Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

26 results found

Former NSA Cyber Director on the Emerging AI Threat Landscape

AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026

Cyber Resilience: Why Security Fails When It Matters Most

Your organization didn't avoid a cyberattack — it endured one. That distinction matters more than most leaders realize. In this WWT Presents Research episode, we push back on the outdated idea that cybersecurity is about keeping attackers out. Instead, cyber resilience assumes compromise and focuses on what must keep running when defenses fail. Host Robb Boyd is joined by Madison Horn, WWT's National Security and Infrastructure Advisor, and Rob Joyce, former NSA Cybersecurity Director, to unpack why many organizations recover once — but struggle to recover again.
Video
•1:04
•Feb 16, 2026

Cyber Resiliency Matters

Cyber Resilience is key to an organization's risk management and rapid response strategy. What is it and why is it important? WWT's Jill Cochrane explains here as she discusses why Cyber Resilience is important and makes the case for investments in Cyber Resilience.
Video
•5:36
•Jan 10, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
•Mar 24, 2025

Enterprise Browsers as the New Workplace Experience

The shift from traditional, natively installed applications to web-based SaaS productivity tools has been highlighted by the increasing reliance on browsers as the new workspace. WWT's Andrew Ridner discusses the security limitations of consumer browsers and the introduction of enterprise browsers as purpose-built solutions offering enhanced security, governance and data protection features. Andrew also reviews use cases for enterprise browsers, including security and compliance, and remote and hybrid work. Finally, Andrew reviews improved user experience in banking, healthcare, IT, government and manufacturing sectors.
Video
•6:49
•Feb 9, 2026

Cisco Secure Firewall FTD

In this video Drew Kaiser (WWT Technical Solution Architect) and Nick Carrieri (Cisco SBG's Director of Product Management) take a look at Cisco Firewall Threat Defense and some of the new features available with the latest release.
Video
•9:32
•Jan 13, 2026

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
•Sep 9, 2025

Strengthening Cybersecurity Governance for Business Resilience

In today's evolving threat landscape, cybersecurity governance is no longer just an IT function—it's a business imperative. Regulators demand more than compliance checkboxes; they expect organizations to prove that their security controls work. Join WWT security experts Mario Balakgie and Mike Dombrowski for a deep dive into governance strategies that align security with business objectives, mitigate emerging risks and drive operational resilience. You'll learn how organizations can move from compliance-driven to risk-driven approaches, ensuring faster, smarter decision-making in an interconnected world.
Video
•0:58
•Apr 1, 2025

Fortinet Hardware Refresh: Advice from Security Experts

As the digital landscape evolves, maintaining secure, high-performance infrastructure is critical. Fortinet's upcoming End of Support (EOS) dates for numerous models mark a pivotal moment for IT leaders.
Video
•3:55
•Sep 30, 2025

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
•Feb 11, 2025

Safeguarding Critical Infrastructure on Service Provider Networks | Experts

Hyperscalers and service providers sit on the front lines of an emerging cyber battlefield, where both allies and adversaries are leveraging AI to gain an advantage. Join WWT Senior Vice President Greg Schoeny and Chief Security Advisor Jason Cook as they talk about how service providers can leverage cloud-native applications, distributed workforces and AI to enhance their business agility and customer experience while ensuring they have a robust and resilient cybersecurity posture.
Video
•0:27
•Sep 1, 2024

Secure Voice and Combating Deepfakes

Voice Networks and Voice Security are a powerful tool in combatting the growing threat of deepfakes. WWT's Brandon Echele reviews the key issues around Voice Security including the Voice Network, recent deepfake events, the Anatomy of a Voice Deepfake Fraud and Voice Security and Resiliency.
Video
•11:43
•Jan 10, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1127 Followers

At a glance

211Total
83Blogs
49Articles
26Videos
17Events
13Case Studies
8Labs
8Learning Paths
3Workshops
2Communities
1Briefing
1WWT Research
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Cyber Resilience
  • Network Security
  • ATC
  • AI & Data
  • WWT Presents
  • Cloud
  • Data Security
  • What we do
  • Cloud Security
  • Consulting Services
  • Public Sector
  • Zero Trust
  • Fortinet
  • Cyber Range
  • Endpoint Security
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies