Free online learning for government employees.

How to Build a Better Endpoint Security Strategy
Agency IT environments have become increasingly complex in recent years, with employees accessing data and applications using multiple endpoint devices, creating more vulnerabilities for malicious actors to exploit. In this video interview, Jared Vichengrad, Head of Public Sector at Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Related Videos
Sep-02-2025
Artificial intelligence, including generative and agentic AIs, can transform resident-to-government interactions by delivering ...
Artificial Intelligence: A New Frontier in Government CX
Sep-02-2025
Artificial intelligence, including generative and agentic technology, can transform how residents interact with government, as ...
AI in Government: New Opportunities to Transform CX
Aug-21-2025
Data is the lifeblood of our digital world, yet government agencies often maintain vast stores of corrupt, outdated or ignored ...
Data Resiliency: Getting a Handle on Your Data — in Motion and at Rest
Aug-21-2025
Too often, governments store vast troves of largely outdated, corrupt or ignored data — or some combination of all three — whic...
Data Resiliency: Knowing and Using Your Data, With Automation and AI
Aug-19-2025
Given tight budgets and constrained staffing, state and local agencies know they must lean into automation. Artificial intellig...
How Agentic AI Is Teeing Up a New Era of Automation
Aug-19-2025
State and local agencies have pushed traditional rules-based automation as far as it can go. Artificial intelligence has brough...
How Agentic AI Helps State and Local Agencies Drive Greater Efficiencies
Aug-15-2025
As agencies look to realize the full benefits of artificial intelligence, they often run into two big obstacles: Their data is ...
How to Lay a Solid IT Foundation for the AI Age
Aug-15-2025
Government agencies across the public sector have made data a top priority over the last several years, especially with the eme...
How AI Is Revealing the Cracks in Legacy Infrastructure
Aug-12-2025
The Department of Homeland Security launched the Continuous Diagnostics and Mitigation program in 2012 to help agencies get bet...
How Modern Data Services Are Transforming DHS CDM Program
Aug-12-2025
Over the years, many agencies have struggled to realize the full benefits of the federal Continuous Diagnostics and Mitigation ...
How to Get More Value out of CDM Cyber Data
May-02-2025
Risk management, a concept that originated in the financial sector, has not proven to be a good fit for cybersecurity, accordin...
Cyber Risk Management? A Better Bet Is Danger Management
Apr-29-2025
Artificial intelligence (AI) can detect cyber threats and take action faster and more accurately than any human. But making the...
Building a Network for AI Cybersecurity
Mar-25-2025
The proliferation of user devices has become a nightmare for cyber professionals, as they find themselves managing multiple end...
How to Bolster Your Endpoint Defenses
Mar-17-2025
Agencies relying on outdated infrastructure are both missing out on recent advances in networking and security capabilities and...
Why Network Modernization Tops the IT Agenda
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...