Overview
Explore
Labs
Services
Events
Partners
9 results found
Hands-On Lab Workshop: Palo Alto NGFW Foundations Version 10
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Palo Alto NGFW Foundations Version 10 lab. This lab is designed designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure. This one-hour event is limited to 60 participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the host for a hands-on experience.
Webinar
• Oct 14, 2024 • 2pm
Hands-On Lab Workshop: Cisco XDR Foundations
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Cisco XDR Foundations. In this Live Lab event you will learn the basics about Cisco's XDR console and how to navigate through the many tools available to an analyst. Our Cisco XDR Foundations lab highlights the importance of having an XDR solution by showcasing the necessary tools an analyst will need to help your organization defend against cyber security threats.
Webinar
• Nov 21, 2024 • 10am
Driving Agility and Resiliency with Consolidated Cybersecurity Platforms | Experts
Today's CISOs and security teams have more tools than ever to implement. It's driving innovation, but also creating new levels of complexity — from a cost, visibility and agility perspectives — that are difficult to overcome. After years of over rotating on the number of tools and solutions being used, it's time for security leaders to get back to the basics. But how?
Join WWT's Area Vice President of Cyber Chris Konrad as he delves deep into the benefits of consolidating cybersecurity platforms, from enhanced visibility and improved threat detection to cost savings and operational efficiency. Chris also tackles the challenges that come with consolidation and provides actionable mitigation strategies that can be a game-changer for your organization's cybersecurity posture.
Webinar
• Aug 29, 2023 • 9am
Shift Left to Protect APIs with F5 | Partner Spotlight
APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient.
Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
• Aug 22, 2024 • 9am
Adopt a Hacker Mentality to Stay Ahead of the Cyber Curve | WWT Experts
Today's threat landscape is broader than ever and cyberattacks are growing in volume and sophistication each and every day. In fact, hackers are launching new assaults at a clip of greater than one every minute of the day. Yet an alarming number of business leaders feel ill-prepared in the event a cyberattack hits their company. How can this be given the stakes involved?
Join WWT Cyber Range Architect Brett Turner as he discusses what cyber threats pose the greatest risks to organizations this year and how companies can best address the expanding talent gap taking place in the cyber industry. Brett also talks about what it takes to become an ethical hacker and why dynamic, live-fire cyber exercises called Cyber Ranges could be your best bet to standing up to cyber criminals moving forward.
Webinar
• Jan 31, 2023 • 9am
TEC37 Security Series E10: Five Essential Steps to Improve Security Maturity
Join host Robb Boyd as he speaks with WWT's Jill Cochrane, Kris Carr, and Geoff Hancock, as they walk through different levels of cybersecurity maturity to give CISOs, CEOs and CIOs the confidence to improve their security postures wisely and maximize resources.
Webinar
• Sep 21, 2022 • 3:30pm
The Future of XDR: Separating Utopia from Reality | WWT Experts
The rapid adoption of distributed workforce models has created a gap between IT and security when it comes to endpoints. In fact, a recent Ponemon Institute survey found half of today's enterprise endpoints are vulnerable to attack while more than a quarter of organizations lack visibility into what is happening at their endpoints. How can we get out of this mess?Â
Join WWT Executive Security Advisor John Aplin as he talks about the importance of taking a platform mentality when it comes to extended detection and response (XDR). John also discusses how XDR serves as a natural extension to EDR, helps draw the line between XDR marchitecture and reality, and identifies best practices he's seeing in the market today for moving toward an XDR approach.Â
Webinar
• Mar 7, 2023 • 9am
WWT Experts: Chris Konrad on Security
Grab a quick dose of deep expertise with the WWT Expert series. In each episode, our host poses topical questions to a WWT Expert. Learn about the business solutions these experts have created, the technologies they've mastered and the trends they're seeing in the marketplace. All in 30 minutes or less.
Our WWT Experts host, Matthew Coble, will be joined this week by security expert, Chris Konrad. Chris is a 24-year veteran of the cybersecurity industry, and he's built and led various teams in consulting, sales, and professional services. He currently leads security strategy with many of WWT's top global accounts, and he's regularly tapped to share his expertise with media and industry groups, both online and off.
Webinar
• Dec 14, 2022 • 1pm
Consolidation and Automation, Not Complication | Simplify Your Security Strategy
Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility.
Join experts from WWT and Palo Alto Networks as they discuss the value of adopting a platform approach that focuses on integration, visibility, and real-time monitoring to simplify security operations. This session will provide an overview of Palo Alto's platform strategy and WWT's Security Tools Rationalization process to identify technology gaps and overlaps.
Webinar
• May 2, 2024 • 1pm