Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

logo-versa-networks.png
Multi-Vendor Onsite Event

Event Date: May 15, 2025
Hosted By: Axonius, Cribl, Everfox, Hypori, ThunderCat, Viasat, Versa Networks & Carahsoft
CPE credit available
Location: Aberdeen Proving Ground, MD
The modern battlefield isn't just physical - it's digital, and the threats are relentless. Cyber adversaries are constantly evolving, probing for weaknesses in our defenses. Staying ahead of threats demands a unified, battle-ready network ...

Archived Events

Carahsoft Tradeshow

Event Date: January 28, 2025
Hosted By: Axonius Federal & Carahsoft
Location: San Diego, CA
From this session, attendees learned how to:  Meet DoN cyber ready missions  Achieve ongoing authorization 
Axonius-Microsite-Logo.png
Axonius Federal Systems Virtual Event

Event Date: January 21, 2025
Hosted By: Axonius Federal Systems & Carahsoft
Attendees learned about:    Understanding CDM modernization and gain insights into the latest strategies and best practices for updating Customer Data Management ECS's role in CDM and how ECS has supported and advanced the CDM program over the last several ...
Axonius-Microsite-Logo.png
Axonius Federal Systems Virtual Event

Event Date: September 10, 2024
Hosted By: Axonius Federal Systems & Carahsoft
Attendees of this webinar learned about:  A complete inventory of all assets Identifying security coverage and configuration gaps Automating policy enforcement, alert triage and other manual actions
Splunk-New-Microsite-logo.png
Multi-Vendor Virtual Event

Event Date: May 16, 2024
Hosted By: Splunk, Axonius & Carahsoft
 Attendees joined us to learn how industry-leading technologies, Splunk and Axonius, work together to enable comprehensive logging visibility and accelerate gap remediation for federal agencies. The M-21-31 memorandum, released almost three years ago, remains a challenge for many ...
Nozomi-Networks-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: March 21, 2024
Hosted By: Nozomi Networks, Axonius Federal Systems, Asc3nd & Carahsoft
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own ...
Axonius-Microsite-Logo.png
Axonius Federal Systems Virtual Event

Event Date: February 20, 2024
Hosted By: Axonius, Aquia & Carahsoft
Attendees of this webinar learned:   How to build the foundation for a Zero Trust Architecture that covers all kinds of environments and asset types Appreciate the impact of people, processes, and organizational culture on the adoption of new technologies and the move ...
Axonius-Microsite-Logo.png
Axonius Federal Systems Virtual Event

Event Date: November 14, 2023
Hosted By: Axonius & Carahsoft
This session with Idaho National Labs Chief Information Security Officer, Chief Data Officer, Director of Cybersecurity Rob Roser, and moderator Pete Tseronis, discussed: How to leverage automation to ...
Axonius-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: June 27, 2023
Hosted By: Axonius, Splunk & Carahsoft
Attendees of this Axonius, Splunk & Carahsoft webinar learned: How to gain true visibility of your entire attack surface How to meet recent federal regulations mandating regular and comprehensive logging management How to optimize your internal logging management to aid in ...

Resources


Axonius Key Differentiators
Whitepaper

Axonius Key Differentiators

The challenge of gaining visibility into all assets with sufficient context has hindered IT and security teams for many years… until now. For this reason, many organizations are turning to Axonius to serve as the system of record that allows teams to triage IT and security incidents, improve security operations and vulnerability management, and optimize technology infrastructure decisions.


Download PDF