Back to Search Begin New Search Save Search Auto-Notify
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
October 20-22, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
State of Code Webinar Series
Recent projections reveal the staggering cost of poor software quality: over $2.41 trillion annually in the US, with nearly two-thirds attributed to the cybercrime fueled by insecure code. Register for Sonar's State of Code webinar series to learn how their integrated solution for code quality and code security analysis is designed to help software developers reduce this cost and streamline workflows with AI. Join Sonar solution experts online...
October 21, 2025
Organizer: Sonar Government Team at Carahsoft
Location: Webcast
Add Favorite
Intelligent Data Infrastructure: Poweri...
Federal Civilian agencies face mounting pressure to modernize IT infrastructure, adopt AI responsibility, strengthen cyber resilience, and embrace the cloud - all while improving efficiency, reducing costs, and protecting mission integrity. You're invited to join NetApp and Carahsoft for a webinar series designed to equip agencies with practical strategies, proven solutions, and expert insights for accelerating transformation across critical m...
October 21, 2025
Organizer: NetApp Government Team at Carahsoft
Location: Webcast
Add Favorite
The Missing Link in Threat Detection: C...
When it comes to securing industrial environments, host and network data are two halves of the same story. Network data shows you what’s moving, where it’s going, and how it flows, but without host data, you can miss the “why” and “how” behind suspicious activity. Host data gives the inside view: process activity, system changes, and user actions that can reveal the root cause of an incident. Without both pu...
October 21, 2025
Organizer: Insane Cyber Government Team at Carahsoft
Location: Webcast
Add Favorite
Escape Rising Virtualization Costs with...
Rising licensing costs and restrictive bundling models have left many government customers paying more than ever for virtualization solutions—often for features they don’t even use. These unexpected expenses create budget challenges and limit flexibility at a time when agencies are under pressure to modernize efficiently. With HPE VM Essentials (VME), there’s a smarter way forward. This solution delivers the agility and perfo...
October 21, 2025
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
VETS 2 DPA Training

CANCELED

Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
October 21, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
DNS Under Siege: Unmasking the Infrastr...
In today’s threat landscape, DNS is no longer just the phonebook of the internet. It’s a battleground. Threat actors are exploiting DNS with unprecedented speed and sophistication, leveraging ephemeral domains, traffic distribution systems (TDS), domain hijacking and adversarial AI to evade detection and scale attacks. In this webinar, you'll learn about:The rise of one-time-use domains and their role in control evasionHow maliciou...
October 21, 2025
Organizer: Infoblox Government Team at Carahsoft
Location: Webcast
Add Favorite
Vulnerability Management 101
During this webinar attendees will learn: The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CK How vulnerability management plays a role with various standards and frameworks
October 21, 2025
Organizer: Fortra Government Team at Carahsoft
Location: Webcast
Add Favorite
From AI Readiness to AI Enablement
Federal agencies are accelerating their adoption of artificial intelligence (AI) to meet growing demands to increase speed and efficiency to keep pace with AI requirements. Yet, AI is only as effective as the trusted data that powers it. While agencies possess vast data amounts of datasets and data products, much of it remains isolated, inconsistent, and untrusted, putting AI program at risk. To unlock the full potential of AI, data must be ac...
October 21, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Smarter Contracts, Stronger Missions
Icertis and Carahsoft are excited to invite you to join us subsequent to AUSA 2025 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's rapidly evolving defense and government contracting landscape, agility, compliance, and visibility are mission-critical. AI-powered contract lifecycle management (CLM) is transforming procurement and performance across the...
October 21, 2025
Organizer: Icertis Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search