Free online learning for government employees.

How to Mitigate the Threat of Identity-Based Attacks
Identity-based solutions have become a pillar of modern cybersecurity, but there's a catch: Identities can be compromised, making it easier than ever for malicious actors to penetrate an agency's defenses. In this video interview, Cristian Rodriguez, Field Chief Technology Officer for the Americas at CrowdStrike, discusses how agencies can improve their ability to detect and defend against such insider threats.
Related Videos
Aug-21-2025
Data is the lifeblood of our digital world, yet government agencies often maintain vast stores of corrupt, outdated or ignored ...
Data Resiliency: Getting a Handle on Your Data — in Motion and at Rest
Aug-21-2025
Too often, governments store vast troves of largely outdated, corrupt or ignored data — or some combination of all three — whic...
Data Resiliency: Knowing and Using Your Data, With Automation and AI
Aug-19-2025
Given tight budgets and constrained staffing, state and local agencies know they must lean into automation. Artificial intellig...
How Agentic AI Is Teeing Up a New Era of Automation
Aug-19-2025
State and local agencies have pushed traditional rules-based automation as far as it can go. Artificial intelligence has brough...
How Agentic AI Helps State and Local Agencies Drive Greater Efficiencies
Aug-15-2025
As agencies look to realize the full benefits of artificial intelligence, they often run into two big obstacles: Their data is ...
How to Lay a Solid IT Foundation for the AI Age
Aug-15-2025
Government agencies across the public sector have made data a top priority over the last several years, especially with the eme...
How AI Is Revealing the Cracks in Legacy Infrastructure
Aug-12-2025
The Department of Homeland Security launched the Continuous Diagnostics and Mitigation program in 2012 to help agencies get bet...
How Modern Data Services Are Transforming DHS CDM Program
Aug-12-2025
Over the years, many agencies have struggled to realize the full benefits of the federal Continuous Diagnostics and Mitigation ...
How to Get More Value out of CDM Cyber Data
Aug-06-2025
For agencies aiming to rein in costs and boost efficiency, outdated technology is a problem hiding in plain sight. In this vide...
Tackle Hidden Waste Through Asset Lifecycle Management
Aug-06-2025
When agencies keep outdated technology, the math never works out: They end up spending more money to maintain increasingly inef...
Asset Lifecycle Management: Stop Wasting Money on Outdated Tech
Jun-09-2025
Cloud computing appeals to agencies looking for operational and other efficiencies. But faced with cost overruns and more compl...
Cloud Security: Complex Threats, Clear Solutions
Jun-09-2025
Despite its potential for efficiencies and other savings, the cloud has proven too expensive and vulnerable for many agencies, ...
The Essentials of Cloud Data Security
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
Apr-25-2025
Identity solutions have played an essential role in cybersecurity for more than 20 years. But agencies are beginning to realize...
Why It's Time to Take an Identity-First Approach to Security
Apr-25-2025
Security capabilities are just one aspect of an identity-based security solution. As agencies increasingly rely on cloud- and s...
How to Get Your Identity-Based Security Up to Speed
Feb-28-2025
Identity is at the heart of the modern cyber ecosystem, with a growing number of agencies authenticating the identity of users ...
How to Bolster Your Agency's Identity-Based Protections
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Oct-15-2024
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collabor...
Modernizing Network and Cyber Operations
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Oct-26-2021
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency a...
How Threat Hunters Use Data Analytics to Shut Down Attackers
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...