How to Secure the Software Development Lifecycle

Protect Your Agency's Software Development Lifecycle - Interactive [10 minutes]

The rapid rise in government applications has created significant benefits for the public sector. But while software applications are transforming the face of government, they are also expanding government’s technology footprint … View Course

Creating an Integrated Cyber Defense

Secure Your Entire Ecosystem - Interactive [10 minutes]

Citizen data. The federal government has it, and bad actors want it. Cyber threats surround agencies on all sides, creating a constant challenge to protect sensitive information about Americans. How … View Course

What You Need to Know About Comply to Connect

Secure Defense Agencies - Interactive [10 minutes]

The Defense Department created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. It is a formal framework for validating new devices, evaluating their compliance … View Course

How to Achieve FedRAMP Compliance

How a Third-Party Assessment Organization Can Help - Interactive [10 minutes]

In a super-connected world with ubiquitous technology, agencies must have a well–defined yet agile program to address and respond to cyber risks. That usually means moving many processes and tools … View Course

Your Steps to Achieve CDM Phase 4

Protect Your Agency Data - Interactive [10 minutes]

In response to mounting network security challenges, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program. The Department of Homeland Security’s Continuous Diagnostics and Mitigation … View Course

An Introduction to Combating Insider Threats

A Multilayered Approach to Detection & Prevention - Interactive [10 minutes]

Malicious and unintentional insider threats are among the greatest risks to government information security. They can also be the most difficult cyberthreat to identify, given the many methods and motivations … View Course

How to Act on Advancements in Government Cybersecurity

Improve Security with Managed Services - Interactive [20 minutes]

Governments at all levels are increasingly taking a proactive, department-wide approach to cybersecurity. They’re starting to invest in emerging technologies like artificial intelligence to supplement their modest staff sizes. They’re … View Course

How to Create a Security Transformation

Deploy a Security Fabric - Interactive [10 minutes]

Government agencies are changing the way they achieve their missions. They are procuring, deploying, and even creating their own digital services to help meet rising citizen and employee demands. This … View Course

How to Tackle CDM Phase 3

Secure Your Agency for All of CDM - Interactive [10 minutes]

In an effort to enhance the federal government’s cyber posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program. CDM provides DHS, and other federal … View Course

How to Build Connected Security

Combine Physical Security, Network Security and Cybersecurity

We used to think of security in terms of fences, barred windows, and barricades to physical locations. Then, with the rise of computers and other technologies, we began to worry … View Course