SOC of the Future: Advanced Strategies for Modern Cybersecurity Challenges

Carahsoft-Innovative Care for Shadow Warriors-blog-embedded image-2025

In today’s fast-paced digital world, security teams are under immense pressure to defend against a surge in sophisticated cyber threats. Expanding attack surfaces, driven by new technologies, cloud adoption, remote work and interconnected devices, create countless entry points for attackers. Security Operations Centers (SOCs) must evolve by leveraging automation, AI and machine learning (ML) to stay ahead—cutting through the noise, accelerating threat detection and streamlining responses to provide scalable, real-time defense against ever-evolving risks.

Modern SOC Challenges

As cyber threats continue to rise in both frequency and sophistication, SOCs are coping with an overwhelming volume of security incidents. Check Point Software’s 2025 Security Report reveals a staggering 44% year-over-year increase in cyberattacks, highlighting the urgent need for stronger, more scalable defenses.

Organizations are no longer operating within clearly defined perimeters. Today’s digital environments are sprawling and dynamic, spanning on-premises infrastructure, multi-cloud deployments, software as a service (SaaS) platforms, Internet of Things (IoT) devices and a remote workforce. Each layer adds complexity—and with it, new vulnerabilities. The expanding attack surface increases not only the number of potential entry points but also the volume of activity that must be monitored.

This leads to another major challenge: organizations are now generating unprecedented volumes of security data. SOCs are tasked with analyzing vast, continuous streams of telemetry to detect threats in real time but extracting meaningful insights from this flood of data has become increasingly difficult.

While traditional Security Information and Event Management (SIEM) systems remain a core component of enterprise security, they are struggling to keep up. Many SIEM platforms are constrained by schema designs, database capacity and a limit on the number of detection rules that can be ingested.

As a result, SOCs are often forced to make difficult trade-offs, choosing which data to collect and analyze based on storage and processing limitations. This selective approach creates blind spots, potentially allowing critical threats to go undetected. In fact, 56% of organizations report coverage gaps directly linked to the limitations of legacy SIEM systems, underscoring the need for modernization.

Alert fatigue is compounding the issue. Even well-configured SOCs can generate thousands of alerts daily, overwhelming analysts and increasing the risk of real threats being missed. According to a 2023 RSA survey by Gurucul, 61.37% of security teams report receiving more than 1,000 alerts per day, while 4.29% deal with over 100,000. Alarmingly, 19.74% say the volume is so high they cannot even quantify it.

SOC Prime-SOC of the Future-blog-embedded image-2025

Beyond the operational strain, cost is another major barrier. A medium-sized organization can produce terabytes of log data every day, and storing and processing this information—especially at the scale required for comprehensive threat detection—can cost hundreds of thousands annually. SOC leaders are under constant pressure to strike a balance between broad visibility and tight budget constraints.

In this high-volume, high-velocity environment, traditional manual analysis simply cannot keep up. To close visibility gaps, reduce alert overload and operate efficiently at scale, organizations must adopt intelligent automation. Advanced analytics, ML and AI-driven detection can dramatically reduce noise, prioritize critical alerts and help SOC teams focus on what matters most—responding to real threats in real time.

The Role of Automation in SOC

Automation is a key force multiplier for SOC teams, enhancing threat response speed and accuracy. Over the past decade, security orchestration, automation and response (SOAR) solutions have had mixed success. While these solutions streamline workflows and incident response, they require significant maintenance, including scripting, playbook development and continuous security stack integration. The high total cost of ownership often outweighs initial investments, making long-term sustainability a challenge.

To address these limitations, SOCs are adopting telemetry pipelines, which intercept and filter traffic before SIEM processing, ensuring only relevant security data is analyzed. Advanced enrichment reduces redundant data, improving efficiency while lowering cloud storage costs.

Extended detection and response (XDR) solutions are also gaining traction. XDR integrates multiple security layers, correlates alerts locally and reduces reliance on centralized SIEMs. Vendor-specific XDR stacks work best within their own ecosystems but streamline threat detection and response.

Data lakes are becoming essential for long-term threat hunting, enabling analysts to detect subtle, prolonged attacks by retaining historical data for extended periods. This allows analysts to uncover patterns that might otherwise go unnoticed.

As SOC automation evolves toward autonomous SOC models and “SOCless” SIEM architectures, ML-driven algorithms will handle much of the processing and correlation, facilitating faster threat detection and response. By automating repetitive tasks like log analysis and low-level alert triage, SOC analysts can focus on complex investigations, enhancing security while addressing the skills gap.

Still, Gartner predicts that by 2030, 75% of SOC teams will see a decline in core security analysis skills as they grow too reliant on automation and AI. Therefore, deployments aimed at both augmenting human tasks and adding precision and speed to human investigations will be more effective than single-technique AI analytics. Striking the right balance between machine-driven speed and human insight seems like a feasible solution that keeps security teams agile, informed and in control of threats.

Evolving Technologies and Solutions

AI and ML capabilities enhance predictive analytics and threat-hunting capabilities, keeping SOC teams ahead of attackers. According to Gartner, by 2026, advancements like “action transformers” and the continued evolution of Generative AI (GenAI) will power semi-autonomous platforms that can greatly enhance and support the day-to-day operations of cybersecurity teams.

As cybersecurity AI assistants evolve, they will be used as more sophisticated tools for interactive support and investigation, covering tasks like incident response, risk assessment and code reviews. These tools are expected to boost efficiency and reduce response times, whether in organizations just building their security programs or in mature teams with established processes. These innovations improve threat detection and SOC readiness to withstand modern cyber risks.

Future SOC Operations

Progressive organizations understand the real value of AI/ML-powered SOC technologies that can be reasonably used and shift their focus from single-technique tools to building integrated systems that fuse software, AI and human expertise. Achieving scalable impact means having a clear strategy that targets the most meaningful opportunities.

Additionally, investment in workforce development and upskilling will be essential to bridging the cybersecurity talent gap. Organizations that invest in these areas will elevate their SOC effectiveness, better safeguard critical assets and build a resilient, future-ready cybersecurity posture.

To gain deeper insights into these strategies and hear directly from industry experts, watch SOC Prime’s webinar, “The SOC of the Future: Advanced Strategies to Evolve SOC for Modern-Day Enterprise Cybersecurity.”

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including SOC Prime we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Modern Fraud Threats in Government Relief Programs: How Agencies Can Defend Against Cybercrime

A recent investigation by CBS News’ “60 Minutes” has highlighted a significant issue: organized crime rings, often operating from overseas, are using stolen identities to steal billions of dollars from the U.S. Federal and State programs. These sophisticated fraud schemes specifically target public assistance initiatives, taking advantage of digital vulnerabilities and overwhelmed systems. The COVID-19 pandemic accelerated the delivery of relief funds, presenting new challenges for security systems still being implemented.

As these cyber-enabled crimes grow in complexity and scale, Public Sector organizations must evolve their defenses. HUMAN Security offers a modern solution that aligns with Public Sector standards and frameworks, like the NIST Cybersecurity Framework, to protect against automated fraud, account takeovers and bot-driven exploitation.

The Expanding Threat Landscape: Government Fraud at Scale

The fraud rings described in the CBS report do not fit the Hollywood stereotype of a lone hacker in a basement. These are industrial-scale operations run by criminal syndicates that:

  • Use stolen or synthetic identities to apply for public benefits such as unemployment insurance, COVID relief, food assistance and housing vouchers.

  • Leverage bots and automated scripts to rapidly test stolen credentials against Government login portals.

  • Host phishing websites and fake document generators to fool verification systems.

  • Exploit the lack of robust digital defenses in legacy Public Sector infrastructure.

At the height of the pandemic, the U.S. prioritized the rapid distribution of trillions in relief funds to support individuals and businesses in crisis. In the urgency to deliver aid quickly, some agencies adjusted standard fraud controls—creating unforeseen opportunities for bad actors. According to the CBS report, an estimated $280 billion was lost to fraud, with an additional $123 billion categorized as wasted or misused.

The tactics employed have now evolved into permanent tools of financial exploitation. Many cybercriminals continue to exploit social welfare and Government programs by leveraging automation and AI. Fraud isn’t slowing down—it’s scaling up.

Why Public Sector Agencies Are Attractive Targets

Government systems present a unique target profile for attackers due to a combination of high-value data, broad user bases and strained IT resources. Here’s why the Public Sector is particularly vulnerable:

1. High Payout Potential

Each successful fraudulent claim can yield thousands of dollars in benefits. Fraudsters often operate in bulk, submitting thousands of applications using stolen identities.

2. Legacy Infrastructure

Many State and Local agencies still operate on outdated software stacks that lack modern bot detection or behavior-based threat analysis.

3. Lack of Real-Time Monitoring

Fraudulent applications often go undetected until after funds are dispersed. Manual review processes are insufficient to handle the volume of claims.

4. Increased Script & API Vulnerabilities

Fraudsters exploit front-end vulnerabilities, such as JavaScript manipulation or misuse of APIs, to simulate real user activity, bypass verification checks and deploy fake documents.

HUMAN Security: A Modern Solution for a Modern Threat

Carahsoft, HUMAN 60 min, blog, embedded image, 2025

HUMAN Security specializes in protecting organizations from automated attacks, fraud and abuse by distinguishing between real users and malicious bots. HUMAN’s solutions are uniquely positioned to help Public Sector agencies address the specific types of fraud exposed by 60 Minutes.

1. Bot and Automation Mitigation

Fraudsters frequently use bots to submit applications at scale, probe systems for weaknesses and conduct credential stuffing attacks. The HUMAN Defense Platform analyzes over 20 trillion digital interactions weekly to identify real-time anomalies.

Through behavioral analysis, device fingerprinting, and machine learning, we can help public sector clients:

  • Detect non-human interaction patterns
  • Prevent fake accounts from being created
  • Block bot-driven denial-of-service or overload attempts

2. Account Takeover & Credential Abuse Defense

Many fraud schemes begin with access to a real person’s Government credentials. We prevent account takeovers by identifying compromised credentials in real time and helping clients stop  unauthorized login attempts.

Our Application Protection Package also integrates into public-facing login portals to block brute-force attempts and detect unusual login behavior.

3. Fake Identity and Synthetic Account Prevention

Fraudsters use fake IDs or generated synthetic identities to bypass identity checks. Our behavior-based analytics distinguish real users from fabricated personas—stopping fake account creation before it starts.

4. Real-Time Threat Intelligence:

By continuously monitoring emerging threats, we equip Public Sector clients with up-to-date information to counteract evolving fraud tactics.

5. Integration with Public Sector Frameworks:

Leading-edge solutions that align with standards like the NIST Cybersecurity Framework, HUMAN facilitates seamless integration into existing Government infrastructures and helps public sector clients with compliance and regulatory requirements.

Real-World Benefits to Government Agencies

By adopting fraud protection solutions, public agencies can:

  • Minimize Fraud Risk: Real-time prevention minimizes the risk of sending funds to bad actors.

  • Protect Citizens: Reduce identity theft and unauthorized access to sensitive citizen data.

  • Build Trust: Demonstrating robust cybersecurity fosters public trust in digital Government systems.

  • Streamline Compliance: Meet modern standards like PCI DSS 4.0 requirements 6.4.3. & 11.6.1 and NIST CSF with confidence.

  • Save Taxpayer Dollars: Every fraudulent dollar blocked is money that can be returned to real beneficiaries or saved for future programs.

A Call to Action for Government Leaders

The fraud revealed in the CBS 60 Minutes report isn’t an isolated event—it’s a warning sign. Digital transformation has accelerated across public agencies, but fraud defenses haven’t always kept pace.

Government leaders must take a proactive stance by:

  • Modernizing fraud detection capabilities

  • Closing visibility gaps across digital infrastructure

  • Adopting behavior-based, real-time defenses like HUMAN Security

  • Aligning security strategy with established frameworks (NIST, PCI DSS)

Fraud is no longer just a compliance risk—it’s a national security issue. As public trust and taxpayer funds hang in the balance, Government agencies must embrace modern, intelligent and automated defense systems to keep fraudsters out.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including HUMAN Security we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

The Importance of Data, AI and More Within Law Enforcement at IACP Technology Conference 2025 

The International Association of Chiefs of Police (IACP) Technology Conference 2025 is an annual law enforcement conference that hosts public safety professionals and technology thought leaders to discuss new solutions, techniques and trainings to equip the industry for success. With a strong law enforcement portfolio and deep industry ties, Carahsoft offers unmatched insight into the challenges agencies face today. 

By bridging the gap between top software providers and law enforcement agencies, Carahsoft’s Law Enforcement Technology Team helps both sworn and civilian personnel streamline operations, enhance decision-making and drive greater efficiency across all aspects of public safety.  

Carahsoft and over 20 of our vendors, including Cellebrite, Zebra, Saferwatch, Blackberry and Magnet Forensics, attended and ran demos of their solutions across data management and analytics, artificial intelligence (AI), emerging technology, forensics, and device security. 

Here are the 5 most relevant themes featured at the IACP Technology Conference 2025. 


Integrating Artificial Intelligence into Law Enforcement 

At IACP Tech, discussions centered around integrating AI into law enforcement to increase efficiency while balancing transparency and accountability to real-time threats. In the panel “Transforming Policing with AI: Efficiency, Accuracy and Ethical Considerations for Report Writing,” panelists underscored how AI can streamline administrative tasks, reduce the time officers spend on documentation and improve the overall accuracy and quality of police reports. Speakers also highlighted that the integration of AI must be accompanied by transparency and accountability. They stressed the importance of clearly disclosing when reports are generated or supported by AI to maintain public trust and uphold ethical standards. In the panel “Curb Your AI Through Privacy Impact Assessments,” speaker Nora Kurzova, the State Auditor of the State of Utah Office, explored the ethical implications that come with predictive AI in law enforcement. Kurzova drew attention to bias present in predictive tools, stressing the importance of human oversight to correct potential biases. With rigorous evaluations of the decisions that automated systems enact, law enforcement can ensure fairness and a positive impact on communities. 


Carahsoft, IACP 2025, blog, embedded image, 2025

Emerging Technologies in Law Enforcement 

For modern criminal investigations, law enforcement faces growing complexity in managing and analyzing mass volumes of digital data. As the volume of data generated by connected devices continues to surge, investigators must adapt software that enables timely and efficient data recovery. Critical evidence can come from a variety of sources, such as Nest cameras, smart rings, thermostats and even gaming consoles. Human augmentation technologies, including smart glasses, brain-computer interfaces and mixed reality devices, were all identified as new frontiers that officers could utilize during investigations. By utilizing unconventional data points as corroborative tools and avenues for new leads, law enforcement can increase its investigative awareness.  


Breakthroughs in Digital Forensics 

At the panel “Advancements in Criminal Investigations: Increasing Solve Rates with Technology,” speaker Ed O’Carroll, a retired Major of the Crimes Bureau from the Fairfax County Police Department, emphasized the transformative impact of advanced investigative technologies in resolving challenging criminal cases. Advancements in digital forensics, genetic genealogy and rapid DNA testing have all transcended the abilities of law enforcement, enabling the solving of difficult cases. As IT continues to evolve, law enforcement can utilize strategic partnerships with technology organizations to improve its digital forensics capabilities and reduce backlogs. With recent technological breakthroughs, skilled crime analysts and forensic professionals can maximize their potential through these revolutionary tools. 


The Importance of Interoperable Data in Public Safety 

Law enforcement depends on thorough and accurate analytics to improve and maintain capabilities. In the panel “Breaking the Data Chains: Advocating Open and Interoperable Solutions in Public Safety,” speakers explored the evolving role of data in public safety, with a strong emphasis on the importance of interoperability and open standards. Adopting open data standards enables seamless data exchange across systems and jurisdictions. Panelists called for greater vendor transparency and urged public safety agencies to include open data access provisions in their contracts to avoid vendor lock-in. Ultimately, by strengthening data sharing practices, public safety agencies can enhance operational effectiveness and fulfill mission objectives.  


Tailored, Interactive Training with Artificial Intelligence 

Law enforcement agencies are increasingly utilizing AI and virtual reality technologies to address resource constraints during training. In the panel “How Your Records Management Process Can Work for You—Leveraging RMS Functional Standards,” speaker Jeff Smythe discussed a statewide effort to revise curriculum by embedding AI tools into courses. By synthesizing practical data and automation, law enforcement can improve training and service quality.

Examples of this include: 

  • Utilizing real-world body camera footage to create simulated scenarios for training 
  • Collecting best practices to develop AI-powered virtual reality scenarios that feature immediate feedback and debriefing capabilities 
  • Implementing automated virtual reality scenarios to train soft skills, such as employee counseling and community engagement 

By simulating realistic, frequent tech-enhanced training, employers can significantly improve officer readiness and skill retention. AI and virtual tools offer scalable solutions to deliver consistent, high-quality training in an evolving public safety environment. 


