Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore

Select a tab

1 result found

Basics and Breakthroughs: How State and Local CISOs Can Walk the Line

State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Senior Consulting Security Architect, as they explore how CISOs can shine in a landscape characterized by basics and breakthroughs.  
Video
•1:21
•Mar 31, 2025

Whole-of-state cybersecurity

Protect critical systems and citizen data across agencies, institutions and communities with a unified approach to cybersecurity.

1 Follower

At a glance

33Total
16Labs
15Learning Paths
1Blog
1Video
What's related
  • Security
  • ATC
  • Cyber Range
  • Network Security
  • Security Operations
  • Endpoint Security
  • Cloud
  • Cloud Security
  • Okta
  • Palo Alto Networks
  • Cybersecurity Risk & Strategy
  • Data Center
  • Data Protection & Cyber Recovery
  • Identity and Access Management
  • Rubrik
  • Zscaler
  • Armis
  • Cisco
  • Cisco Security
  • CrowdStrike

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies