Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

10 results found

Steps for Building an AI Security and Governance Program | Research

CISOs and their security teams play a pivotal lead role in unlocking the power of AI in the enterprise. While most organizations start their AI journey based on use cases, a governance program needs to be built in parallel. Join WWT AI security expert Angela Brandt as she dives into how you can build an AI governance program that addresses fairness, bias, discrimination and safety. Angela also talks about the important role security plays in an AI Center of Excellence and how to assess risk related to AI in your business.
Video
•1:34
•Jun 28, 2024

Partner POV | CrowdStrike: Charlotte AI

Charlotte AI is built into the CrowdStrike Falcon platform and is a conversational assistant for security operations that turns hours of work into minutes or seconds.
Video
•3:01
•Jul 2, 2024

CrowdStrike: Falcon Next-Gen SIEM

In a world of stealthy, fast-moving threats and ever-increasing log volumes, defenders need an edge that's orders of magnitude faster, smarter, and more scalable than current approaches. Watch this video to see how to detect and stop the adversary Alpha Spider quickly with CrowdStrike Falcon Next-Gen SIEM.
Video
•3:01
•Apr 3, 2024

CrowdStrike: Falcon Identity Protection

Adversaries increasingly target identity, with 80% of modern breaches involve stolen credentials. Watch how Falcon Identity Protection stops adversaries' malicious use of valid credentials with the industry's only unified platform for identity protection and endpoint security.
Video
•2:47
•Dec 20, 2023

Partner POV | CrowdStrike: Falcon ASPM

CrowdStrike Falcon Application Security Posture Management (ASPM) extends visibility beyond endpoints and cloud and automatically prioritizes the most impactful risks.
Video
•2:17
•Jul 2, 2024

CrowdStrike: Falcon LogScale

We've always said, "You don't have a malware problem, you have an adversary problem." Watch to find out how to detect, investigate and hunt for advanced adversaries with Falcon LogScale. You'll see firsthand how Falcon LogScale accelerates security operations to stop breaches with petabyte-scale log management and lightning-fast search that's up to 150x faster than traditional SIEMs
Video
•2:28
•Jan 8, 2024

CrowdStrike: Falcon Cloud Security

Cloud exploitation grew 95% over the past year, with adversaries becoming even more focused and persistent. Watch how Falcon Cloud Security stops breaches with truly unified agent and agentless protection, from endpoint to cloud.
Video
•2:22
•Jan 17, 2024

WWT & CrowdStrike | Partner Spotlight

Get an inside look at what leaders at WWT and CrowdStrike are saying about our partnership
Video
•1:19
•Mar 27, 2024

Overview: ExtraHop Reveal(x) + CrowdStrike Falcon

Integrate with CrowdStrike Falcon to enhance endpoint detection and response with the network detection and response capabilities of ExtraHop Reveal(x) 360. With this integration, you can import threat intelligence files to detect and annotate indicators of compromise in your environment.
Video
•2:59
•Nov 7, 2023

Inside the MITRE ATT&CK Evaluation

CrowdStrike shares a look into the latest MITRE ATT&CK Evaluation, where the Falcon Complete service had the highest detection coverage of all participating vendors, detecting 75 of the 76 adversarial techniques.
Video
•6:18
•Aug 3, 2023

CrowdStrike

CrowdStrike solutions help strengthen security posture for customers, with machine learning, AI, and proactive threat hunting providing an easy turnkey solution.

98 Followers

At a glance

42Total
13Articles
10Videos
6Blogs
6Labs
3Briefings
2Case Studies
2Learning Paths
What's related
  • Security
  • Endpoint Security
  • Security Operations
  • Cloud
  • Cloud Security
  • ATC
  • AI Security
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Blog
  • CrowdStrike Falcon Insight
  • Network Security
  • CrowdStrike Falcon X
  • Identity and Access Management
  • Financial Services
  • AI & Data
  • Applied AI
  • Cloud Marketplace
  • Consulting Services
  • Cyber Resilience

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies