Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Tricentis Extends Public Sector Program and Executive Leadership to Support Growing Demand in Government
Tricentis

Speed Changes Everything


Event Date: February 28, 2023
Hosted By: Tricentis USA Corp & Carahsoft
Tricentis and SAP invited the participants to learn how speed can change everything! The participants learned how to deliver the fastest, safest, and lowest-cost methods for SAP release.
 
In this webinar, the participants observed:
  • How SAP customers are putting their initiatives into overdrive by cutting the time, risk, and cost associated with deploying SAP projects.
  • How SAP’s official testing solution helps you fast-track innovation across. This includes the most complex SAP landscapes without risk.

Fill out the form below to view this archived event.


Resources


DataLocker eBook – What is CMMC 2.0?
eBook

DataLocker eBook – What is CMMC 2.0?

Established by the United States Department of Defense (DOD), the Cybersecurity Maturity Model Certification (CMMC) is a framework designed to fortify the cyber defenses of government contractors. The program aims to safeguard confidential information within the DOD supply chain by requiring comprehensive third-party assessments of the security practices of both contractors and subcontractors alike. In essence, CMMC outlines the specific IT security standards businesses must satisfy in order to secure lucrative government contracts. CMMC was introduced in response to a string of security breaches targeting sensitive federal data. The high-profile nature of those exploits led the DOD to reexamine the security capabilities of its ecosystem. The agency determined that the insufficiency of current standards, combined with the lack of accountability from resource-strapped subcontractors rendered the supply chain extremely vulnerable to cyber threats.


Fill out the form below to view this Resource.