Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

20 results found

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Cloud, FinOps and AI: What You Need to Know About Unit Economics, GPUs and the ROI Flywheel

AI has pushed cloud into overdrive. In this episode of the AI Proving Ground Podcast, two of our top cloud experts — Jack French and Todd Barron — reset the approach and detail why cloud is the launchpad but portability is the strategy; how to start greenfield with containers and abstraction; what a real FinOps model for AI looks like (unit economics, tagging, token/GPU visibility); where neo clouds fit versus hyperscalers; and how to handle cross-cloud risk and skill gaps; and the governance moves that accelerate—not restrict—innovation.
Video
•1:38
•Oct 14, 2025

Cisco Secure Cloud Control Lightboard Overview

Take a look at Cisco's new management tool that combines security controls for the cloud, services edge, applications, and large language models under a single view.
Video
•9:51
•Apr 8, 2025

Parter POV | Generative AI, Predictive AI and the CISO

Cloud Security Bootcamp 2024: AI in Cloud Security with Frank Dickson, Group VP of Security & Trust, IDC and presented by Sentinel One.
Video
•32:10
•Sep 26, 2024

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

CNAPP Explained: Simplifying Cloud-Native Security

In this lightboard session, we will take a look at the fundamental components of a Cloud-Native Application Protection Platform (CNAPP) to understand how it consolidates your cloud security architecture. You will see a breakdown of how Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), and Cloud Infrastructure Entitlement Management (CIEM) work together to provide a unified view of your environment and prioritize the most important issues first.
Video
•9:07
•Feb 13, 2026

Partner POV | Deep Instinct DSX for Cloud

DSX for Cloud – Amazon S3 prevents bad actors from breaching your cloud and hybrid-cloud storage and roots out lurking, unexecuted malware.
Video
•3:02
•Dec 16, 2024

Illumio Insights Overview

Cyber attackers are no longer just at the gates; they're already inside, moving stealthily across your complex hybrid multi-cloud environment. Traditional security tools flood you with data but lack the context needed to connect the dots, leaving attackers free to roam, steal data, and disrupt operations. Enter Illumio Insights, the first cloud detection and response solution built on the AI security graph. This breakthrough in AI-enriched observability, detection, and containment transforms traffic and workload data into actionable intelligence. Agentless and quick to deploy, it provides AI-enriched context for all resources, flows, and workloads, allowing you to dynamically quarantine threats with a single click. Built for cloud scale, Illumio Insights doesn't just find a needle in a haystack but every needle in every haystack, ensuring you have the answers you need.
Video
•1:23
•Jan 13, 2026

Partner POV | Secure everything you build and run in the cloud

Wiz is a new model for doing cloud the right way where Development, Security, and Operations teams work together to build your cloud faster and securely.
Video
•1:40
•May 24, 2024

Network Access Control- 802.1X Lightboard

Walk through how 802.1X works on a network. What role the supplicant, authenticator, and authentication server play in 802.1X. How to deploy 802.1X, and recommendations for EAP (Extensible Authentication Protocol) in a network.
Video
•12:23
•Apr 8, 2025

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

SentinelOne's Singularity Cloud Security Overview

Blocking an Attack in Under One Minute
Video
•1:39
•Sep 9, 2025

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1153 Followers

At a glance

169Total
58Blogs
43Articles
21Labs
20Videos
12Learning Paths
8Case Studies
3Events
2Assessments
2Workshops
What's related
  • Cloud
  • Security
  • Blog
  • ATC
  • Network Security
  • AI Security
  • Security Operations
  • Cloud Strategy and Adoption
  • Cybersecurity Risk & Strategy
  • AWS
  • Cloud Networking
  • Data Security
  • Networking
  • Wiz
  • Application & API Security
  • Automation
  • Cisco
  • F5
  • Google Cloud
  • Endpoint Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies