Free online learning for government employees.

State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts to defend their systems and data. In this video interview, Thomas MacLellan, Director of Government Affairs and Strategy at Palo Alto Networks, discusses how whole-of-state security and related measures can help state, local and educational organizations to strengthen their cyber posture.
Related Videos
Feb-13-2025
Modernizing constituent services is no longer an option. That's because constituents, when dealing with agencies, expect the sa...
How to Transform Your Operations Through Digital-First Services
Feb-13-2025
Outdated, paper-based workflows and processes are a losing proposition for both government agencies and the constituents they s...
How Agencies Achieve Better Outcomes Through Digital-First Services
Feb-12-2025
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies inc...
Identity Protection Starts With Privileged Access Management
Feb-12-2025
One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud,...
Protecting Identities: The Need for Privileged Access Management
Feb-07-2025
Whenever a constituent interacts with an agency, whether requesting information or accessing services, the quality of that enga...
How AI Can Help Agencies Deliver Better Constituent Experiences
Feb-07-2025
Whenever a constituent interacts with an agency, whether requesting information or accessing services, the quality of that enga...
How AI Can Transform Government Service Delivery
Jan-29-2025
The fierce competition for talent, along with shrinking budgets, makes it tougher than ever for state and local agencies to att...
Automation: Giving Agencies an Edge in Workforce Management
Jan-29-2025
There's not much agencies can do about tight budgets or the fierce competition for talent, but they can take steps to provide e...
How Automation Can Strengthen Human Capital Management
Jan-09-2025
With the risk of fraud being omnipresent, agencies must take every possible measure to strengthen the digital identity verifica...
How to Balance Security and CX in the Digital Identity Verification
Jan-09-2025
Agencies must take every feasible measure to safeguard against the omnipresent risk of fraud through the identity verification ...
Reduce Fraud and Improve CX Through Digital Identity Verification
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Nov-09-2022
Digital collaboration is a good thing, right? Of course it is. But it's also a potential cybersecurity risk. The problem is tha...
Keeping Data Secure in a Digital Workspace
Feb-24-2022
Did you know only three out of 10 IT projects succeed today? The common culprit: a cookie-cutter approach to modernizing applic...
Top 10 Digital Transformation Considerations for Your Journey
Feb-11-2021
This course will discuss how federal agencies can leverage a secure access service edge (SASE) approach to maintain TIC 3.0 com...
Secure Your Agency for Long-Term Remote Work and Maintain TIC 3.0 Compliance
Jan-25-2021
Never mind the pandemic. Legacy systems and paper-based processes aren't a winning combination in the best of times. So, let's ...
How to Digitize Mission Processes and Improve Customer Experience
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Jul-31-2020
Digital innovation throughout agencies increasingly relies on cloud-native tools and app containers. This course reviews securi...
Enhancing the Security of Cloud-Native Tools and Apps
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-29-2020
DevOps is rapidly changing how agencies develop, test and deliver applications. It's widely understood that security must be pa...
How to Maintain Security in a Fast-Paced DevOps Environment
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....