Calendar of Events

  • Cybersecurity, Stronger Together 2026 Conference

    Jack Morton Auditorium 805 21st ST, Washington, DC, United States

    WiCyS is proud to support George Washington University’s College of Professional Studies (CPS) in partnership with The Cyber Guild (TCG) are hosts of Cybersecurity, Stronger Together, an annual gathering of industry leaders, leaders from […]

  • WiCyS Professional Affiliate International Leaders Only Meeting

    Virtual

    WiCyS Professional Affiliate Leaders-Only Meeting: We are all Stronger Together. As WiCyS professional affiliates trail blaze through their regional, specialty, or corporate affiliate programs, we collectively meet monthly in a leadership capacity to sync up on WiCyS global updates, best practices, upcoming events, and Q & A. International Affiliate meetings are held the first Wednesday […]

  • WiCyS AI Affiliate | Empowering Women in Cybersecurity and Privacy

    Eversheds Sutherland, Brienner Straße 12, 80333 Munich Eversheds Sutherland, Brienner Straße 12, Munich, Germany

    We’ll dig into what’s really happening in the world of cybersecurity and AI security, uncover the latest trends, and spotlight the issues you should be watching closely. Expect candid insights, practical advice, and maybe a few surprises! Learn the Latest EU Tech & Cyber Law Developments & A Panel Exchange on data, cybersecurity, and AI […]

  • WiCyS Florida Affiliate | Brunch Bytes: Galentines Edition

    Various Locations

    Join the Florida Affiliate for Galantine's Brunch Bytes on February 8. Brunch Bytes is more than just a meal. It’s a chance to connect with other WiCyS Florida members, build local […]

    Free
  • Webinar | Threat Hunting 101: From Alerts to Adversaries

    BrightTALK

    Join this WiCyS Webinar with Nebulock to learn about threat hunting, a proactive approach to cybersecurity focused on uncovering hidden and emerging threats that alerts may have missed. In this introductory session, Sydney Marrone, Head of Threat Hunting at Nebulock, will explain the fundamentals of threat hunting, how it differs from traditional detection, and what […]