Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Infoblox-microsite.png
Infoblox Webcast

Event Date: February 19, 2025
Hosted By: Infoblox & Carahsoft
Join us at the Infoblox Demo Desk to see how Infoblox outperforms legacy solutions in delivering resilient, scalable, and automated network management for today’s multi-cloud environments. Discover how Infoblox helps overcome challenges such as: Frequent updates and downtime: ...

Archived Events

Infoblox-microsite.png
Infoblox Webcast

Event Date: January 29, 2025
Hosted By: Infoblox & Carahsoft
During our 30-minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed: The impacts on security that arise from evolving IT architectures How to leverage your ...
Infoblox-microsite.png
Infoblox Event

Event Date: January 28, 2025
Hosted By: Infoblox, Blackwood & Carahsoft
Location: Reston, VA
Federal agencies face increasingly sophisticated cyber threats, with adversaries exploiting the Domain Name System (DNS) to infiltrate and disrupt critical systems. DNS, while vital for networking, has become a key vulnerability—but also serves as a powerful tool for threat detection and mitigation. In ...
Infoblox-microsite.png
Infoblox Event

Event Date: January 22, 2025
Hosted By: Infoblox, CDW & Carahsoft
Location: New York, NY
Understanding how threat actors use AI to compromise environments has become a rising concern across the globe. Leveraging techniques such as proactive threat detection, detecting highly evasive threats, accelerating threat investigation and streamlining incident response are critical in adapting to today’s cyber ...
Infoblox-microsite.png
Infoblox Webcast

Event Date: January 21, 2025
Hosted By: Infoblox & Carahsoft
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg provided an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they reviewed the architectural considerations for this solution ...
Infoblox-microsite.png
Infoblox Webcast

Event Date: December 18, 2024
Hosted By: Infoblox & Carahsoft
During the Infoblox Demo Desk, attendees learned
Infoblox-microsite.png
Infoblox Webcast

Event Date: November 20, 2024
Hosted By: Infoblox & Carahsoft
During our 30-minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed: The impacts on security that arise from evolving IT architectures How to leverage your ...
Infoblox-microsite.png
Infoblox Webcast

Event Date: October 23, 2024
Hosted By: Infoblox & Carahsoft
During our 30-minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed: The impacts on security that arise from evolving IT architectures How to leverage your ...
Infoblox-microsite.png
Infoblox Webcast

Event Date: October 17, 2024
Hosted By: Infoblox & Carahsoft
In this technical session, the second of a three-part virtual workshop series, Hexabuild’s Tom Coffeen demonstrated the configuration of IPv6 Address Management on an Infoblox system. He used a fictional IPv6 address plan that includes some IPv6 address planning best practices.   Key Learning ...
Virtual Event

Event Date: October 01, 2024 - October 02, 2024
Hosted By: Federal News Network and Carahsoft
With the recent release of the updated National Cybersecurity Strategy Implementation Plan, agencies are continuing their efforts to meet the cyber objectives set by the administration in March 2023. What’s on the agenda for the second year? At the Cyber Leaders Exchange 2024, Federal News Network explored how agencies ...

Resources


Featured

CMMC compliance is vital for businesses working with the Department of Defense, ensuring they meet security standards to protect sensitive data. Achieving CMMC certification helps organizations safeguard contracts and secure valuable partnerships in a high-stakes cybersecurity environment.

Federation Bubbles with Justin Richer introduces a flexible model for identity federation, where trust is dynamically managed based on context. This approach allows for secure, isolated, and adaptable spaces, even in disconnected environments, ensuring stronger security for modern systems.

Check out SolCyber's new e-book on CMMC 2.0.

CMMC 2.0 and it's regulations set to take effect shortly. The window of time to address your security vulnerabilities and demonstrate compliance is closing quickly.

The Defense Industrial Base (DIB) is crucial to U.S. national security, handling highly sensitive information and making it a prime target for cyber threats. As the DoD implements the Cybersecurity Maturity Model Certification (CMMC), contractors must now meet stringent security standards, which can...

Secude HaloCAD
Solutions Brief
With HaloCAD, you can secure CAD files wherever they travel, ensuring lifelong access control and protection inside and outside your IT perimeter. HaloCAD's automatic data protection safeguards your sensitive files against leaks or theft, helping you demonstrate compliance, avoid penalties, and enha...

Join Jared Shepard, CEO and President of Hypori, as he shares key insights from SOF Week 2024 in this must-watch video.

Learn more about how Lifeline's CMMC Fast Track can help your organization achieve CMMC quickly and efficiently.

This whitepaper provides an overview of the Cybersecurity Maturity Model Certification (CMMC) history, purpose, and parameters and the requirement for secure handling and storage of Controlled Unclassified Information (CUI) by defense contractors, suppliers, and other enterprises serving the Defense...

Zscaler's Zero Trust Exchange architecture empowers organizations and DoD suppliers to achieve CMMC compliance. By minimizing attack surfaces and enforcing least privilege access, Zscaler's modern approach to security strengthens an organization's overall cybersecurity posture and aligns...