Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore

Select a tab

WWT at RSA Conference 2026

World Wide Technology will join security leaders from across the industry at RSAC 2026 to explore the most pressing cybersecurity challenges and the evolving threat landscape. Throughout the week, we look forward to connecting with customers and peers to share practical perspectives on emerging technologies, security strategy and what it takes to build resilience in an increasingly complex environment.

 WWT + Softchoice: Better Together

WWT and Softchoice partner to deliver a more complete approach to cybersecurity and digital transformation — integrating deep technical expertise, software and cloud solutions, and real‑world execution. 

Join us at RSA as we connect, collaborate and engage with the security community to explore practical ways to strengthen resilience, manage risk and drive secure outcomes.

Meet with us at The Veranda

Join us at The Veranda, a short walk from the Moscone Center, Monday through Thursday during the conference to meet with your WWT and Softchoice teams. 

Contact your WWT or Softchoice team member for more information. 

WWT Thought Leadership Sessions

Stop by The Veranda to hear from experts on key security topics:

March 24 | 10:00 - 11:00 a.m.

Presenters: Kate Kuehn, AVP of Global Cyber Advocacy and Fortinet

New data sovereignty features may matter most for regulated sectors such as finance, healthcare, and public institutions that face tight rules on where and how data is stored.  The new data sovereignty features help clarify where Fortinet is trying to compete within security operations platforms.

March 24 | 11:30 a.m. - 12:30 p.m.

Presenters: Madison Horn, National Security & Critical Infrastructure Advisor and Rob Joyce, Former NSA Cybersecurity Director

From recent tensions surrounding Venezuela's energy sector to the current conflict involving Iran, geopolitical confrontation is increasingly unfolding not only through kinetic action but through cyber operations targeting economic systems and critical infrastructure. Framed through the lens of "The Art of Conflict: Cyber at War – How Iran's Retaliation is Shaping Critical Infrastructure and Global Enterprise Risk," this discussion will explore how modern conflict is translating into cyber pressure on enterprises and infrastructure operators around the world. In this cross-talk conversation, Madison Horn, Chief Advisor for National Security & Critical Infrastructure, will be joined by the Former NSA Cyber Director, Rob Joyce to examine how adversaries leverage cyber capabilities for espionage, disruption, and strategic signaling during periods of conflict. The discussion will connect these geopolitical dynamics to the operational realities organizations face, highlighting where cyber pressure is most likely to emerge and what security and infrastructure leaders should be paying attention to as the landscape continues to evolve.

March 24 | 2:00 - 3:00 p.m. 

Presenter: Robert Geis, Field CISO, Global Cyber

The gap between AI experimentation and enterprise production is where most organizations stall. This session demonstrates how Cisco Secure AI Factory with NVIDIA — validated and deployed through WWT — bridges that gap with pre-validated architectures, integrated security controls and operational simplicity. Discover how to reduce deployment timelines, mitigate risk and build AI infrastructure that meets the demands of business while delivering the performance your AI developers and data science teams need.

March 25 | 12:30 - 1:30 p.m.

Presenters: Jillian Anderson-Nix, AI Security Strategist & ARMOR Lead and Kent Noyes, AVP, Global Cyber Archtecture & Innovation

As AI rapidly transforms industries, leaders are confronted with an expanded attack surface and unprecedented regulatory complexity. ARMOR directly addresses these challenges, providing actionable, holistic guidance that embeds security across the full AI lifecycle from chip to deployment, whether cloud or on-premises.  Come understand this innovative new Framework from a practical example and community perspective.

March 25 | 2:00 - 3:00 p.m. 

Presenters: Jason Lam, Security Practice Director, Chris Edmunson, Solution Delivery Manager, and Fortinet

How Fortinet is leaning further into security operations, not just perimeter defenses, and how FortiSIEM sits at the core of how enterprises monitor and respond to threats, with the focus on AI driven incident response. This speaks directly to the rise of AI powered attacks and more complex security environments

March 25 | 3:30 - 4:30 p.m.

Presenter: Mike Dombrowski, Senior Director, Global Security Solutions

Building trust in the use of AI is accomplished by adopting AI responsibly across the enterprise. WWT's ARMOR framework helps organizations achieve that by addressing the inherent risks of AI. There are four core risk dimensions that align to the ARMOR framework: Governance, Organizational, Model and Enablement. The Building Trust session will discuss each of these areas, they're alignment to ARMOR, and how they are used to develop the underlying capabilities & controls for trustworthy AI use.

March 26 | 10:00 - 11:00 a.m.

Presenters: Bryan Fite, Technical Solutions Architect III for AI and Fortinet

Come hear about the latest trends and impact on Cyber Posture Management leveraging AI Detection in OT Security. We will cover best practices, areas of focus and the key highlights of the report.

Don't miss out!

Customer Networking Reception

Join World Wide Technology at The Veranda on Monday, March 23rd from 7:00 PM - 10:00 PM PST for a networking event during one of the industry's top security conference! This event offers a prime opportunity to engage with fellow industry leaders, share insights, and forge invaluable connections. This gathering promises an evening of synergy and opportunity you won't want to miss!

If you're interested in joining this event, please reach out to your WWT team member. 

In partnership with: BlackCloak, Dragos, NETSCOUT, and Tanium.

Executive Breakfast with World Wide Technology

Invitation-only breakfast hosted by WWT, Cisco, and NVIDIA at The Veranda on Tuesday, March 24th from 7:00 AM - 9:00 AM PST. Attendees will have an insightful morning of networking, collaboration, and thought-provoking discussions with industry leaders and executives. 

If you're interested in joining this event, please reach out to your WWT team member. 

World Wide Technology's Women's Brunch at RSAC

Connect with dynamic community of women leaders and innovators in cybersecurity for a thoughtfully curated morning designed to bring people together in a warm, welcoming, and engaging setting. This gathering is intended to create space for meaningful connection, conversation, and community, an opportunity to connect with peers, exchange perspectives, and foster lasting relationships over great food and even better company.

If you're interested in joining this event, please reach out to your WWT team member. 

In partnership with: SentinelOne.

 

Learn from World Wide Technology experts featured at RSAC

Add these sessions to your calendar today!

Attack and Defend: Modern Applications with AI

Think like an attacker, build like a defender. Led by WWT experts Jason Lam and Chris Edmundson, this hands-on lab will explore AI retrieval-augmented generation (RAG) security — where AI meets data access. Participants will exploit vulnerabilities in RAG applications to understand attack vectors. Then, implement robust defenses using proven strategies, mastering both sides of AI security through exercises that prepare them for real-world threats.

By understanding how adversaries think and operate, organizations can make more informed decisions about architecture, security controls and resilience in increasingly dynamic environments.

Tuesday, March 24
1:15 PM – 3:15 PM PDT

 

NightDragon Innovation Summit

WWT is a proud gold sponsor of the NightDragon Innovation Summit, a forum that brings together industry leaders to discuss the forces shaping the cyber landscape. Featuring WWT's Mike Taylor as he shares actionable perspectives on enabling secure, sustainable innovation.

Tuesday, March 24 | 2:20 PM PDT

Featured Speakers:

  • Mike Taylor, CTO and EVP of Services
  • Vitaly Gudanets, CISO, Anthropic
  • Julien Soriano, Deputy CISO, NVIDIA

 

Taming the Algorithm - Governing AI as a Core Business Risk

AI has moved from experimentation to execution. This panel explores how leading organizations are treating AI governance as a core business and trust mandate—defining clear decision rights, managing real prompt- and model-level risk, and aligning legal, security, and product leaders without slowing innovation.

