Free online learning for government employees.

Protecting Identities: The Need for Privileged Access Management
One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud, expanding their attack surfaces, multiplying the number of user privileges, and augmenting system blind spots. In this video interview, Kevin E. Greene, Chief Security Strategist for Public Sector at BeyondTrust, discusses how privileged access management (PAM) can keep malicious actors at bay.
Related Videos
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But agencies often struggle with leg...
Using AI to Build Efficiency and Improve Customer Service
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But digital transformation wasn’t al...
Improving Agency Efficiency to Improve Public Trust
Apr-29-2025
Federal networks rely on legacy systems that aren’t designed to protect against modern cybersecurity threats nor equipped to su...
Rethinking Networks for the Age of AI
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Apr-29-2025
As agencies explore a growing range of use cases for artificial intelligence (AI), they face a looming challenge: Their existin...
How to Move Ahead on Your AI Journey
Apr-29-2025
For many agencies, their excitement about the potential use cases for artificial intelligence (AI) is tempered by their concern...
Mapping the Key Steps for Every AI Initiative
Apr-28-2025
Modernization is more than shiny laptops and high-end servers. Often, the most valuable reforms simply help non-IT teams — in l...
Why Workflow Modernization Makes Such a Difference
Apr-28-2025
Sometimes, the most valuable modernization doesn’t involve high-end technology: It simply helps non-IT staff — in legal, human ...
Service-Based Workflows: Going From Manual to Modern
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Feb-12-2025
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies inc...