BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20230312T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20231105T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20250309T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20251102T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240903
DTEND;VALUE=DATE:20240930
DTSTAMP:20260506T155047
CREATED:20240910T182950Z
LAST-MODIFIED:20240910T182950Z
UID:10001891-1725321600-1727654399@www.wicys.org
SUMMARY:Clicked Program Sprints Applications | Creating & Implementing a Cybersecurity Program with AI Team Sprint
DESCRIPTION:In this experience\, you and your teams will be responsible for creating and implementing an enterprise security program for a tech organization. You and your team will be considering all of the action items for a Security Project and managing them accordingly and securely. This may sound like a no-brainer\, but a lot of planning and analysis is needed here. You will be working with various project stakeholders to ensure their needs are met\, voices are heard\, and most importantly that the project is completed on time\, on-budget\, and in the most secure\, risk-free way possible. \nLearner outcomes:  \n\nCybersecurity Fundamentals: Understand the core principles and components of a comprehensive cybersecurity program.\nRisk Assessment and Management: Learn how to identify\, analyze\, and mitigate potential security risks within an organization.\nImplementation Strategies: Gain practical experience in deploying cybersecurity tools and technologies to protect organizational assets.\n\n  \nApplications OPEN until September 29; submit HERE \n  \nAvailable to: \n\nMembers with 0-3 years of cybersecurity industry experience.\nMembers who have completed their registration on the IBM Cybersecurity Fundamentals course website.\nMembers committed to completing the program.\nMembers willing to commit 10 hours (Mini Sprint) and/or 20 hours (Team Sprint).
URL:https://www.wicys.org/event/clicked-program-sprints-applications-creating-implementing-a-cybersecurity-program-with-ai-team-sprint/
LOCATION:Virtual
CATEGORIES:WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/09/WiCyS-Clicked-Marketing-Image-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240909
DTEND;VALUE=DATE:20241105
DTSTAMP:20260506T155047
CREATED:20241001T141915Z
LAST-MODIFIED:20241001T141915Z
UID:10001907-1725840000-1730764799@www.wicys.org
SUMMARY:WiCyS Conference 2025 | Scholarship Applications are open
DESCRIPTION:The WiCyS annual in-person and virtual conferences are the premier events dedicated to recruiting\, retaining and advancing women in cybersecurity. Each year\, professionals and students—women and allies alike— unite to enhance their skills\, build valuable connections and pursue career advancement opportunities. Join us in shaping the future of the cybersecurity workforce. \nExpand your network and enrich your skills at the WiCyS technical conference. Take advantage of scholarships that provide reduced conference registration rates and three nights of complimentary shared lodging from April 2 to 5. All applicants must be current WiCyS members. \nScholarship categories include students\, military\, faculty\, allies\, mentors\, and equity & advancement. Please note that students MUST apply for a WiCyS scholarship to attend the 2025 conference\, as general registration is not available for students. Don’t miss your chance to be a part of this transformative community. Apply now and invest in your future! \n  \nSubmit for your Scholarship by November 4th at 5pm CT HERE
URL:https://www.wicys.org/event/wicys-conference-2025-scholarship-applications-are-open/
LOCATION:Virtual
CATEGORIES:WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/10/2025-Call-For-Scholarships-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240909
DTEND;VALUE=DATE:20241105
DTSTAMP:20260506T155047
CREATED:20241001T142432Z
LAST-MODIFIED:20241001T142432Z
UID:10001908-1725840000-1730764799@www.wicys.org
SUMMARY:WiCyS Conference 2025 | Call for Proposals are Open
DESCRIPTION:The WiCyS annual in-person and virtual conferences are the premier events dedicated to recruiting\, retaining and advancing women in cybersecurity. Each year\, professionals and students—women and allies alike— unite to enhance their skills\, build valuable connections and pursue career advancement opportunities. Join us in shaping the future of the cybersecurity workforce. \nEnhance the learning experience for all conference attendees by submitting a proposal. Whether it’s a workshop\, lightning talk\, presentation\, birds-of-a-feather session\, panel or student poster\, we welcome contributions from both members and non-members. Submit multiple proposals across various categories and tracks to enhance the learning experience for conference attendees. Your participation will help create a powerful and enriching environment that highlights the incredible talent and knowledge within the cybersecurity community. Together\, let’s inspire and educate the next generation of cybersecurity professionals. \n  \nSubmit your CFP by November 4th at 5pm CT HERE
URL:https://www.wicys.org/event/wicys-conference-2025-call-for-proposals-are-open/
LOCATION:Virtual
CATEGORIES:WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/10/2025-Call-For-Presenters-2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240917T130000
DTEND;TZID=UTC:20240917T140000
DTSTAMP:20260506T155047
CREATED:20240909T180223Z
LAST-MODIFIED:20240909T180223Z
UID:10001889-1726578000-1726581600@www.wicys.org
SUMMARY:Webinar | Navigating Cyber Risks in the Networked Age: A Deep Dive into LinkedIn's Risk Calculation and Business Impact
DESCRIPTION:Navigating Cyber Risks in the Networked Age: A Closer Look at LinkedIn’s Approach to Risk Management and Business Impact\,” they will explore the challenges of cybersecurity in today’s connected digital world. Presenters Shefali Mahajan\, Anusha Nagarajan\, Archal Swamy\, Deyanira Garcia\, and Rucha Deshpande will discuss how LinkedIn\, as a leading professional networking platform\, identifies and manages cyber risks that could affect its operations and users. Additional areas to be covered include a discussion of challenges and best practices for large\, networked organizations; valuable lessons for business in the digital economy; communicating risk to leadership to enable strategic decision-making; and the broad effects of cyber risk on business continuity\, reputation\, and user trust. \n\n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits.\n\n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-navigating-cyber-risks-in-the-networked-age-a-deep-dive-into-linkedins-risk-calculation-and-business-impact/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/09/WiCyS-LI-_-Twitter-33.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240917T190000
DTEND;TZID=America/Halifax:20240917T200000
DTSTAMP:20260506T155047
CREATED:20240903T192355Z
LAST-MODIFIED:20240906T194335Z
UID:10001874-1726599600-1726603200@www.wicys.org
SUMMARY:WiCyS Military Affiliate | Why is Configuration Management Critical in Cyber Security
DESCRIPTION:For this month\, our keynote Speaker Crystal Talley\, an Army Veteran\, and a configuration manager\, will be educating us on “Why is Configuration Management Critical in Cyber Security”. This event will take place on Tuesday\, September 17th at 7pm Central Time.
URL:https://www.wicys.org/event/wicys-military-affiliate-why-is-configuration-management-critical-in-cyber-security/
LOCATION:Virtual
CATEGORIES:WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/09/WiCyS-Military-Affiliate-_-Why-is-Configuration-Management-Critical-in-Cyber-Security.png
ORGANIZER;CN="WiCyS Military Affiliate":MAILTO:wicysmilitary@wicys.org
END:VEVENT
END:VCALENDAR