As law enforcement professionals handle sensitive and vital information, the protection of that information and data is essential to carrying out fair and accurate investigations and procedures. Through tailored training, data analytics and AI, law enforcement can improve capabilities and focus resources on protecting civilians.  

To learn more about public safety related technology, visit Carahsoft’s law enforcement portfolio to explore solutions showcased at IACP Technology Conference. For additional research into the key takeaways that industry and Government leaders presented at IACP Technology Conference, view Carahsoft’s full synopsis of key sessions from the tradeshow.  

TechNet Cyber 2025: Top 5 Insights on Zero Trust, Interoperability and More 

Technology is a vital part of the United States Department of Defense (DoD)’s capabilities, making security and enhancements essential to the nation’s stability and growth. AFCEA International’s flagship event, TechNet Cyber, emphasizes the role of cybersecurity and IT within the DoD. Alongside its partners, such as such as Amazon Web Services (AWS), Everfox and Ciena, Carahsoft attended TechNet Cyber to support DoD mission objectives. Carahsoft maintains a unique position in the defense industry with the ability to connect DoD and intelligence community (IC) personnel, Government IT decision-makers, thought leaders and industry and vendor partners. At this year’s conference, leaders and operators in the IT and Defense Department joined to network, facilitate problem solving and explore ways to expedite and secure the procurement process.


Expanding Zero Trust: “Flank Speed” is Ready to Scale 

To safeguard against potential cybersecurity attacks, the DoD is working to secure its networks with Zero Trust, a security strategy focused on identity, credential and access management. In the session “DoD Zero Trust Success Stories,” David Voelker, Zero Trust Architecture Lead for the Department of the Navy, discussed recent initiatives to bolster Zero Trust within Flank Speed, the Navy’s single enterprise Microsoft 365 solution that provides productivity tools, collaboration tools and OneDrive storage. The Department of the Navy is planning to conduct autonomous penetration testing to determine the quality of Zero Trust capability implementation. Last year Flank Speed met 151 of 152 Zero Trust activities, meeting target far ahead of schedule. Flank Speed is the Navy’s single enterprise Microsoft 365 solution that provides productivity tools, collaboration tools and OneDrive storage.

Another speaker, Ian Leatherman, the Zero Trust Strategy Lead for Microsoft U.S. Federal, discussed key takeaways from Microsoft’s work with Flank Speed. Visibility into agency networks is critical to emboldening existing Zero Trust strategies. Mr. Leatherman stated, “When in doubt, collect the telemetry: you never know what new or novel adversary techniques you may find.” Knowing exactly how many endpoints, applications and users are on the network at any given time positions the DoD to swiftly deal with incoming threats. 

Leatherman also discussed recent initiatives to involve all Navy personnel in a cybersecurity strategy; security is more than a technology solution, but a way to ensure safety within the agency. David Voelker, Zero Trust Architecture Lead at the Department of the Navy echoes this statement. While the Zero Trust Portfolio Office set their DoD-wide Zero Trust adoption target as the end of fiscal year 2027, Flank Speed is already operational. Voelker notes that the Flank Speed configuration could be lifted and shifted to other customers in the DoD, with a quick deployment time of under 24 hours. Mr. Voelker also recommends automating this shift.  

Carahsoft and our vendor partners offer several cybersecurity solutions to help Government agencies implement Zero Trust architectures that protect critical information and reduce national security risk. Our offerings align with Public Sector Zero Trust maturity models developed by NIST, the DoD and CISA.  


Carahsoft, TechNet, blog, embedded image, 2025

How Mission Objectives Drive Acquisition  

Acquiring powerful, up-to-date technology enables the DoD to protect against persistent and increasingly sophisticated cyber-attacks. The DoD aims to streamline its procurement process to maintain pace and safeguard against attacks. In the session “DoD Software Modernization Senior Steering Group,” speaker Sean Brady, Senior Lead for Software Acquisition Enablers at the Office of the Undersecretary of Defense (Acquisition and Sustainment), explained that there are two key drivers to this transformation. The first is mission objectives; software should be tailored to allow the DoD to adapt its systems to rapidly changing threats. The second is access to commercial innovation, which allows the DoD to access products in weeks or months rather than years.  


Digital Transformation for Operational Effectiveness 

Digital transformation in the DoD is crucial for maintaining pace with an increasingly technology-driven security environment. Thomas W. Simms, Principal Deputy Executive Director for Systems Engineering and Architecture at the Office of the Under Secretary of Defense for Research and Engineering, discussed the major digital transformation efforts within the DoD. 

The main four are: 

  1. Modular Open Systems Approach (MOSA), a congressional requirement that integrates technical and business strategies to promote acquisition and drives modular designs 
  1. The DoD’s Digital Engineering Instruction, which requires programs to use digital engineering in their design process 
  1. Application Program Interfaces (APIs), a ruleset that allows communication between software applications and is driven by the DoD’s API guidebook, which enables the DoD to become more data-centric   
  1. The DoD’s System Engineering Guidebook, which is currently undergoing an update to incorporate guidance from the Secretary of Defense’s latest memos  

By modernizing legacy systems and enabling the DoD to acquire the newest and greatest in IT, these initiatives enhance operational effectiveness and improve decision-making speed.


Fast-Tracking Authority to Operate (ATO) 

In the defense industry, technology must be approved to mitigate security risks. The Software Fast Track (SWFT), a process that expedites software verification within the U.S. Government, is changing the way the DoD manages risks and conducts Authority to Operate (ATO). Contractors can get involved with the latest software acquisition and risk management changes by participating in the three recently released requests for information (RFIs).  

These RFIs, which close May 20th, are: 

Katie Arrington, the Acting DoD Chief Information Officer (CIO), also discussed the Software Fast Track (SWFT) set to launch on June 1st of this year. The initiative will replace the traditional Authority to Operate (ATO) structure and add a few requirements, such as third-party Software Bill of Materials (SBOM), third-party risk assessments and the population of Enterprise Mission Assurance Support Service (eMASS) with artifacts. Once these guidelines are in place, contractors will gain a Provisional ATO. 

Ms. Arrington attests that these changes will revolutionize the Risk Management Framework (RMF) by allowing industry experts to provide feedback to the DoD. Paper compliance isn’t enough anymore, Ms. Arrington says. The DoD is looking for “continuous monitoring, red-teaming and people to continually evaluate their capability.”  

She also added that the DoD will be sunsetting the Approved Products List (APL). Additional sponsor additions are no longer being accepted. Instead, the SWFT initiative will take over, establishing a “trust, but verify” procedure, promoting both security and swift ATO action.


Using Interoperability to Pitch to DoD 

As operations increasingly move online, interoperability becomes increasingly important to efficiency and accessibility. Venice Goodwin, the outgoing CIO for the Department of the Air Force, offered advice to industry professionals on navigating changes within DoD. Goodwin recommends that the industry practice “extreme teaming;” rather than service each department individually: vendors should focus on servicing the DoD as a whole. As the DoD prioritizes capabilities that have cross-departmental benefits, industry experts should demonstrate the effectiveness of their capabilities and solutions in every domain across land, sea, air and space. With this collaboration, both the Private and Public Sector can get the results they need.


The digital transformation journey within the Department of Defense represents not just an evolution of systems, but a commitment to defending interests at home and abroad. Acquisition, ATO and Zero Trust are all valuable assets to maintaining pace with the current, constantly evolving technological climate, ensuring the United States carries out its mission of protecting the nation. 

To learn more about mission-critical technology, visit Carahsoft’s defense portfolio to explore solutions showcased at TechNet Cyber. For additional research into the key takeaways that industry and Government leaders presented at TechNet Cyber, view Carahsoft’s full synopsis of key sessions from the tradeshow.  

National Laboratories Information Technology(NLIT) Summit 2025:Top 5 Insights on Automation, Cybersecurity and More

Technology enables Government agencies to strengthen security, increase efficiency and collaborate across departments. This year at the National Laboratories Information Technology (NLIT) Summit, representatives from the National Laboratories, Government IT decision-makers and industry and vendor partners gathered to discuss recent advancements in IT across the Department of Energy (DOE) labs, featuring panels, interactive sessions and demonstrations focused on emerging, mission-driven technologies. Carahsoft stood alongside its partners, such as Amazon Web Services (AWS), Snowflake and GitLab to support the DOE’s mission objectives. Together, we deliver secure, compliant solutions that drive innovation—from MultiCloud strategies and generative AI to streamlined IT procurement.

Here are the top themes discussed at this year’s summit.


