TEC37 Security: Would Zero Trust Have Prevented the SolarWinds Breach?
Zero Trust is a framework that combines Identity and Access Management (IAM), Enterprise Segmentation and other security components to provide “least access” protection to corporate networks and resources. WWT Cybersecurity architects Steve Brodson, Ricky Boyd and Ken Dunham join host Robb Boyd to discuss the key ways in which a Zero Trust Architecture could have protected against the Solar Winds-based attacks that made the news in December.
RecordedJun 3 202145 mins
Your place is confirmed, we'll send you email reminders
Many CISOs struggle with where to begin when adopting agile principles within cybersecurity. We will discuss four recommendations to jumpstart adoption.
WWT Global executive leaders Chris Konrad, Kent Noyes and John Evans join host Robb Boyd to discuss the key ways in which adopting an agile workflow for cybersecurity can lead to a more efficient environment through process consistency, enhanced project visibility and team collaboration across the business.
One of the biggest points of consideration when adopting a Cloud strategy is how to best integrate with existing, on-premises infrastructure and workloads. In this TEC37 encore episode, our experts share how Google Cloud VMware Engine allows extended and standalone VMware-based environments while realizing the inherent benefits associated with consuming Public Cloud infrastructure. This allows for accelerating Public Cloud strategies and modernizing infrastructure and applications without the need for new tooling and skillsets.
Robb Boyd, Tanner Bechtel, Arsalan Lari, Ben Haddox (AppDynamics)
In this TEC37, we are taking a technical dive into the AIOps & APM space, bringing in experts to discuss our partnerships and the technical complexities we deal with in today's world. In this episode, our technical experts will take a deep dive into your AIOps journey. You will walk away knowing that what WWT has developed in the AIOps space is real. You will gain understanding about the thought process and behind the scenes collaborations & integrations that only WWT can deliver.
Robb Boyd; Jennifer Huber; Steven Buhler; Keith Parsons (Wireless LAN Professionals, Inc.)
It’s not a question of if your organization will move to a Wi-Fi 6 infrastructure but rather when. While the market has touted the speeds and feeds of Wi-Fi 6, little has been said about how organizations should prepare for a successful Wi-Fi 6 deployment. Join host Robb Boyd as he speaks with WWT’s Jennifer Huber, Technical Solutions Architect; Steven Buhler, Business Development Manager; and special guest Keith Parsons, Managing Director of the Wireless LAN Professionals, Inc. They’ll discuss the foundational components that need to be in place before Wi-Fi 6 deployment, including common blind spots.
We’re at the dawn of a new breed of applications that will unlock the potential of Industry 4.0 —a fourth industrial revolution that will make the enterprise more agile, aware, efficient, intelligent, safe and sustainable. Industry 4.0 is enabled by critical technologies that are each reaching peak maturity at the same time. When these technologies work cohesively and are supported by modern connectivity like private LTE and 5G, massive companies can move at the speed of a startup while maintaining their brut market strength while meeting their internal needs. Host Robb Boyd talks to WWT’s Dan Graham, Don Rogers and Jason Craig to discuss Industry 4.0, how it works, who can piece it together and how it paves the way for a wave of new Fortune 500 companies.
Robb Boyd; Sean Hicks; Jason Lamb (Intel); Pat Dooley (Dell EMC); James Harless
In this TEC37 encore, we explore why many organizations hesitate to take a single-vendor approach when implementing a software-defined data center (SDDC) due to fear of vendor lock-in. Vendor lock-in can occur when an organization exclusively depends on one vendor for products or services, making them unable to use another vendor without significant switching costs. While the concern around vendor lock-in is valid and should generally be avoided, SDDC is an exception to this rule because of its focus on the software layer and the importance of choosing infrastructure components that best support the software platform. Join host Robb Boyd as he speaks with WWT’s Sean Hicks and James Harless — Technical Solutions Architects, Intel’s Jason Lamb — Cloud Solutions Strategist, and Dell’s Pat Dooley — HCI Specialist. They’ll discuss why a single-vendor approach might be your best move for an optimal SDDC environment.
In today’s ever-evolving age of digital transformation, an opportunity to leverage new emerging technology likely also means having to address another unforeseen security obstacle. From application modernization, to data privacy and governance, to the skyrocketing rise of ransomware attacks, government agencies are constantly having to pivot in their security strategy in response to the next big adversarial challenge. In this episode of WWT’s Public Sector Tech Talk Series, we will be joined by Nutanix to discuss how adopting a hyper-converged architecture in a multicloud environment can benefit agencies in their journey to digital transformation.
In this TEC37 recast, we explore the relationship between cybersecurity and the business. For years, cybersecurity has been viewed by C-level leadership as cost center. But as cyber attacks grow in sophistication and scale, organizations need to start viewing security threats as business threats and security strategy an integral part of business success. Join host Robb Boyd as he speaks with WWT's Todd Neilson, Global Director of Security Services, and Gregory Schoeny, VP of Services and Strategic Solutions for Global Service Providers. They’ll discuss how cybersecurity can become a business enabler.
As the country shifts from pandemic response to pandemic recovery, some of the remote work posture from 2020 will remain for 2021 and beyond. The past year has allowed organizations to test, at scale, massive telework initiatives to continue working uninterrupted from homes far outside the office. This event focuses on the implications around enabling a more mobile workforce and what the future of work looks like for government agencies.
Businesses need secure, reliable networks more than ever before. But, with today’s hybrid cloud architectures, maintaining a high-performing and secure network requires a broad view across IT domains. Relying on a hodgepodge of narrowly focused, siloed performance monitoring tools does not provide the depth needed to diagnose complex network performance problems. Tune in to this Public Sector Tech Talk as our experts discuss Network Visibility and what you should be doing to protect it.
Aparna Kumar, Mike Malaret (Veritas), Ernie Bergan (Veritas)
Now more than ever, government agencies at all levels are looking to update their IT strategy in order to achieve agility and success while continuing to lower costs, increase results and remain compliant. Tune in to this Public Sector Tech Talk to learn how to leverage metadata analytics to create a strategy for your IT environment that allows your organization to thrive in today’s IT world. We’ll discuss how metadata analytics can help to optimize storage and costs, mitigate risks, and streamline backup compliance to overall elevate your IT infrastructure.
Cyber attacks against government agency and critical infrastructure networks are at an all-time high. Whether conducted by large-scale nation-state actors or “lone wolf” hackers, the data and information that resides in these networks is mission-critical and must be protected. With the release of the Cyber Executive Order (EO) in May and the $9.8 billion FY22 budget request for cybersecurity funding – just for federal civilian agencies – the Biden Administration is taking cybersecurity seriously. But what can agencies do when the inevitable happens? How can they most efficiently and effectively recover after a breach or attack? This episode focuses on cyber resiliency and the actions agencies can take to recover quickly.
Robb Boyd; Chris Konrad; Stephen Gregory; Scott Webb
As threats to organizations’ data environments become more sophisticated and persistent, the need to prevent and rapidly recover from adverse cyber events has become critical. The right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running. In this episode, you’ll hear about how the right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running.
Robb Boyd; Tanner Bechtel; Chris Weis; Neil Anderson
In this TEC37 encore, join host Robb Boyd and WWT’s Tanner Bechtel, Chris Weis and Neil Anderson as they discuss how WWT has developed a true AIOps reference architecture, and a strategy that leverages a multi-product and product agnostic approach to an AIOps Ecosystem. You will walk away with a better understanding of how WWT has built a real architecture around AIOps and how to take the next step in your AIOps journey. This team will help answer the question, “How do we make these silos work better together?” and give insight into what has been built in WWT’s Advanced Technology center.
Businesses moving forward with an AI strategy need to ensure the security of those AI models is part of that strategy. In this TEC37 episode, we revisit issues in AI model security for the organization and suggest approaches for identifying and closing gaps in defending AI models. We will also touch on the importance of building a robust, mature, and repeatable program for assessing AI model vulnerabilities.
COVID took most organizations by surprise. Companies that had previously ignored cloud technology and strategy became increasingly disrupted. Even companies in the process of digital transformation — while better positioned than most — were unprepared for the magnitude of the challenge. As organizations increasingly accept that COVID is a longer-term challenge, they also have a chance to appreciate the pandemic’s silver lining: enabling “work from anywhere” and accelerating technology modernization across all parts of the business — even those areas previously not considered. In this TEC37 episode, we will discuss how many customers had to pause certain initiatives, reappropriate budgets to meet changing demands, and scramble to enable services to maintain even minimum levels of business operations.
Ansible and Terraform are some of the leading tools for automating infrastructure and driving infrastructure as code. In this episode our experts from each side will discuss the foundations for a successful automation strategy and where each tool fits in a larger automation strategy.
In this TEC37 encore, we explore how CISOs can scale cybersecurity across the enterprise as security becomes increasingly tied to business success. Too often, the expense and damage to reputation that occurs after a sophisticated cyber attack can cause businesses irreparable harm. CISOs find themselves stuck between trying to secure new technology that will give their organization a competitive edge and protecting their legacy IT infrastructure and systems. Success requires an approach to cybersecurity that considers the business, architecture and operations. Join host Robb Boyd as he speaks with WWT's Geoff Hancock – Global Director of Cybersecurity Engineering, Warren Perils — Security Practice Manager for Global Service Provider and Comcast’s Shena Tharnish — VP of Cybersecurity Products. They’ll discuss steps organizations can take to implement holistic cybersecurity.
The Biden Administration’s Cyber Executive Order (EO), officially released on May 12, lays out a multi-pronged approach on how to fortify federal agency cybersecurity efforts and mitigate the large-scale, damaging attacks felt across the country. The Cyber EO provides direction, now it’s up to each agency to develop a cohesive strategy.
Robb Boyd; James Harless; Sean Hicks; Shanon Berry (Dell Technologies); Robert Looney (Intel)
Software-Defined Data Centers (SDDC) are designed to overcome the drawbacks of traditional IT infrastructure to offer the accelerated delivery of consistent data center services. Despite the performance gains, some organizations have been hesitant to adopt a SDDC environment. Tune into this TEC37 episode to find out more!
Webcast topics on the latest in technology solutions.
WWT brings hundreds of technology companies into a physical yet virtualized environment via our Advanced Technology Center (ATC). These companies include Silicon Valley heavyweights and emerging tech players alike. Individually these companies are impressive, but collectively, when integrated by WWT, we produce game-changing solutions.
There are multiple dimensions to the ATC ecosystem, but for many who have experienced it, they simply view it as “Silicon Valley in St. Louis.”