BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:WiCyS - Women in Cybersecurity
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20240215T130000
DTEND;TZID=UTC:20240215T140000
DTSTAMP:20260514T075037
CREATED:20231121T163922Z
LAST-MODIFIED:20231206T213541Z
UID:10001408-1708002000-1708005600@www.wicys.org
SUMMARY:WiCyS February Book Club
DESCRIPTION:Join us as we discuss ‘The Art of Attack: Attacker Mindset for Security Professionals’ By: Maxie Reynolds \nIn The Art of Attack: Attacker Mindset for Security Professionals\, Maxie Reynolds untangles the threads of a useful\, sometimes dangerous\, mentality. The book shows ethical hackers\, social engineers\, and pen testers what an attacker mindset is and how to and how to use it to their advantage. Adopting this mindset will result in the improvement of security\, offensively and defensively\, by allowing you to see your environment objectively through the eyes of an attacker. \nThe book shows you the laws of the mindset and the techniques attackers use\, from persistence to “start with the end” strategies and non-linear thinking\, that make them so dangerous. You’ll discover: a variety of attacker strategies\, including approaches\, processes\, reconnaissance\, privilege escalation\, redundant access\, and escape techniques; the unique tells and signs of an attack and how to avoid becoming a victim of one; and what the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against. \nPerfect for red teams\, social engineers\, pen testers\, and ethical hackers seeking to fortify and harden their systems and the systems of their clients\, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker. \nRegister HERE
URL:https://www.wicys.org/event/wicys-february-book-club/
LOCATION:C
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2023/11/Feb-Book-Club.png
END:VEVENT
END:VCALENDAR