Free online learning for government employees.

New Modernization Priorities Put Focus on Converged Solutions
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken on new importance in recent months. But given current budget constraints, how can agencies modernize their network infrastructure while also strengthening their cyber posture? In this video interview, Bill Lemons, the Director of Systems Engineering at Fortinet Federal, discusses how a converged solution can address both requirements in a cost-effective way.
Related Videos
Aug-21-2025
Data is the lifeblood of our digital world, yet government agencies often maintain vast stores of corrupt, outdated or ignored ...
Data Resiliency: Getting a Handle on Your Data — in Motion and at Rest
Aug-21-2025
Too often, governments store vast troves of largely outdated, corrupt or ignored data — or some combination of all three — whic...
Data Resiliency: Knowing and Using Your Data, With Automation and AI
Aug-19-2025
Given tight budgets and constrained staffing, state and local agencies know they must lean into automation. Artificial intellig...
How Agentic AI Is Teeing Up a New Era of Automation
Aug-19-2025
State and local agencies have pushed traditional rules-based automation as far as it can go. Artificial intelligence has brough...
How Agentic AI Helps State and Local Agencies Drive Greater Efficiencies
Aug-15-2025
As agencies look to realize the full benefits of artificial intelligence, they often run into two big obstacles: Their data is ...
How to Lay a Solid IT Foundation for the AI Age
Aug-15-2025
Government agencies across the public sector have made data a top priority over the last several years, especially with the eme...
How AI Is Revealing the Cracks in Legacy Infrastructure
Aug-12-2025
The Department of Homeland Security launched the Continuous Diagnostics and Mitigation program in 2012 to help agencies get bet...
How Modern Data Services Are Transforming DHS CDM Program
Aug-12-2025
Over the years, many agencies have struggled to realize the full benefits of the federal Continuous Diagnostics and Mitigation ...
How to Get More Value out of CDM Cyber Data
Aug-06-2025
For agencies aiming to rein in costs and boost efficiency, outdated technology is a problem hiding in plain sight. In this vide...
Tackle Hidden Waste Through Asset Lifecycle Management
Aug-06-2025
When agencies keep outdated technology, the math never works out: They end up spending more money to maintain increasingly inef...
Asset Lifecycle Management: Stop Wasting Money on Outdated Tech
Jun-02-2025
First responders and other government organizations in the field need trusted, uninterrupted access to information and communic...
A Single Solution: Secure Wireless Networks in the Field
Apr-28-2025
Modernization is more than shiny laptops and high-end servers. Often, the most valuable reforms simply help non-IT teams — in l...
Why Workflow Modernization Makes Such a Difference
Apr-28-2025
Sometimes, the most valuable modernization doesn’t involve high-end technology: It simply helps non-IT staff — in legal, human ...
Service-Based Workflows: Going From Manual to Modern
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Apr-07-2025
Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
How to Modernize the Network, Strengthen Security and Cut Costs
Mar-25-2025
The traditional approach to modernization, with its focus on discrete projects with fixed requirements, is quickly becoming out...
How to Shift to a Continuous Modernization Mindset
Mar-25-2025
With the advent of artificial intelligence (AI) and related automation tools, the traditional concept of discrete, start-to-fin...
How AI and Automation Can Drive Continuous Modernization
Mar-19-2025
Insider threats have always been with us butut new technologies, including artificial intelligence, have made it easier for net...
How Can Agencies Strengthen Their Defense Against Insider Threats?
Mar-19-2025
Artificial intelligence and other technologies have made it much easier for end-users to manipulate data and systems in ways th...
Meeting the Challenge of Insider Threats
Mar-10-2025
While zero-trust network architecture represents a significant shift in cybersecurity, it does not address the full scope of da...
Beyond Zero Trust: How to Strengthen Your Data Resilience
Mar-10-2025
As the data environment grows more complex, agencies need to look beyond zero-trust network architecture to address the full sc...
How to Take the Next Step Toward Data Resilience
Mar-05-2025
Between digital transformation and artificial intelligence, agencies are faced with increased data vulnerability and growing at...
Increased Data Vulnerability Requires New Focus on Resilience
Mar-05-2025
Given the heightened risks to government data, agencies need to think not just in terms of security but also resilience. In thi...
Why Agencies Need to Get Serious About Data Recovery
Dec-19-2024
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
May-14-2021
It’s safe to assume that most of us don’t like to fail. But we live in an imperfect – and often surprising – world, where failu...
Uh-Oh: Leadership Strategies for Plans Gone Awry
Feb-18-2021
By 2018, IT leaders at an independent federal agency had had enough. With offices and workplaces spread across the country, age...
Using TIC 3.0 to Improve Network Performance and Security
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....