Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum ...

Archived Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Webcast

Event Date: April 25, 2024
Hosted By: Thales TCT & Carahsoft
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a ...

The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and ...

SandboxAQ-Logo-Accent-Color-Blackat4x-no-TM.png
Multi-Vendor Webcast

Event Date: March 19, 2024
Hosted By: Marion Square, SandboxAQ & Carahsoft
...

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Webcast

Event Date: February 29, 2024
Hosted By: Thales TCT & Carahsoft
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that ...

Gravel-Road-cropped.png
Multi-Vendor Webcast

Event Date: July 29, 2021
Hosted By: Harpoon Security, Splunk & Carahsoft
Attendees of this webinar learned about:A Pre-Exploit solution (prevention before the attack) is the only way to defeat this unique attack method.Harpoon detecting and blocking this specific weakness in the Ransomware attack chain on Microsoft Windows computers before it can ...

Resources