Security
Security Insights
Filter by Content Types
- No options
1167 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•May 14, 2026 • 10am
Security & Shades: Helping you Protect Yourself from Cyber Threats and UV Rays.
Join WWT, Silverfort, Concentric AI, and Horizon3 AI for a cybersecurity dinner featuring a panel of industry experts discussing the rapidly evolving landscape of Identity, Data, and threat managment. This high‑level conversation is designed to spark meaningful dialogue, share real‑world perspectives, and answer your most pressing questions in today's shifting landscape.
Enjoy a curated dinner experience at Truluck's in Rosemont, with each participant also receiving a $150 Sunglass Hut gift card. This intimate evening will give you the opportunity to connect with peers, gain fresh insights from practitioners, and explore practical approaches to strengthening your organization's security posture.
Experience
•Apr 23, 2026 • 3:30pm
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Apr 16, 2026 • 9am
WWT Innovation Vendor Spotlight - Gambit
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with Gambit a leader in cyber resilience.
15 minutes after agentless deployment, Gambit reveals the actual truth about your entire stack: backup gaps, immutability violations, availability drift, config deviations - before these cascade into outages. Command the risk, protect revenue, prove compliance, accelerate innovation.
Further information can be found at: https://www.gambit.security/
Date: March 31, 2026
Time: 12:00 PM - 1:00 PM EST
Location: Virtual
Agenda:
* Introductions (5 min)
* WWT Cyber Resilience Practice Overview (10 min)
* Gambit Security Presentation (30-45 min)
* Q&A (15 min)
Experience
•Mar 31, 2026 • 11am
Cisco AI Defense CTF
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard, and the winners will be determined by least incorrect submissions
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Mar 30, 2026 • 9am
Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR
Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am
World Wide Technology's Women's Brunch at RSAC (women only event)
We are delighted to invite you to our exclusive Women's Brunch taking place during the RSA Conference on Wednesday, March 25, from 9:00–11:00 AM PT at The Veranda.
Join a dynamic community of women leaders and innovators in cybersecurity for a thoughtfully curated morning designed to bring people together in a warm, welcoming, and engaging setting. This gathering is intended to create space for meaningful connection, conversation, and community, an opportunity to connect with peers, exchange perspectives, and foster lasting relationships over great food and even better company.
In addition to brunch, guests will enjoy a professional headshot booth and a custom bracelet station, adding a fun and personal touch to the morning.
We look forward to bringing together an incredible group of women across cybersecurity for a memorable and elevated social gathering centered on connection, community, and celebrating the impact women continue to have across our industry.
Experience
•Mar 25, 2026 • 11am
Executive Breakfast with World Wide Technology at RSAC
We are thrilled to extend an exclusive invitation for you to attend an Executive Breakfast hosted by World Wide Technology, Cisco, and NVIDIA. Join the WWT executive leadership team during RSAC for an intimate breakfast at The Veranda! We are looking forward to hosting you for an insightful morning of networking, collaboration, and thought-provoking discussions with industry leaders and executives.
Experience
•Mar 24, 2026 • 9am
The Infection Core CTF
The Infection Core is an intermediate‑level cyber defense challenge focused on reverse engineering, malware analysis, memory forensics, and cryptanalysis.
Players are tasked with responding to an urgent incident: an autonomous cyber‑weapons division has lost control of a highly advanced malware project known as SHIVR, which has escaped onto the public web. Your mission is to track, analyze, and ultimately neutralize SHIVR before it compromises your own infrastructure—all while SHIVR actively works to counter your efforts.
Tools utilized in the game include:
🔷IDA/Ghidra (disassemblers & reverse engineering suites)
🔷Wireshark (traffic analysis)
🔷John the Ripper (password cracking)
🔷GDB (debugging)
🔷Frequency Analysis utilities (cryptanalysis)
Experience
•Mar 23, 2026 • 9am
Beyond the Big Stages: Why Grassroots Cybersecurity Events Matter
Cybersecurity isn't just built at RSA and Black Hat. It happens in local communities, regional events and grassroots conversations—and that's where organizations should be investing more of their time and energy.
Blog
•Mar 19, 2026
Unlocking Cyber Resilience: HPE Zerto Cyber Vault and Ransom Recovery
This event will delve into the critical aspects of cyber resilience, focusing on the HPE Zerto Cyber Vault's capabilities in combating ransomware threats. As cyberattacks grow in sophistication, enterprises need robust solutions to ensure rapid recovery and continuity. Our experts will explore how HPE Zerto's decentralized architecture and air-gapped recovery can dramatically reduce downtime and meet compliance needs. Attendees will gain insights into the architecture's core pillars and learn how to leverage these technologies to protect their organizations from the growing threat of ransomware.
Webinar
•Mar 19, 2026 • 9am
The Next Chapter for Google & Wiz
In a landmark acquisition, Google acquires Wiz, an industry-leading cloud security company. While there are still no definitive answers on what the future may hold, the opportunities are endless.
Blog
•Mar 18, 2026