Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Tableau-From-Salesforce-Logo-BLUE.png
Multi-Vendor Virtual Event

Event Date: May 27, 2025
Hosted By: Carahsoft & Tableau
CPE credit available
Join us for a hands-on webinar exploring how any analyst can master spatial analytics in Tableau—no GIS background required. You'll learn how to integrate geographic data into your workflows, uncover hidden patterns and deliver deeper insights through intuitive mapping tools. During this ...

Archived Events

Armis-microsite.png
Armis Virtual Event

Event Date: March 26, 2025
Hosted By: Armis & Carahsoft
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems. Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to ...
Armis-microsite.png
Armis Virtual Event

Event Date: May 28, 2025
Hosted By: Armis & Carahsoft
CPE credit available
As our CTEM series concludes, this final session brings together the critical elements needed to operationalize a proactive exposure management program. Agencies and organizations managing cyber-physical ...
RegScale-microsite.png
Multi-Vendor Virtual Event

Event Date: May 28, 2025
Hosted By: RegScale, Sicura & Carahsoft
CPE credit available
Join Sicura, RegScale and USMC for a live session where you’ll discover how to automate the full compliance lifecycle — dramatically reducing ATO timelines while strengthening security and audit-readiness across even the most complex environments.  Whether you’re ...
Tabnine-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: April 22, 2025 - May 28, 2025
Hosted By: Tabnine & Carahsoft
Attendees of this webinar listened to subject-matter experts discuss by Tabnine: How AI agents trained on your agency’s codebase can enforce quality, consistency, and compliance How to implement AI guardrails that align with government SDLC and security requirements How ...
Logo-redhat-color-375.png
Multi-Vendor Virtual Event

Event Date: May 28, 2025
Hosted By: Red Hat, F5 & Carahsoft
CPE credit available
The Federal Aviation Administration (FAA) relies on high-performing, scalable containerized applications to support aviation safety, efficient air traffic management and regulatory enforcement. Ensuring these applications run smoothly is essential to mission success, enabling real-time ...
Bravium-Microsite-Logo.png
Bravium Virtual Event

Event Date: May 28, 2025
Hosted By: Bravium & Carahsoft
CPE credit available
Join us while we dive into the essentials for identifying and selecting high-value Agentic AI use cases.   During this webinar, we will: Discuss key considerations and criteria that help determine the best areas in your organization for AI-driven ...
f5-logo-rgb_transparent.png
Multi-Vendor Onsite Event

Event Date: May 28, 2025
Hosted By: F5, Red Hat, Peraton & Carahsoft
CPE credit available
Location: Canal Winchester, OH
F5 Tech on Tap is back for 2025!   Join F5, Red Hat, and Peraton for this interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat ...
Multi-Vendor Virtual Event

Event Date: May 29, 2025
Hosted By: Google Cloud, Redis & Carahsoft
CPE credit available
Join Google Cloud and Carahsoft for an exclusive deep dive into the latest innovations with Redis. From seamless data integrations and cutting-edge geospatial capabilities to active-active deployments across availability zones and the world's fastest vector database—Redis is transforming ...
threatER_-_Logo_Color_.png
threatER Virtual Event

Event Date: May 29, 2025
Hosted By: threatER & Carahsoft
CPE credit available
Today’s SLED environments are more distributed than ever with libraries, schools, remote offices and field teams all relying on secure Wi-Fi and cloud-connected infrastructure. But these access points are now prime targets for threat actors who bypass traditional perimeter defenses. In ...

Resources


No resources were found. Please try another search.