Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

18 results found

Emerging and International Security Risk: Executive Perspectives

A rapidly evolving threat landscape is putting security leaders and their teams on their heels. Cyber attacks, AI, nation-state bad actors, regulatory changes — the list is growing by the day. Watch WWT's Vice President of Global Cybersecurity Chris Konrad as he hosts an executive discussion with Dave DeWalt (Founder and CEO of NightDragon), Rob Joyce (former Director of Cybersecurity for the NSA) and Kate Kuehn (WWT's Global Head of Cybersecurity Advocacy) as they explore strategies for government collaboration, board preparation and future cybersecurity challenges. They'll provide actionable advice for organizations to enhance their resilience against current and future cyber threats.​
Video
•1:45
•Nov 19, 2024

Adopt a Hacker Mentality to Stay Ahead of the Cyber Curve | Experts

Today's threat landscape is broader than ever and cyberattacks are growing in volume and sophistication each and every day. In fact, hackers are launching new assaults at a clip of greater than one every minute of the day. Yet an alarming number of business leaders feel ill-prepared in the event a cyberattack hits their company. How can this be given the stakes involved? Join WWT Cyber Range Architect Brett Turner as he discusses what cyber threats pose the greatest risks to organizations this year and how companies can best address the expanding talent gap taking place in the cyber industry. Brett also talks about what it takes to become an ethical hacker and why dynamic, live-fire cyber exercises called Cyber Ranges could be your best bet to standing up to cyber criminals moving forward.
Video
•0:17
•Dec 17, 2024

Wiz Operating Platform Demo

Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
•10:12
•Oct 30, 2024

Partner POV | Enhancing Security with WWT, ExtraHop and Gigamon

The newest Power of 3 offering features channel partner WWT and leading network security company ExtraHop to provide customers with real-time, precise threat detection by integrating the ExtraHop network detection and response (NDR) platform RevealX™ with the Gigamon Deep Observability Pipeline, sold and serviced by WWT.
Video
•43:28
•Sep 16, 2024

CrowdStrike: Falcon Next-Gen SIEM

In a world of stealthy, fast-moving threats and ever-increasing log volumes, defenders need an edge that's orders of magnitude faster, smarter, and more scalable than current approaches. Watch this video to see how to detect and stop the adversary Alpha Spider quickly with CrowdStrike Falcon Next-Gen SIEM.
Video
•3:01
•Apr 3, 2024

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

Meeting Today's Modern Endpoint Security Requirements

Reduce your cyber risk despite an industry-wide shortage of cybersecurity professionals.
Video
•1:07
•May 17, 2023

Partner POV | CrowdStrike: Falcon ASPM

CrowdStrike Falcon Application Security Posture Management (ASPM) extends visibility beyond endpoints and cloud and automatically prioritizes the most impactful risks.
Video
•2:17
•Jul 2, 2024

Partner POV | Gen AI- Powered XDR

Minutes matter — Shut down threat actors and mobilize your response using our open, AI-powered XDR Platform.
Video
•3:25
•Aug 16, 2024

IBM's Security QRadar Suite: AI-powered Cyberthreat Solutions for Enterprises

AI-powered Cyberthreat Solutions for Enterprises
Video
•3:35
•Aug 28, 2023

QRadar XDR Live on CP4S SaaS Platform

See It - SOAR-XDRC- Ransomware Watch a video demonstration of the IBM QRadar Ransomware use case being delivered
Video
•41:24
•Apr 14, 2023

CrowdStrike: Falcon LogScale

We've always said, "You don't have a malware problem, you have an adversary problem." Watch to find out how to detect, investigate and hunt for advanced adversaries with Falcon LogScale. You'll see firsthand how Falcon LogScale accelerates security operations to stop breaches with petabyte-scale log management and lightning-fast search that's up to 150x faster than traditional SIEMs
Video
•2:28
•Jan 8, 2024

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

771 Followers

At a glance

166Total
57Blogs
38Articles
18Videos
15Labs
11Learning Paths
9Case Studies
8Events
5Briefings
3Workshops
1Community
1WWT Research
What's related
  • Security
  • Cybersecurity Risk & Strategy
  • Blog
  • Network Security
  • ATC
  • Endpoint Security
  • AI Security
  • Cyber Range
  • Cloud Security
  • Cloud
  • Palo Alto Networks
  • What we do
  • Cyber Resilience
  • Consulting Services
  • CrowdStrike
  • Cisco
  • OT Security
  • AI & Data
  • Cisco Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies