Register to join us!


  • days
  • Hours
  • Minutes
  • Seconds
Summit Details

Outfit Your Organization to Overcome Social Engineering

At this year's Cybersecurity Awareness Month Summit, we’ll help you gear up to overcome obstacles, identify hidden hazards, and find a path forward past modern threats, all of which will enable your employees and leaders to stay safe online, create a culture of security, and actively reduce human risk.

You’ll hear from experts who will show you how to survive AI-enhanced social engineering attacks, a chief information security officer, a threat research and intelligence expert, a chief technical officer, and the former NSA Cybersecurity Director and former Acting Homeland Security Director Robert Joyce! And you’ll emerge with a clear understanding of how to keep security awareness top of mind all year long.

You'll learn:
  • Exclusive industry insights, unique perspectives, and security best practices
  • How to reduce or eliminate the hazards of AI-enhanced attacks
  • Ways to more effectively deal with the disinformation being delivered to inboxes
Sessions & Speakers
  • Keynote: The State of the Hack: Under Attack in the Digital Domain

    30 Minutes
    Robert Joyce, former NSA Cybersecurity Director and former Acting Homeland Security Director
  • Human Risk is Business Risk: Lessons Learned from Tales in our Trenches

    30 minutes
    Adam Marrè, CISO, Arctic Wolf
    Ismael Valenzuela, VP, Threat Research and Intelligence, Arctic Wolf
  • Human Risk Behaviors: The Evolving Relationship between Leaders and End Users

    30 minutes
    Christopher Fielder, Field CTO, Arctic Wolf
    Sule Tatar, Sr. Product Marketing Manager, Arctic Wolf
  • Summit Conclusion

Hosted by:
Hannah Teel

Manager, Security Awareness & Training, Arctic Wolf

Featured Speaker:
Robert Joyce

Former NSA Cybersecurity Director, former Acting Homeland Security Director

Adam Marrè

CISO, Arctic Wolf

Ismael Valenzuela

VP, Threat Research and Intelligence, Arctic Wolf

Christopher Fielder

Field CTO, Arctic Wolf

Sule Tatar

Senior Product Marketing Manager, Arctic Wolf

Speaker Name

Speaker Job Title and Position

Speaker Name

Speaker Job Title and Position

Event Speakers
Arctic Wolf Event Speaker
Speaker Name

Speaker Job Title and Position

Arctic Wolf Event Speaker
Speaker Name

Speaker Job Title and Position

Arctic Wolf Event Speaker
Speaker Name

Speaker Job Title and Position

Arctic Wolf Event Speaker
Speaker Name

Speaker Job Title and Position

Session Overview
  1. Keynote: The State of the Hack: Under Attack in the Digital Domain

    30 minutes
    In our keynote session, Acting Homeland Security Director Robert Joyce will provide a sharp and timely analysis of today's rapidly evolving cyber threat landscape. He’ll explain the increasingly sophisticated tactics used by nation-state hackers, explore the new intelligence on attacks targeting critical infrastructure, and examine how AI has emerged as a double-edged sword in cybersecurity.



  2. Human Risk is Business Risk: Lessons Learned from Tales in our Trenches

    30 minutes
    Take an expert-led look at the sophisticated attack types threat actors use to expose human error and how you can better educate and enable your team members to identify risks. We’ll reveal exclusive insights from the world’s largest commercial SOC, our team of 800+ global analysts, and over 10,000 customers across diverse industries and geographies.




  3. Human Risk Behaviors: The Evolving Relationship between Leaders and End Users

    30 minutes
    Join experts from Arctic Wolf as we explore the greatest organizational risks ast it relates to users and user errors. You’ll discover how aligned global IT and security leaders are with end users in terms of identifying potential threats, securing confidential information and creating a culture of awareness. And you’ll walk away with actionable advice that can help you harden your environment by preparing your team to be your first line of defense.
  4. Summit Conclusion











Register Now
Event Presented by:

Lorem Ipsum Video Title Goes Here

Quaerat sodales sapien euismod purus at blandit and purus ipsum primis and cubilia laoreet augue a luctus magna dolor luctus mauris pretium a sapien egestas luctus

Booth #B44

Event giveaway at Booth #B44!

Stop by stand #B44 for a chance to win some great prizes, sit down for a 1-on-1 chat with one of our industry experts, and learn how we can help you avoid the hazards of human risk that plague global organisations.

PLUS!

Aliquam a augue suscipit, luctus neque purus ipsum neque at dolor primis libero tempus, blandit and cursus varius magna tempus a dolor
While you’re out there taking laps around the event, don’t forget to stop by and enter to win a BlockZone Oracle Red Bull Racing Formula 1 car!
Demo our solutions and you’ll be entered to win an Inspire Travel Card voucher (worth up to $100) to help fund your next adventure.
,


Our Event Locations

Booth #1765 and the Atomic Saloon aren't the only spots to see us. We're taking part in an entire lineup of receptions, sessions, and special events, so you’ll have so many ways to connect with the Pack!
The Venetian Las Vegas
3355 S Las Vegas Blvd,
Las Vegas, NV 89109

Wrigley Field
1060 W Addison St,
Chicago, IL 60613

Hunt Down Cyberattacks Before They Impact Your Business

Aliquam a augue suscipit, luctus neque purus ipsum neque at dolor primis libero tempus, blandit and cursus varius magna tempus a dolor
Network Inspection
Continuous network traffic inspection that detects malicious activity to/from suspicious IP addresses and domains
Log Analysis & Search
Automatically collects, normalizes, analyzes, and retains data from existing networks, systems, and applications
Threat Detection
Identifies malicious files/EXEs, malicious traffic, bad IP addresses/domains, and lateral movement through Windows event log and Sysmon monitoring
24x7 Monitoring
A cloud-based SOC staffed by security analysts who monitor your on-premises and cloud resources 24x7
Cloud Security
Monitors cloud services, SaaS apps, IaaS infrastructure, and SecOps services to identify malicious user activity
Managed Containment
Detect indicators of compromise and prevent the spread of threats
Endpoint Visibility
Our unified endpoint technology provides operational metrics, asset categorization, threat visibility, and detection and response
Incident Response
Identifies critical security incidents from millions of suspicious investigations, escalates responses, and proposes remediation action

Arctic Wolf is the Market Leader in Security Operations

Aliquam a augue suscipit, luctus neque purus ipsum neque at dolor primis libero tempus, blandit and cursus varius magna tempus a dolor uctus neque purus.

Arctic Wolf Icon
Discover
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Blog Icon
Assess
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Blog Icon
Harden
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Arctic Wolf Icon
Discover
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Blog Icon
Assess
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Blog Icon
Harden
We identify assets in your environment and define your attack surface across network, perimeter, host, and accounts.
Sample CTA Title
Tempor sapien donec gravida a suscipit and porta justo vitae

Aliqum mullam blandit vitae and tempor sapien and donec lipsum gravida a porta undo velna dolor in cubilia laoreet

About Arctic Wolf:

Arctic Wolf is the global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes trillions of security events each week to enable critical outcomes for most security use cases. The Arctic Wolf® Aurora Platform delivers automated threat detection and response at scale and empowers organizations of any size to stand up world-class security operations with the push of a button.

For more information about Arctic Wolf, visit  arcticwolf.com.