BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241030
DTEND;VALUE=DATE:20250130
DTSTAMP:20260430T065009
CREATED:20241024T185050Z
LAST-MODIFIED:20241024T185050Z
UID:10001934-1730246400-1738195199@www.wicys.org
SUMMARY:WiCyS | SentinelOne ThreatOps
DESCRIPTION:Join WiCyS Strategic Partner SentinelOne ThreatOps Virtual Training sessions. \nAre you interested in taking on the Challenge? \nYou’ll join fellow cybersecurity peers for SentinelOne’s ThreatOps Challenge\, which will incorporate both known and advanced persistent threat attack vectors and methodology. \nHelp neutralize the threats. Be a Threat Hunter! \nYou’ll Investigate and complete scenarios with varying levels of difficulty in an allotted time. Winners are determined by highest scores\, time to complete\, or both. \nParticipants will receive: \n\nTraining on the SentinelOne Endpoint Protection Platform\nFree-form challenges focused on the realm of EDR and Threat Hunting\nCPE credits upon completion of the entire event\nGift cards for the top three winners\n\nUpcoming ThreatOps Challenges:\n\n\n\nOctober 30\, 2024: Cloud Native Security (2 hours)\nNovember 20\, 2024: Purple AI (2 hours)\nDecember 18\, 2024: Identity (2 hours)\nJanuary 29\, 2025: Cloud Workload Protection (2 hours)\n\n\n\nIf you are interested in learning how to neutralize the threats\, Register HERE. Be a Threat\, Hunter.
URL:https://www.wicys.org/event/wicys-sentinelone-threatops/
LOCATION:Virtual
CATEGORIES:WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/10/WiCyS-at-SentinelOne_-ThreatOps-Challenge.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241202
DTEND;VALUE=DATE:20241207
DTSTAMP:20260430T065009
CREATED:20241113T182449Z
LAST-MODIFIED:20241113T182449Z
UID:10001955-1733097600-1733529599@www.wicys.org
SUMMARY:WiCyS | AWS re:Invent
DESCRIPTION:Join WiCyS at AWS re: Invent in Las Vegas to connect with WiCyS Global Deputy Director Michele Tomasic. Please stop by our booth in the Non-Profit Expo Booth 1186 at the Venetian on Tuesday\, December 3rd\, from 10 am – 6 pm to meet our affiliate\, snag some swag\, and learn more! \nAt re:Invent 2024 you’ll get a front row seat to hear real stories from customers and AWS leaders about navigating pressing topics like generative AI. Learn about new product launches\, watch demos\, and get behind-the-scenes insights during five headline-making keynotes. AWS leaders—including AWS CEO Matt Garman and special guest Andy Jassy\, CEO Amazon.com—will take the stage along with top AWS customers. \n  \nRegister HERE
URL:https://www.wicys.org/event/wicys-aws-reinvent/
LOCATION:Las Vegas\, Las Vegas\, NV\, United States
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/11/WiCyS-at-AWS-re-Invent.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241205
DTEND;VALUE=DATE:20241207
DTSTAMP:20260430T065009
CREATED:20241125T182625Z
LAST-MODIFIED:20241125T182625Z
UID:10001963-1733356800-1733529599@www.wicys.org
SUMMARY:WiCyS Minnesota | BSides Austin: “Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets”
DESCRIPTION:Join WiCyS Minnesota’s Jessa Gegax as she presents at BSides Austin on Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets.  \nThis talk explores how to leverage the nooks and crannies of Salesforce to find and abuse misconfigurations that chain together and create serious vulnerabilities that leak sensitive data to adversaries. It highlights that security concerns still exist on applications built on a well-known CRM tool with declarative or “point-and-click” development\, where to discover them\, and how they can be remediated. It provides a real-world scenario of using various Salesforce widgets to find security vulnerabilities like Insecure Direct Object References (IDORs) and Broken Authorization as a means of stealing sensitive client information. It offers solutions for detection and prevention for these elevated attacks that relate to common security best practices. At the end of this discussion\, you will walk away with better awareness of the vulnerabilities existing in Salesforce\, how they can be discovered\, remediated\, then prevented. You may even learn a new trick or two on how to think like a hacker when building your company’s next communication tool! \n  \nThe very first BSides in Austin was organized in 2010 by Jack Daniel and Ben Tomhave. This was the fourth BSides ever to be held\, and it had about 30 attendees. In 2011\, Michael Gough stepped up and took over organization of our local event. Even as he continued to manage the BSides Austin events through 2015\, Michael also helped kick off BSides Texas in 2012\, and was heavily involved in BSides throughout Texas (including Dallas\, San Antonio and Houston). Matt and Janice have been running BSides Austin since 2016. BSides Austin has grown in that short time into a two-day event with around 750 participants. Our goal is to continue providing a fantastic event with great content and training for the information security community. \n  \nRegister HERE
