Live WEST 2026 Webinar
ThreatOps Challenge: AI SIEM Workshop - During this webinar, attendees will learn: How to navigate real-world alerts, threats and easter eggs; About the full power of AI-driven analytics and Singularity Data Lake; About the latest advances in threat detection, investigation and response. Register now to join the ultimate threat hunting competition only for Public Sector customers!
Live WEST 2026 Webinar
Alteryx and Carahsoft are excited to invite you to join us subsequent to WEST 2026 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. As federal agencies modernize to meet evolving mission demands, data and AI are playing an increasingly critical role in accelerating decision-making and improving operational outcomes.
Webinars & Broadcasts
From Readiness to Realization: Your 2026 Roadmap to Zero Trust Compliance - As Federal agencies advance from Zero Trust readiness to full implementation, many are encountering new challenges in operationalizing their architectures to meet 2026 compliance goals. During this webinar, you'll hear perspectives from a distinguished panel of experts across the Zero Trust ecosystem.
Webinars & Broadcasts
Increase cost savings and efficiency with Intelligent Content Management - Government agencies can reduce costs and improve efficiency by replacing legacy content systems with Box Intelligent Content Management, which unifies unstructured data and applies AI to streamline workflows and surface insights. A single secure, FedRAMP High authorized platform consolidates storage, e-signatures, AI tools, and integrations to lower IT overhead, eliminate silos, and increase productivity.
Webinars & Broadcasts
One Platform for Federal Agencies - This resource page highlight is a collection of government-focused events and educational materials curated by Carahsoft in partnership with technology vendors. It promotes the upcoming On-Demand webinars, trainings and briefings designed to help public sector organizations understand and adopt modern IT solutions across areas such as cybersecurity, cloud, digital transformation and networking.
Webinars & Broadcasts
Preparing for looming national cyber security threats in 2026 and beyond - This article emphasizes that sectors such as energy, healthcare, transportation and public administration face heightened risk as attackers exploit routine weaknesses like stolen credentials and vulnerabilities introduced through third-party vendors and software supply chains.
Webinars & Broadcasts
Addressing Security Holes in Air-Gapped Environments - As cyber threats continue to escalate, government agencies are under pressure to move towards a Zero Trust architecture, safeguarding users, critical data, and systems without traditional network perimeters. However, migrating to the cloud can cause security holes in air-gapped systems if threats like data transfer from external storage media, for example, a USB device, aren't attention focuses.
Webinars & Broadcasts
Operating as One: Enabling Maritime Dominance Through Cross-Domain Collaboration
Webinars & Broadcasts
F5 AI Red Team Solution Overview - . Access our resource to learn how to transition from reactive defense to proactive assurance while hardening the resilience of your AI innovations. This solution overview introduces the F5 AI Red Team, an automated platform designed to expose critical vulnerabilities-such as prompt injection and data exfiltration-long before they can be exploited in production.
Webinars & Broadcasts
RSA® Governance & Lifecycle - In today's rapidly evolving digital landscape, identity governance and administration (IGA) is essential for driving efficiencies, maintaining compliance, and protecting critical assets. Organizations must ensure that access to sensitive data is controlled, especially as employees, partners, students, contractors, and others join, move within, or leave the organization.
Webinars & Broadcasts
Meeting Presidential Mandates with RSA ID Plus: Phishing-Resistant MFA for Federal Agencies - In response to the escalating cyber threat landscape, where 73% of public-sector breaches involved phishing, federal mandates such as OMB M-22-09, OMB M-24- 14, and Executive Order 14028 have set forth stringent requirements for federal agencies to implement Zero Trust Architecture (ZTA) and phishing-resistant multifactor authentication (MFA) by the end of FY2024.
Webinars & Broadcasts
RSA iShield Key 2 Series for Federal Agencies - Nearly all federal and governmental agencies, both civilian and defense, trust RSA to secure the most secure. Whether ensuring compliance, protecting classified information, or securing federal networks, RSA ID Plus for Government is your go-to solution for robust, compliant authentication.
Webinars & Broadcasts
Webinar Secure, Mission-Ready Collaboration: Introducing Zoom for Defense - With IL4 authorization and NIPRNet connectivity, Zoom for Defense is purpose-built to meet the communication needs of the U.S. Department of Defense. Watch the on-demand webinar to learn how Zoom for Defense enables defense agencies to securely collaborate and innovate on a resilient, compliant platform.
