Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

7 results found

Think Beyond Disaster: Driving Cyber Recovery in the Data Center | Research

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Webinar
•Jul 24, 2024 • 9am

🎤 MicDrop - Rubrik CTF

The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations. Features highlighted include: ✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience. ✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats. ✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis. ✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance. ✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•May 15, 2025 • 10am

Securing AI Transformation with WWT's Jim Kavanaugh and Cisco's Jeetu Patel

As AI adoption accelerates across industries, businesses face unprecedented challenges in securing their AI-driven transformations. In this exclusive fireside chat, Cisco EVP and Chief Product Officer Jeetu Patel and WWT Co-founder and CEO Jim Kavanaugh discuss the latest breakthroughs in AI security and how enterprises can more confidently innovate while safeguarding their AI applications. Jeetu and Jim will also explore the global landscape and its impact on the future of enterprise AI; provide practical guidance on how to craft an AI strategy that balances the need for speed with the necessity of caution; and talk about emerging AI solutions and how they can integrate into your IT strategy.
Webinar
•Mar 5, 2025 • 9am

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am

Accelerating Time to Recovery with Zerto Cyber Resilience Vault | Partner Spotlight

Cyber threats continue to grow in frequency and sophistication, and the adoption of AI is adding to the complexity. Most CISOs are confident they can recover when they are attacked, but accelerating time-to-recovery is a top concern.
Webinar
•Jul 25, 2024 • 9am

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
•Aug 22, 2024 • 9am

Putting Data Protection into Action with Cohesity's DataHawk | Partner Spotlight

With the cyber threat landscape growing more complex each and every day, data protection and cyber resiliency have moved to the forefront of our clients' strategic agendas. IT decision makers are now highly focused on protecting their crown jewels – often their data – by securing the perimeter of their networks and looking to integrate AI and ML into their models to move into a more proactive defense posture. It's challenging... but there's good news, too. The innovations taking place in this space provides optimism that as an industry we are rounding the bend on overcoming most of the bad actors who look to exploit and destroy our customers.
Webinar
•Jun 22, 2023 • 9am

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

888 Followers

At a glance

170Total
69Articles
30Blogs
30Videos
11Learning Paths
10Labs
9Case Studies
7Events
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • Commvault
  • ATC
  • Blog
  • Cloud
  • Dell Tech
  • AI & Data
  • Cohesity Data Protection
  • Rubrik
  • Dell Data Protection
  • Primary Storage
  • Cloud Security
  • Cloud Data Management
  • Cohesity Cyber Resilience
  • WWT Presents
  • Applied AI
  • Dell Public Sector

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies