Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: July 25, 2023
Hosted By: BeyondTrust, Tenable & Carahsoft
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote ...
Tenable-microsite.png
Tenable Webcast

Event Date: June 27, 2023
Hosted By: Tenable & Carahsoft
Discover and prioritize Active Directory vulnerabilities and misconfigurations to disrupt attack paths before attackers exploit them. Tenable Active Directory security prevents and detects sophisticated attacks such as Brute Force, DCShadow, DCSync, password spraying, and more without agents and privileges. Agencies can ...
Tenable-microsite.png
Tenable Webcast

Event Date: June 20, 2023
Hosted By: Tenable & Carahsoft
This demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Tenable OT Demo highlights: Learned how organizations gain complete visibility across converged ...
Tenable-microsite.png
Tenable Webcast

Event Date: June 13, 2023
Hosted By: Tenable & Carahsoft
While Active Directory (AD) implementations vary across enterprises, there are a number of common challenges that organizations face. In this workshop Tenable focused on the nuts and bolts of Active Directory, and how best to secure it. Session highlights included: Domain Controllers ...
BeyondTrust-microsite.png
Multi-Vendor Webcast

Event Date: April 18, 2023
Hosted By: BeyondTrust, Tenable & Carahsoft
Cybersecurity is usually framed in terms of IT – from malware to phishing to ransomware, federal agencies are paying attention to securing their networks and endpoints. But leaders often overlook security measures for operational technology (OT) and industrial control systems (ICS), such as building automation systems, ...
Tenable-microsite.png
Tenable Webcast

Event Date: April 04, 2023
Hosted By: Tenable & Carahsoft
Tenable and Carahsoft security experts had an informative webinar to learn how you can implement a proactive approach for preventing breaches and exploitation.   Our discussion covered:  Why education is such a vulnerable environment for ...
Waterfall_Security_Color.png
Multi-Vendor Webcast

Event Date: March 15, 2023
Hosted By: Waterfall Security Solutions, Tenable & Carahsoft
During this webinar our experts reviewed how you can leverage passive automation to properly inventory OT assets, their workflows, communication paths, and protect them to an air-gapped level of security – without operation compromise ...
Tenable-microsite.png
Tenable Webcast

Event Date: January 31, 2023
Hosted By: Tenable & Carahsoft
In this webinar, Tenable and Carahsoft took a deep dive into why preventative security is essential for preventing breaches and exploitation, as well as the benefits of real time continuous assessment for eliminating the attack pathways that the Bad Guys use for lateral movement and privilege escalation.
Tenable-microsite.png
Tenable Webcast

Event Date: December 14, 2022
Hosted By: Tenable & Carahsoft
View Tenable and Carahsoft's demo of Tenable’s Active Directory security solution, Tenable.ad.Some demo highlights included:Discoveing underlying issues affecting Active DirectoryIdentifying dangerous trust relationshipsCatching every change in your ...
Tenable-microsite.png
Tenable Webcast

Event Date: December 13, 2022
Hosted By: Join Us - Tenable Active Directory Webinar!
In this webinar, attendees heared subject-matter-experts discuss:Proven methods for preventing and detecting attacks in real-time.Why point-in-time efforts to secure Active Directory fall short.How to address risks in Active Directory and eliminate attack paths before attackers ...

Resources


No resources were found. Please try another search.