Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

1280px-Akamai_logo.png
Akamai Webcast

Event Date: November 20, 2024
Hosted By: Akamai & Carahsoft
A simple, comprehensive Zero Trust solution is no longer a want — it’s a need. The new Akamai Guardicore Platform brings together micro-segmentation, ZTNA and AI-supported protection. Attendees explored the platform's breakthrough capabilities and better prepare your teams to address threats like ...
1280px-Akamai_logo.png
Multi-Vendor Webcast

Event Date: October 31, 2024
Hosted By: Akamai, Noname, Kong & Carahsoft
Discover how the powerful integration of Kong and Noname Security provides unparalleled protection and control over your API ecosystem. By combining Kong's advanced API management capabilities with Noname Security's proactive threat detection and vulnerability management, attendees gained comprehensive visibility ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: August 27, 2024
Hosted By: Akamai & Carahsoft
As cyber threats evolve, adversaries can evade even the most advanced security tools. Zero Trust, with its principle of “never trust, always verify”, offers a robust framework for enhancing security, but what does it take to fully implement? Research from the Enterprise Strategy Group (ESG) revealed that ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: June 13, 2024
Don’t allow your organization to go unprepared! The latest revision to the Payment Card Industry Data Security Standard (PCI DSS v4) includes major changes governments accepting payment card data online must comply with by March of 2025. Sometimes easily ignored, these updates must be addressed (specifically ...
Cyber threats targeting the public sector are not just evolving; they are becoming more insidious, exploiting the lack of lateral (east-to-west) segmentation within networks to conduct widespread, destructive breaches. It is estimated that government organizations have lost $860.3 million to ransomware attacks from 2018 ...
Multi-Vendor Event

Event Date: January 25, 2024 - February 09, 2024
Hosted By: Carahsoft
Location: Reston, VA
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.  During the 2024 CyberSmart Federal Day thought leaders from ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: August 22, 2023
Hosted By: Akamai & Carahsoft
In today's interconnected world, state and local governments are faced with the challenge of safeguarding sensitive data and critical infrastructure against an ever-evolving landscape of cyber threats. Traditional network security measures are no longer ...
NSA Cybersecurity Collaboration Center's (CCC) focus is on hardening the cybersecurity posture of small to medium-sized companies, which make up the vast majority of the US Defense Industrial Base (DIB). NSA knows that nation-states are targeting DIB networks and their critical technologies, looking to steal sensitive ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: June 16, 2022
In the 3rd quarter of 2021 there was a ransomware attack against healthcare facilities every single day of the quarter. The average cost to a healthcare facility to recover from an attack is now pushing $9 million. In this webinar, experts discussed the anatomy of a ransomware attack, show you how an ...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the ...

Resources


UberEthers_Managed_Services_Platform__the_CISA_Zero_Trust_Maturity_Model_Thumbnail.JPG
Datasheet

UberEther’s Managed Services Platform & the CISA Zero Trust Maturity Model

We excel in all stages of Identity, Device, Network/Environment, Application Workload, and Data


Fill out the form below to view this Resource.