Free online learning for government employees.
Your Playbook for Protecting Against Cyberattacks
The adoption of hybrid cloud is becoming the norm for government IT operations. Unfortunately, ransomware and other cyber threats are becoming the norm as well. This video, developed in collaboration with Amazon Web Services (AWS), describes how to create a playbook for hybrid cloud security, and highlights five best practices for building on that playbook.
Related Videos
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Dec-08-2021
It's not easy to hear, but every employee -- yes, every one of us -- is a potential weak link in our organization's cyber defen...
How to Spot and Handle a Phishing Attempt
Dec-20-2024
Autonomous agents, one of the hottest developments in artificial intelligence, are poised to have a transformative effect both ...
What You Need to Know About AI Agents (and Why You Should Care)
Dec-20-2024
One of the hottest developments in artificial intelligence (AI) is the emergence of the autonomous agent, an advanced form of A...
How Autonomous AI Agents Could Transform Agencies
Nov-18-2024
As agencies accelerate their adoption of artificial intelligence-based solutions, they need to ensure the underlying data is AI...
How to Ensure Your Data Is AI-ready
Nov-18-2024
As agencies step up their efforts to leverage artificial intelligence (AI) and AI-based tools, they are quickly realizing they ...
How Data Hygiene Is Key to AI Initiatives
Jan-05-2023
The VPN has been a constant in the life of remote workers for such a long time, it's difficult to imagine another option. If th...
How to Break up With Your VPN (and Improve Security)
Sep-15-2021
Walk through a case study of a federal agency responsible for insuring almost 8 million mortgage loans for properties in Americ...
A ‘How to Build the Plane While You Fly It’ Approach to Loan Modernization
Jul-13-2021
When measuring total cost of ownership on a Windows-to-cloud migration, there’s more to consider than just price. This video, c...
How to Build a Better Cloud Migration Strategy
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...