Carahsoft Technology Corp.
Carahsoft has built our reputation as a customer-centric organization dedicated to serving the needs of our technology manufacturers, government end users, and reseller ecosystem with Solutions for Government. We have a proven history of helping government agencies find the best possible technology solution at the best possible value. Each customer works directly with a dedicated account representative to determine a solution tailored specifically to meet his or her needs. We combine our extensive knowledge of the technologies we provide, with a thorough understanding of the government procurement process, to analyze needs, provide configuration support, simplify the ordering process, and offer special government pricing.

Upcoming Carahsoft Technology Corp. Events

Join your peers in the D.C. area for a day dedicated to the future of public sector auditing.
Wolters Kluwer TeamMate and Carahsoft are hosting TeamMate Insights, a free, in-person event focused on elevating audit quality and navigating the shift in today's audit landscape.
Attendees will learn:
- Assessment Pitfalls: Join Adam Glover, Senior Director of CMMC Services at Insight Assurance, for a look into the most common assessment issues and pitfalls organizations face
- Elevating Audit Quality: Explore practical ways internal audit teams can strengthen methodology, improve process consistency and use their audit management tools more effectively
- Continuous Compliance: Learn practical automation patterns to reduce evidence fatigue, tighten ownership and keep cybersecurity compliance moving without blocking security
- Lessons From the Field: Hear an expert panel discussion unpacking real-world audit lessons
Space is limited, register today!

As federal and state health and human services policies evolve, HHS agencies must adapt quickly while continuing to deliver consistent, trusted services to the communities they serve.
In this session, we review real-world experience building operational agility across health and human services programs.
Learn how the agency designed flexible workflows to absorb regulatory change, maintain compliance and data integrity, leverage automation to accelerate response without losing human oversight and coordinate across teams and partners—ensuring policy changes translate into clear, manageable outcomes for both staff and constituents.

Learn how to eliminate fragmented systems and replace outdated search tools with a unified, intelligent solution. Discover how Glean’s AI-powered platform connects to your existing applications and data sources to securely surface the right information in seconds.
- How to instantly search across siloed systems to find critical information faster
- Use cases in cybersecurity, program management and constituent services
- A practical framework for adopting AI securely within your agency
- What responsible, permission-aware AI looks like in a government environment

HPE & NVIDIA invite you to join us for the "AI in a Hybrid Multi-Cloud Environment for Utah” event on April 21st at The Element Center in Kearns, UT. This one-day event brings together government and industry thought leaders to explore how AI is shaping innovation across the state of Utah.
Hear from keynote speaker Alan Fuller, State CIO for Utah, as he shares insights on the state’s approach to AI and emerging technologies. The event will also feature a panel discussion with government and industry leaders exploring how organizations across Utah are approaching AI strategy, policy and implementation.
Learn how large language models and Generative AI are enhancing government operations. During the afternoon, engage in technical interactive workshops focused on LLM, Generative AI and how to orchestrate and automate your hybrid cloud environment to support and enable AI workloads. Network with your peers and speak with industry experts about your upcoming needs.
We hope to see you there!

Federal agencies invest heavily in cybersecurity tools but tools alone do not guarantee mission readiness. As the 2026 National Cyber Strategy emphasizes disrupting adversaries and securing emerging technologies like AI, cyber teams must operate effectively under real attack conditions, not just meet compliance requirements.
Join Cympire and Carahsoft for a live demonstration of how federal teams can validate readiness through realistic cyber range exercises. This session will showcase how organizations can simulate modern threat scenarios—including AI-driven adversary behavior—within controlled environments modeled after real-world agency infrastructure.
In this session, attendees will learn:
- How federal teams can validate operational readiness through live-fire cyber range exercises rather than compliance-based training
- How to simulate modern threat scenarios, including AI-enabled adversary behavior, in controlled environments
- How cyber ranges can replicate realistic mission conditions to test detection, response, and team coordination
- How agencies can rapidly deploy training environments to support scalable cyber exercises
- Practical ways to transition from static training to continuous readiness validation for Federal cyber defenders

- Explain why phishing continues to bypass traditional security controls in SLED environments
- Review approaches to supporting identity and MFA compliance frameworks, including CJIS requirements
- Demonstrate how Zero Trust principles shift security from the network perimeter to identity
- Outline methods for enforcing strong, phishing-resistant authentication across cloud, hybrid, and legacy applications
- Address strategies for balancing security strength with user experience and operational efficiency

Join Tanium's 4th Annual FedCyber Exchange on April 21st, 2026, at the Hyatt Regency in Tysons Corner, VA. Register today to hear from Tanium executive leadership on operational resilience and the future of cybersecurity, and take part in in-depth breakout sessions focused on managing risk and securing technology at scale.
During this event, attendees will gain insights on how to:
- Enable faster detection, decision-making and response with Autonomous IT, real-time endpoint intelligence and AI-driven automation using governed workflows and trustworthy data
- Execute Zero Trust and sustain continuous compliance with real-time evidence
- Strengthen mission resilience through partnerships, ecosystem integration and cross-agency collaboration

The pace of modern software delivery continues to accelerate, leaving development and security teams balancing speed, stability, and compliance. As workflows become more automated and interconnected—with AI now part of the mix—maintaining visibility and control across the pipeline has never been more critical.
Join leaders from Veracode and Security Compass for a candid discussion focused on what works in practice. We’ll explore proven approaches to building a resilient DevSecOps program, aligning teams more effectively, and enabling innovation without introducing unnecessary risk.

- Live demos of their AI platform designed to address public sector workflow obstacles
- Glean's "Practical Playbook" for adopting AI into your agency
- a 60 minute session dedicated to the direct impact of AI on government agencies

Context-Aware Classification: Using intelligent tools to classify data based on context (who created it, where it is going) rather than just content
CMMC Level 3 Readiness: Specific tips for mapping your classification labels to the 110+ controls of NIST SP 800-171 to ensure contractor and agency compliance
The GenAI Guardrail: How to use classification to prevent sensitive government data from being ingested into unauthorized LLM (Large Language Model) training sets
Dynamic Access Orchestration: Integrating your classification engine with Identity Providers (IdP) to enable "Just-in-Time" access based on the sensitivity of the document
In the upcoming 4/21 webinar, topics covered include:
- Advanced Post-Exploitation: A discussion of extended post-exploitation capabilities, enhanced injection techniques, and customizable integrations that support comprehensive assessment workflows.
- Built-In OPSEC-Focused Features: An overview of Outflank C2’s native operational-security enhancements, designed to streamline operator workflows and reduce reliance on complex build processes.
- Advanced Capabilities: Insight Cobalt Strike, OST, and the Fortra offensive security offerings.

- The Agentic Lifecycle: How to use Anypoint Code Builder to define, configure and bootstrap your first Agent Network Project.
- Defining the "Brain": A deep dive into Agent Cards and YAML specifications to define clear boundaries and "tools" for your agents.
- Cross-District Governance: Utilizing the Agent Registry to ensure transparency and prevent "Agent Sprawl" across the 12 Districts.
- Secure Execution: How MuleSoft Agent Fabric enforces NIST-compliant security protocols, ensuring AI actions are traceable and audited.

- How the TX2 far surpasses the previous TX1 in performance and features
- How the TX2 has become a powerful triage tool
- Why Tree Hashing will become the go-to hashing methodology of the future

- How to securely organize and automate work
- Way to enhance analysis, collaboration and decision-making
- Practical methods for using ChatGPT in complex government tasks

- The Stalling Point of AI: Why AI initiatives stall due to data structure limitations, not model performance — and what agencies can do about it
- Semantic Unification: How semantic unification enables cross-agency search, retrieval and AI-powered decision support
- Agentic AI Readiness: What agentic AI readiness actually requires at the architecture level
- Legacy System Integration: How a unification layer can operate above legacy systems without rip-and-replace
Events We Are Sponsoring
Most federal agencies are moving to incorporate artificial intelligence (AI) into their systems and processes, in part as a response to Executive Order 14110, issued in 2023, for the safe, secure, and trustworthy development and use of AI, and in part because AI promises productivity gains and cost savings.
As expected with an innovative new technology, so far agencies have been experimenting with pilot programs, rather than enterprise-wide initiatives. They are wrestling with several challenges to scaling up their pilots, such as poor data quality, governance and compliance obstacles, integration hurdles, and lack of dedicated budgets.
Learning Objectives:
- Define metrics for ROI, productivity, and social benefit
- Draw from case studies that discuss moving from pilots to scaled implementations
- Outline lessons learned from practical deployment of AI across the private sector

Innovate Cybersecurity Summit is an invitation-only, all-expenses-paid, cybersecurity education event for CISOs and cybersecurity executives.
We bring a small group of leaders together to talk plain truth about risk, response, and resilience. The format includes a variety of engaging sessions, from CISO panels and Breakout sessions to our fast-paced Reverse Expo for productive meetings. Fill out the form to apply to attend today.
The Ultimate Cybersecurity Executive Experience.
- 140+ CISO Attendees from enterprise organizations across industries.
- 3 Days of focused engagement, exclusive networking, and cutting-edge technology.
- 10+ Hours of peer-led sessions, panels, and workshops tackling the most pressing challenges facing CISOs today.
As agencies move to incorporate AI tools throughout their organizations, many are finding that AI without orchestration creates new silos. The agencies that lead will not be the ones with the most AI tools, but the ones that deploy AI safely, at scale, with auditability and human oversight built into every action.
Creating a single “front door” for AI users can help make sure the AI is working for government employees, not the other way around. By creating AI “specialists” that can execute entire jobs from beginning to end, public servants can be freed up to take the work that requires judgment and empathy. This twin path to completing work assignments compresses time-to-value and provides faster outcomes.
Learning Objectives:
- Outline considerations for defining the line where an ‘AI Specialist’ can own a task versus where a human must intervene
- Evaluate ways to build human oversight into every autonomous action at a mission scale
- Identify steps to accelerate implementation to reap the benefits of faster time-to-value

Google Cloud Next: Where big ideas become a reality
- Get a sneak peek into some of the latest advancements in AI and cloud tech.
- Join a global community of leaders, thinkers, and doers to share ideas.
- Immerse yourself in three full days of back-to-back lightning talks, interactive demos, guided workshops, and more.
Next is for everyone. Whether you’re a developer, a data scientist, an IT leader, a security professional, or just passionate about all things tech, you’ll find tools, insights, and opportunities at Next that you won’t find anywhere else. Attendees must be 21+ years old to attend.
The future is yours to build. Get started with insights, strategies, and tools from Next. Check out these learning opportunities that can help you turn your next big idea into a reality.
Equipping your teams with the right digital tools is one of the fastest ways to remove friction, streamline daily tasks, and boost overall productivity. But with so many solutions emerging, it can be tough to know which ones will actually make a measurable impact.
Join us on Wednesday, April 22 at 2 p.m. ET/11 a.m. PT for an energizing session on practical, real‑world ways technology can help government teams collaborate better, stay organized, and focus on mission‑critical work.
You'll learn:
- Simple, tactical steps to help your workforce get more done with less effort.
- How to identify the tools that will drive the greatest value.
- Easy ways to measure whether new technologies are improving workflow and employee experience.
Federal agencies are under relentless pressure to modernize their security posture as they face an onslaught of new, enhanced threats – from hostile nation-states, criminal networks, and hackers determined to stir up trouble.
The path forward starts with three proven principles: Least Privilege Access, which blocks users from gaining entry to data and software they are not allowed to use; Zero Trust architectures, designed to “never trust, always identify;” and microsegmentation, which allows networks to be blockaded into very small sections that can be walled off from the overall network.
Learning Objectives:
- Learn how to align these three strategies with required mandates
- Outline a practical roadmap for implementation across your agency’s infrastructure
- Delineate the ways these approaches strengthen your agency’s cyber defenses from the inside out
Equipping teams with the right digital tools quickly reduces friction, streamlines tasks, and boosts productivity—but with so many options, it’s hard to know which will truly make an impact.
Join us on Wednesday, April 22 at 2 p.m. ET/11 a.m. PT for an energizing session on practical, real‑world ways technology can help government teams collaborate better, stay organized, and focus on mission‑critical work. You’ll learn:
- Simple, tactical steps to help your workforce get more done with less effort.
- How to identify the tools that will drive the greatest value.
- Easy ways to measure whether new technologies are improving workflow and employee experience.
Federal agencies are moving quickly with AI pilots — but experimentation must evolve into secure, governed, mission-aligned execution. Articles about AI “hallucinations” including fictitious legal citations and quotes demonstrate the risks of using legal AI tools without appropriate context and human review.
Legal and regulatory teams can transition from proof of concept to production-ready AI workflows that are defensible, auditable, and aligned with federal mandates. Embedding governance, human oversight, and measurable value into AI initiatives, without increasing operational risk — is achievable and offers a clear path to streamlining legal operations.
Learning Objectives:
- Delineate where in the legal process your agency wants to make use of legal AI tools
- Outline the known problems found with AI legal tools (e.g., false case law citations) and the steps needed to protect against them
- Identify the regulatory frameworks within which your agency’s legal AI will operate and lay out the steps to incorporate their guidelines

Virginia is among the leaders in government innovation, employing technology to raise the quality of public services and make people more involved. It involves updating data systems, AI and IT infrastructure, making digital services better while improving customer experience. At its core, this project entails setting ethical standards for managing AI and data; hence Virginia must ensure that these technologies are used responsibly even as they continue expanding their use.
Join us at the Government Innovation Showcase Virginia to explore insights in data management, modernized infrastructure, citizen-centric digital services, digital inclusion, and inter-agency collaboration. This event will highlight Virginia's innovative approaches and provide a platform for sharing ideas with peers across the state.

Advancing government excellence through trusted collaboration, partnerships and technology leadership
NASCIO excels as the premier community and trusted resource for state CIOs
- Support transition planning, processes and mentoring for state CIOs
- Identify and promote leading practices and innovations to support, enable and transform the business of state government
- Promote and cultivate additional information technology communities of practice in support of the state CIO and transformational government services
- Improve the sharing of experiences and expertise among members, trade associations and strategic partners
- Curate and promote content on information technology issues, implications and solutions
Individuals must be employed by a current NASCIO member to register
Cybersecurity is always a volatile topic – new threats, new approaches to defense, emerging new attack surfaces. The emergence of AI as a commercially viable technology introduces new considerations, including growing recognition that it substantially increases the need for risk management.
The cyber cold war between U.S. agencies and hostile interests – from criminals to nation-states – has entered a new phase with the widespread use of artificial intelligence (AI), which has emerged as a true two-edged sword in the conflict. AI can be a powerful tool in cyber defense, but it will have to be used against AI-driven cyber attacks.
Another defense against AI is the concept of Zero Trust; it is the basis of federal policy mandating that agencies adopt ZT architectures. Today, however, the premise must be expanded to include supply chain security. And the need for stronger, more comprehensive cybersecurity must extend to include U.S. critical infrastructure – another way that the cyber attack surface is expanding.
Learning Objectives:
- Identify where new AI tools can reinforce existing cyber defenses
- Examine how to protect data privacy within an AI-enabled system
- Evaluate your software supply chain to determine how and where to implement zero trust requirements
- Delineate the elements of a universally applied ZT architecture, including identities, accounts, assets, resources, authentication, behavior, and data
- Review your agency’s operations to locate where OT is used and conduct risk assessments to determine corrective measures
In today’s zero trust world, federal systems integrators (FSIs) operate in some of the most complex environments—distributed workforces, partner connectivity, subcontractors, and teams supporting multiple agencies with different requirements. That complexity makes it harder to ensure the right users have the right access to the right application without relying on broad network trust.
A modern approach pairs strong identity signals with application-level access enforcement and continuous verification after login. This helps SIs reduce over-privileged access, limit lateral movement, and improve auditability—while enabling secure collaboration across employees, subcontractors, and mission partners.
Learning Objectives:
- Outline the value and benefits of integrated, real-time enforcement of both identity and access control
- Define post-login risk in and how continuous verification helps to counter it
- Recognize how identity and security are evolving as AI becomes embedded across your organization—and as AI agents and other non-human identities emerge in your systems
- Review your organization’s audibility, data control, and third-party/supply chain exposure
Microsegmentation is a critical security strategy for state and local law enforcement agencies aiming to comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. This policy mandates strict security, encryption, and access controls for protecting sensitive Criminal Justice Information (CJI).
The security policy ensures that law enforcement agencies and their partners securely manage biometric, biographical, and case data throughout its lifecycle. Microsegmentation helps meet stringent requirements for controlling access to Criminal Justice Information (CJI) by breaking networks into small, secure zones to restrict lateral movement of threats. Key aspects of microsegmentation for CJIS compliance include limiting “east-west” movement between systems; implementing Zero Trust architectures; and automating the classification of protected assets and creating dynamic security policies.
Learning Objectives:
- Understand the connection between microsegmentation and zero trust architecture in protecting and monitoring “need-to-know” access to CJI
- Evaluate how automated policy generation protects both compliance and operational stability
- Define the role of microsegmentation in protecting high-value assets, such as database servers containing sensitive information such as biographic, biometric, or case report data
Almost all (95%) government agency leaders at all levels say they plan to invest in emerging technologies over the next five years, including generative AI (35%), yet only a fraction achieve measurable and sustainable service improvements.
Part of the challenge is reexamining the metrics used to track improvements in customer service (CX); after all, what is measured should change depending on whether government customers are being assisted by human agents or agentic agents.
Learning Objectives:
- Develop actionable strategies for leveraging analytics and advanced technology integration
- Translate digital initiatives into sustained improvements in stakeholder engagement, transparency, and service reliability
- Navigate legislative mandates and rapidly changing policies with confidence, aligning program delivery with measurable agency goals

Events Where We Are Exhibiting

Powered by the Navy League of the United States, Sea-Air-Space is the premier maritime exposition in the U.S., bringing together defense industry leaders and top military decision-makers from around the world to share the latest advancements in the maritime domain. With industry leading speakers and events featured across three impactful days, Sea-Air-Space is a must-attend for anyone invested in the future of U.S. maritime strength and innovation.
What You'll Experience at Sea Air Space
Sea-Air-Space offers unmatched opportunities to connect, learn, and lead in the maritime defense community. Here’s what attendees and exhibitors can expect:
- Numerous networking and business-generating opportunities. Connect with policy-makers, senior military leaders, program managers, and industry decision-makers to build partnerships and spark new opportunities.
- 4 Expansive Exhibit Hall Experiences. Explore hundreds of cutting-edge exhibits showcasing the latest innovations, technologies, and solutions driving the future of maritime, naval, and defense operations.
- Professional development opportunities. Gain the latest insights into today’s defense landscape and where it’s headed through expert-led panels and sessions.
- Influential Keynotes & Luncheons – Hear from the nation’s top defense, industry, and government leaders as they share real-time updates and long-term visions in an open, engaging forum.
Please see our website to view FAQs!

The New Jersey Digital Government Summit is where innovation meets impact!
Bringing together the brightest minds in state and local government, this summit empowers public-sector leaders to explore cutting-edge technologies, modernize operations, and solve pressing challenges. From cybersecurity and AI to data governance and digital service delivery, sessions are designed to spark insight, foster collaboration, and accelerate real-world results. Whether you're shaping strategy or implementing solutions, the Summit delivers valuable peer connections and actionable guidance to help move your mission forward.
Open to Public Sector only.

We are extremely excited to convene the community at SOF Week 2026. This convention for U.S. and International SOF will include a diverse slate of programs, to include professional development sessions, interactive discussions about the future of SOF, and an up-close view of some of the best tech available to our warfighters. GSOF looks forward to working with USSOCOM to make SOF Week 2026 an impactful event.

This invitation-only gathering brings together state and local IT executives, emerging leaders, and visionary thinkers for candid conversations on the future of public-sector technology. Focused on leadership development, innovation, and strategy, the Forum goes beyond the tech to address the people, policies, and practices shaping digital government. Through peer exchange and practical sessions, participants gain the insights, relationships, and skills needed to lead their organizations and communities into the future.
This is an invitation-only event, open to Public Sector only.
For more information or to request an invitation, please contact Jennifer Caldwell.

The Los Angeles Digital Government Summit is where innovation meets impact!
Bringing together the brightest minds in state and local government, this summit empowers public-sector leaders to explore cutting-edge technologies, modernize operations, and solve pressing challenges. From cybersecurity and AI to data governance and digital service delivery, sessions are designed to spark insight, foster collaboration, and accelerate real-world results. Whether you're shaping strategy or implementing solutions, the Summit delivers valuable peer connections and actionable guidance to help move your mission forward.
Open to Public Sector only.

Registration is not yet available. Check back in the Spring of 2026.
TechNet Augusta 2026 gives participants the opportunity to examine and explore the intricacies of the cyber domain. With assistance from the U.S. Army Cyber Center of Excellence and industry experts, the conference is designed to open the lines of communication and facilitate networking, education and problem solving. Leaders and operators also discuss procurement challenges the military, government and industry face during a time of uncertain budgets and runaway technology advances.
With assistance from the U.S. Army Cyber Center of Excellence and industry, this three-day conference is designed to open the lines of communication between the military and commercial sector and provide a space where government and industry professionals can discuss issues and share solutions surrounding cyber electromagnetic activities and unified land operations.

The North Carolina Digital Government Summit is where innovation meets impact!
Bringing together the brightest minds in state and local government, this summit empowers public-sector leaders to explore cutting-edge technologies, modernize operations, and solve pressing challenges. From cybersecurity and AI to data governance and digital service delivery, sessions are designed to spark insight, foster collaboration, and accelerate real-world results. Whether you're shaping strategy or implementing solutions, the Summit delivers valuable peer connections and actionable guidance to help move your mission forward.

The California Government Innovation Summit is where innovation meets impact!
Bringing together the brightest minds in state and local government, this summit empowers public-sector leaders to explore cutting-edge technologies, modernize operations, and solve pressing challenges. From cybersecurity and AI to data governance and digital service delivery, sessions are designed to spark insight, foster collaboration, and accelerate real-world results. Whether you're shaping strategy or implementing solutions, the Summit delivers valuable peer connections and actionable guidance to help move your mission forward.

Co-hosted by AFCEA and INSA, the nation’s leading non-profit associations dedicated to public-private partnerships, the summit will bring together 2,200 leaders from government, academia, start-ups, and the defense industrial base for two days of technology-driven, mission-focused discussions.
Your registration and sponsorship don't just underwrite an event, they strengthen our mission and support the community we serve.
From a career fair and thought-provoking plenaries to breakout sessions, cutting-edge exhibits, and unmatched networking, the Summit is where connections spark ideas and partnerships that last. Registration opening Spring 2026!

The TribalNet Conference & Tradeshow is the annual gathering of the TribalHub community. It is not just another conference; it is an experience! This is one of the only events truly dedicated to Native American government, gaming, and health technology – with topics that are relevant to what is going on both nationally and locally. The attendees and vendors are open, engaged and ready to make valuable connections! In today’s world, it’s more essential than ever, for business leaders to utilize cutting-edge technologies and leadership strategies across all departments to create sustainable growth and success. The TribalNet Conference & Tradeshow is a great opportunity to take advantage of a growing network of resources, experience and industry connections, ensuring that enterprise and government leaders are in possession of the tools and information that they need to thrive in their industries.
What will you gain by attending?
- Valuable Connections with Vendor Partners and Industry Peers
- Opportunities for Collaboration with other Tribes
- Practical Tools for Business Growth
- Knowledge of the Latest Technology Tools and Resources

Each year, SC provides the leading technical program for the HPC community. The Program is designed to share best practices in all areas of high performance computing. Become a contributor and share your excellence. Presenting at SC is extremely rewarding.
Here’s your opportunity to meet and interact with industry, research organizations, universities, and startups joining us from across the globe. As an exhibitor, showcase your cutting-edge technologies, products, and services to thousands of attendees.
The Students@SC program offers a broad range of volunteer experiences, cluster competitions, and networking opportunities. Put your professional development into overdrive and identify the possibilities within the field of high performance computing.
Industry, academia, and government experts volunteer to design, build, and administer the cutting-edge SCinet infrastructure, providing internet connectivity for attendees and pushing the boundaries of network innovation through research and demos.

The Florida IT Leadership Forum is where tomorrow’s government leaders grow today.
This invitation-only gathering brings together state and local IT executives, emerging leaders, and visionary thinkers for candid conversations on the future of public-sector technology. Focused on leadership development, innovation, and strategy, the Forum goes beyond the tech to address the people, policies, and practices shaping digital government. Through peer exchange and practical sessions, participants gain the insights, relationships, and skills needed to lead their organizations and communities into the future.
For more information or to request an invitation, please contact Jennifer Caldwell.
