Overview
Explore
Labs
Services
Events
Partners
Select a tab
8 results found
Securing AI Transformation with WWT's Jim Kavanaugh and Cisco's Jeetu Patel
As AI adoption accelerates across industries, businesses face unprecedented challenges in securing their AI-driven transformations. In this exclusive fireside chat, Cisco EVP and Chief Product Officer Jeetu Patel and WWT Co-founder and CEO Jim Kavanaugh discuss the latest breakthroughs in AI security and how enterprises can more confidently innovate while safeguarding their AI applications.
Jeetu and Jim will also explore the global landscape and its impact on the future of enterprise AI; provide practical guidance on how to craft an AI strategy that balances the need for speed with the necessity of caution; and talk about emerging AI solutions and how they can integrate into your IT strategy.
Webinar
•Mar 5, 2025 • 9am
Think Beyond Disaster: Driving Cyber Recovery in the Data Center | Research
As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery.
Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Webinar
•Jul 24, 2024 • 9am
🎤 MicDrop - Rubrik CTF
The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations.
Features highlighted include:
✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience.
✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats.
✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis.
✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance.
✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert
This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•May 15, 2025 • 10am
Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am
Balancing Risk, Recovery and Resiliency with Commvault | Meet the Chief
Cyber resilience has become an executive- and board-level imperative for organizations of all kinds. But how can leaders ensure their businesses can withstand and recover from the inevitable cyber attack?
In this episode of Meet the Chief, Commvault CEO Sanjay Mirchandani details his unique perspective on the evolving nature of cyber resilience, the shift from pure defense to a focus on data protection and rapid recovery, and the need for a unified platform to safeguard all workloads. Sanjay also explores the responsible use of AI in enhancing recovery capabilities and operational excellence, and shares insights related to building a culture of trust and transparency.
Webinar
•Sep 5, 2024 • 9am
Shift Left to Protect APIs with F5 | Partner Spotlight
APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient.
Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
•Aug 22, 2024 • 9am
Accelerating Time to Recovery with Zerto Cyber Resilience Vault | Partner Spotlight
Cyber threats continue to grow in frequency and sophistication, and the adoption of AI is adding to the complexity. Most CISOs are confident they can recover when they are attacked, but accelerating time-to-recovery is a top concern.
Webinar
•Jul 25, 2024 • 9am
Putting Data Protection into Action with Cohesity's DataHawk | Partner Spotlight
With the cyber threat landscape growing more complex each and every day, data protection and cyber resiliency have moved to the forefront of our clients' strategic agendas.
IT decision makers are now highly focused on protecting their crown jewels – often their data – by securing the perimeter of their networks and looking to integrate AI and ML into their models to move into a more proactive defense posture.
It's challenging... but there's good news, too. The innovations taking place in this space provides optimism that as an industry we are rounding the bend on overcoming most of the bad actors who look to exploit and destroy our customers.
Webinar
•Jun 22, 2023 • 9am