Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

Federation Bubbles with Justin Richer, CTO of UberEther
Multi-Vendor Webcast

Event Date: November 14, 2024
Hosted By: UberEther, Ping Identity, Radiant Logic, SailPoint, CyberArk & Carahsoft
Attendees of this gained insight into:   The Bubble Model: Learned how the bubble model creates resilient, self-contained identity environments that operate independently of central authorities, ensuring secure operations even in high-risk scenarios by isolating identities & ...
Ping Identity Achieves FedRAMP High Certification
Multi-Vendor Event

Event Date: August 15, 2024
Hosted By: Three Wire Systems
During Three Wire’s Tech Day in partnership with BeyondTrust, Ping, UberEther,  Zscaler, and Carahsoft, featured speakers James Ebeler, Three Wire Systems, Matt Topper, UberEther, and Conrad Maiorino, Zscaler discussed: Identity, Credential, Access Management (ICAM) strategy and Secure ...
CyberarkMicrosite2023.png
Multi-Vendor Webcast

Event Date: June 20, 2024
Hosted By: CyberArk, UberEther & Carahsoft
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates ...
Yubico-Microsite.png
Multi-Vendor Webcast

Event Date: June 06, 2024
Hosted By: UberEther, Yubico, Nok Nok & Carahsoft
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to ...
SailPoint-Logo-RGB-Color_transparent_resize.png
Multi-Vendor Webcast

Event Date: May 16, 2024
Hosted By: SailPoint, UberEther & Carahsoft
As the digital landscape evolves, so do the challenges and opportunities in identity and access management. This forward-looking webinar showcased how SailPoint IdentityIQ and UberEther's IAM Advantage are setting the pace for the future of IAM in the federal sector. During this webinar, ...
Federation Bubbles with Justin Richer, CTO of UberEther
Multi-Vendor Webcast

Event Date: April 10, 2024
Hosted By: UberEther, Ping Identity, Radiant Logic, SailPoint, CyberArk & Carahsoft
Attendees of this webinar learned:  Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address ...
Federation Bubbles with Justin Richer, CTO of UberEther
Multi-Vendor Webcast

Event Date: November 07, 2023
Hosted By: UberEther, Nok Nok & Carahsoft
The Executive Order M-22-09 mandates that all government agencies and contractors doing business with the government must implement phishing-resistant MFA for employees, contractors and citizens online applications by fiscal year end 2024. NIST, CISA, and NSA have ...
Federation Bubbles with Justin Richer, CTO of UberEther
Multi-Vendor Webcast

Event Date: August 31, 2023
Hosted By: UberEther, SailPoint, Radiant Logic, CyberArk, Ping Identity & Carahsoft
Attendees learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches ...
Federation Bubbles with Justin Richer, CTO of UberEther
Multi-Vendor Webcast

Event Date: June 28, 2023
Hosted By: UberEther, SailPoint, Radiant Logic, CyberArk, Ping Identity, & Carahsoft
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the ...

Resources


Featured

Our unique key generation technology eliminates the risk of key transmission.

The US Government has been increasingly concerned about the quantum threat to national security, and this mounting apprehension is evident in the growing cadence of warnings and publications in recent years. From the National Quantum Initiative (NQI) Act in December 2018 to the White House National ...

This document provides an overview of the Gold Comet™ Solution – features, sample industries supported by our platform, and contact information to reach out via Carahsoft.

Read this SandboxAQ whitepaper providing an overview of core capabilities and how they’re different. Public sector core capabilities include: AI + Quantum, Quantum Sensing, Post-Quantum Cryptography and AI Simulation.

Article

Learn about the government’s post-quantum cryptography (PQC) readiness based on the National Institute of Standards and Technology standards.

Blog

MIT scientists have created a new quantum algorithm that could bring us closer to cracking complex cryptographic systems. Read now to learn more about cryptographic systems.

The development of the finalized post-quantum cryptography (PQC) standards are led by the National Institute of Standards and Technology, the Commerce Department’s scientific standards bureau. Read now to learn how federal officials are trying to prevent future Quantum computing powered cyber ...

Read how we’re partnering with NOVONIX to accelerate battery technology advancements, reduce development timelines and drive sustainability in materials and chemicals across all industries.

Learn about the first phase of the quantum encryption transition through Government Executive Orders and mandates.

Guide

Quantum Computing GovLoop Guide featuring Digicert, Palo Alto Networks, Quantropi and Keyfactor. This guide outlines the timeline of quantum computing, how it works, and other important aspects to know to prepare for the future & start fighting quantum threats.