Artificial Intelligence Exploration

The National Laboratories are at the forefront of advancing artificial intelligence (AI) and High Performance Computing (HPC) to meet critical mission objectives. Several DOE labs are showcasing this commitment through transformative initiatives. At Los Alamos National Laboratory, the establishment of the National Security AI Office and the deployment of the Venado AI supercomputer reflect a strategic focus on embedding AI into national security operations. Sandia National Laboratories is leading innovation with “vibe coding,” an AI-assisted development methodology that allows developers to generate code based on described functionality, streamlining the software development process.

To further accelerate AI and HPC capabilities, the National Laboratories are leveraging NVIDIA technologies, including GPU-powered infrastructure and AI toolkits, to support high-throughput data analysis, simulation and machine learning applications. This partnership enables scalable performance and energy-efficient computing tailored to complex scientific workloads.

In response to growing cybersecurity threats, labs are also deploying AI-driven automated response systems to detect and neutralize risks in real time. These combined efforts enhance the DOE’s cybersecurity posture while reinforcing the National Laboratories’ leadership in next-generation computing and AI innovation.


Argo: A New Generative AI Platform

As part of its development, Argo incorporates technologies from OpenAI to support advanced natural language processing and generative tasks. By integrating OpenAI models with internal controls and security protocols, Argonne can deliver high-performing language tools tailored to research and mission needs, without compromising data integrity.

Future enhancements to Argo will include:

  • Document upload for summarization and analysis
  • Adjustable response styles that range from creative and exploratory to focused and deterministic
  • Integration of Argonne-specific knowledge and internal documents for contextualized outputs
  • Onsite deployment of GPU resources to host fine-tuned and open-source LLMs, enabling operational applications such as translation, code generation and scientific research

Through Argo, Argonne is setting a benchmark for secure, mission-aligned AI deployment across the DOE ecosystem.


An Automated Approach to Cybersecurity 

Sandia National Laboratories emphasized the critical need to embed security at every stage of the software development lifecycle through a DevSecOps approach. In the session “From DevOps to DevSecOps: ASC DSO at Sandia’s Journey toward Secure Software” Stuart Baxley, a Senior Research & Development Computer Scientist shared how Sandia integrates automated tools and continuous monitoring to enable early threat detection and fast remediation—reducing both risk and cost compared to reactive approaches. Agencies with automation tools, such as GitLab, enable the National Laboratories to manage their unique software development environments.

To enhance cybersecurity posture, Sandia recommends the adoption of key security practices and tools, including. Static Application Security Testing (SAST), Software Bill of Materials (SBOM) and container scanning. Leveraging these capabilities is essential to maintaining resilience in an increasingly complex and dynamic threat environment.


Efficiency Through the Cloud

Lawrence Berkeley National Laboratory has advanced its cloud adoption efforts through the Materials Project initiative, leveraging Amazon Web Services (AWS) to significantly improve the availability, accessibility and scalability of its data products. This successful deployment offers a strong blueprint for other national laboratories exploring cloud migration.

By transitioning to cloud infrastructure, the lab has unlocked a range of strategic benefits including enhanced collaboration, improved high-performance computing capabilities, robust encryption and data security and accelerated AI-driven research. These advantages position cloud adoption not just as a technical upgrade, but as a critical enabler of research efficiency, data innovation and scientific discovery in today’s increasingly data-intensive environment.


Managing Diverse Data

As datasets across the National Laboratories continue to grow in size and complexity, effective data management becomes increasingly challenging. Oak Ridge National Laboratory advocates for a holistic approach, recognizing that no single tool can address every need. Instead, the focus should be on strengthening data transfer capabilities and adopting integrated strategies to improve overall data mobility and accessibility.

In alignment with federal mandates, laboratories and agencies managing research data must prioritize the following:

  • Transparency – ensuring data is accessible to the public to support open research
  • Up-to-date data management practices – implementing current tools and processes
  • Comprehensive audit trails and metadata documentation – maintaining accountability and traceability

By improving data transfer methods and aligning with these core principles, National Laboratories can enhance collaboration, uphold security standards and maximize the impact of their research.

Through a combination of strong data governance, cloud adoption, AI integration and cybersecurity automation, the National Laboratories remain committed to advancing innovation and IT excellence across the DOE ecosystem.


Through data management, cloud application, AI and cybersecurity automation, the National Laboratories maintain a comprehensive strategy to continually fulfill their mission of advancing IT knowledge and collaboration across the DOE.

To learn more about technologies featured at NLIT, visit Carahsoft’s artificial intelligence portfolio.


The Top CMMC Events for Government and the DIB in 2025 

With the release of the Cybersecurity Maturity Model Certification (CMMC) 2.0 framework, 2025 marks a pivotal year for education, collaboration and implementation across the Defense Industrial Base (DIB). As compliance standards evolve, this year’s lineup of CMMC-centric events offers defense contractors, cybersecurity professionals and Government stakeholders unparalleled opportunities to deepen their understanding, explore new solutions and engage directly with policy leaders and technology providers. Below is a preview of the key events shaping the CMMC landscape in 2025—and how Carahsoft and our partners are helping to drive the conversation forward. 

CEIC West 

May 21-23 | Las Vegas, NV | In-Person Event 

​CEIC West 2025, the official conference of The Cyber AB, is the premier event for defense contractors and cybersecurity professionals focused on implementing the CMMC 2.0 framework. Hosted by Forum Makers, this conference offers practical strategies to help organizations achieve compliance and secure their place in the DIB. Attendees will benefit from expert-led sessions, hands-on workshops and networking opportunities with key figures from the DoD and The Cyber AB. Additional highlights include pre-conference training, the Women of CMMC Dinner and the Tech for Troops Golf Tournament. Learn how to close security gaps, manage costs and tackle the real-world challenges of CMMC compliance at CEIC West 2025. 

Sessions to look out for:  

  • Keynote: “Protecting CUI, Federal Contractors and the Future of CMMC” feat. Katie Arrington, CIO, DoD 
  • “CMMC Beyond the DoD: Preparing for a Broader Compliance Landscape” 

Carahsoft will present a Solutions Showcase spotlighting a group of partners that provide CMMC compliance tools tailored for the DIB. Numerous resources and solutions providers —including those in Carahsoft’s “Solutions Showcase” such as Cyturus, Lifeline Data Centers, Axonius Federal Systems, ISI Defense and Paramify— will be available for attendees seeking to learn more about CMMC and Carahsoft’s role in the program. Join us at the pre-conference golf tournament as Carahsoft is proud to be the Beverage Sponsor of this charitable event! 

Carahsoft CMMC Webinar Series 

August 12-14 | Virtual Event 

Carahsoft upcoming webinar series offers a comprehensive look at the latest updates to the CMMC program, providing DIB stakeholders with the insights needed to achieve and maintain compliance. Through a series of expert-led sessions, participants gain a clear understanding of the CMMC framework and learn how to implement effective cybersecurity practices aligned with Federal requirements. Whether you are just beginning your compliance journey or looking to strengthen your existing posture, this series delivers actionable guidance for all levels of the CMMC compliance journey. 

The Carahsoft CMMC Webinar Series will feature a number of partners to share insights and offer practical solutions for achieving compliance. Check out our website for more information and to register as we get closer to the event date. 

National Cyber Summit 

September 23-25 | Huntsville, AL | In-Person Event 

The National Cyber Summit 2025 is the nation’s most innovative cybersecurity technology event, offering unique opportunities for education, collaboration and workforce development. Hosted by the North Alabama Chapter of the Information Systems Security Association (NAC-ISSA), Cyber Huntsville Corporation (CHC), Auburn University Research and the University of Alabama in Huntsville, the summit brings together participants from Government, industry and academia. Attendees can expect a comprehensive agenda featuring expert-led sessions, hands-on training and valuable networking designed to foster collaboration and innovation across the cybersecurity landscape. With its strong emphasis on advancing best practices and protecting national interests, the National Cyber Summit remains a must-attend event for the cybersecurity community.  

Carahsoft will host a Partner Pavilion highlighting trusted technology providers focused on CMMC compliance solutions for the DIB. This space will serve as a hub for attendees to explore Carahsoft’s extensive lineup of solutions providers and educational resources, offering access to experts and compliance tools. 

CS5

October 16-17 | Washington, D.C. | In-Person Event 

The essential gathering for Defense Contractors and their Subcontractors to get CMMC compliance right. CS5 is the one conference that brings the entire compliance ecosystem together. From the experts who prepare you (RPOs) to the auditors who assess you (C3PAOs) and the training and tool providers who support you every step of the way. Start here to deliver CMMC compliance to your organization. Return here to optimize your path. If you’re in the defense industrial base, you can’t afford to miss it.

Carahsoft will have a Solutions Showcase for partners that provide CMMC compliance solutions to the DIB. This showcase will provide attendees with a hands-on opportunity to explore Carahsoft’s expansive network of compliance-focused technologies and gain insights into the tools, services and support available to guide them through every phase of their CMMC journey. 

DoDIIS *Canceled for 2025

December 7-10 | Fort Lauderdale, FL | In-Person Event 

​The 2025 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference is a premier event that brings together senior decision-makers, technical experts and innovators from the DoD, Intelligence Community (IC), industry, academia and Five Eyes (FVEY) partners. This immersive conference offers a unique platform for collaboration and knowledge sharing, focusing on the integration across the IC and the rapid development and deployment of mission-focused solutions. Attendees will have the opportunity to engage with a comprehensive selection of sessions, interact with a broad range of leaders and showcase solutions addressing issues impacting mission users. The event also features dynamic speakers, innovative technologies and networking socials, providing an invaluable experience for all participants.  

Carahsoft, Top CMMC Events, blog, embedded image, 2025

Carahsoft will host an expansive Partner Pavilion highlighting cutting-edge technologies that support defense and intelligence missions. Within this space, our Cyber booth—located in the Vertical Alley”—will feature a demo station from our CMMC team. 

CMMC Day 

May 5, 2026 | College Park, MD | In-Person Event  

Join industry leaders at the 6th annual CMMC Day 2026, where the Defense Industrial Base (DIB) will come together to navigate the shift from compliance to competitiveness under CMMC 2.0. With over 300,000 U.S. Government subcontractors soon to be impacted, this one-day conference offers essential insights into the CMMC framework’s wide-reaching implications for Federal supply chain security. CMMC Day delivers expert-led sessions from the National Institute of Standards and Technology (NIST), the National Information Assurance Partnership (NIAP), the National Security Agency (NSA) and other key players, guiding attendees through NIST 800-171, foundational cybersecurity standards and the maturity model’s evolving requirements.  

Whether you are a product vendor, integrator, testing lab or Government official, you will gain actionable knowledge, connect with the full industry value chain and leave better equipped to assess, prepare and certify under the new framework. 

Carahsoft is looking forward to showcasing our partners who deliver innovative CMMC compliance solutions for the Defense Industrial Base at CMMC Day 2026. The event will spotlight Carahsoft’s broad portfolio of resources and solution providers, making it a must-attend opportunity for those preparing for or advancing their role in the CMMC ecosystem. 

CS2 Reston 

May 6-7 | Reston, VA | In-Person Event 

The Cloud Security and Compliance Series (CS2) Reston, hosted by Summit 7, brings together defense contractors and IT leaders to learn about Federal cybersecurity requirements. With the CMMC rule now published, the CS2 Reston delivers critical guidance on achieving compliance with CMMC 2.0, NIST 800-171, Defense Federal Acquisition Regulation Supplement (DFARS) 70 Series—7012, 7019, 7020—and International Traffic in Arms Regulations (ITAR), as well as securing Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). Featuring expert-led sessions, real-world case studies and technical breakouts, the agenda includes speakers from The Cybersecurity Assessor and Certification Body (Cyber AB), Microsoft, Summit 7 and others. CS2 Reston is a must-attend event for Chief Information Security Officers (CISOs), IT administrators and compliance professionals seeking practical insights and peer connections in the evolving defense cybersecurity landscape.  

Carahsoft will exhibit at CS2 Reston, engaging with attendees interested in learning more about our cybersecurity solutions portfolio and educational resources. Look out for our 2026 involvement on our website. 

SOF Week 

May 5-8 | Tampa, FL | In-Person Event 

​SOF Week is the premier global gathering for the Special Operations Forces (SOF) community. Jointly hosted by U.S. Special Operations Command (USSOCOM) and the Global SOF Foundation, this annual event brings together over 19,000 attendees—including SOF operators, defense industry leaders, policymakers and international partners—to collaborate on advancing the future of special operations. Attendees can expect a dynamic agenda featuring senior keynotes, breakout sessions, live demonstrations and a multi-venue exhibition showcasing cutting-edge technologies.  SOF Week offers unparalleled opportunities to network, learn and contribute to the global SOF mission. 

Carahsoft will host a large Partner Pavilion at SOF Week 2026, where attendees can explore a wide range of mission-focused technologies from our partners. Look out for more information about our involvement in 2026 on our website. 

TechNet Cyber 

May 6-8 | Baltimore, MD | In-Person Event 

TechNet Cyber 2026, hosted by the Armed Forces Communications and Electronics Association (AFCEA) International, is a premier event uniting military, Government, industry and academic leaders to tackle the ever-evolving challenges in cyberspace. The conference emphasizes collaborative strategies to strengthen cyber resilience and outpace adversaries. Attendees will gain valuable insights from top officials at United States Cyber Command (USCYBERCOM), the Defense Information Systems Agency (DISA), the Department of Defense Chief Information Officer (DoD CIO) office and other key agencies. Sessions will cover zero trust architecture, artificial intelligence (AI) integration and cyber workforce development. Featuring a robust exhibit hall and targeted networking opportunities, TechNet Cyber offers a comprehensive platform for driving cybersecurity innovation across the Public and Private Sectors.  

Carahsoft will host a Partner Pavilion showcasing cybersecurity solutions from our leading technology partners such as Cyturus. Check out our website as we look forward to our 2026 involvement. 

Looking Ahead: 

Whether you are just beginning your CMMC journey or looking to enhance your existing compliance strategy, these 2025 events provide a critical forum for insight, innovation and connection. With each event tailored to address the most pressing challenges facing the DIB, participants can expect actionable takeaways, hands-on demos and valuable discussions with experts across Government and industry. Carahsoft is proud to support these initiatives through our presence at each event, along with our robust ecosystem of CMMC-focused partners and resources. 

Explore Carahsoft’s full CMMC solutions portfolio and learn how we can help support your compliance efforts. 

Nutanix AHV and Rubrik’s Layered Security – The Key to System Resilience and Efficiency

Protecting critical infrastructure from cyber threats and ensuring business continuity in the face of disasters is a top priority for organizations today. Luckily, Nutanix AHV, a modern, secure virtualization platform that powers and enhances virtual machines (VMs), can help. Rubrik’s integrated solutions fortify AHV environments against ransomware attacks and enable efficient disaster recovery. By leveraging features like immutable backups, anomaly detection and on-demand cloud-based disaster recovery, organizations can enhance their cyber resilience and minimize the impact of disruptive incidents.

A Simple and Secure Path to VM Management

Nutanix AHV is simple to use and secure by design. The platform works through a centralized control plane, where AHV is integrated into a single application programming interface (API). This eradicates a complicated setup on the customer side. By maintaining constant management and a virtualization layer, Nutanix AHV allows organizations to fulfill mission objectives.

Nutanix AHV features several built-in security features, such as micro-segmentation, data insights, audit trails, ransomware protection and data age analytics.

Nutanix features:

  • Built-in, self-healing abilities protect against disk failure, node failure and more
  • A vulnerability patch summary automatically alerts users about susceptibility risks and anomalies that need to be addressed
  • A life cycle manager provides readmittance testing and deployment testing
  • More than one copy of backup data, ensuring that users do not lose valuable information
  • Multi-site replication including to and from the public cloud.

Securing data in Nutanix AHV requires more than just the basic perimeter defenses, but a multi-layered strategy. With Rubrik’s data protection abilities, which include immutable backups, automatic encryption and logical air-gapping, agencies and organizations can recover information within minutes and resume mission objectives in the event of a breach.

Securing Data with Rubrik’s Rapid Recovery Abilities

Rubrik, a security cloud solution provider that keeps your data resilient, enables the near-instant recovery of virtual machines and data within the Nutanix AHV environment. Rubrik provides multiple recovery options within AHV, such as file-level recovery, live mount, export, mount virtual disks and downloadable virtual disk files. Through Rubrik, businesses can recover files from older hypervisors into newer AHV environments without having older hypervisors online. Once granted access to the AHV environment, Rubrik automatically discovers and integrates protocols and base level policies for VMs. Rubrik’s recovery process restores data in minutes, regardless of VM size. As VMs get larger and larger, frequently hitting 50 terabytes, this speedy and precise response empowers organization’s incident response plans to be swift and efficient. After scanning the meta data, users are granted file level recovery after anomaly detection, allowing users oversight on affected data.

As the data that organizations manage grows exponentially, data security becomes critical to business functions. Rubrik offers comprehensive data security, continuously monitoring and remediating data risks within the network.

Through Rubrik, businesses can recover files from older hypervisors into newer AHV environments without having older hypervisors online. Once granted access to the AHV environment, Rubrik automatically discovers and integrates protocols and base level policies for VMs.Rubrik’s recovery process restores data in minutes, regardless of VM size. As VMs get larger and larger, frequently hitting 50 terabytes, this speedy and precise response empowers organization’s incident response plans to be swift and efficient.After scanning the meta data, users are granted file level recovery after anomaly detection, allowing users oversight on affected data.

Rubrik also provides constant monitoring for backups. Typically, businesses do not regulate data backlogs, which increases the likelihood that they miss attackers that sit in the system environment for a few days before collecting data. With Rubrik’s threat monitoring and hunting, organizations can search through backups and detect when an anomaly entered the environment. Through Nutanix and Rubrik’s integration, IT teams can reduce complexity, gain oversight, cut down on operational costs and improve resiliency and efficiency.

Automation: The Key to a Proactive Incident Response

Modern cyber threats require a proactive approach to incident response. With automation and orchestration, facilitated by the combined capabilities of Nutanix and Rubrik, organizations can detect, respond to and recover from cyber incidents more efficiently.

Rubrik has a built-in anomaly detection, which searches protected data for strange behavior, such as mass deletion or encryption. As the volume of data on a network increases, organizations often have sensitive data they are not actively monitoring or even know sensitive data maybe exposed. Rubrik clusters are always scanning protected data for anomalies, sensitive data, and known IOC’s allowing customers to select resolution options, such as isolating compromised VMs, or the ability to restore product systems from last known good copies.

Readiness impacts recovery time, and recovery time impacts organization operations. Nutanix AHV’s recovery organization authorizes IT teams to organize VMs into a set of templates, which can be used to create blueprints and launch application recovery. Nutanix also provides organizations with the flexibility to apply policy to each workload, taking control of network security and BC/DR policy with VM level granularity. By allowing organizations to map out their application owners, Nutanix AHV enables businesses to move from a reactive to a proactive security posture, minimizing the impact of attacks and ensuring swift recovery.

Nutanix and Rubrik’s integration creates a powerful security and operational synergy, empowering organizations with the tools they need for network safety and, if necessary, a swift and comprehensive restoration of critical systems, empowering organizations to resume business missions. Nutanix AHV enables organizations to reduce complexity, improve security and achieve a higher level of resilience and operational efficiency.

To learn more about how Nutanix AHV and Rubrik’s integration delivers streamlined data protection, rapid recovery and robust incident response capabilities, watch our webinar, Fortifying AHV: Cyber Recovery and Incident Response with Nutanix and Rubrik.


The Top Geospatial and Space Tech Events for Government in 2025 and Beyond

Geospatial and space technologies are revolutionizing how Government agencies leverage location-based data, modern mapping platforms and advanced analytics to drive mission-critical decisions. From enhancing national security to improving infrastructure and environmental monitoring, these tools empower agencies to innovate and collaborate. In 2025 and beyond, Carahsoft and our vendor partners are excited to support Government professionals at premier events showcasing the latest advancements in geospatial and space tech. Join senior leaders, policymakers and IT experts to explore cutting-edge solutions and forge strategic partnerships. Below, we highlight top upcoming events.

SOF Week 

May 5-8, 2025 | Tampa, FL | In-Person Event 

SOF Week is the premier annual gathering for the international Special Operations Forces (SOF) community, jointly sponsored by U.S. Special Operations Command (USSOCOM) and the Global SOF Foundation. The event serves as a critical platform for fostering collaboration, innovation and excellence in modern special operations. Attendees will gain unique insights into the latest advancements in SOF capabilities, tactics and technology. The event attracts over 19,000 participants drawing SOF professionals, industry leaders and Government stakeholders from around the world. 

Keep an eye out for the USSOCOM Annual Awards Ceremony. A highlight of the week, this awards dinner honors outstanding contributions to the SOF community and celebrates its achievements. 

Join Carahsoft at its SOF Week exclusive pavilion alongside our technology partners, and do not miss our networking reception on Wednesday, May 7, 2025, from 6:00pm – 9:00pm at The Florida Aquarium. 

GEOINT Symposium 

May 18-21, 2025 | St. Louis, MO | In-Person Event 

Hosted annually by the United States Geospatial Intelligence Foundation (USGIF), the GEOINT Symposium is the nation’s largest gathering of geospatial intelligence professionals, drawing over 4,000 attendees. Attendees will explore the intersection of technology and security, addressing challenges and opportunities in today’s complex geopolitical landscape. The event features industry-leading keynote speakers, main stage panels and hands on training workshops covering topics such as mission planning, precision timing and navigation, enhancing your practical skills and knowledge in geospatial intelligence applications.

This year’s theme, “Building a Secure Tomorrow Together,” will feature prominent keynote speakers, including The Honorable Tulsi Gabbard, Director of National Intelligence (DNI), VADM Frank “Trey” Whitworth, Director of the National Geospatial-Intelligence Agency, and General B. Chance Stalzman, Chief of Space Operations, US Space Force.

Carahsoft will have a significant presence at GEOINT 2025, featuring a pavilion with partner demos throughout the show. Connect with industry professionals at Carahsoft’s networking reception on Tuesday, May 20, at The Post Building, which will feature food and music. 

GeoGov Summit 

September 8-10, 2025 | Herndon, VA | In-Person Event 

The GeoGov Summit is an annual forum that brings together leaders and experts from Government, industry, organizations and academia to advance the national geospatial strategy. The summit focuses on the evolving role of geospatial technologies in Governance, national security, infrastructure and public services. It serves as a platform for policymakers, technology providers and geospatial professionals to collaborate on improving data-driven decision making, enhancing interoperability and strengthening the National Spatial Data Infrastructure (NSDI). 

Carahsoft is looking forward to attending and sponsoring the GeoGov Summit, along with our geospatial partners.

FOSS4G NA 

November 3-5, 2025 | Reston, VA | In-Person Event 

Free and Open Source Software for Geospatial North America (FOSS4G NA) is the premier open geospatial technology and business conference, offering a vibrant and welcoming atmosphere for technologists, end-users, academics and decision-makers. Attendees can look forward to a diverse program featuring presentations, workshops and networking opportunities that highlight the latest advancements in open source geospatial software and applications. 

This event will feature: 

  • Insights from leading experts in the geospatial field, who will discuss current trends and the future direction of open source geospatial technology. 
  • Hands on workshops where attendees will have the opportunity to engage directly with open source geospatial tools and applications, enhancing their technical skills and knowledge. 

Carahsoft is proud to sponsor FOSS4G NA 2025, supporting the growth of open geospatial technologies. With deep expertise in open source technologies, Carahsoft partners with top providers to deliver secure, scalable solutions that enhance operational efficiency and situational awareness. 

CyberSat 

November 17-20, 2025 | Reston, VA | In-Person Event 

The CyberSat Summit is a key gathering dedicated to addressing cybersecurity threats and defenses in the satellite and space sectors. Since its inception in 2017, it has brought together satellite, space and cybersecurity professionals alongside Government, military and intelligence officials to discuss emerging technologies like artificial intelligence (AI) security, Zero Trust frameworks and quantum encryption. The SpaceInformation Sharing and Analysis Center (Space ISAC) will host a live tabletop exercise, testing incident response skills in a crisis simulation. Attendees can expect technical tracks on securing satellite networks, mitigating AI-driven threats and enhancing cyber resilience. Join the policy makers, threat analysts and engineers shaping the future of space security at this must-attend event! 

Sessions to Look Out for:  

  • Unclassified Program (November 17-18): Two tracks focused on real-world case studies, system-level security challenges and in-depth technical approaches to combat emerging cyber risks 
  • Classified Program (November 19-20): This segment, held at the Aerospace Corporation’s Sensitive Compartmented Information Facility (SCIF) in Chantilly, VA, will cover a range of topics, including counterspace cyber applications of AI, threats to the supply chain, improving cyber resiliency in space and directed energy detection for satellite sensors. 

Carahsoft is looking forward to exhibiting at the CyberSat Summit, along with our geospatial, space, AI and cyber partners.

Geography 2050 

November 20-21, 2025 | New York City | In-Person Event 

Geography 2050 is the American Geographical Society’s annual symposium, held in partnership with the Columbia Climate School. The 2025 theme, “The Future of GeoAI and the Planet,” will explore the convergence of geospatial technologies and artificial intelligence (GeoAI) and their transformative impact on understanding and addressing global challenges. Attendees will engage with experts from Government, industry, academia and non-profits to discuss how GeoAI can enhance our ability to monitor, predict and respond to environmental and societal changes. The symposium aims to foster a strategic dialogue on leveraging GeoAI for sustainable development and planetary stewardship. 

This event will feature: 

  • “GeoAI Foundation Models,” a session that delves into the development of comprehensive GeoAI foundation models that are capable of processing vast amounts of geospatial data to provide actionable insights. 
  • “GeoAI and Glimpsing into the Future,” a session where experts will discuss how GeoAI enhances predictive modeling to anticipate future environmental and societal changes, aiding in proactive decision-making. 
  • “Plenary Session” with Jack Dangermond, where Esri’s founder and president will discuss the latest trends in Geographic Information System (GIS), advancements in GeoAI and the future of location intelligence. 
  • Technical workshops, where attendees will gain hands-on experience with Esri’s newest tools, including ArcGIS, AI-powered GIS workflows and spatial data science applications. 
  • User presentations, where attendees will learn how Government agencies and enterprises are leveraging GIS to solve real-world challenges in disaster response, national security and smart city planning. 

Carahsoft is proud to support the geospatial community by partnering with leading vendors to provide innovative solutions in GeoAI and geospatial technologies. We look forward to participating in Geography 2025 this year!

Geo Week 

February 16-18, 2026 | Denver, CO | In-Person Event 

Geo Week is a premier conference focused on the integration of geospatial technologies, the built environment and 3D innovations. This annual conference brings together professionals from geospatial, architecture, engineering, construction (AEC) and related industries to explore advancements in technologies like Light Detection and Ranging (LiDAR), photogrammetry, remote sensing, reality capture and AI.

The event features over 200 speakers and 50+ sessions, including keynote presentations, educational workshops and product previews.

Carahsoft is excited to sponsor and exhibit alongside our geospatial partners and network with attendees across the industry.

SATELLITE 2026 

March 23-26, 2026 | Washington, D.C. | In-Person Event 

For more than 40 years, the SATELLITE Conference & Exhibition serves as a major gathering for the satellite, space and defense industries, bringing together professionals from around the globe to discuss the latest advancements, challenges and trends in the field. The conference features a comprehensive program that includes keynote addresses from expert speakers, engaging panel discussions and networking opportunities with industry leaders and peers, fostering collaboration and innovation.  

We look forward to sponsoring and having a booth at Satellite 2026 to showcase how Carahsoft is supporting the industry in the space, satellite and defense industries.

FedGeoDay 

April 2026 | Washington, D.C. | In-Person Event 

FedGeoDay is the premier event dedicated to Open Geospatial Ecosystems within the U.S. Federal Government. This event provides attendees the opportunity to engage with Federal program managers, technology leaders, industry partners and organizations to share ideas, learn and network. The event includes presentations, workshops and networking sessions aimed at fostering collaboration and innovation in the geospatial community. 

Carahsoft is proud to be a sponsor of FedGeoDay, reinforcing our commitment to advancing open geospatial technologies across the Public Sector.  Look out for updates on our presence in 2026 on Carahsoft’s website. 

Space Symposium 

April 13-16, 2026 | Colorado Springs, CO | In-Person Event 

2026 will mark the 41st Space Symposium! Over 10,000 space professionals and decision makers from commercial, Government and military sectors will gather to discuss critical issues, policy updates, innovative solutions and industry trends across the space community. The event will include expert panels, keynote addresses and networking opportunities with the top minds in the field. The Space Symposium is the number one international space event that is shaping the future of space exploration and technology.  

Carahsoft is looking forward to sponsoring and exhibiting at the 41st Space Symposium.

Sea-Air-Space 

April 19-22, 2026 | National Harbor, MD | In-Person Event 

The Navy League of the United States (NLUS) Sea-Air-Space is the largest annual maritime exposition in North America. Attendees across Government and industry gather for innovative and educational discussions on advancements in maritime, naval and security technologies that will strengthen the future of the sea services. The event features informative sessions, policy discussions and 400+ exhibitors—from startups to Fortune 500 companies—showcasing the latest tech in the maritime field.

Carahsoft is looking forward to showcasing our Aerospace and Maritime technology solutions and partner ecosystem as part of the Carahsoft Partner Pavillion.

Looking Ahead:

The geospatial and space tech landscape is evolving rapidly, with GeoAI, precision navigation and cybersecurity at the forefront. As the industry continues to evolve, these events will continue to build momentum. These exciting gatherings will further integrate innovative technologies to address Government needs. Join Carahsoft at these events to explore innovative solutions and connect with industry leaders.

To learn more or get involved in any of the above events, please contact us at Geospatial@Carahsoft.com. For more information on Carahsoft and our industry leading Geospatial and Space Tech technology partners’ events, visit our Geospatial solutions portfolio. 

The Switch to Proactive Network Resilience Management to Maintain Operational Continuity

Due to the threat of modern ransomware gangs and Advanced Persistent Threats (APTs), critical infrastructure organizations face unprecedented challenges from sophisticated adversaries. These gangs and APT groups, such as Volt and Salt Typhoons, seek to compromise and disrupt the operations of critical national infrastructure (CNI) for financial gain or to cause economic and societal harm. Luckily, organizations can combat these attacks by shifting from traditional defensive approaches to a comprehensive network resilience strategy that ensures operational continuity through proactive management.

The Critical Shift from Defense to Resilience

With mission-critical systems increasingly dependent on network availability, cybersecurity is a top priority. Traditional security approaches have primarily focused on hardening defenses against external threats. However, this strategy has proven insufficient as sophisticated attackers continue to infiltrate networks and are increasingly exploiting weakly configured or vulnerable network devices to carry out their attacks. The consequences of such breaches extend beyond security concerns to operational, financial and reputational damage that can undermine an organization’s core mission.

Network devices are particularly attractive targets because they serve as the connective tissue for all organizational IT operations. When compromised, these devices provide attackers with persistence, lateral movement capabilities and access to sensitive data flows. Additionally, misconfigurations and unplanned changes to these devices—whether malicious or accidental—can result in disruptive outages at precisely the wrong moment.

To address these challenges, organizations need a tailored network resilience strategy built on the four pillars of operational resilience:

  1. Business Continuity: Maintaining critical business functions and mitigating interruptions to mission-critical services
  2. Risk Management: Assessing proactively to identify and address potential failure points before they impact operations
  3. Cybersecurity: Utilizing trusted hardening guides and security frameworks, such as those provided by the US National Institute of Standards and Technology (NIST) and the UK National Cyber Security Centre (NCSC), to monitor, detect and respond to cyber attacks and insider threats
  4. Disaster Recovery: Regaining access to and use of critical systems and restoring services as soon as possible following an outage

This approach recognizes that network security must be redefined as the proactive protection and assurance of business services, applications and data. This strategy shifts the goal from merely defending the perimeter to ensuring systems remain available and recoverable, and therefore trustworthy.

Titania, Network Resilience, blog, embedded image

Implementing Continuous Network Resilience Management

Organizations must switch to viewing their network security as something that must be continuously and proactively protected. By focusing on network readiness, resilience and recoverability, organizations can quickly detect problems within their network and reduce risk to their business, all which aligns with the latest compliance and security mandates. While shifting to continuous network resilience may seem daunting, Titania, a world-leader in network configuration analysis for routers, switches and firewalls, can help.

Here are five ways that Titania enables organizations to shift from risk-based vulnerability management to continuous network resilience management:

  1. Offers full network visibility, equipping organizations to swiftly identify anomalies. Titania’s platform establishes a configuration baseline that identifies all changes, differentiating between planned and unauthorized ones, enabling teams to automatically identify anomalies and potential indicators of compromise (IOCs). This includes identifying macro-segmentation violations, such as changes to or presence of unauthorized internet protocols (IPs), ports and users that could signal an active threat.
  2. Assesses network segmentation to contain breaches. Network segmentation prevents or delays bad actors from moving laterally within a business, which would allow them to access more of the network than otherwise possible. By hardening and effectively segmenting all routers, switches and firewalls, Titania helps reduce risk to a business’ mission-critical objectives.
  3. Analyzes and remediates network exposure. Titania helps organizations assess misconfigurations and software vulnerabilities based on the specific tactics, techniques and procedures (TTPs) that threat actors use. To minimize exposure to APTs and ransomware, Titania automatically prioritizes remediation workflows to address the most critical and likely TTP risks.
  4. Maintains accurate configuration management database (CMDB) to aid business continuity and disaster recovery.  By tracking all configuration changes, whether planned or unauthorized, Titania enables businesses to swiftly recover from any potential breaches. Titania also enables network operations center (NOC) teams to manage configurations-as-code, ensuring potential disruptions are identified and addressed during pre-deployment configuration testing.
  5. Assures networks comply with both internal and external mandates. Titania cross-checks network configurations to determine adherence to mandated requirements, automatically reporting pass/fail compliance with US, EU and international hardening standards and risk management frameworks (RMFs).

As threats continue to evolve and mission objectives become intertwined with network infrastructure, the ability to ensure operational continuity through comprehensive network resilience management will become a defining characteristic of successful cybersecurity programs. By implementing solutions that address the full spectrum of network security challenges, Government agencies and commercial organizations can protect their mission-critical services and maintain the trust of those who depend on them.

To learn more about implementing a comprehensive network resilience strategy for your organization, visit Titania’s Nipper Resilience product page.

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including Titania we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Top 3 Trends Enhancing Digital Learning Experience in 2025

The advent of innovative technology and modern learning techniques has opened an array of possibilities for adult and student learning. L&D leaders and educators can customize their training and teaching instruction for employees and students to deliver the best learning experience possible.

With technological advancement, digital learning is no longer confined to static online courses. It has become an interactive and technology-driven space that adapts to the needs of modern learners. With the increasing reliance on digital platforms, it is vital to explore ways to optimize course delivery and improve learner engagement. The focus is no longer just on delivering content but also on making learning more intuitive, practical, and aligned with resolving real-world challenges.

Carahsoft recently conducted a webinar in partnership with Harbinger Group, titled ‘The Digital Learning Experience: Top 3 Trends for 2025’ featuring industry experts, Alistair Lee, Principal Evangelist at Adobe, Scott Biegel, Principal Solution Consultant at Adobe, and Umesh Kanade, Vice President – Capability Development at Harbinger Group. Hosted by Shannon Teel, Partner Sales Leader at Adobe, this webinar discussed the top three trends in the digital learning space for L&D and education leaders to consider.

Adobe Top 3 Trends Enhancing Digital Learning Experience Webinar Blog embedded image 2025

Trend 1: AI and Generative AI

AI simulates human intelligence in machines, while GenAI uses algorithms to autonomously create new content. It is reshaping digital learning by delivering learning experiences tailored to individual needs. This ensures learners receive targeted recommendations that align with their goals and preferred learning styles.

GenAI can provide L&D teams and educators as well as adult learners and students with learning recommendations based on previous course work, content consumed by peers, and the delivery modality from previous content selections. By observing the learning patterns and learner behaviors, GenAI can aid trainers and educators in populating forms from a variety of different mediums. For learners, it can help improve learning results and stay engaged with relevant content.

Beyond personalization, AI-based automated custom content development is accelerating course development, reducing both time and costs while ensuring high-quality, customized learning experiences at scale. AI-based tools can generate course content, including quizzes, assessments, interactive simulations, and multimedia elements.

Some examples include:

Text

  • Session outlines
  • Slide structure or speaker notes
  • Abstracts or introductions
  • Quiz questions
  • Polls or group exercises

Images

  • Backgrounds for virtual rooms or camera
  • Whiteboard exercises
  • Slide imagery

Audio

  • Lobby music
  • Sound effects
  • Announcements
  • Translations

Video

  • Localized video
  • Stringer or lobby content

AI can analyze existing graphics and media assets to maintain a consistent style, ensuring newly generated course content aligns seamlessly. This helps prevent generic outputs and avoids copyright issues while enhancing the overall quality of the learning materials.

Tips to Effectively Generate Content Using AI

Apart from learning content, AI can be leveraged to generate teaching instruction plans and L&D workflows. For example, AI tools can be used to create automated leadership coaching plans and analysis, add clarity to session notes, improve lecture structure, or develop targeted employee training framework.

However, L&D leaders, educators, and instructional designers need to implement the right prompt writing techniques to best use AI for generating digital learning content.

“Use AI to help you with AI. A chatbot can help you create a more effective prompt. You can prompt a chatbot to ask you questions to get a better result. So, instead of just producing a result, tell the chatbot to ask you questions related to the topic you’re looking for, and it will do so before producing the result. I think you’ll get much better qualitative content out of that,” shared Alistair.

It’s highly recommended to consider using the ‘CISCO’ prompt structure when interacting with AI chatbots for generating digital learning content.

Context: Explain your role and goal

Intent: Describe the intent of your prompt and what you want to achieve

Style: Consider what tone you want to employ

Commands: List out detailed instructions and rules to follow

Outcome: Outline the specific format you want to receive the results in

Educators with special considerations, such as privacy concerns, should consider retrieval augmented generation (RAG) models or retrieval augmented language models (REALM). These models are trained specifically on your content. This way, rather than asking public AI generators, agencies or organizations can utilize RAG and REALM to ensure accuracy and internally guided content.

Agentic AI is another hot trend in digital learning. It improves learning success and drives business outcomes with next-gen learning environments, intelligent tutoring systems, faster content development, custom learning pathways, automated assessment, and AI-driven gamification. To know how to effectively leverage Agentic AI in eLearning, download this comprehensive practical guide.

Trend 2: Advanced Learning Analytics

Learning is driven by engagement, and therefore, it is vital to ensure learners are listening and are engaged. Advanced learning analytics can help L&D leaders and educators drive engagement and tailor their training and lesson plans.

Traditionally, standard reports only featured data on how much time learners spent in the learning space. Contrastingly, modern digital learning analytics can not only inform L&D teams and educators how long learners were present in the learning space but also how connected they were.

Some key learner engagement indicators include:

  • Asking questions
  • Responding to polls
  • Utilizing chat features
  • Downloading learning materials
  • Enabling their microphone
  • Interacting with emotes

Digital reports can feature data on whether the window was in focus or if the learner was taking notes, chatting, or responding to polls. Each L&D leader or educator should consider how they want to measure engagement to determine the effectiveness of sessions. Indicators of elements that drive interactions can help them optimize and perfect the digital learning experience.

A more engaged learning environment not only enhances knowledge retention but also fosters a stronger connection between learners and instructors, making the experience more interactive and valuable. Engagement is also influenced by the relevance and adaptability of content. When learning materials are updated, personalized, and aligned with learners’ goals, engagement improves. If the content is outdated or disconnected from real-world applications, engagement levels may decline, signaling the need for modifications.

L&D teams and educators should consider continuously monitoring and refining digital learning and engagement strategies through advanced learning analytics. This will help them create a learning experience that feels dynamic, relevant, and impactful.

Apart from advanced analytics, adaptive assessment and predictive analytics are the two other key aspects of digital learning data analytics. Here’s a snapshot of the three types of digital learning data analytics discussed in the webinar:

Trend 3: Hybrid Learning Models

Traditionally, L&D leaders and educators had to consider whether their sessions should be conducted in a synchronous or asynchronous form. With the advent of digital learning, they must now determine whether their learning and training sessions should be conducted in person or virtually, or in hybrid form.

They also need to decide if the sessions must incorporate features such as:

  • Microlearning
  • Compliance learning
  • Collaborative breakouts
  • Simulations
  • On-the-job learning

When coming to a decision, it is important to consider the learning objective, and the advantages and weaknesses of each, so learners get the most out of the session. L&D teams and educators should not be afraid to experiment with new modalities, as it may bring out the strength of a session, enhancing the learning experience.

Expanded Modalities in Hybrid Learning

Expanded modalities in hybrid learning are the range of ways in which content is delivered, and learning is experienced, going beyond traditional in-person and online formats. The idea is to enhance flexibility, engagement, and personalization by offering multiple paths for learners to interact with the material, instructors, and peers.

Expanded modalities aim to meet diverse learner needs and preferences while maximizing the strengths of both digital and physical environments. In modern hybrid learning models, this flexibility is key to increasing accessibility, equity, and learner success.

Here are some expanded modalities in hybrid learning:

Parting Thought

With AI, advanced learning analytics, and hybrid learning, the digital learning experience is better than ever. These technologies and models allow L&D leaders and educators to refine their approach, making learning more interactive, responsive, and accessible. They can not only optimize the learning experience but also increase course completion rates, while ensuring learners are well-equipped for the future.

For today’s workforce, learning isn’t just about acquiring new knowledge, it’s about career advancement, staying relevant in their industry, or transitioning to new roles. With smarter learning systems that adapt to individual progress, digital learning helps them build practical skills that directly impact their professional growth.

To learn more about digital learning trends for 2025, watch the webinar, “The Digital Learning Experience: Top 3 Trends for 2025.” To take a deeper dive into Adobe’s eLearning products, contact us to schedule a complimentary one-on-one demonstration today!