Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

What's popular

The Art of Conflict: Cyber at War - How Iran's Retaliation is Shaping Critical Infrastructure and Global Enterprise Risk

Iran's retaliation model signals a period of active cyber probing coupled with sustained infrastructure targeting rather than a one-time shock event.
Blog
•Mar 3, 2026

Manufacturing at the EDGE: SCADA Instrumentation, Model Context Protocol and Agentic Design Patterns

Modern manufacturing is evolving towards data-centric, automated and intelligent systems that require contextualized operational data streaming from IoT-based edge devices converging with IT networks for adaptive real-time decision-making. MCP offers a structured approach to managing and interpreting diverse data streams, while SCADA systems serve as the core industrial instrumentation integrated with agentic methods and advanced inferencing to enhance manufacturing processes.
Blog
•Feb 13, 2026

The WWT Industry Solution Center (WISC), an Introduction

The WWT Industry Solution Center (WISC) is a state-of-the-art facility within WWT's ATC that simulates industrial technology environments to demonstrate the possible ways to digitize, monitor and secure the architecture and its control systems.
Article
•Feb 8, 2024

Cyber Range - CH3M1C41_SP1LL

CH3M1C41_SP1LL (Chemical Spill) is a Red-Team Capture the Flag (CTF) game where you will be the attacker within an Operational Technology (OT) network. You will need to use diverse red-team skills such as network discovery, web application attacks, and password cracking and combine them with OT knowledge to shut down the production of a chemical.
Advanced Configuration Lab
•Advanced
430 launches

Armis Foundation Lab

Armis foundation lab will teach users how to leverage the Armis console to view complete asset visibility across a multitude of environments including On-premise, virtual, cloud, and wireless. It will aslo explore a range of devices and categories seen within the console, starting from a high-level category overview, and then drilling down further to see the device enrichment that is populated for each device. Then, inspecting a device example will show users the wealth of data that Armis can provide for each asset and the activity associated with each one. Users will then experience the simplicity of device enrichment and management that Armis can accomplish passively and without the use of agents.
Foundations Lab
•Fundamentals
293 launches

What's new

S4x26 OT Conference: A Perspective from the WWT OT Security Teams

One of the largest and most advanced ICS cybersecurity events in the world, S4 is where the best and the brightest come together to go deep and paint a future for ICS security. Here, the WWT team gives their candid recollection of this highly esteemed event.
Blog
•Mar 12, 2026

Armis OT Security Lab

Armis OT Security lab will teach users how to explore a range of OT devices and categories seen within the console, starting from a high-level category overview to the Purdue level. Then users will explore how to leverage Armis Query Language to perform investigations. You will also see some of the security capabilities that the Armis platform provides the the Armis Knowledge Base and the Armis Vulnerability Management (AVM).
Advanced Configuration Lab
•Intermediate
•172 launches

Armis: To Catch a Hacker

The Armis to catch a hacker lab will walk users through a realistic exercise based upon real-life incidents with with sophisticated Advanced Persistent Threat (APTs) Actors. These threat actors will move laterally across the network and exploit common visibility gaps to reach their target objectives. This lab will show users how Armis can be leveraged to see this movement.
Advanced Configuration Lab
•Intermediate
•330 launches

Claroty Industrial Control Lab Familiarization

Claroty is monitoring a virtual chemical manufacturing process environment and a simulated substation on a flat network. The environment contains a virtual plant using the MODBUS communications protocol (1 HMI, 1 PLC, 6 I/Os), as well as a Siemens S7-1500 virtual PLC.. This lab enables a user to familiarize and test Claroty's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Foundations Lab
•Fundamentals
•74 launches

NERC CIP-015 Compliance: A "How To" Guide for Power Utilities

NERC CIP‑015‑1 establishes Internal Network Security Monitoring (INSM) requirements for the Bulk Electric System and became effective on September 2, 2025. Compliance for registered U.S. electric utilities follows a phased approach, with completion required between 2028 and 2030, depending on system impact and connectivity.
Blog
•Mar 5, 2026

Cybersecurity as a Safety Imperative in Oil and Gas Operations

Learn best practices for aligning OT cybersecurity with operational safety across upstream, midstream and downstream channels.
WWT Research
•Mar 4, 2026

The Art of Conflict: Cyber at War - How Iran's Retaliation is Shaping Critical Infrastructure and Global Enterprise Risk

Iran's retaliation model signals a period of active cyber probing coupled with sustained infrastructure targeting rather than a one-time shock event.
Blog
•Mar 3, 2026

Cyber Range - CH3M1C41_SP1LL

CH3M1C41_SP1LL (Chemical Spill) is a Red-Team Capture the Flag (CTF) game where you will be the attacker within an Operational Technology (OT) network. You will need to use diverse red-team skills such as network discovery, web application attacks, and password cracking and combine them with OT knowledge to shut down the production of a chemical.
Advanced Configuration Lab
•Advanced
•430 launches

Partner POV | Insights for 2026 from Forescout CEO, Barry Mainz

In 2026, Forescout and partners will tackle accelerated AI-driven threats with Universal Zero Trust Network Access, transforming defense strategies. By embedding operational AI, enhancing visibility, and ensuring quantum readiness, they aim to shift from reactive to proactive security, empowering partners to secure faster and adapt to evolving challenges in a complex digital landscape.
Partner Contribution
•Feb 23, 2026

