Free online learning for government employees.

How to Build a Better Endpoint Security Strategy
Agency IT environments have become increasingly complex in recent years, with employees accessing data and applications using multiple endpoint devices, creating more vulnerabilities for malicious actors to exploit. In this video interview, Jared Vichengrad, Head of Public Sector at Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Related Videos
Oct-01-2025
Agencies today need fast, reliable, secure access to their data, but their data infrastructure is fragmented and inflexible, ma...
Data Modernization Is About More Than Infrastructure
Oct-01-2025
Too often, agency infrastructure cannot handle the explosion of data generated by a multitude of traditional and more non-tradi...
A Modern Solution to Data Storage and Management
Sep-23-2025
Budget-strapped agencies struggle when competing with the private sector to recruit and retain employees. In this video intervi...
How a Financial Wellness Benefit Helps Both Agencies and Their Employees
Sep-23-2025
Budget-strapped agencies struggle to recruit and retain a younger workforce. In this video interview, Lindsay Casel, Leader, St...
How Financial Benefits Can Help Attract a Younger Workforce
Sep-17-2025
Agencies often spend more time wrangling their data than using it. A strong data foundation enables organizations to automate d...
Setting a Strong Foundation Realize Data’s Potential
Sep-17-2025
To generate data that can drive dashboards, AI models, and better decision-making, you need a foundation that supports secure c...
The Building Blocks of a Strong Data Foundation
Sep-11-2025
Agency leaders see vast potential in artificial intelligence, from applications of machine learning to newer solutions based on...
How to Remove the Barriers to Safe and Responsible AI Adoption
Sep-11-2025
Artificial intelligence, from machine learning to generative AI and agentic AI, has the potential to change how agencies manage...
Creating a Roadmap to Safe and Responsible AI
Sep-05-2025
Artificial intelligence has allowed for new breakthroughs and efficiencies, but it’s also given bad actors a powerful tool when...
A Roadmap for Securing AI Systems and Data
Sep-05-2025
Despite the many efficiencies and breakthroughs that artificial intelligence has made possible, the technology also has ushered...
Keeping AI Data Honest: How to Secure AI Systems
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Mar-25-2025
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple end...
How to Bolster Your Endpoint Defenses
Mar-17-2025
Agencies relying on outdated infrastructure are both missing out on recent advances in networking and security capabilities and...
Why Network Modernization Tops the IT Agenda
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...