Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

16 results found

From AI-Powered Attacks to Sovereign AI Security: Strategic Insights from WWT and Fortinet

Join WWT and Fortinet for an expert‑led discussion on how AI is reshaping today's cybersecurity landscape. Hear leaders from both organizations break down the rising speed, scale, and sophistication of AI‑powered cyberattacks, and the parallel challenges organizations face—complexity, skills shortages and expanding attack surfaces. Learn how Fortinet's long‑standing AI and ML innovation, combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure modern AI environments, simplify SOC/NOC operations, and build resilient, sovereign AI infrastructure. Discover actionable guidance on adopting AI securely, mitigating risks early, and leveraging existing platform investments to stay ahead in an era of agentic AI and accelerated threat evolution.
Webinar
•Jan 29, 2026 • 9am

Hands-On Lab Workshop: Cyera Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am

Hands-On Lab Workshop: Mastering Threat Detection and Incident Response

Join our Virtual Lab Workshop to explore the Mastering Threat Detection & Incident Response Learning Path. Inspired by a real Pass-the-Hash attack simulation, this session follows a red team campaign across the full cyber kill chain—credential theft, lateral movement, and privilege escalation. Gain hands-on experience with tools like Falcon XDR, Falcon ITDR, Security Onion, and SOAR as you learn to detect and respond to early-stage threats, escalate incidents, and defend Active Directory from Kerberoasting. Work through real-world scenarios with guidance from experienced analysts and red teamers. Ideal for Tier 1 SOC analysts aiming to level up to Tier 2/3 roles. Stick around for live Q&A with our experts.
Webinar
•Oct 9, 2025 • 11am

Strategic Planning for Post-Quantum Cryptography with WWT and Palo Alto Networks

Join World Wide Technology and Palo Alto Networks experts for an engaging virtual event focused on preparing your organization for the quantum era. Discover the latest insights on post-quantum cryptography (PQC), learn about the risks of "harvest now, decrypt later" attacks, and understand why being PQC ready is critical for long-term data protection and regulatory compliance. Our experts will discuss industry trends, customer challenges, and practical strategies for building crypto agility, ensuring a smooth transition to new standards. Gain actionable guidance to future-proof your security posture and maintain resilience against evolving threats.
Webinar
•Oct 30, 2025 • 9am

Balancing Cyber Threats and Cyber Risk with NightDragon and ThreatConnect

Digital transformation strategies are drastically widening organizational threat apertures. Hear from ThreatConnect CEO Balaji Yelamanchili about how his company is helping security leaders stay ahead of vulnerabilities before they emerge. This episode also features NightDragon's Amy De Salvatore, who talks about how the venture capital firm for cyber is scaling the industry's most effective commercial defenses to combat the cyber offensive landscape.
Webinar
•May 8, 2024 • 9am

The Power of Certainty in an Uncertain Landscape with Tanium

Enterprise IT environments have grown in complexity, leaving leaders to grapple with countless disparate tools and manual processes that manage their environments. Security teams need a simplified, unified approach that breaks down silos, provides more certainty and reduces risk. Join WWT Head of Global Security Strategy Traci Sever as she talks with Tanium CEO Dan Streetman about how Tanium is helping IT operations and security teams work more effectively together and deliver certainty to the most security conscious organizations in the world. Dan also details Tanium's unique Converged Endpoint Management (XEM) platform that can provide real-time data on every computing endpoint, outlines how organizations can use that data to unlock AI breakthroughs and discusses how his time as a U.S. Army Ranger has instilled a culture of resilience, integrity and teamwork at Tanium.
Webinar
•Mar 27, 2024 • 9am

Navigating Public Markets and Trends with 'Market Visionary' Keith Fitz-Gerald

Join us for an exclusive webinar featuring renowned market analyst Keith Fitz-Gerald as he delves into the critical topics shaping today's business and IT landscapes, the potential of AI in different industries and the state of the U.S. economy. Keith also provides in-depth market analysis and long-term investment strategies to secure your financial future, and identifies current global market concerns, the impact of offshoring and effective digital strategies.
Webinar
•Jul 18, 2024 • 9am

Analyzing Today's Threat Landscape Through the Lens of the CISO | Experts

Today's CISOs operate amid rapid and complex change — defending against constantly evolving threat landscapes and increasingly sophisticated bad actors while trying to build a more resilient culture that is adaptable, innovative and programmatic. Join WWT AVP Global Field CISO Mario Balakgie as he provides practical insight and considerations CISOs can use to keep pace with the business while ensuring a secure organization that is resilient to various threats. Mario talks about how CISOs and other security leaders can assess risk appetite, communicate with senior leaders and boards of directors, and stay on top of evolving regulatory environments.
Webinar
•Feb 27, 2024 • 9am

Retail Cybersecurity: Building a Brand Customers Can Trust | Experts

Join our experts as they discuss the dynamic and ever-evolving cybersecurity landscape in the retail sector. In this session, we will uncover the most prevalent cyber threats that retailers face today, from sophisticated ransomware attacks to targeted phishing scams, and discuss how these threats have evolved with the advent of new technologies. Discover the profound impact data breaches can have on financial stability, brand reputation and customer trust, and learn actionable strategies to mitigate these risks.
Webinar
•Sep 24, 2024 • 9am

Overcoming Cyber Threats With a Resilience Strategy with Rubrik

If cyber attacks are inevitable — and for even the most security-conscious businesses, they are — then the future of cybersecurity is resiliency. In that context, it will be increasingly important for CISOs and security teams to maintain uninterrupted business operations with a resilience strategy. To get there, their data needs to be secure. Join WWT Head of Global Security Strategy Traci Sever as she talks with Rubrik founder and CEO Bipul Sinha about how organizations can keep their businesses moving regardless of the threat environment by improving data protection, monitoring risk and adopting a recovery and resilience strategy. Bipul also talks about how Rubrik is integrating AI into its solutions to fight fire with fire and draws upon his work as a venture capitalist to provide growth strategies that can be applied to businesses of all kinds.
Webinar
•Apr 10, 2024 • 9am

Fortify Your Cyber Resilience Strategy with Fortinet | Partner Spotlight

In an era of cyber uncertainty, resilience is the new frontier – a tide shift forcing CISOs and their security teams to re-evaluate their cybersecurity strategies and explore new partnerships and solutions that can strengthen their resilience against evolving threats. Join Fortinet and WWT cybersecurity experts as they discuss how cutting-edge technologies, such as AI and cyber ranges, can empower security teams to anticipate and respond to evolving threats.
Webinar
•Aug 15, 2024 • 9am

Safeguarding Critical Infrastructure on Service Provider Networks | Experts

Hyperscalers and service providers sit on the front lines of an emerging cyber battlefield, where both allies and adversaries are leveraging AI to gain an advantage. Join WWT Senior Vice President Greg Schoeny and Chief Security Advisor Jason Cook as they talk about how service providers can leverage cloud-native applications, distributed workforces and AI to enhance their business agility and customer experience while ensuring they have a robust and resilient cybersecurity posture.
Webinar
•Sep 3, 2024 • 9am

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1126 Followers

At a glance

207Total
82Blogs
47Articles
26Videos
16Events
13Case Studies
8Labs
8Learning Paths
3Workshops
2Communities
1Briefing
1WWT Research
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Cyber Resilience
  • Network Security
  • ATC
  • AI & Data
  • WWT Presents
  • Cloud
  • Data Security
  • What we do
  • Cloud Security
  • Public Sector
  • Consulting Services
  • Zero Trust
  • Endpoint Security
  • Fortinet
  • Applied AI
  • Cyber Range

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies