Free online learning for government employees.

From Siloed to Seamless: The Need for Integrated Security Monitoring
Agencies use multiple, often isolated security systems to monitor everything from cyber risk to fire alarms — but the lack of integration prevents agency staff from effectively, proactively addresses threats. A single platform can marry an agency’s digital and physical monitoring systems and give employees real-time situational awareness. In this video interview, Paul Gomez, Commercial Director at Security Information Systems, discusses what integrated, modernized security monitoring entails and the opportunities it offers.
Related Videos
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But agencies often struggle with leg...
Using AI to Build Efficiency and Improve Customer Service
May-02-2025
There’s a push at the federal level to make government more efficient and more responsive. But digital transformation wasn’t al...
Improving Agency Efficiency to Improve Public Trust
Apr-29-2025
Federal networks rely on legacy systems that aren’t designed to protect against modern cybersecurity threats nor equipped to su...
Rethinking Networks for the Age of AI
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Apr-29-2025
As agencies explore a growing range of use cases for artificial intelligence (AI), they face a looming challenge: Their existin...
How to Move Ahead on Your AI Journey
Apr-29-2025
For many agencies, their excitement about the potential use cases for artificial intelligence (AI) is tempered by their concern...
Mapping the Key Steps for Every AI Initiative
Apr-28-2025
Modernization is more than shiny laptops and high-end servers. Often, the most valuable reforms simply help non-IT teams — in l...
Why Workflow Modernization Makes Such a Difference
Apr-28-2025
Sometimes, the most valuable modernization doesn’t involve high-end technology: It simply helps non-IT staff — in legal, human ...
Service-Based Workflows: Going From Manual to Modern
Apr-23-2025
To get feedback from customers, agencies often ask them to complete a short survey whenever they visit the website or conduct a...
How to Gain Deeper Insights Into the Customer Experience
Apr-23-2025
One of the most common tools for measuring the customer experience is the user survey. But there's a problem with that: Even wh...
To Get a Better Measure of CX, Watch and Learn
Apr-10-2025
Agencies maintain an array of security systems to monitor everything from cyber risk to fire hazards — but the lack of integrat...
What Integrated Security Monitoring Means, and Why Agencies Should Care
Apr-08-2025
In state and local government, some of the most valuable data is not found in traditional databases. It’s found in the wide var...
How AI Can Unlock Insights From Documents, Video and Other Content
Apr-08-2025
For state and local agencies, some of the most valuable data about their operations and services are not found in traditional d...
How to Use AI to Get More Insights out of Unstructured Data
Mar-25-2025
All too often, agencies are weighed down by manual, paper-based systems that slow even the simplest interactions with consumers...
Process Automation: The Efficient Alternative to Paper-based Systems
Mar-25-2025
Manual, paper-reliant systems make agency operations slow and cumbersome, to the detriment of consumers, contractors, and inter...
How Automation and AI Can Transform Your Agency Operations
Mar-05-2025
Between digital transformation and artificial intelligence, agencies are faced with increased data vulnerability and growing at...
Increased Data Vulnerability Requires New Focus on Resilience
Mar-05-2025
Given the heightened risks to government data, agencies need to think not just in terms of security but also resilience. In thi...
Why Agencies Need to Get Serious About Data Recovery
Feb-12-2025
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies inc...
Identity Protection Starts With Privileged Access Management
Feb-12-2025
One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud,...
Protecting Identities: The Need for Privileged Access Management
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Dec-19-2024
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Nov-09-2022
Digital collaboration is a good thing, right? Of course it is. But it's also a potential cybersecurity risk. The problem is tha...
Keeping Data Secure in a Digital Workspace
Feb-24-2022
Did you know only three out of 10 IT projects succeed today? The common culprit: a cookie-cutter approach to modernizing applic...
Top 10 Digital Transformation Considerations for Your Journey
Jan-25-2021
Never mind the pandemic. Legacy systems and paper-based processes aren't a winning combination in the best of times. So, let's ...
How to Digitize Mission Processes and Improve Customer Experience
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Jun-29-2020
DevOps is rapidly changing how agencies develop, test and deliver applications. It's widely understood that security must be pa...