WWT’s Security Automation Workshop is a two- to four-hour technical whiteboard and hands-on lab session focused on exploring how security automation and orchestration can address both the technical and strategic requirements of your organization.
WWT offers comprehensive assistance for aligning operations with the federally mandated standard Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST 800-171).
WWT offers a comprehensive assessment that provides a formal approach to determining how well an organization is aligned to compliance as defined by the federal standard Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST 800-171).
The WWT Hunk on Splunk Workshop is a two- to four-hour strategic discussion and whiteboard session focused on identifying your companies business and security challenges.
The WWT Splunk Workshop is a two- to four-hour strategic discussion and whiteboard session where WWT experts customize the meeting to focus on your companies business and security challenges.
This workshop delivers expert insight into the proven best practices to plan, design, pilot, implement and properly scale network automation in your environment.
The objective of this workshop is to evaluate your agency’s security posture. Using a combination of interviews, review of written security policies and procedures, and automated discovery tools, WWT will make specific recommendations to address vulnerabilities and improve the agency’s overall security.
The objective is to produce a working conceptual overview of how your organization can secure and manage mobile workloads in your existing platform, or plan for changes to your environment to accommodate your needs.
Using internal business initiatives and goals, this workshop ties discovery and alignment to the organization and helps you better understand next-generation firewalls from a solution and business enablement perspective.
Experts explore areas such as dynamic-based network policies, endpoint profiling, identity attributes and the impact of mobile devices.
This workshop prepares your organization for the transition to NERC CIP v5. Understanding how NERC CIP v5 truly impacts your business can help your company reduce risk and compliance costs by improving visibility and establishing ownership of key assets.
Experts explore areas like measuring and defining an incident, differentiating between a threat and a risk, proper internal and external communications after a data breach, the remediation process, and real-world incident scenarios based on the experiences of instructors.
Experts review the people, processes and technology needed for role-based, granular, enterprise-wide visibility into an organization’s security risks.
Experts will explore an organization’s ability to understand, detect, mitigate and respond to DDoS attacks.
The workshop will provide an executive-level snapshot of your organization’s current maturity level for a cybersecurity program and will highlight critically important risk areas tied to your organization’s strategic and business objectives.
This workshop gives your organization the opportunity to evaluate and strengthen your understanding of how to reduce the impact of data breaches through rapid detection of advanced attacks.