Calendar of Events

  • Webinar | Introduction to Zero Trust: Why It Matters in the Digital Era

    BrightTALK

    Traditional perimeter-based security models are no longer sufficient in an age of increasing cyber threats, cloud-based infrastructures, and remote work. The Zero Trust security framework has emerged as a crucial approach to safeguarding digital assets by assuming that no entity—inside or outside the network, should be trusted by default. Please join speakers from WiCyS Strategic […]

  • WiCyS Members Secure Your Spot at SANSFIRE 2025

    Washington Hilton 1919 Connecticut Avenue Northwest, Washington, DC, United States

    Join top cybersecurity professionals July 14–19 for expert-led training that delivers a year’s worth of learning in just 5–6 days. Attend in person and receive a limited-time promo bundle—valued at […]

  • WiCyS AI Affiliate | Meetup

    Virtual

    Join the WiCyS AI affiliate for a member meetup. We will discuss the upcoming events, provide updates on activities we have been working on, and share how you can start […]

  • WiCyS | NICE Conference & Expo 2025

    Denver Marriott Tech Center 4900 S Syracuse St, Denver, CO, United States

    Join WiCyS and Executive Director Lynn Dohm at the NICE Conference & Expo 2025 to connect with WiCyS members. Please stop by our booth to meet our affiliate, snag some […]

  • WiCyS Minnesota Affiliate | 6th Annual Golf Open and Tournament

    Dellwood Country Club 29 Highway 96 East, Dellwood, M, United States

    Tee off with fellow cybersecurity professionals at our 6th Annual Golf Open and Tournament! Enjoy a perfect blend of networking and fun on the greens. Join us for a memorable […]

  • Webinar | Cyber Security in Contact Center as a Service (CCaaS)

    BrightTALK

    Join Ford for this webinar to understand why contact centers are vital for customer relationships and how the shift to cloud-based CCaaS introduces new cybersecurity challenges. We'll delve into threats like phishing and malware, emphasizing the need for robust authentication, data encryption, and regular security audits. Discover how a comprehensive strategy combining technology, access controls, […]