
2024 Arctic Wolf
Cybersecurity Awareness Month Summit


What is Cybersecurity Awareness Month?
Every October, security-minded organizations around the world turn their focus toward security awareness to promote the power of a strong security culture to protect systems, data, and people.

Survive the
Social Engineering Avalanche
Avoid the Hazards of Human Risk
At this year's Cybersecurity Awareness Month Summit, we'll explore social engineering attacks that exploit the hazards of human risk and equip you with the knowledge, tools and strategies to conquer these challenges and overcome their obstacles.



Featuring a Team of Expert Guides To Help You Scale the Summit of Security Awareness:



Hector Monsegur
Controversial Hacker and Co-founder of Lulzsec
Keynote:
Cybersecurity, a Human Problem, Not a Systems Problem
Take a deep dive into the issue that plagues cybersecurity the most, the human element, as well as common social engineering tactics threat actors use, and how to address human risk in your organization.

Adam Marrè
Senior Vice President & CISO, Arctic Wolf

Rusty Carter
Vice President of Product – Cloud Security, Arctic Wolf
The Greatest Threats and How to Overcome Them
Learn how to avoid the hazards of human risk in this session focused on helping you find a safer path past the biggest risks your employees face: business email compromise (BEC), phishing, and ransomware.

Christopher Fielder
Field CTO, Arctic Wolf

Sule Tatar
Senior Product Marketing Manager, Arctic Wolf
Human Risk Behaviors: A Story of Leaders and End Users
Featuring a deep dive into insights from our recent global survey, this session will offer insights into the proper identification of potential threats, how to secure confidential information and the best ways to create a culture of awareness.
Event Host

Hannah Teel
Manager, Security Awareness & Training, Arctic Wolf
Human Risk Behavior Snapshot
An analysis of IT leader and end-user attitudes in an evolving threat landscape


Phishing: A Primer on How to Protect Your Organization

7 Types of Social Engineering Attacks

Understanding Drive-by Download Attacks

How To Defend Against the Rise of BEC Attacks

How to Solve the 5 Biggest Security Awareness Training Challenges
