Free online learning for government employees.

Identity Protection Starts With Privileged Access Management
Among the various cybersecurity risks, one type of vulnerability — identity security — is a particular concern. As agencies increasingly transition to the cloud, they create more vulnerabilities, expanding their attack surfaces, multiplying the number of user privileges, and augmenting system blind spots. In this video interview, Kevin E. Greene, Chief Security Strategist for Public Sector at BeyondTrust, discusses how privileged access management (PAM) can keep malicious actors at bay.