Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

Upcoming and on-demand events

Online or in person, WWT offers a variety of events to collaborate, connect and grow in the digital world.

Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR

Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am

AI for Security vs Security for AI with Palo Alto Networks

Join WWT and Palo Alto Networks for an insightful discussion about how AI is transforming organizations and reshaping today's cybersecurity landscape. Learn how Palo Alto Networks comprehensive platform approach combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure every aspect of AI usage from development to deployment and beyond.
Webinar
Feb 26, 2026 • 9am

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
Aug 21, 2025 • 10am

Hands-On Lab Workshop: LLM Security

In this event, you will gain the knowledge and tools to identify, mitigate, and prevent security risks, strengthening the reliability and security of your AI systems. WWT's Prompt Injection and Training Data Poisoning labs help users understand and defend against two major LLM security threats. The Prompt Injection Lab demonstrates how attackers manipulate LLMs with deceptive inputs to extract sensitive data or execute unintended actions, while the Training Data Poisoning Lab explores how corrupting training or retrieval data can introduce biases , vulnerabilities, or backdoors.
Webinar
Mar 13, 2025 • 11am

Securing AI Transformation with WWT's Jim Kavanaugh and Cisco's Jeetu Patel

As AI adoption accelerates across industries, businesses face unprecedented challenges in securing their AI-driven transformations. In this exclusive fireside chat, Cisco EVP and Chief Product Officer Jeetu Patel and WWT Co-founder and CEO Jim Kavanaugh discuss the latest breakthroughs in AI security and how enterprises can more confidently innovate while safeguarding their AI applications. Jeetu and Jim will also explore the global landscape and its impact on the future of enterprise AI; provide practical guidance on how to craft an AI strategy that balances the need for speed with the necessity of caution; and talk about emerging AI solutions and how they can integrate into your IT strategy.
Webinar
Mar 5, 2025 • 9am

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

796 Followers

At a glance

202Total
74Blogs
52Articles
18Labs
16Videos
14Learning Paths
9Case Studies
9Events
4WWT Research
3Briefings
2Workshops
1Community
What's related
  • Security
  • Blog
  • Cybersecurity Risk & Strategy
  • AI Security
  • ATC
  • Network Security
  • Endpoint Security
  • Cyber Range
  • Cloud
  • Cloud Security
  • CrowdStrike
  • Cyber Resilience
  • OT Security
  • Palo Alto Networks
  • What we do
  • AI & Data
  • Data Security
  • Whole-of-state cybersecurity
  • Fortinet
  • Networking

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies