BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:WiCyS - Women in Cybersecurity
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Africa/Nairobi
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0300
TZNAME:EAT
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
TZOFFSETFROM:+0530
TZOFFSETTO:+0530
TZNAME:IST
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Africa/Nairobi:20260423T190000
DTEND;TZID=Africa/Nairobi:20260423T200000
DTSTAMP:20260418T093952
CREATED:20260417T171814Z
LAST-MODIFIED:20260417T172131Z
UID:10003158-1776970800-1776974400@www.wicys.org
SUMMARY:WiCyS Uganda Affiliate | Why APIs Are Every Attacker’s Favorite Target
DESCRIPTION:APIs power over 80% of internet traffic—and they’ve become the most targeted attack surface today. Join WiCyS Uganda Affiliate for this live webinar with Dan Barahona as he explores why attackers love APIs\, shares real-world breaches mapped to the OWASP API Top 10\, and walks through practical tips to keep APIs secure. Whether you’re in security\, development\, or just curious about how modern applications are attacked\, this session will give you practical\, real-world insights you can apply immediately. \n  \nLearn more and register HERE
URL:https://www.wicys.org/event/wicys-uganda-affiliate-why-apis-are-every-attackers-favorite-target/
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/jpeg:https://www.wicys.org/wp-content/uploads/2026/04/WiCyS-Webinar-Template.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Asia/Kolkata:20260424T200000
DTEND;TZID=Asia/Kolkata:20260424T210000
DTSTAMP:20260418T093952
CREATED:20260410T173105Z
LAST-MODIFIED:20260410T173105Z
UID:10003140-1777060800-1777064400@www.wicys.org
SUMMARY:WiCyS Sri Lanka Affiliate | Common Language Used in Every Cybersecurity Team: The Security Frameworks
DESCRIPTION:Join the WiCyS Sri Lanka Affiliate to kick off the first session of the new webinar series on a topic every cybersecurity professional will find valuable. \nThis will break down widely used frameworks such as NIST Incident Response\, MITRE ATT&CK\, NIST RMF & OWASP in a way to help you understand how they connect\, why they matter\, and how they are used in real-world cybersecurity environments. This session is proudly organized in collaboration with SentryLabs (Private) Limited\, bringing expert insights and practical knowledge to our community. \nSpeaker – Yashen Waduge\, Senior Solutions Architect – SentryLabs\nHost – Kalani Matheesha\, Associate Tech Lead – Epic Lanka\, WiCyS Sri Lanka Member \nRegister HERE \nJoin and start speaking the common language of cybersecurity.
URL:https://www.wicys.org/event/wicys-sri-lanka-affiliate-common-language-used-in-every-cybersecurity-team-the-security-frameworks/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/WiCyS-Webinar-Series-Insights-Beyond-e1775842243281.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260428T130000
DTEND;TZID=UTC:20260428T140000
DTSTAMP:20260418T093952
CREATED:20260407T190056Z
LAST-MODIFIED:20260407T190056Z
UID:10003132-1777381200-1777384800@www.wicys.org
SUMMARY:Webinar | Building and Advancing Your Career in Cybersecurity Program Management
DESCRIPTION:Cybersecurity is one of the fastest-growing industries in the world\, but not every impactful role requires writing code or analyzing malware. Cybersecurity program managers play a critical role in driving security strategy\, coordinating complex initiatives\, and helping organizations stay resilient against evolving threats. In this webinar\, Ningjing Gao\, Principal Security Portfolio Technical Program Manager at Adobe takes an inside look at cybersecurity program management and the role it plays in modern organizations. You’ll learn what cybersecurity program managers do\, how the role connects technical and business teams\, and the skills that help professionals succeed in this field. \nWe’ll also discuss pathways into cybersecurity program management – whether you’re exploring the field for the first time or looking to grow your career in security\, technology\, or program leadership. Topics will include helpful qualifications\, relevant certifications\, and practical ways to position yourself for opportunities in this space. If you’re interested in cybersecurity and enjoy leadership\, strategy\, and cross-team collaboration\, this session will provide insights to help you navigate and advance your career. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-building-and-advancing-your-career-in-cybersecurity-program-management/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/WiCyS-LI-_-Twitter-2026-03-27T131519.806.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260429T180000
DTEND;TZID=UTC:20260429T190000
DTSTAMP:20260418T093952
CREATED:20260407T180413Z
LAST-MODIFIED:20260409T153902Z
UID:10003126-1777485600-1777489200@www.wicys.org
SUMMARY:WiCyS Florida and Latina Affiliates | The Unspoken Weight of Being a Woman in Cyber
DESCRIPTION:A Guided Discussion.\nCome join WiCyS Florida and Latina as they explore the added pressures beyond just being the only woman in the room\, things like being a first-gen college student\, being a woman of color\, and the potential pressures these factors add in an already tough industry. \n  \nRegister HERE for this event. Learn more and follow each of these affiliates: Florida and Latina
URL:https://www.wicys.org/event/wicys-florida-and-latina-affiliates-the-unspoken-weight-of-being-a-woman-in-cyber/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/Screenshot-2026-04-09-at-11.38.34-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260430T120000