Partner POV | G7 Sets Quantum Deadline: Roadmap Signals Industry Urgency for All

Quantum computing is here, sparking a race for post-quantum cryptography (PQC) readiness. The G7 roadmap outlines a 2030-2035 migration window, urging organizations to strategize now. Forescout's technology aids in detecting and managing PQC vulnerabilities. Act now to secure your future against this looming threat. The countdown to Q-Day has begun.
Partner Contribution
•Feb 23, 2026

Partner POV | Trellix and Nozomi Networks: Charting the Future of IT/OT Security

The convergence of IT and OT security is essential as digital and physical worlds merge. The Trellix and Nozomi Networks integration offers a unified approach, enhancing asset visibility and threat detection. This partnership provides a blueprint for resilient, proactive defense, crucial for safeguarding critical infrastructure and ensuring safety in an interconnected future.
Partner Contribution
•Feb 17, 2026

Manufacturing at the EDGE: SCADA Instrumentation, Model Context Protocol and Agentic Design Patterns

Modern manufacturing is evolving towards data-centric, automated and intelligent systems that require contextualized operational data streaming from IoT-based edge devices converging with IT networks for adaptive real-time decision-making. MCP offers a structured approach to managing and interpreting diverse data streams, while SCADA systems serve as the core industrial instrumentation integrated with agentic methods and advanced inferencing to enhance manufacturing processes.
Blog
•Feb 13, 2026

Partner POV | The Visibility Gap Undermining OT and IOT Security

Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026

Armis Foundation Lab

Armis foundation lab will teach users how to leverage the Armis console to view complete asset visibility across a multitude of environments including On-premise, virtual, cloud, and wireless. It will aslo explore a range of devices and categories seen within the console, starting from a high-level category overview, and then drilling down further to see the device enrichment that is populated for each device. Then, inspecting a device example will show users the wealth of data that Armis can provide for each asset and the activity associated with each one. Users will then experience the simplicity of device enrichment and management that Armis can accomplish passively and without the use of agents.
Foundations Lab
•Fundamentals
•293 launches

Partner POV | Armis Exposure Management & Security on NVIDIA BlueField-3 DPU

Armis and NVIDIA's collaboration revolutionizes Cyber-Physical System security with an agentless solution on BlueField-3 DPUs. This innovative approach enhances visibility, threat detection, and operational continuity across IT and OT environments, addressing legacy vulnerabilities and sophisticated threats without impacting performance, ensuring robust protection and seamless deployment.
Partner Contribution
•Jan 15, 2026

Closing the Cyber–Physical Gap by Combining Intrusion Detection Systems and Process-Level Monitoring

The post discusses the limitations of Intrusion Detection Systems (IDS) in monitoring network behavior without verifying physical process changes in Operational Technology (OT) environments, emphasizing that combining IDS with process-level monitoring at Level 0 provides comprehensive detection, operational clarity and regulatory compliance by confirming actual physical impacts of cyber incidents.
Blog
•Jan 7, 2026

Partner POV | Fortinet OT Security Platform: Securing Cyber-Physical Systems

Operational Technology (OT) environments are increasingly interconnected, expanding the attack surface and vulnerability. Fortinet's OT Security Platform offers robust solutions, including secure networking, AI-driven operations, and strategic partnerships, to protect critical infrastructure. As OT security evolves, integrating IT and OT systems becomes crucial to mitigate risks and enhance resilience.
Partner Contribution
•Dec 30, 2025

Partner POV | Adapting to Modern Threats: Armis & Fortinet Deliver Measurable Cyber Resilience in OT

The convergence of IT, OT, and cloud systems has expanded attack surfaces, demanding seamless security solutions. Armis Centrix™ and Fortinet's integration offers real-time visibility and adaptive controls, ensuring operational resilience and compliance. This partnership enhances detection, containment, and response, safeguarding critical infrastructures with precision and speed.
Partner Contribution
•Dec 17, 2025

Process-Oriented OT Cybersecurity: The View Beyond the Network

This post discusses the limitations of traditional OT cybersecurity tools that rely on network-layer monitoring, highlighting the risks of compromised control logic and data manipulation at the process layer, and presents SIGA's process-oriented cybersecurity approach using out-of-band electrical signal data and machine learning to provide CISOs with reliable visibility and decision support for operational resilience in critical infrastructure and manufacturing environments.
Blog
•Dec 16, 2025

WWT and Tanium at Converge 2025: Autonomous IT & Unstoppable Partnership

At Tanium Converge 2025, WWT showcased its strategic partnership with Tanium, emphasizing real-time, AI-driven risk management. Key innovations like Tanium Ask and Jump Gate highlight a shift towards Autonomous IT, enhancing operational efficiency and security. Together, WWT and Tanium empower organizations to transition from reactive to proactive IT management.
Blog
•Nov 24, 2025

OT Security

As industrial control systems (ICS) converge with enterprise networks and traditional IT environments, operational technology (OT) security helps ensure the safety and integrity of industrial operations including IoT assets that help control and monitor these environments.

227 Followers

At a glance

55Total
16Articles
16Blogs
8Case Studies
6Labs
4Learning Paths
2Events
2Videos
1WWT Research
What's related
  • Security
  • Security Operations
  • Armis
  • Digital
  • Internet of Things (IoT)
  • Cybersecurity Risk & Strategy
  • Manufacturing
  • ATC
  • Blog
  • AI Security
  • Network Security
  • asd-cyber-ioot
  • Cyber Range
  • Cloud
  • Cloud Security
  • Fortinet
  • Healthcare
  • Data Security
  • Endpoint Security
  • Zero Trust

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies