Calendar of Events

  • WiCyS Sri Lanka Affiliate – Community Kickoff

    Virtual

    The WiCyS Sri Lanka Community Kickoff marks the beginning of our journey as an official WiCyS Affiliate, creating a space where cybersecurity professionals, students, and allies come together to connect, learn, and inspire. This virtual event will introduce the WiCyS Sri Lanka community, share our vision for empowering women in cybersecurity and open the door […]

  • Webinar | Elevate your Career through paid DefCon Training Opportunities

    BrightTALK

    Join the WiCyS Educational and Training Affiliate for an informative webinar on how and why to facilitate a training at DefCon. Learn the career growth opportunities that on-site training can offer and how to best showcase your expertise to the DefCon community. This session will be joined by SeeYew Mo, Director of Training for DefCon […]

  • WiCyS Professional Affiliate Leaders Only Meeting

    WiCyS Professional Affiliate Leaders Only Meeting
    Virtual

    WiCyS Professional Affiliate Leaders-Only Meeting: We are all Stronger Together. As WiCyS professional affiliates trailblaze through their regional, specialty, or corporate affiliate programs, we collectively meet monthly in a leadership capacity to sync up on WiCyS global updates, best practices, upcoming events, and Q&A. Affiliate meetings are held on the first Tuesday at 7:00 pm […]

  • WiCyS Professional Affiliate International Leaders Only Meeting

    Virtual

    WiCyS Professional Affiliate Leaders-Only Meeting: We are all Stronger Together. As WiCyS professional affiliates trail blaze through their regional, specialty, or corporate affiliate programs, we collectively meet monthly in a leadership capacity to sync up on WiCyS global updates, best practices, upcoming events, and Q & A. International Affiliate meetings are held the first Wednesday […]

  • Webinar | WiCyS GRC Intensive Training Program

    BrightTALK

    Join us for an in-depth look at the WiCyS GRC - Governance, Risk & Compliance program, a 14-week intensive training for early to mid-career women professionals in cybersecurity. This program uses the NIST Risk Management Framework (RMF) to teach the fundamentals of GRC, covering policy writing, control implementation, evidence gathering, and risk identification. The course […]

  • WiCyS | Executive Leaders Network

    Virtual

    The Executive Leaders Network brings together top cybersecurity leaders to share insights, solve challenges, and build a trusted community of peers. In a field that is constantly changing and where leadership can often feel isolating, this network offers a space for open dialogue, collaborative problem-solving, and strategic support. It also serves as a platform to […]

  • Webinar | WiCyS AI Accelerator Program Launch

    BrightTALK

    Join us on January 15 at 1 pm CT to discover how the WiCyS AI Security Accelerator Program is bridging the critical gap between traditional cybersecurity and the frontier of Artificial Intelligence. Designed for mid-career professionals (3–10 years of experience) living or working in Maryland, this strategic initiative offers hands-on training, technical mentorship, and a […]

  • Webinar | Rethinking GRC: Building an Engineered, Scalable Future

    BrightTALK

    Governance, Risk and Compliance (GRC) has long been seen as a process heavy, documentation-driven function, but the future demands something very different. As organizations scale and threats evolve, GRC can no longer rely on manual workflows, fragmented tools, and traditional governance models. It must transform into a discipline that is engineered, automated, and deeply integrated […]

  • Webinar | Securing the AI Agent: A Deep Dive into Architecture, Risks, and Controls

    BrightTALK

    The rise of AI agents introduces a new frontier of security challenges that go beyond traditional cybersecurity. In this WiCyS webinar, Christine Sizemore, a Security Specialist at Google Cloud, will guide you through the unique security architecture of AI agents. She will explore the top risks, including prompt injection and tool manipulation, and provide a […]