̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: March 12, 2025
Hosted By: DarkOwl & ̽»¨ÊÓÆµ
Attendees of this webinar learned about how in today's world, Open Source Intelligence (OSINT) plays a critical role in uncovering threats and mitigating risks by leveraging publicly available information. This webinar dove deep into the practical side ...
WireScreen-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: February 26, 2025
Hosted By: WireScreen, DarkOwl & ̽»¨ÊÓÆµ
To request access to the on-demand recording, please reach out to wirescreen@carahsoft.com.
DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: July 10, 2024
Hosted By: DarkOwl & ̽»¨ÊÓÆµ
In the realm of Open Source Intelligence (OSINT), the ability to gather, analyze, and interpret publicly available information is critical. This ...
DarkOwl_Logo_x70.png
DarkOwl Virtual Event

Event Date: February 08, 2024
Hosted By: DarkOwl & ̽»¨ÊÓÆµ
Thank you for your interest in this event. Attendees of this webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign ...

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

Collibra has been named a Leader in The Forrester Wave™: Data Governance Solutions, Q3 2025 report, recognized for its strong vision and comprehensive capabilities. Download the report to explore emerging trends, evaluation criteria for governance tools, and why Collibra stands out in today&rs...

Ready to fast-track your implementation? The Road to Go-Live Handbook reveals proven strategies, expert tips, and step-by-step guidance to help you launch with confidence and deliver results faster. View this essential playbook for turning process insights into real business impact—download no...

Government agencies are facing increasing demands to provide services more efficiently, transparently, and with limited resources. To support this transformation, we're thrilled to share that Accela has acquired ePermitHub—marking a significant advancement in streamlining permitting and pl...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

This resource provides an overview of EdgeRunner AI, a military-specific AI solution offering capabilities such as offline, multi-step, multi-turn interactions tailored for warfighters. It highlights features like EdgeRunner Athena for document summarization and domain-specific adapters with LoRA fi...

Access this Cohesity eBook to uncover six key predictions shaping the future of AI, data security, and cloud. As AI rapidly transforms industries, it brings both opportunities and risks—Cohesity experts provide actionable insights to help you stay ahead. Explore practical takeaways and valuabl...

This Alteryx and Cloudera resource highlights their joint solution for seamless data integration, advanced analytics, and scalable machine learning. It emphasizes key benefits such as efficient data processing, secure collaboration, and regulatory compliance, helping businesses optimize decision-mak...

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,