Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

CyberarkMicrosite2023.png
Multi-Vendor Webcast

Event Date: December 05, 2024
Hosted By: CyberArk, Optiv + ClearShark & Carahsoft
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.   Attendees joined CyberArk and ...
UberEther_Logo.png
Multi-Vendor Webcast

Event Date: November 14, 2024
Hosted By: UberEther, Ping Identity, Radiant Logic, SailPoint, CyberArk & Carahsoft
Attendees of this gained insight into:   The Bubble Model: Learned how the bubble model creates resilient, self-contained identity environments that operate independently of central authorities, ensuring secure operations even in high-risk scenarios by isolating identities & ...
Tenable-microsite.png
Multi-Vendor Webcast

Event Date: November 13, 2024
Hosted By: Tenable, CyberArk & Carahsoft
View this on-demand webinar where attendees learned how Tenable and CyberArk integrate to: Provide details on what you don't know about your environment, giving you a complete view of your exposure. Ensure the best possible control of your credentials when scanning. Automate ...
CyberarkMicrosite2023.png
CyberArk Webcast

Event Date: October 17, 2024
Hosted By: CyberArk & Carahsoft
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. The clock is ticking to meet these CJIS compliance standards! Failing to ...
CyberarkMicrosite2023.png
Multi-Vendor Webcast

Event Date: June 20, 2024
Hosted By: CyberArk, UberEther & Carahsoft
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates ...
UberEther_Logo.png
Multi-Vendor Webcast

Event Date: April 10, 2024
Hosted By: UberEther, Ping Identity, Radiant Logic, SailPoint, CyberArk & Carahsoft
Attendees of this webinar learned:  Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address ...
UberEther_Logo.png
Multi-Vendor Webcast

Event Date: August 31, 2023
Hosted By: UberEther, SailPoint, Radiant Logic, CyberArk, Ping Identity & Carahsoft
Attendees learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches ...
UberEther_Logo.png
Multi-Vendor Webcast

Event Date: June 28, 2023
Hosted By: UberEther, SailPoint, Radiant Logic, CyberArk, Ping Identity, & Carahsoft
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the ...

Resources


Blog

The pandemic has had a huge economic impact, leaving many people hurting financially, particularly after losing their jobs. Even as governments enact programs to help reduce the burden on the unemployed, fraudsters have regarded the current crisis as a chance to commit massive unemployment fraud. CO...

Presentation

View this slide deck to learn how F5 Distributed Cloud showcases hybrid multi-cloud networking and Full Stack app security.

During this session attendees gained hands-on experience with common hacker tools and saw how they’re used in attacks against applications today.

Resources

F5 Labs 2018 through 2020 Shape Security & F5 Labs

This F5 resource about Kubernetes Ingress Traffic details why Kubernetes matters and microservices application development is on the rise.

Webinar

Attendees had the opportunity to learn more about F5 Distributed Cloud WAF/WAAP Deployment Services and participate in a hands-on learning experience.

NGINX App Protect is a modern software-based app-security solution that works seamlessly in DevOps environment as a robust WAF or app-level DoS defense by helping you deliver secure apps from code out to the warfighter.

During this F5 DoD Virtual User Group, you will learn how F5 Distributed Cloud showcases hybrid multi-cloud networking and Full Stack app security.

Discover how F5 XC and BIG-IP Next can help you overcome your IT curveballs and achieve your modernization goals.