WiCyS Mid Atlantic Affiliate : National Pumpkin Day CTF
Ready to show off your tech skills and claim the grand prize!? Join us in celebrating National Pumpkin Day - CTF Style! LOCATION: Capitol Tech University - Cyber Lab 11301 […]
Ready to show off your tech skills and claim the grand prize!? Join us in celebrating National Pumpkin Day - CTF Style! LOCATION: Capitol Tech University - Cyber Lab 11301 […]
Join our Houston Affiliate at OT Cybersecurity in Houston to connect with WiCyS members. Please stop by our booth to meet our affiliate, snag some swag, and learn more The […]
Join our Minnesota Affiliate at the 14th Annual Leadership Event Cyber Security Summit to connect with WiCyS members. Please stop by our booth to meet our affiliate, snag some swag, […]
Join us for an insightful webinar hosted by SentinelOne designed for women looking to break into Digital Forensics and Incident Response ("DFIR"). Learn about various career pathways, key technical and […]
Join WiCyS Executive Director Lynn Dohm as a Featured Speaker at Cyber Security Summit 2024. She will present her "Keeping an Eye on the "I" in the Inclusion". Imagine a […]
Join WiCyS Strategic Partner SentinelOne ThreatOps Virtual Training sessions. Are you interested in taking on the Challenge? You'll join fellow cybersecurity peers for SentinelOne's ThreatOps Challenge, which will incorporate both […]
We are thrilled to share that WiCyS and RSA have joined forces to offer an incredible opportunity to one of our student members. One lucky RSA Conference Security Scholar program […]
The Women in Cybersecurity (WiCyS) West Africa Affiliate, under the auspices of the Cyber Security Authority (CSA) Ghana, is organizing a workshop to equip women, NGOs, CSOs, journalists, and underserved […]
Don't miss the 7th annual Diversity & Inclusion Research Conference (#DIRC24), taking place online on Oct 30. Join a stellar roster of presenters who will share practical advice and real-world […]
What to do when the AI or ML system is acting funky? How does one know when there is a problem? How can one differentiate between a design defect, data […]