Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

BeyondTrust-microsite.png
BeyondTrust

BeyondTrust's Securing Paths to Privilege Vision for Public Sector


Event Date: June 12, 2025
Hosted By: BeyondTrust & Carahsoft
Location: Tampa, FL

In this two-hour session, BeyondTrust explores what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur.

Topics covered:

  • What modern identity security means and how it fits within zero trust frameworks
  • What paths to privilege are and how attackers target them to undermine security
  • Why traditional tools don’t go far enough to address today’s hybrid environments and the importance of features like JIT access and automated workflows
  • Better Together 3rd party integrations, specifically with ServiceNow
  • Use cases for education & government agencies  

Resources


Privileged Access Management is Essential to Zero Trust
Whitepaper

Privileged Access Management is Essential to Zero Trust

Privileged Access Management (PAM) marks one potential pathway towards achieving the Zero Trust mandate to "never trust, always verify," a principal that is critically important to the protection of agency systems while enabling the access and usability demands of modern users.

In this Government Business Council expert dialogue, you'll gain insights into the government cybersecurity landscape - and how privileged access management can be used to mitigate risk - from the following cybersecurity experts:

  • Mike Witt - Senior Agency Information Security Officer and Chief Information Security Officer, National Aeronautics and Space Administration
  • Gerald Caron - Chief Information Officer / Assistant Inspector General for Information Technology, U.S. Department of Health and Human Services, Office of the Inspector General
  • Jeremy Wilson - Deputy CISO for Security Operations, State of Texas Department of Information Resources

Fill out the form below to view this Resource.