Product & Technical Documents
Axonius Software Assets - ): Discover how organizations are gaining complete visibility into software usage to strengthen security and control costs. Learn how Axonius Software Assets help identify unsanctioned software, manage EOL/EOS, remediate vulnerabilities and optimize spend through smarter, centralized software management.
Product & Technical Documents
Securing the Hybrid Cloud with AI and Deep Observability - This Gigamon solution brief discusses the integration of AI and how it helps analyze GenAI traffic across hybrid cloud environments. The solution strengthens visibility and governance while streamlining operations through troubleshooting and improved compliance.
Product & Technical Documents
Driving the DoD mission forward - This industry brief explains how Docusign helps DoD organizations digitize agreements, forms, and workflows to improve efficiency, reduce costs, and enhance service member experiences. It highlights secure, compliant eSignature and agreement management capabilities aligned with DoD IL4 and FedRAMP Moderate requirements to support mission-critical defense operations.
Product & Technical Documents
F5 AI Guardrails Solution Overview - Access our resource to learn how F5 AI Guardrails helps organizations secure, govern, and scale AI with confidence.
Product & Technical Documents
FortiLayer - AI/ML Trust and Security Analysis - FortiLayer helps teams deploying AI in critical defense systems improve model security, explainability, and performance. It breaks models into analyzable layers to identify risks such as adversarial susceptibility, overfitting, and underutilized neurons, with options for rapid patching, compliance mapping evidence, and pipeline integration.
Product & Technical Documents
FortiLayer - AI/ML Trust and Security Analysis - FortiLayer helps teams deploying AI in critical defense systems improve model security, explainability, and performance. It breaks models into analyzable layers to identify risks such as adversarial susceptibility, overfitting, and underutilized neurons, with options for rapid patching, compliance mapping evidence, and pipeline integration.
Product & Technical Documents
BinLens - Automated Binary Vulnerability Analysis - BinLens - Automated Binary Vulnerability Analysis BinLens automates deep binary analysis to uncover potential zero-day vulnerabilities with low false positives, even when source code is unavailable, helping ensure software is secure before deployment. Powered by automated symbolic execution, it excels at finding memory-safety violations and other undefined behaviors that can put mission-critical defense systems at risk
Product & Technical Documents
What is Covert Copy? - Wasabi Covert Copy creates a hidden, immutable replica of critical data that only a root user can access, providing strong protection against ransomware, accidental deletion, and tampering. The covert bucket is invisible to non root users, secured through Multi Factor and Multi User Authentication, and automatically maintains immutability through periodic lock renewal.
Video & Visual Content
ServiceNow AI Platform Experience Agentic AI with the Zurich Release - The ServiceNow AI Platform Zurich release ushers in the agentic era of enterprise AI. In this resource, you'll see how autonomous AI app development, agentic workflows, and built-in security come together on a single platform. Explore key innovations like Build Agent, agentic playbooks, and ServiceNow Vault and learn how they enable faster innovation, scalable automation, and trusted AI across the enterprise..
Video & Visual Content
AI-Powered Deep Obervability - The brochure outlines Gigamon's role in delivering network-derived intelligence that strengthens cyber defense, supports Zero Trust initiatives and enhances operational resilience across on-premises, hybrid, and multi-cloud architectures, including classified and air-gapped networks.
Reports & Written Content
Adobe JELA One Pager - The Adobe Joint Enterprise License Agreement (JELA) allows 1.67 million DOD users in the U.S. Army, Air Force, and 4th Estate to efficiently use Adobe software through a single contract. It supports the DOD's Workforce Acceleration and Recapitalization Initiative by modernizing operations, eliminating manual workflows and paper-based processes, and implementing automation and AI for improved mission outcomes
Product & Technical Documents
Red Teaming Service - Discover Trellix's Red Teaming services, which simulate real-world attack scenarios to assess your organization's incident detection and response capabilities. Using both traditional and non-traditional techniques, Trellix evaluates your security's resilience against data exfiltration and advanced attacks.
Reports & Written Content
Develop an Intelligent Data Strategy for Defense Agencies with Data Cataloging - Understand the Value of Data Cataloging and Governance. An enterprise data catalog acts as a central place to collect, index, relate, annotate, and share knowledge about agency data assets.
Reports & Written Content
Data Security & Protection in the Age of Zero Trust - In an era of escalating cyber threats and stringent data privacy regulations, federal agencies are entrusted with safeguarding a vast amount of sensitive citizen data. This critical responsibility is compounded by the evolving threat landscape, increasing regulatory scrutiny and the mandate to modernize operations while adhering to the Zero Trust security framework.
Reports & Written Content
What Content Velocity means to the DoD's Mission - When it comes to the images and videos that deliver modern content, cutting-edge technology can help the warfighter and improve overall readiness. That technology landscape is changing fast, with artificial intelligence (AI) promising to accelerate content creation and streamline content management.
Reports & Written Content
Intelligent Automation: The New Age of AI-Powered Data-Driven Business is Here - This infographic outlines a simple, three-step approach to turning information into impact. It begins with collecting and organizing data, transforms that data into meaningful insights, and concludes with taking informed, actionable steps.
Reports & Written Content
Cyber Threats to the U.S.: What Policymakers Need to Know for 2026 - Amit Weigman discusses how cyber threats have moved beyond opportunistic intrusions to become deliberate tools of global competition that target U.S. government networks and critical infrastructure. Attackers exploit basic weaknesses like compromised credentials, vulnerable software and supplier relationships to infiltrate systems and sometimes reach operational technology that controls physical infrastructure.
Reports & Written Content
Gigamon Adds Crucial Network Visibility to Zero Trust at the Department of Defense - In this customer success story, Gigamon outlines challenges around Zero Trust and explains how Gigamon's technology addresses these challenges. Also featured in this resource are benefits DoD customers have received with Gigamon's solutions.
Reports & Written Content
Transform Asset Intelligence Into Intelligent Action with Axonius - Discover how Axonius helps defense agencies identify unmanaged assets, enforce Zero Trust policies and reduce risk through automated, data-driven action. Axonius unifies data across endpoints, identities, software, SaaS and cloud to deliver cyber clarity at mission speed.
Reports & Written Content
A practical guide to enabling PQC with F5 - Read our blog to learn how to future-proof your digital infrastructure against emerging quantum threats. This guide outlines how F5 facilitates a seamless transition to Post-Quantum Cryptography (PQC), enabling the integration of NIST-standardized algorithms into existing infrastructure without disrupting performance.
Reports & Written Content
Trellix® Intrusion Prevention System - Explore Trellix's Intrusion Prevention System (IPS), a next-generation intrusion detection and prevention solution designed to improve detection accuracy in advanced attacks. For enhanced protection, Trellix IPS integrates with Trellix Intelligent Sandbox, leveraging machine learning to detect risks and threats across your network.
Reports & Written Content
Securing the National Infrastructure with Efficiency and Lower Costs - Gigamon empowers organizations and federal agencies to control costs, stay ahead of evolving cyber threats, and safeguard the reliability of essential, mission-critical services.
Reports & Written Content
Modern Authentication for the Modern Naval War Fighter - This Yubico document describes why ensuring and securing phishing-resistant access to sensitive information for users who cannot use the Common Access Card (CAC) for authentication is essential. The YubiKey offers a high-assurance alternative with its secure hardware chip that protects authentication secrets from copying or theft. It is suitable for legacy and modern applications, including high-security scenarios that occur in the U.S. Navy.
Reports & Written Content
FedRAMP and DoD IL5 Solutions for Government - Ping Identity provides a modern, cloud-based identity solution that supports Zero Trust security by verifying every user and device, regardless of network location. With support for DOD IL5, FedRAMP High and hybrid IT environments, Ping enables secure cloud adoption, prevents identity silos and enhances federal ICAM/FICAM programs for stronger, flexible authentication across your multi-cloud infrastructure.
Reports & Written Content
The Ultimate Guide to Identity for AI - As AI agents gain autonomy, traditional identity models fall short. This guide explores how identity for AI creates a trust framework that ensures every agent is authorized and traceable. Learn how Ping Identity reduces risk, prevents impersonation and applies Zero Trust principles to AI.
Learn more about our WEST 2026 Resource Hub and Webinar Series speakers!
ThreatOps Challenge: AI SIEM Workshop
ServiceNow AI Platform Experience Blog
Broadcom Webinar
Moderator & Contributing Editor
CEO of Tech Writers Bureau - Manage technical writers and journalists decoding highly technical topics for any audience.
Omnissa Webinar
AppGate Webinar
Alteryx Webinar
A practical guide to enabling PQC with F5
Check Point Webinar