Free online learning for government employees.

Modernizing Network and Cyber Operations
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collaborate seamlessly. In this interview, Alex Maier, of August Shell, and Vivian Richards of Splunk, discuss how to create a blended SOC/NOC environment.
Related Videos
Apr-11-2025
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
New Modernization Priorities Put Focus on Converged Solutions
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Apr-08-2025
In state and local government, some of the most valuable data is not found in traditional databases. It’s found in the wide var...
How AI Can Unlock Insights From Documents, Video and Other Content
Apr-08-2025
For state and local agencies, some of the most valuable data about their operations and services are not found in traditional d...
How to Use AI to Get More Insights out of Unstructured Data
Apr-02-2025
Agencies work hard to inform and engage constituents, and modern technology plays a critical role. But technology alone isn’t t...
Digital-First Communications: Reaching People Where They Are
Apr-02-2025
Modern technology can help agencies reach constituents, but it’s what agencies do with those tools — the communications strateg...
How Digital-First Communications Improve CX
Mar-25-2025
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple end...
How to Bolster Your Endpoint Defenses
Mar-25-2025
The traditional approach to modernization, with its focus on discrete projects with fixed requirements, is quickly becoming out...
How to Shift to a Continuous Modernization Mindset
Mar-19-2025
Insider threats have always been with us butut new technologies, including artificial intelligence, have made it easier for net...
How Can Agencies Strengthen Their Defense Against Insider Threats?
Mar-19-2025
Artificial intelligence and other technologies have made it much easier for end-users to manipulate data and systems in ways th...
Meeting the Challenge of Insider Threats
Feb-28-2025
Identity-based solutions have become a pillar of modern cybersecurity, but there's a catch: Identities can be compromised, maki...
How to Mitigate the Threat of Identity-Based Attacks
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Oct-26-2021
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency a...
How Threat Hunters Use Data Analytics to Shut Down Attackers
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...