BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:WiCyS - Women in Cybersecurity
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20220101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20230615T130000
DTEND;TZID=UTC:20230615T140000
DTSTAMP:20260404T214603
CREATED:20230418T222747Z
LAST-MODIFIED:20230418T222904Z
UID:10001025-1686834000-1686837600@www.wicys.org
SUMMARY:WiCyS Webinar: Resume Best Practices
DESCRIPTION:Do you get writer’s block whenever you are faced with drafting your own resume? Join Penelope Rozhkova\, Security Consultant at Accenture to get some pointers on best practices. Penelope will ask questions to get the creative juices flowing and share tips on how to format and highlight what you have to offer. \nPenelope Rozhkova lives the Frank Sonnenberg quote\, “As you climb your ladder of success\, reach down and pull others along with you.” She was a founding member of two college WiCyS chapters and of the WiCyS Latina Affiliate. While Penelope holds a Masters in Education Administration\, she is a career-changer as an Ivy Tech MUTC CyberAcademy graduate. Previously she worked in a K-12 setting\, where she hired for district-wide roles\, and then moved into a business setting\, where she hired individuals for her own office staff. She has presented workshops on financial education in both corporate and non-profit settings. She has worked with individuals as well as in train-the-trainer programs to share best practices in both the fields of education and financial services\, and now in cybersecurity. Although she is young in her cybersecurity career\, she is well-versed in navigating group dynamics and mentoring future leaders. As an educator at heart\, within cybersecurity\, it is among her goals to share her previous experience as a leader while she grows her technical skills in the field\, which she will undoubtedly end up teaching along the way as she reaches back to pull those up behind her. \nRegister HERE.
URL:https://www.wicys.org/event/wicys-webinar-resume-best-practices/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2023/04/Resume-Best-Practices-Webinar.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20230615T180000
DTEND;TZID=UTC:20230615T200000
DTSTAMP:20260404T214603
CREATED:20230607T173015Z
LAST-MODIFIED:20230607T173132Z
UID:10001257-1686852000-1686859200@www.wicys.org
SUMMARY:WiCyS Georgia Affiliate | Identity Security for Attack Surface Management
DESCRIPTION:Identity and Access Management systems form fundamental building blocks of Cyber Security with the increase in digitization and Identity automation. In recent years\, identity-based attacks have been increasing exponentially using a combination of social engineering\, phishing\, and exploitation of vulnerabilities in configuration and infrastructure. As Identity became the perimeter\, managing the Identity attack surface has become equally important. Whether your Identity platforms are SAAS or On-Prem\, they need to be constantly monitored and integrated into your threat management platform \nTo understand these attack vectors\, the first step is cataloging all key Identity capabilities\, their infrastructure\, and technology. Any small-to-mid-size company will minimally have Directories like Active Directory\, Authentication capabilities like Single Sign On\, and Privileged Access Management. \nRegister HERE.
URL:https://www.wicys.org/event/wicys-georgia-affiliate-identity-security-for-attack-surface-management/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2023/01/WiCyS-Georgia-Affiliate-Logo-on-Shield.png
END:VEVENT
END:VCALENDAR