URL:https://www.wicys.org/event/wicys-minnesota-bsides-austin-salesforce-snafus-unveiling-and-exploiting-security-misconfigurations-using-commonly-used-widgets/
LOCATION:Commons Learning Center on the J.J. Pickle Research Campus at The University of Texas at Austin\, 10100 Burnet Road Bldg 137\, Austin\, TX\, 78758\, United States
CATEGORIES:WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/11/Jessa-Gegax-Speaking-Engagement-Minnesota-Shield.png
ORGANIZER;CN="WiCyS Minnesota Affiliate":MAILTO:WiCySMinnesota@wicys.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20241205T130000
DTEND;TZID=UTC:20241205T140000
DTSTAMP:20260430T065009
CREATED:20241101T194543Z
LAST-MODIFIED:20241101T194706Z
UID:10001947-1733403600-1733407200@www.wicys.org
SUMMARY:WiCyS December Book Club
DESCRIPTION:Your Face Belongs to Us: A Secretive Startup’s Quest to End Privacy as We Know It by Kashmir Hill \nNew York Times tech reporter Kashmir Hill was skeptical when she got a tip about a mysterious app called Clearview AI that claimed it could\, with 99 percent accuracy\, identify anyone based on just one snapshot of their face. The app could supposedly scan a face and\, in just seconds\, surface every detail of a person’s online life: their name\, social media profiles\, friends and family members\, home address\, and photos that they might not have even known existed. If it was everything it claimed to be\, it would be the ultimate surveillance tool\, and it would open the door to everything from stalking to totalitarian state control. Could it be true? \nIn this riveting account\, Hill tracks the improbable rise of Clearview AI\, helmed by Hoan Ton-That\, an Australian computer engineer\, and Richard Schwartz\, a former Rudy Giuliani advisor\, and its astounding collection of billions of faces from the internet. The company was boosted by a cast of controversial characters\, including conservative provocateur Charles C. Johnson and billionaire Donald Trump backer Peter Thiel—who all seemed eager to release this society-altering technology on the public. Google and Facebook decided that a tool to identify strangers was too radical to release\, but Clearview forged ahead\, sharing the app with private investors\, pitching it to businesses\, and offering it to thousands of law enforcement agencies around the world. \nFacial recognition technology has been quietly growing more powerful for decades. This technology has already been used in wrongful arrests in the United States. Unregulated\, it could expand the reach of policing\, as it has in China and Russia\, to a terrifying\, dystopian level.\n\nYour Face Belongs to Us is a gripping true story about the rise of a technological superpower and an urgent warning that\, in the absence of vigilance and government regulation\, Clearview AI is one of many new technologies that challenge what Supreme Court Justice Louis Brandeis once called “the right to be let alone.” \nRegister HERE
URL:https://www.wicys.org/event/wicys-december-book-club/
LOCATION:Zoom\, IN
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/11/WiCyS-December-2024-Book-Club.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20241205T130000
DTEND;TZID=UTC:20241205T140000
DTSTAMP:20260430T065009
CREATED:20241120T194103Z
LAST-MODIFIED:20241120T194103Z
UID:10001959-1733403600-1733407200@www.wicys.org
SUMMARY:Webinar | Salesforce’s Secret Sauce To Embodying Trust As Our #1 Value
DESCRIPTION:Join presenters from Salesforce\, Nicole Morris\, Robert Bridge\, Sid Chowdhury\, Liz Murakami\, Julissa Marcenaro. In today’s world\, where both relationships and security are crucial\, trust is the foundation of every successful partnership. At Salesforce\, trust isn’t just a concept – it’s a core value we embody in everything we do. But what does trust really mean\, and why is it so vital to how we interact with our customers\, stakeholders\, and the wider community? \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits.\n\n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-salesforces-secret-sauce-to-embodying-trust-as-our-1-value/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2024/11/WiCyS-LI-_-Twitter-56.png
END:VEVENT
END:VCALENDAR