Free online learning for government employees.

Protecting Identities: The Need for Privileged Access Management
One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud, expanding their attack surfaces, multiplying the number of user privileges, and augmenting system blind spots. In this video interview, Kevin E. Greene, Chief Security Strategist for Public Sector at BeyondTrust, discusses how privileged access management (PAM) can keep malicious actors at bay.
Related Videos
Aug-06-2025
For agencies aiming to rein in costs and boost efficiency, outdated technology is a problem hiding in plain sight. In this vide...
Tackle Hidden Waste Through Asset Lifecycle Management
Aug-06-2025
When agencies keep outdated technology, the math never works out: They end up spending more money to maintain increasingly inef...
Asset Lifecycle Management: Stop Wasting Money on Outdated Tech
Jul-10-2025
As agencies look to transform their operations and services, their legacy digital communications and collaboration solutions ha...
How Digital Communication, Collaboration Service Can Transform Operations
Jul-10-2025
Legacy digital communications and collaboration services, many of which were patched together during remote work, have emerged ...
Digital Comms and Collaboration: Case Studies in Transformation
Jun-13-2025
Agencies cannot move ahead with AI at speed unless they learn to manage the risks associated with it. And failing to move ahead...
How to Minimize the Risk on the Road to AI
Jun-13-2025
Security. Data privacy. AI governance and ethics. These are some of the pressing concerns that make it difficult for agencies t...
How to Accelerate the Journey to AI
Jun-09-2025
Cloud computing appeals to agencies looking for operational and other efficiencies. But faced with cost overruns and more compl...
Cloud Security: Complex Threats, Clear Solutions
Jun-09-2025
Despite its potential for efficiencies and other savings, the cloud has proven too expensive and vulnerable for many agencies, ...
The Essentials of Cloud Data Security
Jun-06-2025
Government employees make significant use of cell phones, tablets, laptops and other mobile endpoints that connect to agency ne...
How to Secure an Agency’s Many Mobile Devices
Jun-06-2025
Mobile devices such as cell phones, tablets and laptops may boost efficiency and make government employees more productive, but...
How to Tackle Your Mobile-Device Security Risks
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Feb-12-2025
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies inc...