BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:WiCyS - Women in Cybersecurity
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20270314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20271107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20260211T130000
DTEND;TZID=UTC:20260211T140000
DTSTAMP:20260422T202131
CREATED:20260128T185438Z
LAST-MODIFIED:20260128T185438Z
UID:10002853-1770814800-1770818400@www.wicys.org
SUMMARY:Webinar | Threat Hunting 101: From Alerts to Adversaries
DESCRIPTION:Join this WiCyS Webinar with Nebulock to learn about threat hunting\, a proactive approach to cybersecurity focused on uncovering hidden and emerging threats that alerts may have missed. In this introductory session\, Sydney Marrone\, Head of Threat Hunting at Nebulock\, will explain the fundamentals of threat hunting\, how it differs from traditional detection\, and what a modern hunting workflow looks like. The webinar will briefly introduce the Agentic Threat Hunting Framework as an example of how structured\, adaptive thinking can help mature a threat hunting program\, without requiring prior experience or advanced theory. Attendees will walk away with a clear\, repeatable way to approach threat hunting in any environment\, regardless of tools or data maturity. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-threat-hunting-101-from-alerts-to-adversaries/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/jpeg:https://www.wicys.org/wp-content/uploads/2026/01/WiCyS_Nebulock.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260212T130000
DTEND;TZID=UTC:20260212T140000
DTSTAMP:20260422T202131
CREATED:20251217T180245Z
LAST-MODIFIED:20260109T151939Z
UID:10002693-1770901200-1770904800@www.wicys.org
SUMMARY:Webinar | Spider in the Web: UNC3944 in your Cloud Identity Fabric
DESCRIPTION:This WiCyS webinar will dive into UNC3944\, also famously known as Scattered Spider has earned a reputation for aggressive social engineering\, SIM swapping and identity based intrusions and their web footprints stretches deep into cloud environments. They have been known to exploit Azure AD\, Microsoft 365 and other identity platforms to escalate privileges\, maintain persistence and laterally move up without detection. \nIn this session\, Varsha will unravel the tactics\, techniques and procedures (TTPs) UNC3944 uses to compromise and abuse cloud platforms. Either as a beginner or mid-career professional interested in threat hunting\, we’ll talk through how to prepare a threat hunt methodology and hunt for their activity by correlating Azure AD sign-in data\, M365 Unified Audit Logs\, OAuth app grants and endpoint telemetry based off of open source threat intelligence data. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-spider-in-the-web-unc3944-in-your-cloud-identity-fabric/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/12/large-WiCyS-LI-_-Twitter-2026-01-08T205436.666.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260212T130000
DTEND;TZID=America/New_York:20260212T140000
DTSTAMP:20260422T202131
CREATED:20260128T183619Z
LAST-MODIFIED:20260128T183619Z
UID:10002850-1770901200-1770904800@www.wicys.org
SUMMARY:WiCyS Deaf Affiliate | Membership Meeting
DESCRIPTION:WiCyS Deaf Affiliate is thrilled to invite you to the upcoming Affiliate Membership Meeting! Whether you’re a longtime member or exploring our community for the first time\, there is an exciting session planned. This meeting is a fantastic opportunity to learn about WiCyS\, the upcoming 2026 Annual Conference\, and meet other deaf and hard-of-hearing members. \nGuests are welcome! \nContact Angela (angela-deafpres-affiliate@wicys.org) for more information.
URL:https://www.wicys.org/event/wicys-deaf-affiliate-membership-meeting/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/01/Membership-Meeting.png
ORGANIZER;CN="WiCyS - Deaf":MAILTO:angela-deafpres-affiliate@wicys.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260221T110000
DTEND;TZID=America/Los_Angeles:20260221T233000
DTSTAMP:20260422T202131
CREATED:20260128T183945Z
LAST-MODIFIED:20260128T183945Z
UID:10002851-1771671600-1771716600@www.wicys.org
SUMMARY:WiCyS San Diego | Reverse Engineering CTF with Ghidra for DNS exfiltration
DESCRIPTION:Join Venus Liong and Michelle Duell\, top 10 winners of the WiCyS Target Cyber Defense Challenge 2025\, as they crack open real-world reverse engineering challenges using Ghidra—and yes\, they’re bringing AI to the party. \nIn this engaging session\, you’ll watch two brilliant problem-solvers from completely different backgrounds break down a live DNS exfiltration CTF challenge. They’ll show you exactly how they do it\, so you can do it too. \nWhat You’ll Actually Learn: \n\nHow DNS exfiltration works (and why hackers love it)\nThe practical toolkit for approaching reverse engineering in Ghidra\nHow to use AI assistants to level up your problem-solving\n\nWhether you’re brand new to security or looking to sharpen your skills\, this session demolishes the myth that reverse engineering is only for the elite. Two different approaches\, one shared mission: making cyber defense accessible to everyone. \n  \nDon’t miss it—bring your curiosity and leave with concrete skills. Register HERE
