Free online learning for government employees.

Why Agencies Need to Get Serious About Data Recovery
Given the heightened risks to government data, agencies need to think not just in terms of security but also resilience. In this video interview, Don Maruca, Vice President of Federal at Commvault, discusses how agencies can improve their ability to recover quickly and effectively from attacks.
Related Videos
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But agencies often struggle with leg...
Using AI to Build Efficiency and Improve Customer Service
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But digital transformation wasn’t al...
Improving Agency Efficiency to Improve Public Trust
Apr-29-2025
Federal networks rely on legacy systems that aren’t designed to protect against modern cybersecurity threats nor equipped to su...
Rethinking Networks for the Age of AI
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Apr-29-2025
As agencies explore a growing range of use cases for artificial intelligence (AI), they face a looming challenge: Their existin...
How to Move Ahead on Your AI Journey
Apr-29-2025
For many agencies, their excitement about the potential use cases for artificial intelligence (AI) is tempered by their concern...
Mapping the Key Steps for Every AI Initiative
Apr-28-2025
Modernization is more than shiny laptops and high-end servers. Often, the most valuable reforms simply help non-IT teams — in l...
Why Workflow Modernization Makes Such a Difference
Apr-28-2025
Sometimes, the most valuable modernization doesn’t involve high-end technology: It simply helps non-IT staff — in legal, human ...
Service-Based Workflows: Going From Manual to Modern
Apr-23-2025
To get feedback from customers, agencies often ask them to complete a short survey whenever they visit the website or conduct a...
How to Gain Deeper Insights Into the Customer Experience
Apr-23-2025
One of the most common tools for measuring the customer experience is the user survey. But there's a problem with that: Even wh...
To Get a Better Measure of CX, Watch and Learn
Apr-11-2025
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
New Modernization Priorities Put Focus on Converged Solutions
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Apr-10-2025
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of i...
From Siloed to Seamless: The Need for Integrated Security Monitoring
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Apr-08-2025
In state and local government, some of the most valuable data is not found in traditional databases. It’s found in the wide var...
How AI Can Unlock Insights From Documents, Video and Other Content
Apr-08-2025
For state and local agencies, some of the most valuable data about their operations and services are not found in traditional d...
How to Use AI to Get More Insights out of Unstructured Data
Mar-25-2025
All too often, agencies are weighed down by manual, paper-based systems that slow even the simplest interactions with consumers...
Process Automation: The Efficient Alternative to Paper-based Systems
Mar-25-2025
Manual, paper-reliant systems make agency operations slow and cumbersome, to the detriment of consumers, contractors, and inter...
How Automation and AI Can Transform Your Agency Operations
Mar-19-2025
Insider threats have always been with us butut new technologies, including artificial intelligence, have made it easier for net...
How Can Agencies Strengthen Their Defense Against Insider Threats?
Mar-19-2025
Artificial intelligence and other technologies have made it much easier for end-users to manipulate data and systems in ways th...
Meeting the Challenge of Insider Threats
Mar-10-2025
While zero-trust network architecture represents a significant shift in cybersecurity, it does not address the full scope of da...
Beyond Zero Trust: How to Strengthen Your Data Resilience
Mar-10-2025
As the data environment grows more complex, agencies need to look beyond zero-trust network architecture to address the full sc...
How to Take the Next Step Toward Data Resilience
Mar-05-2025
Between digital transformation and artificial intelligence, agencies are faced with increased data vulnerability and growing at...
Increased Data Vulnerability Requires New Focus on Resilience
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Dec-19-2024
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Nov-09-2022
Digital collaboration is a good thing, right? Of course it is. But it's also a potential cybersecurity risk. The problem is tha...
Keeping Data Secure in a Digital Workspace
Feb-24-2022
Did you know only three out of 10 IT projects succeed today? The common culprit: a cookie-cutter approach to modernizing applic...
Top 10 Digital Transformation Considerations for Your Journey
Jan-25-2021
Never mind the pandemic. Legacy systems and paper-based processes aren't a winning combination in the best of times. So, let's ...
How to Digitize Mission Processes and Improve Customer Experience
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Oct-29-2020
For many agencies, the increasing adoption of cloud has brought an increase in data chaos -- too much data and too many types o...
Holistic Approach to Data Management Is Your Only Real Option
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-29-2020
DevOps is rapidly changing how agencies develop, test and deliver applications. It's widely understood that security must be pa...
How to Maintain Security in a Fast-Paced DevOps Environment
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....