Wednesday, March 25 | 9:00 AM PDT

Featured Speakers:

  • Khalid Kark, Field CIO, Cloudflare
  • Kate Kuehn, AVP of Global Cyber Advocacy, World Wide Technology
  • Joe Sullivan, CEO, Joe Sullivan Security & Ukraine Friends, Joe Sullivan Security LLC
  • Michael Goodman, Chief Digital and Security Officer, Hitachi

Register for the Trust Forward Summit by Cloudflare today! 

 

Thanks to our supporting partners

We'd like to recognize our partners for making our presence at RSAC 2026 possible. Thank you for the partnership!

Connect with WWT at RSAC 2026

Let's discuss emerging security challenges and opportunities.

If you'd like to connect with our team or schedule dedicated time with WWT experts, reach out to your account representative for more information.

Meet our experts

Mike TaylorCTO and EVP, Services
Chris KonradVice President, Global Cyber
Jill CochraneVP & General Manager, Solution Security
Ashish UpadhyayAVP Global Cyber Partner Alliance
Kate KuehnArea Vice President of Global Cyber Advocacy
Kent NoyesAVP of Global Cyber Architecture & Innovation
Andrew CampbellDirector, Security Category
Mike McGlynnGlobal Chief Information Security Officer

WWT's AI Readiness Model for Operational Resilience (ARMOR)

The AI Readiness Model for Operational Resilience (ARMOR) is a vendor-agnostic solution designed to secure AI deployments at every stage, from planning to ongoing operations.

Built on practical experience and expert insights, ARMOR is continuously refined as new partners and technologies join the ecosystem.

Whether you're a local business or a global enterprise, its flexible, scalable structure makes it adaptable for organizations of any size or sector.

Explore ARMOR

Read the latest WWT Research in Security

Security Priorities for 2026

A guide for security leaders to strengthen trust, reduce risk and build a more resilient, security-enabled enterprise
WWT Research
•Feb 9, 2026

Secure Your Future: A CISO's Guide to AI

A step-by-step guide for unlocking the power of AI while protecting critical data and navigating the complex regulatory landscape.
WWT Research
•Apr 3, 2025

Trustworthy and Responsible AI at the Global Scale

A WWT Research Report on developing a global framework for the adoption of safe, trustworthy and responsible generative AI (GenAI).
WWT Research
•Feb 14, 2025

A Guide for CEOs to Accelerate AI Excitement and Adoption

The age of AI is here. As the CEO, your leadership is crucial to driving AI transformation. Discover how active executive engagement in AI adoption leads to competitive advantage.
WWT Research
•Oct 30, 2025

World Wide Technology at RSA Conferences

This isn't our first RSAC! Read more of WWT recaps from past conferences.

For Better or For Breach: RSA 2025's Commitment to Cyber Unity

The month of May marks the kickoff of both wedding and conference season, a time when people come together to share journeys and celebrate new beginnings. The RSA Conference 2025 exemplified this spirit, bringing together a diverse array of cybersecurity professionals, innovators and thought leaders to tackle ever-evolving threats. Drawing inspiration from the wedding adage "Something Old, Something New, Something Borrowed, Something Blue," we will explore the key themes and insights from this year's event.

RSA Conference 2023: Igniting Innovation Through Collaboration in Cybersecurity

World Wide Technology security experts share their key takeaways from RSA 2023.

Follow to get more security insights from WWT!

Security

Learn how our consultants proactively integrate IT security into your organization and unite employees, customers, partners and communities against cyber threats.
Category

RSAC

Your one-stop-shop for details about our presence at RSA Conference — the industry-leading cybersecurity conference for timely insights, thoughtful interactions, and actionable intelligence.

17 Followers

At a glance

4Total
4Blogs
What's related
  • Blog
  • Security
  • Cybersecurity Risk & Strategy
  • Identity and Access Management
  • AI Security
  • CrowdStrike
  • Cyber Resilience
  • CyberArk
  • Cybereason
  • Endpoint Security
  • Fortinet
  • SecurityScorecard
  • Thales

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies