Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

1280px-Akamai_logo.png
Akamai Webcast

Event Date: November 20, 2024
Hosted By: Akamai & Carahsoft
A simple, comprehensive Zero Trust solution is no longer a want — it’s a need. The new Akamai Guardicore Platform brings together micro-segmentation, ZTNA and AI-supported protection. Attendees explored the platform's breakthrough capabilities and better prepare your teams to address threats like ...
1280px-Akamai_logo.png
Multi-Vendor Webcast

Event Date: October 31, 2024
Hosted By: Akamai, Noname, Kong & Carahsoft
Discover how the powerful integration of Kong and Noname Security provides unparalleled protection and control over your API ecosystem. By combining Kong's advanced API management capabilities with Noname Security's proactive threat detection and vulnerability management, attendees gained comprehensive visibility ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: August 27, 2024
Hosted By: Akamai & Carahsoft
As cyber threats evolve, adversaries can evade even the most advanced security tools. Zero Trust, with its principle of “never trust, always verify”, offers a robust framework for enhancing security, but what does it take to fully implement? Research from the Enterprise Strategy Group (ESG) revealed that ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: June 13, 2024
Don’t allow your organization to go unprepared! The latest revision to the Payment Card Industry Data Security Standard (PCI DSS v4) includes major changes governments accepting payment card data online must comply with by March of 2025. Sometimes easily ignored, these updates must be addressed (specifically ...
Cyber threats targeting the public sector are not just evolving; they are becoming more insidious, exploiting the lack of lateral (east-to-west) segmentation within networks to conduct widespread, destructive breaches. It is estimated that government organizations have lost $860.3 million to ransomware attacks from 2018 ...
Multi-Vendor Event

Event Date: January 25, 2024 - February 09, 2024
Hosted By: Carahsoft
Location: Reston, VA
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.  During the 2024 CyberSmart Federal Day thought leaders from ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: August 22, 2023
Hosted By: Akamai & Carahsoft
In today's interconnected world, state and local governments are faced with the challenge of safeguarding sensitive data and critical infrastructure against an ever-evolving landscape of cyber threats. Traditional network security measures are no longer ...
NSA Cybersecurity Collaboration Center's (CCC) focus is on hardening the cybersecurity posture of small to medium-sized companies, which make up the vast majority of the US Defense Industrial Base (DIB). NSA knows that nation-states are targeting DIB networks and their critical technologies, looking to steal sensitive ...
1280px-Akamai_logo.png
Akamai Webcast

Event Date: June 16, 2022
In the 3rd quarter of 2021 there was a ransomware attack against healthcare facilities every single day of the quarter. The average cost to a healthcare facility to recover from an attack is now pushing $9 million. In this webinar, experts discussed the anatomy of a ransomware attack, show you how an ...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the ...

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Lineaje Third Party Management (TPRM) provides a solution that reduces the risks in the technology purchased. TPRM analyzes security risks in each device by automatically detecting the security policy violations. Some noticeable capabilities are secure SBOM exchange, Automated Risk Analysis, Auto-up...

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

Lineaje Open-Source Manager helps to keep software components into one organization platform. AppSec teams, software developers and CPOs, CIOs, and CISOs looking to simple and secure ways to organize the software could benefit from OSM,

SBOM360 shows you "what's in your software" by recognizing its software supply chain while looking for risks. Lineaje AI produces solutions and plans if the vulnerabilities of the software are exposed. Reducing risks and cost by 40%.

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...