Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: December 10, 2024
Hosted By: BeyondTurst & Carahsoft
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust.  As agencies continue to ...

Archived Events

BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: November 19, 2024
Hosted By: BeyondTrust, ServiceNow & Carahsoft
Government IT support teams operate in a complex environment. They need to manage different devices, enterprise applications, and multicloud environments, all while balancing user productivity, ease of use, and security.  Together, BeyondTrust and ServiceNow provide a more automated, efficient, and secure ITSM ...
BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: October 24, 2024
Hosted By: ATARC & BeyondTrust
ATARC partnered with BeyondTrust in hosting The Fundamentals of Protecting your Paths to Privilege webinar on Thursday, October 24th, 2024. We hope to have seen you there! Despite the long standing principles of Least-Privilege and Privilege Access Management ...
BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: October 22, 2024
Hosted By: BeyondTrust & Carahsoft
Attacks on identities, especially privileged identities, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. Organizations need a higher degree of privileged access ...
BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: September 17, 2024
Hosted By: BeyondTrust, XMS Solutions & Carahsoft
Secure remote access solutions are used by all organizations to securely allow inside IT admins, vendors, developers, and cloud ops engineers to access systems remotely and in compliance with just-in-time access and least privilege principles. As government organizations work to meet cloud computing mandates and ...
BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: August 27, 2024
Hosted By: BeyondTrust & Carahsoft
90% of organizations experienced at least one identity-related security incident in the past year. Attackers are increasingly targeting identities and exploiting privileged access to gain a strong position in your environment, bypassing the work of EDR and traditional endpoint defenses.  How can security teams ...
Logo-PingIdentity-ForgeRock-Hor-FullColor.png
Multi-Vendor Event

Event Date: August 15, 2024
Hosted By: Three Wire Systems
During Three Wire’s Tech Day in partnership with BeyondTrust, Ping, UberEther,  Zscaler, and Carahsoft, featured speakers James Ebeler, Three Wire Systems, Matt Topper, UberEther, and Conrad Maiorino, Zscaler discussed: Identity, Credential, Access Management (ICAM) strategy and Secure ...
BeyondTrust-microsite.png
Multi-Vendor Email Campaigns

Event Date: August 15, 2024
Hosted By: BeyondTrust, Ping Identity & Carahsoft
It’s estimated that approximately 80% of hacking-related security breaches involve the misuse of privileged credentials. A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust ...
BeyondTrust-microsite.png
BeyondTrust Webcast

Event Date: July 16, 2024
Hosted By: BeyondTrust & Carahsoft
Privileged passwords and credentials are the gateways to an organization's most valuable assets. They unlock access to privileged accounts used to manage critical devices, applications, DevOps infrastructure, and other assets across the enterprise. They pose significant risks if not protected, managed, and monitored ...
BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: June 18, 2024
Hosted By: LexisNexis Risk Solutions & Carahsoft
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication ...

Resources


Featured

Compliance is crucial for agencies to avoid legal action, fines, and damage to their reputation. Leveraging an all-in-one AIOps solution like ScienceLogic AI Platform can help maximize time and costs investments.

Organizations in the public sector must ensure compliance to protect their data, avoid litigation and fines, and maintain constituent trust. ScienceLogic AI Platform uses AI and ML to deliver broad observability into system operations, so agencies know how everything is running and where their data ...

Autonomic IT delivers an IT environment that can understand its real-time state and offer intelligent insights and recommendations. By making IT autonomic, ScienceLogic establishes a self-empowered operational environment that monitors, optimizes, and heals technology investments while it runs.

SAS is looking at the trends of AI usage in 2024 and how to better prepare for a more productive 2025. This blog takes a deeper dive into the primary concerns of government leaders and their usage of GenAI to assess which tools to utilize, new solutions to enhance, and what to keep in mind with poss...

Google and Okta have joined forces to streamline and secure identity management in higher education, leveraging Okta’s robust IAM platform and Google Workspace’s extensive collaboration tools. This partnership aims to automate identity processes, enhance cross-platform access, and support the unique...

When Lexmark needed to incorporate machine learning into their new industrial gateways, Edge Impulse was the immediate solution.

This blog post goes over the emphasis of shifting resumes and traditional career pathing to uncovering everyone's skills and potential with AI-powered talent intelligence.

Discover how the DLA has expanded its Validation Authority environment to ensure reliability and low latency. The organization has implemented multiple Axway repeaters with load balancing for high availability.

Coordinating the transportation of supplies, personnel, and equipment for military operations in hostile and contested environments presents significant logistics challenges. Elemental Cognition facilitates fast, flexible planning and re-planning, which is crucial for mission success amidst the ongo...

Learn how the Defense Innovation Unit of the United States is using Eightfold's Project Marketplace to build the GigEagle app to match members of the military with strategic projects.