Free online learning for government employees.
Protecting Identities: The Need for Privileged Access Management
One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud, expanding their attack surfaces, multiplying the number of user privileges, and augmenting system blind spots. In this video interview, Kevin E. Greene, Chief Security Strategist for Public Sector at BeyondTrust, discusses how privileged access management (PAM) can keep malicious actors at bay.
Related Videos
Nov-24-2025
After making significant investments in artificial intelligence and developing numerous use cases and proof of concepts, many a...
Turn AI Investments Into Meaningful Outcomes
Nov-24-2025
It’s one thing to develop use cases for artificial intelligence, and to launch proof-of-concepts and pilot programs to test tho...
Combine the Power of Search and Cloud to Deliver on AI
Nov-18-2025
Agencies depend on software applications to deliver reliable, effective digital services to constituents, but old-school testin...
Getting Serious About Software Testing: The Model-Based Approach
Nov-18-2025
Old-school approaches to software testing are ill-suited for today’s fast-moving and complex environments and can undermine the...
The Software Testing Advantage: Model-Based Automation
Nov-07-2025
Artificial intelligence places new demands on data management, as it pulls from multiple data sources and configurations and ma...
Scaling Up Data Governance for AI
Nov-07-2025
Artificial intelligence makes analytics more accessible to non-technical users, but places new demands on data governance. Agen...
The Right Platform to Increase Data Access
Oct-30-2025
The cyberthreat landscape has changed. Adversaries are now organized, industrialized and backed by nation-states. Agencies oper...
Combatting the New Cyberthreats With Automation and AI
Oct-30-2025
Artificial intelligence is the double-edged sword of cybersecurity, both raising the risks and providing new and more effective...
Fighting Fire With Fire: Cybersecurity in the Age of AI
Oct-23-2025
Agencies often contend with legacy tech and data silos that develop over time, jeopardizing government readiness and creating s...
How to Fix the Fragmentation That Hinders Government Readiness
Oct-23-2025
Legacy technology and data silos often develop organically over time — as IT teams address individual challenges — but they und...
Overcoming the Fragmentation That Hampers Government Readiness
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Feb-12-2025
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies inc...