to incorporate machine learning into their new industrial gateways, Edge Impulse was the immediate solution.

Keysight’s vTaps and Vision ONE solutions enhance network visibility for government agencies transitioning to highly virtualized environments. By deploying virtual taps (vTaps) and network packet brokers (NPBs), agencies can overcome blind spots in east-west traffic and ensure secure, efficien...

Discover a step-by-step guide to implementing a smart building strategy to improve efficiency, occupant experience, and environmental impact. Access this eBook to begin your journey to smarter facilities.

This ebook explores how to build a Unified Namespace (UNS) for Industrial IoT using MQTT, enabling real-time data flow across systems. It provides best practices and insights to help organizations improve interoperability, scalability, and operational efficiency.

Technology is transforming workforce safety, security,
and efficiency while delivering massive ROI. Download the latest State of Connected Operations Report to learn more.

Download the 2025 Riskiest Devices Report to gain valuable insights into the most vulnerable devices impacting your network security. This comprehensive report identifies the top risks associated with IoT, OT, and IT devices and provides actionable recommendations to safeguard your infrastructure. S...

Explore how Xona secures OT, ICS, and IT with zero-trust access and protocol isolation. As critical infrastructure becomes more connected, the risk to OT, ICS, and IT systems grows—especially as traditional access methods like VPNs and jump servers fall short. The Xona Platform addresses these...

Armis Centrix™ assists DIB members in maintaining CMMC compliance. It’s extensive solution identifies IT, OT, IoT and IoMT assets and brings a visibility into assets in the network that is like no other. Armis provides customers with important compliance insights from the start.

Article

Schools trust Samsara’s technology to ensure student safety when on or off the bus, streamline parent communication, improve on-time route performance, reduce fleet operation costs, and more—all in one easy-to-use, affordable system.

HERA, Waterfall Security’s new way of revolutionizing how secure remote access works for OT.