Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

23 results found

Hands-On Lab Workshop: Mastering Threat Detection and Incident Response

Join our Virtual Lab Workshop to explore the Mastering Threat Detection & Incident Response Learning Path. Inspired by a real Pass-the-Hash attack simulation, this session follows a red team campaign across the full cyber kill chain—credential theft, lateral movement, and privilege escalation. Gain hands-on experience with tools like Falcon XDR, Falcon ITDR, Security Onion, and SOAR as you learn to detect and respond to early-stage threats, escalate incidents, and defend Active Directory from Kerberoasting. Work through real-world scenarios with guidance from experienced analysts and red teamers. Ideal for Tier 1 SOC analysts aiming to level up to Tier 2/3 roles. Stick around for live Q&A with our experts.
Webinar
•Oct 9, 2025 • 11am

Strategic Planning for Post-Quantum Cryptography with WWT and Palo Alto Networks

Join World Wide Technology and Palo Alto Networks experts for an engaging virtual event focused on preparing your organization for the quantum era. Discover the latest insights on post-quantum cryptography (PQC), learn about the risks of "harvest now, decrypt later" attacks, and understand why being PQC ready is critical for long-term data protection and regulatory compliance. Our experts will discuss industry trends, customer challenges, and practical strategies for building crypto agility, ensuring a smooth transition to new standards. Gain actionable guidance to future-proof your security posture and maintain resilience against evolving threats.
Webinar
•Oct 30, 2025 • 9am

Hands-On Lab Workshop: Cyera Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am

Hands-On Lab Workshop: Cisco XDR Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Cisco XDR Foundations. In this Live Lab event you will learn the basics about Cisco's XDR console and how to navigate through the many tools available to an analyst. Our Cisco XDR Foundations lab highlights the importance of having an XDR solution by showcasing the necessary tools an analyst will need to help your organization defend against cyber security threats.
Webinar
•Nov 21, 2024 • 10am

Reducing Human Error in the Security Loop with Beyond Identity's Jasson Casey

The concept of identity and access management has changed dramatically over the last decade. As organizations gravitate toward AI solutions, leaders are being forced to think about where they depend on humans for security and how they can take humans out of the loop. Because humans fighting computers is a losing battle. Join WWT's Head of Global Security Strategy, Traci Sever and Jasson Casey, CEO of Beyond Identity — the company founded on the basic premise that passwords should be eradicated — as he offers unique perspective on why most identity vendors solve for productivity issues, but not security issues, and why identity and access management is the ideal way to verify who you are. Jasson also talks about executive priorities over the next 12-18 months and the implications generative AI is having across the board.
Webinar
•Oct 31, 2023 • 9am

The Power of Certainty in an Uncertain Landscape with Tanium

Enterprise IT environments have grown in complexity, leaving leaders to grapple with countless disparate tools and manual processes that manage their environments. Security teams need a simplified, unified approach that breaks down silos, provides more certainty and reduces risk. Join WWT Head of Global Security Strategy Traci Sever as she talks with Tanium CEO Dan Streetman about how Tanium is helping IT operations and security teams work more effectively together and deliver certainty to the most security conscious organizations in the world. Dan also details Tanium's unique Converged Endpoint Management (XEM) platform that can provide real-time data on every computing endpoint, outlines how organizations can use that data to unlock AI breakthroughs and discusses how his time as a U.S. Army Ranger has instilled a culture of resilience, integrity and teamwork at Tanium.
Webinar
•Mar 27, 2024 • 9am

Steps for Driving Cyber Resiliency Enterprise-Wide | Research

We've heard it time and time again: It's not if, but when you'll get hacked. Accepting that reality requires you and your security teams shift your focus from prevention to recovery. Watch Kate Kuehn, WWT's Global Head of Cyber Advocacy, talk about how you can drive cyber resiliency – from the practitioner level all the way up through the board room.
Webinar
•May 23, 2024 • 9am

Fortify Your Cyber Resilience Strategy with Fortinet | Partner Spotlight

In an era of cyber uncertainty, resilience is the new frontier – a tide shift forcing CISOs and their security teams to re-evaluate their cybersecurity strategies and explore new partnerships and solutions that can strengthen their resilience against evolving threats. Join Fortinet and WWT cybersecurity experts as they discuss how cutting-edge technologies, such as AI and cyber ranges, can empower security teams to anticipate and respond to evolving threats.
Webinar
•Aug 15, 2024 • 9am

Safeguarding Critical Infrastructure on Service Provider Networks | Experts

Hyperscalers and service providers sit on the front lines of an emerging cyber battlefield, where both allies and adversaries are leveraging AI to gain an advantage. Join WWT Senior Vice President Greg Schoeny and Chief Security Advisor Jason Cook as they talk about how service providers can leverage cloud-native applications, distributed workforces and AI to enhance their business agility and customer experience while ensuring they have a robust and resilient cybersecurity posture.
Webinar
•Sep 3, 2024 • 9am

Overcoming Cyber Threats With a Resilience Strategy with Rubrik

If cyber attacks are inevitable — and for even the most security-conscious businesses, they are — then the future of cybersecurity is resiliency. In that context, it will be increasingly important for CISOs and security teams to maintain uninterrupted business operations with a resilience strategy. To get there, their data needs to be secure. Join WWT Head of Global Security Strategy Traci Sever as she talks with Rubrik founder and CEO Bipul Sinha about how organizations can keep their businesses moving regardless of the threat environment by improving data protection, monitoring risk and adopting a recovery and resilience strategy. Bipul also talks about how Rubrik is integrating AI into its solutions to fight fire with fire and draws upon his work as a venture capitalist to provide growth strategies that can be applied to businesses of all kinds.
Webinar
•Apr 10, 2024 • 9am

Rethinking Cybersecurity in Healthcare in the Age of AI | Experts

Healthcare is among the most vulnerable to cyber attack — and often the most targeted. Security leaders are challenged with defending against a rapidly evolving threat landscape while trying to build a more resilient organization. And the stakes — in some cases, human life — could not be higher. Join WWT Chief Healthcare Advisor Dr. Sanaz Cordes and Field CISO Robert Geis as they talk about how healthcare CISOs can manage and secure the increased burden of data, balance cyber risk as it relates to AI and what's happening from a regulatory perspective.
Webinar
•Mar 12, 2024 • 9am

Navigating Public Markets and Trends with 'Market Visionary' Keith Fitz-Gerald

Join us for an exclusive webinar featuring renowned market analyst Keith Fitz-Gerald as he delves into the critical topics shaping today's business and IT landscapes, the potential of AI in different industries and the state of the U.S. economy. Keith also provides in-depth market analysis and long-term investment strategies to secure your financial future, and identifies current global market concerns, the impact of offshoring and effective digital strategies.
Webinar
•Jul 18, 2024 • 9am

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1120 Followers

At a glance

229Total
77Blogs
58Articles
26Videos
23Events
13Case Studies
8Labs
8Learning Paths
7Briefings
4Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Network Security
  • Cyber Resilience
  • AI & Data
  • Cloud
  • What we do
  • Consulting Services
  • Cloud Security
  • ATC
  • Fortinet
  • Applied AI
  • Endpoint Security
  • Cisco
  • Data Security
  • Financial Services
  • Cyber Range

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies