BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250505
DTEND;VALUE=DATE:20260501
DTSTAMP:20260407T133648
CREATED:20250421T154955Z
LAST-MODIFIED:20250604T181530Z
UID:10002151-1746403200-1777593599@www.wicys.org
SUMMARY:WiCyS Vulnerability Disclosure Program (VDP) | Applications Now OPEN
DESCRIPTION:The WiCyS Vulnerability Disclosure Program (VDP) is designed to provide WiCyS members with hands-on\, technical training in identifying\, reporting\, and remediating cybersecurity vulnerabilities. Utilizing the WiCyS website and platform as a live training environment\, participants gain real-world experience in vulnerability discovery\, triage\, and reporting—key skills that enhance their résumés and prepare them for careers in cybersecurity. The program empowers members to become “Defenders of WiCyS” by fostering a deeper understanding of secure coding practices\, systems analysis and responsible disclosure processes. \nParticipants are encouraged to collaborate\, share insights\, and build their technical acumen in a supportive community environment. The VDP is open to all WiCyS members and serves as a stepping stone toward more advanced training and industry engagement. \nThe VDP program will run from June 2\, 2025\, to June 1\, 2026. Applications will be open continuously from May 5\, 2025\, to May 1\, 2026—members can apply anytime. \nAvailable to:\n\nWiCyS members of all experience levels (domestic or international)\nProfessionals seeking hands-on experience\nIndividuals interested in vulnerability discovery and reporting\nMembers looking to strengthen offensive and defensive security skills\n\nWhat You Get:\n\nAccess to a live\, real-world training environment using the WiCyS platform\nOpportunities to discover\, report\, and triage actual vulnerabilities\nExposure to responsible disclosure processes and secure coding principles\nPotential future involvement in a formal bug bounty program through industry partnerships\nAnd More!\n\nProgram Details:\n\nProgram Runs June 2\, 2025 – June 1\, 2026\nApplication Open: May 5\, 2025 – May 1\, 2026\nLaunch webinar: May 27\, 1-2 pm CT\n\n  \nMore details about the VDP program and to apply visit HERE
URL:https://www.wicys.org/event/wicys-vulnerability-disclosure-program-vdp-applications-open-may-5th/2025-05-05/
LOCATION:Virtual
CATEGORIES:WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/04/WiCyS-VDP-2025-Socials-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250905
DTEND;VALUE=DATE:20260801
DTSTAMP:20260407T133648
CREATED:20250905T184614Z
LAST-MODIFIED:20260406T125604Z
UID:10002552-1757030400-1785542399@www.wicys.org
SUMMARY:WiCyS | Security Training Scholarship
DESCRIPTION:The WiCyS Security Training Scholarship\, made possible by WiCyS Tier 1 Partners and Premier Supporters\, is a multi-staged scholarship opportunity for WiCyS members. Those selected will participate in a reliable pathway to launch and advance in their cybersecurity careers through skills development. The focus of this scholarship is to award WiCyS members who are seeking cybersecurity employment within the next 1.5 years. The program is designed for students and/or career changers! \nBuild and leverage the power of community. During each stage of the scholarship\, a cohort is established with mentors and peers to help guide and support recipients. This powerful network will be there through every step of the scholarship experience to lean in on. The collective strength of all involved is priceless. \nGraduates of the program will be ready to pursue careers in cybersecurity! \n\n\n\n\nAll WiCyS members\, over age 18\, are invited to apply.  This training program is composed of multiple stages. Each stage has specific criteria. Throughout the program\, continuation to the next stage is based on performance in the previous stage and application data. \nWhat Makes this Program Unique: \n\nFinds hidden cybersecurity talent\nElevates those with aptitude\, grit\, and determination\nEmpowers all participants with real-world skills they can continue to build upon\nChanges lives by enabling final-stage participants to start cybersecurity jobs in less than a year of completion\nProvides direct impact on the cybersecurity workforce by launching careers\n\n\n\n  \nMore information HERE
URL:https://www.wicys.org/event/wicys-security-training-scholarship/
LOCATION:Virtual
CATEGORIES:CPE/CEU Credits Available,WiCyS,WiCyS Program
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/09/2025-Security-Training-Scholarship-FINAL-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20260121T130000
DTEND;TZID=UTC:20260121T140000
DTSTAMP:20260407T133648
CREATED:20260106T182120Z
LAST-MODIFIED:20260106T182120Z
UID:10002698-1769000400-1769004000@www.wicys.org
SUMMARY:Webinar | Securing the AI Agent: A Deep Dive into Architecture\, Risks\, and Controls
DESCRIPTION:The rise of AI agents introduces a new frontier of security challenges that go beyond traditional cybersecurity. In this WiCyS webinar\, Christine Sizemore\, a Security Specialist at Google Cloud\, will guide you through the unique security architecture of AI agents. She will explore the top risks\, including prompt injection and tool manipulation\, and provide a framework for building a robust defense. You’ll learn how to apply traditional security controls while also adopting new\, agent-specific mitigation to secure your AI applications from end to end. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. To earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-securing-the-ai-agent-a-deep-dive-into-architecture-risks-and-controls/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2026/01/WiCyS-LI-_-Twitter-2025-12-17T135623.412.png
END:VEVENT
END:VCALENDAR