Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Thales_LOGO_.png
Multi-Vendor

When AI Learns to Breach and Quantum Learns to Decrypt: The Endgame


Event Date: June 26, 2025
Hosted By: Thales TCT, SandboxAQ & Carahsoft

As public and private sectors accelerate AI adoption, they're deploying it atop cryptographic foundations built for a human-centric world. This results in a surge of non-human identities such as service accounts, agentic AI, machine-to-machine workflows, many authenticated by expired, weak or untracked keys. 

These digital actors now outnumber humans across critical systems and often hold far more privilege. When they fail or are exploited, the fallout is immediate: stolen IPunauthorized access and large-scale data exfiltration that often goes unnoticed until it's too late. 

This webinar explored how adversaries, many AI-enabled themselves, are exploiting cryptographic blind spots to impersonate trusted systems, bypass controls and steal encrypted data. We'll connect cryptographic mismanagement to the sharp rise in supply chain breaches, credential abuse, ransomware campaigns and compliance failures. 

Attendees of this webinar learned: 

  • How AI and quantum threats converge at the cryptographic layer 
  • Real-world cases where IP theft and identity compromise stemmed from poor key and certificate management 
  • How to apply quantum-resistant cryptography to secure the generation of non-human identities
  • A practical cryptographic inventorying framework to improve visibility, enforce control and meet mandates like NSM-10 and OMB M-23-02

Fill out the form below to view this archived event.


Resources


OpenText Vulnerability Assessments and Penetration Testing Methodology
Resources

OpenText Vulnerability Assessments and Penetration Testing Methodology

When you partner with OpenText for security testing, you’re being supported by a team of industry experts with backgrounds spanning information management technology, security operations, data security, application security, and identity and access management. Our tools and methodology safely mimic behaviors and strategies of today’s most sophisticated malicious actors, performing full-spectrum vulnerability, penetration, and other security assessments to test your organization’s systems with a single goal—to identify areas of weakness and provide clear, prescriptive guidance to remediate any issues that pose a risk.


Fill out the form below to view this Resource.