Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

7 results found

Welcome To The League CTF

How to Begin (DAY OF CTF): 1. Watch the introduction video from Mal by clicking "Launch Event". 2. Click "Launch Gamespace" to launch the CTF and access your Player Desktop. 3. Double-click the "README.txt" file on your Player Desktop for further instructions. Step into the world of advanced cybersecurity in our Cyber Range CTF game, "Welcome to the League". This event is tailored for individuals ready to push their red skills to the limit. Participants will engage in a series of sophisticated challenges designed to test their abilities in Active Directory enumeration, privilege escalation, and post-exploitation techniques. Do you have what it takes to join The League? This game takes around 8 hours to complete and will be accessible for a full 24-hour period, allowing players to log in and progress at their own pace. With state-saving functionality, participants can pause and resume their gameplay without losing progress, ensuring a flexible and engaging experience.
Cyber Range
•Mar 18, 2026 • 9am

Hands-On Lab Workshop: Palo Alto NGFW Foundations Version 10

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Palo Alto NGFW Foundations Version 10 lab. This lab is designed designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure. This one-hour event is limited to 60 participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the host for a hands-on experience.
Webinar
•Oct 14, 2024 • 2pm

🔍 Haystack CTF: The Hunt for IOC's

Immerse yourself in the world of Intrusion Detection in our Cyber Range Blue Team Capture The Flag (CTF) game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss!
Cyber Range
•Apr 24, 2025 • 9am

Consolidation and Automation, Not Complication | Simplify Your Security Strategy

Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join experts from WWT and Palo Alto Networks as they discuss the value of adopting a platform approach that focuses on integration, visibility, and real-time monitoring to simplify security operations. This session will provide an overview of Palo Alto's platform strategy and WWT's Security Tools Rationalization process to identify technology gaps and overlaps.
Webinar
•May 2, 2024 • 1pm

Empowering Security: Cisco's AI-Driven Future

Join us for an insightful conversation with Tom Gillis, SVP and General Manager, Cisco Security, Data Center, Internet and Cloud Infrastructure, as we explore the evolving cybersecurity landscape for 2025. We'll discuss the latest trends in AI-driven threats, the importance of integrated security solutions across the tech stack, and how Cisco's firewall models and Hypershield are shaping the future of defense strategies. Don't miss this opportunity to learn from a leading industry expert on how to stay ahead of emerging threats and safeguard your organization's data.
Webinar
•Jan 30, 2025 • 9am

Securing AI for Healthcare and Life Sciences

In the rapidly evolving landscape of Life Sciences & Healthcare cybersecurity, the role of a Chief Information Security Officer (CISO) has never been more challenging. According to Gartner, 80% of CIOs plan to increase their cybersecurity investments in 2024. This increase is driven by the expanding attack surface, increase in scope and public visibility to ransomware incidents, and the rapid proliferation of generative AI (GenAI) use cases, which introduce new and unknown risks. As AI adoption grows, so too do the security challenges it presents. But how can security teams support safe innovation while mitigating new risks?
Webinar
•Aug 14, 2024 • 11am

How to Enhance Network Performance and Security With Graphiant's Khalid Raza – the 'Father' of SD-WAN | Meet the Chief

From data security models to AI-driven threat detection, Graphiant is at the forefront of modern network solutions. In this episode of Meet the Chief, we talk with Graphiant CEO Khalid Raza – widely recognized as the 'father' of SD-WAN – about the pivotal roles of AI and data exchanges and how these are set to revolutionize network management and performance. Khalid also discusses the need to secure critical infrastructure.
Webinar
•Aug 21, 2024 • 9am

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1166 Followers

At a glance

186Total
61Blogs
47Labs
26Articles
19Videos
10Case Studies
10Learning Paths
7Events
4Workshops
2Briefings
What's related
  • Security
  • ATC
  • Cyber Range
  • Blog
  • Cloud
  • Networking
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Endpoint Security
  • Fortinet
  • Cisco Security
  • Application & API Security
  • Palo Alto Networks
  • Zero Trust
  • AI Security
  • Whole-of-state cybersecurity
  • Cisco Secure Firewall
  • Cisco Network Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies