Free online learning for government employees.

How to Mitigate the Threat of Identity-Based Attacks
Identity-based solutions have become a pillar of modern cybersecurity, but there's a catch: Identities can be compromised, making it easier than ever for malicious actors to penetrate an agency's defenses. In this video interview, Cristian Rodriguez, Field Chief Technology Officer for the Americas at CrowdStrike, discusses how agencies can improve their ability to detect and defend against such insider threats.
Related Videos
Apr-11-2025
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
New Modernization Priorities Put Focus on Converged Solutions
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Apr-08-2025
In state and local government, some of the most valuable data is not found in traditional databases. It’s found in the wide var...
How AI Can Unlock Insights From Documents, Video and Other Content
Apr-08-2025
For state and local agencies, some of the most valuable data about their operations and services are not found in traditional d...
How to Use AI to Get More Insights out of Unstructured Data
Apr-02-2025
Agencies work hard to inform and engage constituents, and modern technology plays a critical role. But technology alone isn’t t...
Digital-First Communications: Reaching People Where They Are
Apr-02-2025
Modern technology can help agencies reach constituents, but it’s what agencies do with those tools — the communications strateg...
How Digital-First Communications Improve CX
Mar-25-2025
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple end...
How to Bolster Your Endpoint Defenses
Mar-25-2025
The traditional approach to modernization, with its focus on discrete projects with fixed requirements, is quickly becoming out...
How to Shift to a Continuous Modernization Mindset
Feb-28-2025
Identity is at the heart of the modern cyber ecosystem, with a growing number of agencies authenticating the identity of users ...
How to Bolster Your Agency's Identity-Based Protections
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Oct-15-2024
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collabor...
Modernizing Network and Cyber Operations
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Oct-26-2021
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency a...
How Threat Hunters Use Data Analytics to Shut Down Attackers
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...