Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

13 results found

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

Creating the Perfect Pizza Kitchen for Little Caesars

WWT built an app that made it easier for employees to make the right decisions at the right time, and empowers them to deliver on Little Caesars' patented Hot-N-Ready promise.
Case Study

Retail Banking: Transforming Legacy Infrastructure

Transform legacy infrastructure to a resilient, agile environment to both prevent and survive cyber extinction level events.
Case Study

Analytics Organization Develops Vulnerability Management Program for PCI Compliance

A data analytics organization in jeopardy of failing a PCI audit tapped WWT to create a vulnerabilities management program.
Case Study

Manufacturer Recovers From Costly Ransomware Attack

WWT leverages partnership with security firm CyFIR to help customer remediate ransomware attack and strengthen security hygiene.
Case Study

Healthcare Organization Performs Security Assessment for HIPAA Compliance

The security risk assessment encompassed a vulnerability assessment of more than 8,000 IP addresses, a network architecture review and a technical risk assessment.
Case Study

Manufacturer Uses Risk Assessment to Protect IT and OT Assets

A global manufacturing company faced with implementing a security plan enlisted WWT to be their trusted advisor, conduct a risk assessment and help navigate the OEM landscape.
Case Study

Pharmaceutical Manufacturer Accelerates OT Security

WWT brings visibility to assets, traffic flows, and interdependencies of critical systems and processes within manufacturing plants.
Case Study

Global Financial Services Organization Seeks Unified Security Policy

A financial services organization interested in enforcing a unified security policy turned to WWT to perform a TrustSec proof of concept.
Case Study

Encryption Strategy Matures Security Posture for National Insurer

WWT's recommended solution addresses gaps in certificate management and data classification and provides an encryption strategy for a large insurer.
Case Study

Virtual CISOs Mature Cybersecurity Programs Across Industries

Clients from healthcare, manufacturing and financial services see the benefits of working with WWT's Virtual CISO consultants.
Case Study

Large Technology Distributor Performs Penetration Test to Measure Effectiveness of IT Controls and Identify Potential Vulnerabilities

A large technology distributor looking to improve their security posture performed penetration testing to secure their exposed assets.
Case Study

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1116 Followers

At a glance

217Total
75Blogs
54Articles
24Videos
22Events
13Case Studies
8Learning Paths
7Briefings
6Labs
3Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Cyber Resilience
  • Network Security
  • AI & Data
  • What we do
  • Cloud
  • Consulting Services
  • Cloud Security
  • Applied AI
  • Fortinet
  • Cisco
  • Endpoint Security
  • ATC
  • Financial Services
  • Data Security
  • Healthcare

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies