Security
Security Insights
Filter by Content Types
- No options
1200 results found
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
While the lab environment remains open for 8 hours, the game is designed to be completed within a 6-hour window.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Jun 11, 2026 • 9am
Cisco AI Defense CTF
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard. Should players finish with equal scores, final placement will be awarded to the player who achieved their last correct submission in the least amount of time from their first submission.
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Jun 1, 2026 • 9am
ARMOR up with WWT... because AI is inside the wire
Security for AI represents an unprecedented challenge, but AI security practices are compounding the problem by slowing adoption, limiting utilization, and undermining the return on your AI investments. Learn how the "WWT ARMOR framrework" — developed with leading organizations and industry partners — can accelerate AI efforts, increase utilization, and unlock productivity to drive maximum value, all while enhancing security and governance.
*Lunch & Harbor Court Parking Validation Provided
Experience
•May 28, 2026 • 4pm
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•May 14, 2026 • 10am
Secure the Use of GenAI Models with Cisco Secure Access
Cisco Secure Access serves as an integrated platform that provides the necessary infrastructure for organizations to govern and protect their artificial intelligence usage through centralized policy management. By embedding AI Access capabilities directly into the solution, it allows businesses to maintain robust security, visibility, and data protection while fostering innovation across the enterprise.
Video
•1:33
•May 13, 2026
Mythos Is Coming. Are You Building Walls or Traps?
Anthropic's forthcoming Mythos model wasn't built to hack. It just learned how — and it's good at it. In this AI Proving Ground Podcast episode, former NSA cybersecurity director Rob Joyce and WWT cyber leader Kent Noyes break down what Mythos means for your security posture and what the defender's playbook looks like now.
Video
•5:07
•May 13, 2026
NERC CIP-15 Compliance: A Strategic Approach for Internal Network Security Monitoring
Learn what NERC CIP-015 requires, why OT environments complicate compliance and how utilities can meet the standard while building a stronger security posture.
Article
•May 12, 2026
Hybrid Private Access with Cisco Secure Access
Cisco Secure Access provides a unified zero-trust platform that enables organizations to maintain consistent security policies across both cloud and on-premises environments. By integrating Hybrid Private Access, the platform allows IT teams to flexibly balance cloud-based scalability with local enforcement to meet specific privacy, compliance, and performance requirements.
Video
•1:23
•May 11, 2026
I Built a C2 Channel in 5 Minutes. Your Security Team Had No Idea.
A covert AI agent experiment reveals a new threat class, exploiting trusted SaaS APIs like Slack for command-and-control without detection. As autonomous agents become standard, enterprises must adopt proactive security measures. WWT's AI Gateway and Governance Framework offers a structured approach to mitigate these emerging risks.
Blog
•May 11, 2026
Defending at the Speed of AI
A 12-point response plan for cybersecurity and resilience leaders
WWT Research
•May 8, 2026
WWT - Mythos Response Framework
Join WWT for this webinar event around Mythos readiness content developed with security leaders across the sector — a prescriptive framework.
Mythos-class AI capabilities have moved a working assumption most vulnerability programs still rely on: that exploit development is slow enough for weekly or monthly patch cycles to keep pace. Median time-to-exploit is now measured in hours, and the barrier to weaponizing published CVEs has collapsed.
Rather than add to the noise, we've distilled the best public guidance into a 12-point response framework structured around three shifts: strengthen the foundation, move from vulnerability management to exploit prevention, and align people and partners.
Webinar link:
https://er-wwt.webex.com/er-wwt/j.php?MTID=m5df93c3a9932ead47d16ca4501b9e62f
Webinar number:
2550 700 1561
Webinar password:
QpGWYBy83s3
Experience
•May 7, 2026 • 3:30pm
Hands-On Lab Workshop: Cisco AI Defense
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed to challenge and sharpen your AI security skills. The Cisco AI Defense CTF lab puts you in the middle of real-world AI threat scenarios, where you will exploit and defend against vulnerabilities including prompt injection, jailbreaking, and misuse of generative AI models. Watch Cisco AI Defense technology intercept and neutralize attacks in real time as you work through progressively challenging scenarios. This lab goes beyond surface-level awareness—giving you direct, practical experience with the tools and techniques used to secure enterprise AI environments.
Webinar
•May 7, 2026 • 11am