BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:WiCyS - Women in Cybersecurity
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250505
DTEND;VALUE=DATE:20260501
DTSTAMP:20260417T185057
CREATED:20250421T154955Z
LAST-MODIFIED:20260415T155011Z
UID:10002151-1746403200-1777593599@www.wicys.org
SUMMARY:WiCyS Vulnerability Disclosure Program (VDP) | Applications Now OPEN
DESCRIPTION:The WiCyS Vulnerability Disclosure Program (VDP) is designed to provide WiCyS members with hands-on\, technical training in identifying\, reporting\, and remediating cybersecurity vulnerabilities. Utilizing the WiCyS website and platform as a live training environment\, participants gain real-world experience in vulnerability discovery\, triage\, and reporting—key skills that enhance their résumés and prepare them for careers in cybersecurity. The program empowers members to become “Defenders of WiCyS” by fostering a deeper understanding of secure coding practices\, systems analysis and responsible disclosure processes. \nParticipants are encouraged to collaborate\, share insights\, and build their technical acumen in a supportive community environment. The VDP is open to all WiCyS members and serves as a stepping stone toward more advanced training and industry engagement. \nThe VDP program will run from June 2\, 2025\, to June 1\, 2026. Applications will be open continuously from May 5\, 2025\, to May 1\, 2026—members can apply anytime. \nAvailable to:\n\nWiCyS members of all experience levels (domestic or international)\nProfessionals seeking hands-on experience\nIndividuals interested in vulnerability discovery and reporting\nMembers looking to strengthen offensive and defensive security skills\n\nWhat You Get:\n\nAccess to a live\, real-world training environment using the WiCyS platform\nOpportunities to discover\, report\, and triage actual vulnerabilities\nExposure to responsible disclosure processes and secure coding principles\nPotential future involvement in a formal bug bounty program through industry partnerships\nAnd More!\n\nProgram Details:\n\nProgram Runs June 2\, 2025 – June 1\, 2026\nApplication Open: May 5\, 2025 – May 1\, 2026\nLaunch webinar: May 27\, 1-2 pm CT\n\n  \nMore details about the VDP program and to apply visit HERE
URL:https://www.wicys.org/event/wicys-vulnerability-disclosure-program-vdp-applications-open-may-5th/2025-05-05/
LOCATION:Virtual
CATEGORIES:All Career Levels,WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/04/WiCyS-VDP-2025-Socials-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20250611T080000
DTEND;TZID=UTC:20250623T160000
DTSTAMP:20260417T185057
CREATED:20250611T125752Z
LAST-MODIFIED:20250611T125752Z
UID:10002364-1749628800-1750694400@www.wicys.org
SUMMARY:WiCyS | Google Cybersecurity Certificate Cohort Program - Applications Open
DESCRIPTION:The Google Cybersecurity Professional Certificate Cohort Program is a nine-course series that was developed to provide an understanding of the importance of cybersecurity practices and their impact on organizations. Learners will identify common risks\, threats\, and vulnerabilities\, as well as techniques to mitigate them. Hands-on experience with Python\, Linux\, and SQL is also included in the module. The courses are beginner-level and do not require any prior experience in cybersecurity. Though members can move at their own pace\, the program includes WiCyS Technical Mentors that will provide support with the coursework to help learners successfully earn their certificate in less than 6 months. \nWiCyS members accepted to the program will: \nBe provided a free limited-time license to gain access to the certificate courses in Coursera\nBe invited to the program Interest Group to engage in the cohort community\nReceive a digital badge to share with their network\nReceive a Google Cybersecurity Professional Certificate upon completion of the program \nAvailable To:\n200 WiCyS Members who have not participated in the WiCyS Google Cybersecurity program previously\nDomestic and international WiCyS members\nMembers willing to fully commit to the less than 6 months it takes to complete the program \n** This program is not open to those who have previously taken the Google Cybersecurity Certificate Training through WiCyS. \nMore information on the program can be found HERE \nSubmit your application HERE
URL:https://www.wicys.org/event/wicys-google-cybersecurity-certificate-cohort-program-application-2/
LOCATION:Virtual
CATEGORIES:WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/06/Google-Cybersecurity-Certificate-Program-2025-1-2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20250617T130000
DTEND;TZID=UTC:20250617T143000
DTSTAMP:20260417T185057
CREATED:20250609T190023Z
LAST-MODIFIED:20250609T190023Z
UID:10002335-1750165200-1750170600@www.wicys.org
SUMMARY:WiCyS AI Learning Series Program | Securing the Use of Third-Party AI/ML Products
DESCRIPTION:Explore how to evaluate and manage the security risks of integrating third-party AI/ML tools. This session will focus on supply chain considerations\, vendor risk assessments\, and strategies for maintaining trust in outsourced AI systems. \nThe AI Learning Series\, presented by the WiCyS global team and the AI Affiliate\, is a comprehensive program designed to equip cybersecurity professionals with the knowledge and skills needed to navigate the evolving landscape of artificial intelligence. The series features six\, 90-minute modules led by industry experts\, covering topics from AI fundamentals and their intersection with cybersecurity to risks\, governance\, and secure AI product development. Participants will gain insights into building secure AI products\, securing third-party AI/ML solutions\, leveraging AI to enhance organizational and customer security\, and understanding AI policy and regulations.
