Overview
Explore
Labs
Services
Events
Partners
Select a tab
9 results found
Think Beyond Disaster: Driving Cyber Recovery in the Data Center | Research
As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery.
Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Webinar
• Jul 24, 2024 • 9am
Securing AI Transformation with WWT's Jim Kavanaugh and Cisco's Jeetu Patel
As AI adoption accelerates across industries, businesses face unprecedented challenges in securing their AI-driven transformations. In this exclusive fireside chat, Cisco EVP and Chief Product Officer Jeetu Patel and WWT Co-founder and CEO Jim Kavanaugh discuss the latest breakthroughs in AI security and how enterprises can more confidently innovate while safeguarding their AI applications.
Jeetu and Jim will also explore the global landscape and its impact on the future of enterprise AI; provide practical guidance on how to craft an AI strategy that balances the need for speed with the necessity of caution; and talk about emerging AI solutions and how they can integrate into your IT strategy.
Webinar
• Mar 5, 2025 • 9am
🎤 MicDrop - Rubrik CTF
The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations.
Features highlighted include:
Data Protection – Learn how to back up and recover files, databases, and virtual machines to ensure data availability and ransomware resilience.
Data Threat Analytics – Use IOCs, including file patterns, YARA rules, and hashes, to identify and analyze potential threats.
Cyber Recovery – Explore automated and network-isolated recovery methods to restore operations securely and perform forensic analysis.
Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance.
This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
• Apr 3, 2025 • 8am
Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
• Mar 20, 2025 • 11am
🎤 MicDrop - Rubrik CTF at RSA
Take a break from RSA, assemble your team, and join us for an exciting in-person Capture the Flag (CTF) event! The MicDrop CTF will spotlight Rubrik Security Cloud's (RSC) powerful capabilities, showing how RSC empowers organizations with true cyber resiliency.
Key features you'll experience hands-on include:
✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience.
✅ Data Threat Analytics – Detect and analyze potential threats using IOCs, YARA rules, and hashes.
✅ Cyber Recovery – Restore operations securely with automated, network-isolated recovery and perform forensic analysis.
✅ Data Security Posture – Monitor and reduce sensitive data exposure to strengthen security and ensure compliance.
This engaging, real-world ransomware scenario will demonstrate how RSC helps you protect, detect, and recover from cyber threats — all through an immersive, team-based CTF experience.
Cyber Range
• Apr 30, 2025 • 5pm
Accelerating Time to Recovery with Zerto Cyber Resilience Vault | Partner Spotlight
Cyber threats continue to grow in frequency and sophistication, and the adoption of AI is adding to the complexity. Most CISOs are confident they can recover when they are attacked, but accelerating time-to-recovery is a top concern.
Webinar
• Jul 25, 2024 • 9am
Shift Left to Protect APIs with F5 | Partner Spotlight
APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient.
Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
• Aug 22, 2024 • 9am
Balancing Risk, Recovery and Resiliency with Commvault | Meet the Chief
Cyber resilience has become an executive- and board-level imperative for organizations of all kinds. But how can leaders ensure their businesses can withstand and recover from the inevitable cyber attack?
In this episode of Meet the Chief, Commvault CEO Sanjay Mirchandani details his unique perspective on the evolving nature of cyber resilience, the shift from pure defense to a focus on data protection and rapid recovery, and the need for a unified platform to safeguard all workloads. Sanjay also explores the responsible use of AI in enhancing recovery capabilities and operational excellence, and shares insights related to building a culture of trust and transparency.
Webinar
• Sep 5, 2024 • 9am
Putting Data Protection into Action with Cohesity's DataHawk | Partner Spotlight
With the cyber threat landscape growing more complex each and every day, data protection and cyber resiliency have moved to the forefront of our clients' strategic agendas.
IT decision makers are now highly focused on protecting their crown jewels – often their data – by securing the perimeter of their networks and looking to integrate AI and ML into their models to move into a more proactive defense posture.
It's challenging... but there's good news, too. The innovations taking place in this space provides optimism that as an industry we are rounding the bend on overcoming most of the bad actors who look to exploit and destroy our customers.
Webinar
• Jun 22, 2023 • 9am