Free online learning for government employees.

How to Get Your Identity-Based Security Up to Speed
Security capabilities are just one aspect of an identity-based security solution. As agencies increasingly rely on cloud- and software-as-a-service-based offerings, they also need to address concerns around scalability and productivity. In this video interview, Khizar Sultan, Vice President of Workforce and IGA Solutions at CyberArk, discusses how agencies can adopt a modern identity-first approach to cybersecurity.
Related Videos
Oct-01-2025
Agencies today need fast, reliable, secure access to their data, but their data infrastructure is fragmented and inflexible, ma...
Data Modernization Is About More Than Infrastructure
Oct-01-2025
Too often, agency infrastructure cannot handle the explosion of data generated by a multitude of traditional and more non-tradi...
A Modern Solution to Data Storage and Management
Sep-23-2025
Budget-strapped agencies struggle when competing with the private sector to recruit and retain employees. In this video intervi...
How a Financial Wellness Benefit Helps Both Agencies and Their Employees
Sep-23-2025
Budget-strapped agencies struggle to recruit and retain a younger workforce. In this video interview, Lindsay Casel, Leader, St...
How Financial Benefits Can Help Attract a Younger Workforce
Sep-17-2025
Agencies often spend more time wrangling their data than using it. A strong data foundation enables organizations to automate d...
Setting a Strong Foundation Realize Data’s Potential
Sep-17-2025
To generate data that can drive dashboards, AI models, and better decision-making, you need a foundation that supports secure c...
The Building Blocks of a Strong Data Foundation
Sep-11-2025
Agency leaders see vast potential in artificial intelligence, from applications of machine learning to newer solutions based on...
How to Remove the Barriers to Safe and Responsible AI Adoption
Sep-11-2025
Artificial intelligence, from machine learning to generative AI and agentic AI, has the potential to change how agencies manage...
Creating a Roadmap to Safe and Responsible AI
Sep-05-2025
Artificial intelligence has allowed for new breakthroughs and efficiencies, but it’s also given bad actors a powerful tool when...
A Roadmap for Securing AI Systems and Data
Sep-05-2025
Despite the many efficiencies and breakthroughs that artificial intelligence has made possible, the technology also has ushered...
Keeping AI Data Honest: How to Secure AI Systems
Jun-09-2025
Cloud computing appeals to agencies looking for operational and other efficiencies. But faced with cost overruns and more compl...
Cloud Security: Complex Threats, Clear Solutions
Jun-09-2025
Despite its potential for efficiencies and other savings, the cloud has proven too expensive and vulnerable for many agencies, ...
The Essentials of Cloud Data Security
May-02-2025
Are government agencies putting their systems and data at risk by trying to apply the principles of risk management to cybersec...
Why It Might Be Time to Move on From Cyber Risk Management
Apr-25-2025
Identity solutions have played an essential role in cybersecurity for more than 20 years. But agencies are beginning to realize...
Why It's Time to Take an Identity-First Approach to Security
Mar-17-2025
Outdated network infrastructure is trouble waiting to happen. Agencies relying on legacy solutions are both missing out on rece...
How Network Modernization Lays a Strong Cyber Foundation
Mar-17-2025
Agencies relying on outdated infrastructure are both missing out on recent advances in networking and security capabilities and...
Why Network Modernization Tops the IT Agenda
Feb-28-2025
Identity-based solutions have become a pillar of modern cybersecurity, but there's a catch: Identities can be compromised, maki...
How to Mitigate the Threat of Identity-Based Attacks
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Oct-15-2024
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collabor...
Modernizing Network and Cyber Operations
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Oct-26-2021
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency a...
How Threat Hunters Use Data Analytics to Shut Down Attackers
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...