URL:https://www.wicys.org/event/wicys-ai-learning-series-program-securing-the-use-of-third-party-ai-ml-products/
LOCATION:Virtual
CATEGORIES:WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/03/AI-Learning-Series-program-NEW-Program-Runs.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250623
DTEND;VALUE=DATE:20250716
DTSTAMP:20260417T185057
CREATED:20250613T153014Z
LAST-MODIFIED:20250613T153014Z
UID:10002369-1750636800-1752623999@www.wicys.org
SUMMARY:WiCyS | Stage Ready Public Speaking Fellowship Cohort 2
DESCRIPTION:This is a three-part executive coaching exercise program for 50 mid-level career WiCyS members. Participants will learn how to develop stage presence and confidence with the power and presence track\, create their own personal anchor story\, and receive coaching to refine their delivery of their message. Content from their speaking sessions will be showcased on the WiCyS YouTube channel and used to source speakers for speaking opportunities in the WiCyS community. \nFor more information and to apply starting June 23rd\, visit HERE Program runs: August 7\, 2025 – September 11\, 2025.
URL:https://www.wicys.org/event/wicys-stage-ready-public-speaking-fellowship-cohort-2/
LOCATION:Virtual
CATEGORIES:WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/06/Stage-Ready-Public-Speaking-Fellowship-Cohort-2-Socials.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250625
DTEND;VALUE=DATE:20250626
DTSTAMP:20260417T185057
CREATED:20260226T162719Z
LAST-MODIFIED:20260302T135246Z
UID:10003023-1750809600-1750895999@www.wicys.org
SUMMARY:WiCyS | Executive Leaders Network
DESCRIPTION:The Executive Leaders Network brings together top cybersecurity leaders to share insights\, solve challenges\, and build a trusted community of peers. In a field that is constantly changing and where leadership can often feel isolating\, this network offers a space for open dialogue\, collaborative problem-solving\, and strategic support. It also serves as a platform to identify and elevate mid-career professionals into senior roles\, advancing the broader mission to strengthen and diversify leadership across the cybersecurity workforce. \n  \nCriteria: Cybersecurity C-Suite\, President\, VP\, or Director\n \nMeeting Cadence: Monthly\, Invite-Only\n\nYou must meet the criteria outlined above to join this network. Please complete the form HERE only if you are a cybersecurity C-Suite\, President\, VP\, or Director.
URL:https://www.wicys.org/event/wicys-senior-leaders-network-2-2/2025-06-25/
LOCATION:Virtual
CATEGORIES:WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/05/WiCyS-Executive-Leaders-Network-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250625
DTEND;VALUE=DATE:20250716
DTSTAMP:20260417T185057
CREATED:20250409T195500Z
LAST-MODIFIED:20250516T161128Z
UID:10002107-1750809600-1752623999@www.wicys.org
SUMMARY:WiCyS | Create Your Leading Edge Program: Applications OPEN June 25th
DESCRIPTION:The WiCyS State of Inclusion Benchmark Report reveals a career plateau for women in cybersecurity after 6-10 years. Yet\, our N2K Cyber Talent study proves WiCyS members outperform their peers\, even in advanced roles. WiCyS is here to help change this narrative. \nJoin 30 ambitious mid-level professionals in our exclusive 12-week program\, designed to unlock your leadership potential and accelerate your advancement. Led by industry veteran Karen Worstell\, with a proven track record of over 50% of participants achieving promotions or pay increases within three months\, this is your opportunity to transform your career trajectory. \n\nAvailable To:\n\n30 WiCyS members\nMid-level professionals only\nDomestic and International members\nMembers willing to commit fully to attending all sessions\nMembers ready to participate and engage with cameras on throughout the training\n\nWhat you get:\n\nA 12-week training program that includes the following:\n\nWeekly 90-minute seminars\nWeekly curated content\n\n\nYou will learn principles and skills to:\n\nMaster the Broken System: Learn why “meritocracy-based” performance management fails women in tech and gain strategic techniques to advance despite these barriers.\nHarness Your Six Human Needs: Discover how these fundamental needs drive every decision you make—and how to leverage them for greater career satisfaction and success.\nDevelop Authentic Leadership Presence: Master energetic state management to become the leader others naturally want to follow.\nAnd More!\n\n\n\n  \nFull details and how to apply HERE
URL:https://www.wicys.org/event/wicys-create-your-leading-edge-program-applications-now-open/
LOCATION:Virtual
CATEGORIES:WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/04/NEW-Create-Your-Leading-Edge-Apps-Open-Socials.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20250626T130000
DTEND;TZID=UTC:20250626T140000
DTSTAMP:20260417T185057
CREATED:20250506T211205Z
LAST-MODIFIED:20250506T211404Z
UID:10002125-1750942800-1750946400@www.wicys.org
SUMMARY:WiCyS June Book Club
DESCRIPTION:Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger A. Grimes \nFighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader\, from large organizations to individuals. Unlike most anti-phishing books\, which focus only on one or two strategies\, this book discusses all the policies\, education\, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world’s number one anti-phishing company\, KnowBe4\, Inc.\, this guide shows you how to create an enduring\, integrated cybersecurity culture. \n\nLearn what social engineering and phishing are\, why they are so dangerous to your cybersecurity\, and how to defend against them\nEducate yourself and other users on how to identify and avoid phishing scams\, to stop attacks before they begin\nDiscover the latest tools and strategies for locking down data when phishing has taken place\, and stop breaches from spreading\nDevelop technology and security policies that protect your organization against the most common types of social engineering\nand phishing.\n\nAnyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing. \nRegister HERE
URL:https://www.wicys.org/event/wicys-june-book-club-3/
LOCATION:Virtual
CATEGORIES:WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/05/WiCyS-June-2025-Book-Club.png
END:VEVENT
END:VCALENDAR