Security
Security Insights
Filter by Content Types
- No options
1145 results found
Security & Shades: Helping you Protect Yourself from Cyber Threats and UV Rays.
Join WWT, Silverfort, Concentric AI, and Horizon3 AI for a cybersecurity dinner featuring a panel of industry experts discussing the rapidly evolving landscape of Identity, Data, and threat managment. This high‑level conversation is designed to spark meaningful dialogue, share real‑world perspectives, and answer your most pressing questions in today's shifting landscape.
Enjoy a curated dinner experience at Truluck's in Rosemont, with each participant also receiving a $150 Sunglass Hut gift card. This intimate evening will give you the opportunity to connect with peers, gain fresh insights from practitioners, and explore practical approaches to strengthening your organization's security posture.
Experience
•Apr 23, 2026 • 3:30pm
WWT Innovation Vendor Spotlight - Gambit
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with Gambit a leader in cyber resilience.
15 minutes after agentless deployment, Gambit reveals the actual truth about your entire stack: backup gaps, immutability violations, availability drift, config deviations - before these cascade into outages. Command the risk, protect revenue, prove compliance, accelerate innovation.
Further information can be found at: https://www.gambit.security/
Date: March 31, 2026
Time: 12:00 PM - 1:00 PM EST
Location: Virtual
Agenda:
* Introductions (5 min)
* WWT Cyber Resilience Practice Overview (10 min)
* Gambit Security Presentation (30-45 min)
* Q&A (15 min)
Experience
•Mar 31, 2026 • 11am
Cisco AI Defense CTF
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard, and the winners will be determined by least incorrect submissions
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Mar 30, 2026 • 9am
World Wide Technology's Women's Brunch at RSAC (women only event)
We are delighted to invite you to our exclusive Women's Brunch taking place during the RSA Conference on Wednesday, March 25, from 9:00–11:00 AM PT at The Veranda.
Join a dynamic community of women leaders and innovators in cybersecurity for a thoughtfully curated morning designed to bring people together in a warm, welcoming, and engaging setting. This gathering is intended to create space for meaningful connection, conversation, and community, an opportunity to connect with peers, exchange perspectives, and foster lasting relationships over great food and even better company.
In addition to brunch, guests will enjoy a professional headshot booth and a custom bracelet station, adding a fun and personal touch to the morning.
We look forward to bringing together an incredible group of women across cybersecurity for a memorable and elevated social gathering centered on connection, community, and celebrating the impact women continue to have across our industry.
Experience
•Mar 25, 2026 • 11am
Executive Breakfast with World Wide Technology at RSAC
We are thrilled to extend an exclusive invitation for you to attend an Executive Breakfast hosted by World Wide Technology, Cisco, and NVIDIA. Join the WWT executive leadership team during RSAC for an intimate breakfast at The Veranda! We are looking forward to hosting you for an insightful morning of networking, collaboration, and thought-provoking discussions with industry leaders and executives.
Experience
•Mar 24, 2026 • 9am
The Infection Core CTF
The Infection Core is an intermediate‑level cyber defense challenge focused on reverse engineering, malware analysis, memory forensics, and cryptanalysis.
Players are tasked with responding to an urgent incident: an autonomous cyber‑weapons division has lost control of a highly advanced malware project known as SHIVR, which has escaped onto the public web. Your mission is to track, analyze, and ultimately neutralize SHIVR before it compromises your own infrastructure—all while SHIVR actively works to counter your efforts.
Tools utilized in the game include:
🔷IDA/Ghidra (disassemblers & reverse engineering suites)
🔷Wireshark (traffic analysis)
🔷John the Ripper (password cracking)
🔷GDB (debugging)
🔷Frequency Analysis utilities (cryptanalysis)
Experience
•Mar 23, 2026 • 9am
Welcome To The League CTF
This is an individual player CTF game. 'Register a team' is how you will register yourself as a team of ONE. Click the blue button, log in or create your WWT account, create a team name and verify your email. BOOM, you're done!
Step into the world of advanced cybersecurity in our Cyber Range CTF game, "Welcome to the League". This event is tailored for individuals ready to push their red skills to the limit. Participants will engage in a series of sophisticated challenges designed to test their abilities in Active Directory enumeration, privilege escalation, and post-exploitation techniques. Do you have what it takes to join The League?
This game takes around 8 hours to complete and will be accessible for a full 24-hour period, allowing players to log in and progress at their own pace. With state-saving functionality, participants can pause and resume their gameplay without losing progress, ensuring a flexible and engaging experience.
Cyber Range
•Mar 18, 2026 • 9am
Hands-On Lab Workshop: Infection Core
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed for blue team enthusiasts and cybersecurity professionals. The Infection Core lab challenges you to track, contain, and neutralize SHIVR, an autonomous cyber weapon that has escaped onto the public web. Through a series of malware analysis, reverse engineering, memory forensics, and cryptanalysis challenges, you'll develop and test your skills in real-world scenarios. This lab goes beyond surface-level analysis, pushing you to uncover hidden logic and defend critical infrastructure against advanced threats.
Webinar
•Mar 12, 2026 • 11am
Securing AI with CrowdStrike Lab
Explore the Securing AI with CrowdStrike Lab, where AI security meets real-world challenges. Discover how CrowdStrike's AIDR and Falcon Cloud Security protect against AI-specific threats like prompt injection and data leakage, ensuring robust security for workforce, development, and runtime environments. Uncover the future of AI security today.
Advanced Configuration Lab
•6 launches
Partner POV | Think You Have Visibility? Think Again.
Traditional SIEMs struggle with visibility, leaving gaps for attackers. Cortex XSIAM leverages rich telemetry and data stitching to provide comprehensive threat detection and response. By unifying endpoint, network, and cloud data, it reduces alert fatigue and enhances security operations, enabling proactive defense against sophisticated threats. Discover transformative security with Cortex.
Partner Contribution
•Mar 5, 2026
Partner POV | Securing Every Identity in the Age of AI
Identity has become the primary attack vector in modern enterprises, with machine identities outnumbering human ones. CyberArk's integration with Palo Alto Networks elevates identity security to a core platform, offering continuous, dynamic protection against identity-based breaches. This partnership empowers organizations to innovate securely in the AI-driven era.
Partner Contribution
•Mar 5, 2026
NERC CIP-015 Compliance: A "How To" Guide for Power Utilities
NERC CIP-015-1, which focuses on Internal Network Security Monitoring (INSM) for bulk electric systems, became effective on September 2, 2025. Full compliance for covered entities follows a phased approach, with requirements taking effect on a staggered schedule, beginning with some control centers by that date.
Blog
•Mar 5, 2026