URL:https://www.wicys.org/event/wicys-san-diego-reverse-engineering-ctf-with-ghidra-for-dns-exfiltration/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/01/CyberSpeaker_Series_Venus_EB_3.png
ORGANIZER;CN="WiCyS San Diego Affiliate":MAILTO:WiCySSanDiego@wicys.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260225T150000
DTEND;TZID=America/Chicago:20260225T170000
DTSTAMP:20260422T202131
CREATED:20260205T024824Z
LAST-MODIFIED:20260205T025139Z
UID:10002897-1772031600-1772038800@www.wicys.org
SUMMARY:WiCyS BISO Affiliate | Quarterly Webinar Series - Dr. Romi Abidoye
DESCRIPTION:Join the WiCyS BISO Affiliate for the Quarterly webinar. Dr. Romi A. BISO Abidoye is a seasoned Business Information Security Officer with over 15 years of experience aligning cybersecurity\, risk\, and governance with business objectives in highly regulated financial services environments. He partners closely with senior leaders\, audit\, legal\, and regulators to reduce supervisory findings\, close control gaps\, and mature enterprise governance models. His expertise spans enterprise risk management\, third-party risk\, privacy\, business continuity\, and responsible AI risk—making his perspective especially relevant as BISOs navigate emerging technology and regulatory pressures. \n  \nRegister HERE
URL:https://www.wicys.org/event/wicys-biso-affiliate-quarterly-webinar-series-dr-romi-abidoye/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/02/BISODrRomi-final-e1770259694423.png
ORGANIZER;CN="WiCys BISO":MAILTO:janice@networkpdf.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T120000
DTEND;TZID=America/Chicago:20260226T130000
DTSTAMP:20260422T202131
CREATED:20260226T171010Z
LAST-MODIFIED:20260226T171010Z
UID:10002924-1772107200-1772110800@www.wicys.org
SUMMARY:WiCyS AI Affiliate | Monthly Meetup
DESCRIPTION:Join Women in CyberSecurity (WiCyS) AI Affiliate for monthly member meetup! This month’s topic of focus is Moltbot (aka Claudbot)\, an intelligent virtual assistant that leverages artificial intelligence and natural language processing to facilitate seamless communication and operational efficiency. It can handle a wide range of tasks\, such as answering frequently asked questions\, retrieving data from various sources\, guiding users through processes\, and automating routine tasks. \nThe meetup will be an open discussion. Come prepared to discuss your experience with using Moltbot\, security concerns with its adoption and what mitigating controls are being adopted. \n  \nLearn more HERE
URL:https://www.wicys.org/event/wicys-ai-affiliate-monthly-meetup/
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/jpeg:https://www.wicys.org/wp-content/uploads/2026/02/Artificial-Intelligence-Affiliate-Logo-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260226T130000
DTEND;TZID=UTC:20260226T140000
DTSTAMP:20260422T202131
CREATED:20260209T204815Z
LAST-MODIFIED:20260209T204815Z
UID:10002907-1772110800-1772114400@www.wicys.org
SUMMARY:Webinar | The Real "I" in AI: Finding Your Voice in the Machine
DESCRIPTION:In an era of “copy-paste” content and algorithmic echo chambers\, standing out has never been harder—or more essential. Artificial Intelligence is often framed as a tool for automation\, but what if it became a tool for articulation? This WiCyS webinar featuring Palo Alto Networks is built for those who want to understand how AI can enhance their career. \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-the-real-i-in-ai-finding-your-voice-in-the-machine/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/02/WiCyS-LI-_-Twitter-2026-02-04T155726.064.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260226T140000
DTEND;TZID=UTC:20260226T150000
DTSTAMP:20260422T202131
CREATED:20260219T200516Z
LAST-MODIFIED:20260219T200516Z
UID:10002912-1772114400-1772118000@www.wicys.org
SUMMARY:WiCyS Nigeria Affiliate | Launching Your 2026 Cybersecurity Journey
DESCRIPTION:Join WiCyS Nigeria Affiliate for a webinar to start the year strong with practical goal-setting frameworks tailored for women in cyber. Hear from Nigerian cyber professionals on overcoming imposter syndrome\, creating personal career goals\, and aligning the development plans to achieve the goals. The session will guide women at different career stages with a practical demonstration on mapping career paths in governance\, technical security\, risk\, and policy. \nThe webinar will also give a sneak peek into WiCyS Global\, membership perks\, and our plans for 2026. \n  \nRegister HERE
URL:https://www.wicys.org/event/wicys-nigeria-affiliate-launching-your-2026-cybersecurity-journey/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/02/Screenshot-2026-02-19-at-3.04.42-PM.png
ORGANIZER;CN="WiCyS Nigeria Affiliate":MAILTO:wicysnigeria@wicys.org
END:VEVENT
END:VCALENDAR