DTEND;TZID=America/Chicago:20260430T130000
DTSTAMP:20260418T093952
CREATED:20260407T174759Z
LAST-MODIFIED:20260407T174759Z
UID:10003124-1777550400-1777554000@www.wicys.org
SUMMARY:WiCyS AI Affiliate | “Meet An AI Practitioner”: J. R. Santos
DESCRIPTION:Join Women in CyberSecurity (WiCyS) AI Affiliate for the next episode of Meet an AI Practitioner in which Luciano Santos (J. R. Santos)\, Chief Customer Officer at the Cloud Security Alliance (CSA) will be presenting on “From Curious to Contributing—Your On-Ramp to AI Security”. In this session\, you’ll get a practical walkthrough of what CSA has built\, what’s coming next\, and—most importantly—how to plug in. They will cover the frameworks and tools available to you right now\, the career pathways that didn’t exist two years ago (including the TAISE certificate and hands-on working groups)\, and why this moment is uniquely suited for women in cyber to lead. \nMeet the AI practitioner\nJ.R. Santos is the Chief Customer Officer at the Cloud Security Alliance\, where he leads global initiatives focused on member engagement\, training\, and the advancement of secure cloud and AI practices. With more than 20 years of cybersecurity experience\, he has helped shape CSA’s research programs and global community efforts\, supporting organizations and professionals working to secure emerging technologies. J.R. is a frequent speaker on AI governance\, cloud security\, and workforce development in cybersecurity. \n  \nLearn more and attend HERE \n 
URL:https://www.wicys.org/event/wicys-ai-affiliate-meet-an-ai-practitioner-j-r-santos/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/Screenshot-2026-04-07-at-1.46.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260430T140000
DTEND;TZID=UTC:20260430T150000
DTSTAMP:20260418T093952
CREATED:20260417T194642Z
LAST-MODIFIED:20260417T194725Z
UID:10003162-1777557600-1777561200@www.wicys.org
SUMMARY:Webinar | Dark Web – A Guided Tour by John Hammond
DESCRIPTION:What exactly is the dark web? How do I get there? How is it different from the web we browse every day\, and why is it so popular with the bad element of society? Should I be scared? \nJoin cybersecurity researcher and expert\, John Hammond\, on a personally guided tour of the seedy under-belly of the Internet. Having done extensive research on the dark web\, John shares a number of his findings (even some shenanigans) on his popular YouTube channel and even has a dedicated playlist on Cybercrime Investigations. \nNow you get to learn directly from the master himself. \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-dark-web-a-guided-tour-by-john-hammond/
LOCATION:BrightTALK
CATEGORIES:CPE/CEU Credits Available,Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/WiCyS-LI-_-Twitter-2026-04-16T163458.968.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260430T140000
DTEND;TZID=Europe/Paris:20260430T153000
DTSTAMP:20260418T093952
CREATED:20260410T173552Z
LAST-MODIFIED:20260410T173552Z
UID:10003142-1777557600-1777563000@www.wicys.org
SUMMARY:WiCyS Nigeria Affiliate | Introduction to Data Protection and Privacy
DESCRIPTION:The WiCyS Nigeria Affiliate\, in collaboration with the Nigeria Data Protection Commission (NDPC) and is organizing a virtual foundational training on Data Protection & Privacy on April 30\, 2026. \nThe training will: \n\nEquip participants with an understanding of data protection laws\,\nProvide privacy frameworks\, and practical skills for securing personal and organizational data\nEnsure compliance with regulations & enhancing the ability to mitigate risks related to data breaches amongst others.\nObtain e-Certificate of attendance at the end of the training.\n\n  \nIt is a complimentary training because it is part of WiCyS’ mission to recruit\, retain and advance women in cybersecurity. \nRegister HERE
URL:https://www.wicys.org/event/wicys-nigeria-affiliate-introduction-to-data-protection-and-privacy/
LOCATION:Virtual
CATEGORIES:Webinar,WiCyS Affiliate
ATTACH;FMTTYPE=image/jpeg:https://www.wicys.org/wp-content/uploads/2026/04/d9f4a0e2-478d-418f-a45e-11a1c4cf3b04-e1775842542348.jpeg
ORGANIZER;CN="WiCyS Nigeria Affiliate":MAILTO:wicysnigeria@wicys.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260507T140000
DTEND;TZID=UTC:20260507T150000
DTSTAMP:20260418T093952
CREATED:20260417T195018Z
LAST-MODIFIED:20260417T195018Z
UID:10003163-1778162400-1778166000@www.wicys.org
SUMMARY:Webinar | From Data to Defense : Building an Intelligence-Driven Security Ecosystem
DESCRIPTION:Threat intelligence is no longer just about collecting indicators – it’s about enabling better\, faster decisions. This webinar explores a unified approach to delivering high-fidelity\, actionable intelligence directly into security and product workflows. \nKasturi Dalvi\, senior cyber threat researcher at Adobe will discuss how organizations can operationalize threat intelligence across detection\, vulnerability management\, red teaming\, and product security\, helping teams move from reactive defense to proactive risk reduction. Attendees will gain insight into how curated intelligence feeds\, context-driven vulnerability prioritization\, adversary-aligned testing\, and dark web monitoring can significantly improve security outcomes while reducing noise and accelerating response. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-from-data-to-defense-building-an-intelligence-driven-security-ecosystem/
LOCATION:BrightTALK
CATEGORIES:CPE/CEU Credits Available,Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/04/WiCyS-LI-_-Twitter-2026-04-16T162947.493.png
END:VEVENT
END:VCALENDAR