Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

7 results found

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am

Securing AI Transformation with WWT's Jim Kavanaugh and Cisco's Jeetu Patel

As AI adoption accelerates across industries, businesses face unprecedented challenges in securing their AI-driven transformations. In this exclusive fireside chat, Cisco EVP and Chief Product Officer Jeetu Patel and WWT Co-founder and CEO Jim Kavanaugh discuss the latest breakthroughs in AI security and how enterprises can more confidently innovate while safeguarding their AI applications. Jeetu and Jim will also explore the global landscape and its impact on the future of enterprise AI; provide practical guidance on how to craft an AI strategy that balances the need for speed with the necessity of caution; and talk about emerging AI solutions and how they can integrate into your IT strategy.
Webinar
•Mar 5, 2025 • 9am

Hands-On Lab Workshop: LLM Security

In this event, you will gain the knowledge and tools to identify, mitigate, and prevent security risks, strengthening the reliability and security of your AI systems. WWT's Prompt Injection and Training Data Poisoning labs help users understand and defend against two major LLM security threats. The Prompt Injection Lab demonstrates how attackers manipulate LLMs with deceptive inputs to extract sensitive data or execute unintended actions, while the Training Data Poisoning Lab explores how corrupting training or retrieval data can introduce biases , vulnerabilities, or backdoors.
Webinar
•Mar 13, 2025 • 11am

Consolidation and Automation, Not Complication | Simplify Your Security Strategy

Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join experts from WWT and Palo Alto Networks as they discuss the value of adopting a platform approach that focuses on integration, visibility, and real-time monitoring to simplify security operations. This session will provide an overview of Palo Alto's platform strategy and WWT's Security Tools Rationalization process to identify technology gaps and overlaps.
Webinar
•May 2, 2024 • 1pm

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
•Aug 22, 2024 • 9am

Hands-On Lab Workshop: Cisco XDR Foundations

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Cisco XDR Foundations. In this Live Lab event you will learn the basics about Cisco's XDR console and how to navigate through the many tools available to an analyst. Our Cisco XDR Foundations lab highlights the importance of having an XDR solution by showcasing the necessary tools an analyst will need to help your organization defend against cyber security threats.
Webinar
•Nov 21, 2024 • 10am

Hands-On Lab Workshop: Palo Alto NGFW Foundations Version 10

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Palo Alto NGFW Foundations Version 10 lab. This lab is designed designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure. This one-hour event is limited to 60 participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the host for a hands-on experience.
Webinar
•Oct 14, 2024 • 2pm

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

787 Followers

At a glance

178Total
69Blogs
41Articles
19Videos
16Labs
11Learning Paths
9Case Studies
7Events
3Briefings
2Workshops
1Community
What's related
  • Security
  • Blog
  • Cybersecurity Risk & Strategy
  • Network Security
  • AI Security
  • ATC
  • Endpoint Security
  • Cyber Range
  • Cloud
  • Cloud Security
  • CrowdStrike
  • Cyber Resilience
  • Palo Alto Networks
  • OT Security
  • What we do
  • Whole-of-state cybersecurity
  • AI & Data
  • Cisco
  • Consulting Services
  • Data Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies