Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Forescout-Logo-Color.png
Forescout Virtual Event

Event Date: June 24, 2025
Hosted By: Forescout & Carahsoft
CPE credit available
Please join Carahsoft and Forescout for an informative and interactive session that will help you better understand how the use cases and capabilities of Forescout can help your California agency gain total device visibility and protection. During this ...
cloud_wordmark_color_80px.png
Multi-Vendor Virtual Event

Event Date: July 17, 2025
Hosted By: Google Public Sector, August Schell & Carahsoft
CPE credit available
In this session, attendees will: Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics. Optimize ...
Zscaler_BrandAssets_LogoLockup_80px.png
Zscaler Virtual Event

Event Date: July 24, 2025
Hosted By: Zscaler & Carahsoft
CPE credit available
Generative AI tools like ChatGPT have transformed how government organizations access information and enhance productivity. However, their adoption raises critical concerns about safeguarding sensitive data and maintaining compliance. In this insightful webinar, Zscaler will demonstrate how to provide your users ...
SNMicrosite.png
ServiceNow Virtual Event

Event Date: July 24, 2025
Hosted By: ServiceNow & Carahsoft
Tackling security and compliance risks is an enabler to successful cloud adoption. In this session, we’ll explore how public sector organizations can ...

Archived Events

Logo-no-tag-color-horizontal.png
NetFoundry Virtual Event

Event Date: June 12, 2025
Hosted By: NetFoundry & Carahsoft
In this webinar, attendees: Understood the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use cases Gained deep insight into Zero Trust principles, ...
Fortanix-Microsite-Logo.png
Fortanix Virtual Event

Event Date: June 04, 2025
Hosted By: Fortanix & Carahsoft
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back?  Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the ...
pathlock_color-microsite-80px.png
Pathlock Virtual Event

Event Date: June 03, 2025
Hosted By: Pathlock & Carahsoft
In this webinar, attendees learned: How to evaluate your organization’s current position on the security maturity scale Actionable steps to reach NIST 800-171 standards Essential practices for securing identities Valuable insights on how to ...
Dragos_Logo_RGB_Microsite.png
Dragos Virtual Event

Event Date: February 05, 2025 - May 28, 2025
Hosted By: Dragos, Xage Security & Carahsoft
Watch the on-demand webinar with Dragos and Xage Security, where we explored defending against sophisticated nation-state threats to critical infrastructure, including Volt Typhoon. Attendees discovered different strategies for detecting and countering advanced cyber ...
cloud_wordmark_color_80px.png
Multi-Vendor Onsite Event

Event Date: May 15, 2025
Hosted By: Google Cloud Security, Arctiq & Carahsoft
Location: Las Vegas, NV
Attendees joined Google Security Operations (SecOps) and Arctiq for an immersive session exploring how security leaders and practitioners are reshaping their approach to cloud security in the age of AI and automation. Arctiq shared insights into today’s evolving threat landscape, showcasing how Google Cloud ...
oktamicrosite.png
Multi-Vendor Onsite Event

Event Date: May 13, 2025
Hosted By: Okta, Crowdstrike, Zscaler, AWS & Carahsoft
Location: Kansas City, MO
As governments and educational institutions strive to meet demands for access to data-driven services, both internally and externally, they face the critical challenges of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to ...

Resources


Featured

Discover how the Naval Postgraduate School leveraged SimSpace’s high-fidelity cyber range to simulate a critical infrastructure attack, providing advanced IT/OT training for allied military personnel. Learn how this collaboration delivered realistic red, blue, and purple team experiences, enha...

The process optimization phase focuses on identifying workflow bottlenecks, assessing security tool integration, and enhancing automation for faster responses, while testing operations under simulated stress conditions. Detection engineering involves refining detection rules, integrating tools and d...

Download this resource to read BlackFog's Annual Ransomware Report for 2024, This resource highlights the need for organizations to adopt AI-driven defenses.

Hack The Box (HTB) delivers hands-on, role-based cybersecurity training through real-world labs, assessments, and gamified learning tailored to mission-critical roles. Trusted by government agencies, HTB’s Workforce Development Plan helps organizations identify skill gaps, customize training p...

Cyber threats are increasingly sophisticated, making it critical for agencies to adopt a forward-thinking approach to data protection, especially as more organizations migrate to the cloud. Rubrik Security Cloud was created for the United States Government to utilize against cyber threats, cyberatta...

Article

The need for upscaling and rescaling of cybersecurity training in the workplace between the organization and the employees. Working the most efficient way to find balance and use the time to train and creating a culture shift.

Case Study

Explore how Fairfax County streamlined tax systems with Orbit Analytics's integrated BI and reporting solution. Fairfax County was looking for a BI, reporting, and analytics solution that could integrate into its preexisting solutions for managing property tax lifecycles, tax billing and collect...

 Stay ahead of cyber threats with real-world training designed for federal and military teams. Discover how SimSpace’s Cyber Range empowers organizations to simulate sophisticated attacks, strengthen defenses, and ensure readiness for the evolving landscape of cyber warfare.

Datasheet

Elevate your cybersecurity resilience with SimSpace’s tailored cyber range. Designed to enhance your Continuous Threat Exposure Management (CTEM) strategy, our platform enables realistic threat emulations, vulnerability discovery, and control validation—ensuring your defenses are always ...

Solutions Brief

OffSec’s Defensive Cyber Range is a live-fire training environment designed to sharpen blue team capabilities through realistic, hands-on simulations of real-world cyberattacks. With instant access to dedicated instances and tools like Suricata and Wazuh, it helps security teams enhance detect...