Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

22 results found

Hands-On Lab Workshop: Mastering Threat Detection and Incident Response

Join our Virtual Lab Workshop to explore the Mastering Threat Detection & Incident Response Learning Path. Inspired by a real Pass-the-Hash attack simulation, this session follows a red team campaign across the full cyber kill chain—credential theft, lateral movement, and privilege escalation. Gain hands-on experience with tools like Falcon XDR, Falcon ITDR, Security Onion, and SOAR as you learn to detect and respond to early-stage threats, escalate incidents, and defend Active Directory from Kerberoasting. Work through real-world scenarios with guidance from experienced analysts and red teamers. Ideal for Tier 1 SOC analysts aiming to level up to Tier 2/3 roles. Stick around for live Q&A with our experts.
Webinar
•Oct 9, 2025 • 11am

Hands-On Lab Workshop: Cyera Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am

Steps for Driving Cyber Resiliency Enterprise-Wide | Research

We've heard it time and time again: It's not if, but when you'll get hacked. Accepting that reality requires you and your security teams shift your focus from prevention to recovery. Watch Kate Kuehn, WWT's Global Head of Cyber Advocacy, talk about how you can drive cyber resiliency – from the practitioner level all the way up through the board room.
Webinar
•May 23, 2024 • 9am

Reframing Cybersecurity in the AI Era with Cisco

Threat actors are moving faster than ever – often as soon as a vulnerability emerges. In this episode, Cisco's Jeetu Patel dives into Cisco Hypershield – one of the most significant innovation's to ever come out of the security and networking powerhouse. Jeetu details how Hypersheid can be integrated into in-flight AI strategies, embracing a product mindset and key areas you should be prioritizing today to win tomorrow.
Webinar
•May 15, 2024 • 9am

Reducing Human Error in the Security Loop with Beyond Identity's Jasson Casey

The concept of identity and access management has changed dramatically over the last decade. As organizations gravitate toward AI solutions, leaders are being forced to think about where they depend on humans for security and how they can take humans out of the loop. Because humans fighting computers is a losing battle. Join WWT's Head of Global Security Strategy, Traci Sever and Jasson Casey, CEO of Beyond Identity — the company founded on the basic premise that passwords should be eradicated — as he offers unique perspective on why most identity vendors solve for productivity issues, but not security issues, and why identity and access management is the ideal way to verify who you are. Jasson also talks about executive priorities over the next 12-18 months and the implications generative AI is having across the board.
Webinar
•Oct 31, 2023 • 9am

Balancing Cyber Threats and Cyber Risk with NightDragon and ThreatConnect

Digital transformation strategies are drastically widening organizational threat apertures. Hear from ThreatConnect CEO Balaji Yelamanchili about how his company is helping security leaders stay ahead of vulnerabilities before they emerge. This episode also features NightDragon's Amy De Salvatore, who talks about how the venture capital firm for cyber is scaling the industry's most effective commercial defenses to combat the cyber offensive landscape.
Webinar
•May 8, 2024 • 9am

Hands-On Lab Workshop: Cisco XDR Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Cisco XDR Foundations. In this Live Lab event you will learn the basics about Cisco's XDR console and how to navigate through the many tools available to an analyst. Our Cisco XDR Foundations lab highlights the importance of having an XDR solution by showcasing the necessary tools an analyst will need to help your organization defend against cyber security threats.
Webinar
•Nov 21, 2024 • 10am

The Power of Certainty in an Uncertain Landscape with Tanium

Enterprise IT environments have grown in complexity, leaving leaders to grapple with countless disparate tools and manual processes that manage their environments. Security teams need a simplified, unified approach that breaks down silos, provides more certainty and reduces risk. Join WWT Head of Global Security Strategy Traci Sever as she talks with Tanium CEO Dan Streetman about how Tanium is helping IT operations and security teams work more effectively together and deliver certainty to the most security conscious organizations in the world. Dan also details Tanium's unique Converged Endpoint Management (XEM) platform that can provide real-time data on every computing endpoint, outlines how organizations can use that data to unlock AI breakthroughs and discusses how his time as a U.S. Army Ranger has instilled a culture of resilience, integrity and teamwork at Tanium.
Webinar
•Mar 27, 2024 • 9am

Rethinking Cybersecurity in Healthcare in the Age of AI | Experts

Healthcare is among the most vulnerable to cyber attack — and often the most targeted. Security leaders are challenged with defending against a rapidly evolving threat landscape while trying to build a more resilient organization. And the stakes — in some cases, human life — could not be higher. Join WWT Chief Healthcare Advisor Dr. Sanaz Cordes and Field CISO Robert Geis as they talk about how healthcare CISOs can manage and secure the increased burden of data, balance cyber risk as it relates to AI and what's happening from a regulatory perspective.
Webinar
•Mar 12, 2024 • 9am

Navigating Public Markets and Trends with 'Market Visionary' Keith Fitz-Gerald

Join us for an exclusive webinar featuring renowned market analyst Keith Fitz-Gerald as he delves into the critical topics shaping today's business and IT landscapes, the potential of AI in different industries and the state of the U.S. economy. Keith also provides in-depth market analysis and long-term investment strategies to secure your financial future, and identifies current global market concerns, the impact of offshoring and effective digital strategies.
Webinar
•Jul 18, 2024 • 9am

Safeguarding Critical Infrastructure on Service Provider Networks | Experts

Hyperscalers and service providers sit on the front lines of an emerging cyber battlefield, where both allies and adversaries are leveraging AI to gain an advantage. Join WWT Senior Vice President Greg Schoeny and Chief Security Advisor Jason Cook as they talk about how service providers can leverage cloud-native applications, distributed workforces and AI to enhance their business agility and customer experience while ensuring they have a robust and resilient cybersecurity posture.
Webinar
•Sep 3, 2024 • 9am

Overcoming Cyber Threats With a Resilience Strategy with Rubrik

If cyber attacks are inevitable — and for even the most security-conscious businesses, they are — then the future of cybersecurity is resiliency. In that context, it will be increasingly important for CISOs and security teams to maintain uninterrupted business operations with a resilience strategy. To get there, their data needs to be secure. Join WWT Head of Global Security Strategy Traci Sever as she talks with Rubrik founder and CEO Bipul Sinha about how organizations can keep their businesses moving regardless of the threat environment by improving data protection, monitoring risk and adopting a recovery and resilience strategy. Bipul also talks about how Rubrik is integrating AI into its solutions to fight fire with fire and draws upon his work as a venture capitalist to provide growth strategies that can be applied to businesses of all kinds.
Webinar
•Apr 10, 2024 • 9am

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1114 Followers

At a glance

217Total
75Blogs
54Articles
24Videos
22Events
13Case Studies
8Learning Paths
7Briefings
6Labs
3Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Cyber Resilience
  • Network Security
  • AI & Data
  • What we do
  • Cloud
  • Consulting Services
  • Cloud Security
  • Applied AI
  • Fortinet
  • Cisco
  • ATC
  • Endpoint Security
  • Financial Services
  • Data Security
  • Healthcare

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies