Security
Security Insights
Filter by Content Types
- No options
1170 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•May 14, 2026 • 10am
Security & Shades: Helping you Protect Yourself from Cyber Threats and UV Rays.
Join WWT, Silverfort, Concentric AI, and Horizon3 AI for a cybersecurity dinner featuring a panel of industry experts discussing the rapidly evolving landscape of Identity, Data, and threat managment. This high‑level conversation is designed to spark meaningful dialogue, share real‑world perspectives, and answer your most pressing questions in today's shifting landscape.
Enjoy a curated dinner experience at Truluck's in Rosemont, with each participant also receiving a $150 Sunglass Hut gift card. This intimate evening will give you the opportunity to connect with peers, gain fresh insights from practitioners, and explore practical approaches to strengthening your organization's security posture.
Experience
•Apr 23, 2026 • 3:30pm
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Apr 16, 2026 • 9am
WWT Innovation Vendor Spotlight - Gambit
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with Gambit a leader in cyber resilience.
15 minutes after agentless deployment, Gambit reveals the actual truth about your entire stack: backup gaps, immutability violations, availability drift, config deviations - before these cascade into outages. Command the risk, protect revenue, prove compliance, accelerate innovation.
Further information can be found at: https://www.gambit.security/
Date: March 31, 2026
Time: 12:00 PM - 1:00 PM EST
Location: Virtual
Agenda:
* Introductions (5 min)
* WWT Cyber Resilience Practice Overview (10 min)
* Gambit Security Presentation (30-45 min)
* Q&A (15 min)
Experience
•Mar 31, 2026 • 11am
Cisco AI Defense CTF
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard, and the winners will be determined by least incorrect submissions
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Mar 30, 2026 • 9am
The Cloud Identity Crisis
In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026
Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR
Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am
WWT's Take on Fortinet Accelerate 2026
WWT's and Fortinet's partnership was showcased during Accelerate 2026.
Blog
•Mar 26, 2026
Strengthening Healthcare Cybersecurity in an Era of Disruption
In an era of digital transformation, healthcare cybersecurity is mission-critical, impacting patient safety and operational resilience. By prioritizing foundational security strategies, healthcare cybersecurity leaders can navigate evolving threats and regulatory demands, ensuring safer, more resilient care environments.
WWT Research
•Mar 26, 2026
World Wide Technology's Women's Brunch at RSAC (women only event)
We are delighted to invite you to our exclusive Women's Brunch taking place during the RSA Conference on Wednesday, March 25, from 9:00–11:00 AM PT at The Veranda.
Join a dynamic community of women leaders and innovators in cybersecurity for a thoughtfully curated morning designed to bring people together in a warm, welcoming, and engaging setting. This gathering is intended to create space for meaningful connection, conversation, and community, an opportunity to connect with peers, exchange perspectives, and foster lasting relationships over great food and even better company.
In addition to brunch, guests will enjoy a professional headshot booth and a custom bracelet station, adding a fun and personal touch to the morning.
We look forward to bringing together an incredible group of women across cybersecurity for a memorable and elevated social gathering centered on connection, community, and celebrating the impact women continue to have across our industry.
Experience
•Mar 25, 2026 • 11am
Executive Breakfast with World Wide Technology at RSAC
We are thrilled to extend an exclusive invitation for you to attend an Executive Breakfast hosted by World Wide Technology, Cisco, and NVIDIA. Join the WWT executive leadership team during RSAC for an intimate breakfast at The Veranda! We are looking forward to hosting you for an insightful morning of networking, collaboration, and thought-provoking discussions with industry leaders and executives.
Experience
•Mar 24, 2026 • 9am
Every Manufacturer Wants to Be AI-first. Few Know Where to Start
For manufacturers serious about becoming AI-first, IT/OT convergence is the bridge that gets them there.
WWT Research
•Mar 24, 2026