Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

Upcoming and on-demand events

Online or in person, WWT offers a variety of events to collaborate, connect and grow in the digital world.

Building Cyber Resilience: Leveraging Cohesity's Advanced Data Protection Solutions

Join us for an insightful session on enhancing your organization's cyber resilience with Cohesity's advanced data protection solutions. This event will delve into strategies for safeguarding workloads against cyber threats, focusing on the integration of IT and security operations to deliver robust cyber resilience. Learn how Cohesity's unique approach can help your organization anticipate, withstand, and recover from cyber incidents, ensuring business continuity and data integrity.
Webinar
•Apr 2, 2026 • 9am

Unlocking Cyber Resilience: HPE Zerto Cyber Vault and Ransom Recovery

This event will delve into the critical aspects of cyber resilience, focusing on the HPE Zerto Cyber Vault's capabilities in combating ransomware threats. As cyberattacks grow in sophistication, enterprises need robust solutions to ensure rapid recovery and continuity. Our experts will explore how HPE Zerto's decentralized architecture and air-gapped recovery can dramatically reduce downtime and meet compliance needs. Attendees will gain insights into the architecture's core pillars and learn how to leverage these technologies to protect their organizations from the growing threat of ransomware.
Webinar
Mar 19, 2026 • 9am

Ransomware, Recovery and Resilience: How Commvault and Pure Storage Simplify Cyber Recovery

The enterprise data landscape has changed dramatically. Ransomware is no longer a distant risk — it's the defining challenge distorting how organizations think about backup, recovery, and resilience. At the same time, data volumes are exploding, regulatory pressure is intensifying, and cyber insurance carriers are raising the bar on what a "viable recovery plan" looks like.
Webinar
Sep 25, 2025 • 9am

🎤 MicDrop - Rubrik CTF

The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations. Features highlighted include: ✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience. ✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats. ✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis. ✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance. ✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
May 15, 2025 • 10am

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
Mar 20, 2025 • 11am

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

910 Followers

At a glance

151Total
52Articles
33Blogs
24Videos
13Learning Paths
9Case Studies
9Events
8Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Cohesity
  • Commvault
  • Blog
  • Dell Tech
  • Rubrik
  • AI & Data
  • Cloud
  • Dell Data Protection
  • Cloud Security
  • Commvault Cyber Resilience
  • Data Security
  • Applied AI
  • Primary Storage
  • Cohesity Data Protection
  • Dell PowerProtect
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies