Help showcase the strength of women in cybersecurity by submitting a workshop, lightning talk, presentation, birds of a feather, panel or student research poster for the 10th anniversary of our annual Women in CyberSecurity (WiCyS) technical conference April 11-13 in Nashville, TN. Proposal Tracks: Technical Skill Building: technical skill development in all areas of cybersecurity Education […]
You're invited to network and grow your skills at the annual Women in CyberSecurity (WiCyS) technical conference April 11-13 in Nashville, TN. Apply for reduced conference rate registration and two nights of complimentary shared lodging on April 11 and 12. Applicants must be a current WiCyS member. Scholarships include Veterans, Faculty, Students, and Equity and Advancement. Students MUST […]
Learn best practices for protecting yourself during our WiCyS Cybersecurity Month webinar series, Real Ethical Hacking Stories. This webinar series will give viewers insight into real-life scenarios, awareness of the purpose of ethical hacking, and how ethical hackers defend systems from malicious users. To view the entire WiCyS Real Stories of Ethical Hackers Series HERE.
This series focuses on how to ensure your personal cybersecurity. Our goal is to help educate and empower our community with resources, tips, and tricks to ensure safe and secure cyber experiences. To view the entire WiCyS Secure Yourself Series HERE.
In this WiCyS strategic partner webinar with Akamai, participants will learn how to monitor best/secure their digital footprint and how to be an ally to friends/family who experience online abuse. […]
Join our WiCyS Phoenix Affiliate’s booth at The Cyber Security Summit. Engage, Network, Socialize, and share with hundreds of fellow Powerful Business Leaders, C-suite executives, and entrepreneurs. Register HERE.
Day of Shecurity conference is organized by Secure Diversity and the Lookout Foundation. It aims to promote diversity and inclusion in the cybersecurity field. WiCyS Germany President, Ejona Preci, is […]
Organizations have different flavors of cybersecurity professionals – there are architects, analysts, engineers, testers, researchers, and more. But what do these different titles actually mean? What are the responsibilities of […]
Space systems are critical in modern infrastructure, supporting everything from telecommunications and navigation to financial services and energy grids. However, space systems are also increasingly vulnerable to cyberattacks as adversaries […]
Join WiCyS Western Washinton Affiliate’s booth at SecureWorld! For more than 21 years, SecureWorld has been tackling global cybersecurity issues and sharing critical knowledge and tools needed to protect against ever-evolving threats. Through our network of industry experts, thought leaders, practitioners, and solution providers, we collaborate to produce leading-edge, relevant content. Register HERE.
Join WiCyS strategic partner Optum as they discuss transitioning from a military service career to the private sector workforce. Unable to make it during the scheduled time? Register to receive […]
Join our WiCyS DFW Affiliate’s booth at The Cyber Security Summit. Engage, Network, Socialize, and share with hundreds of fellow Powerful Business Leaders, C-suite executives, and entrepreneurs. Register HERE.
Join our WiCyS Massachusetts Affiliate’s booth at The Cyber Security Summit. Engage, Network, Socialize, and share with hundreds of fellow Powerful Business Leaders, C-suite executives, and entrepreneurs. Register HERE.
As cyber threats continue to rise, it’s now more important than ever to ensure you’re protected against growing threats. Join this WiCyS strategic partner webinar with Yubico to learn straightforward security and privacy practices you can apply in your everyday life that will help protect you (and your business) on the internet. Unable to make […]
Join the WiCyS Military and Veterans to socialize and network as we celebrate and honor veterans for their sacrifices, patriotism, and willingness to serve. Everyone is welcome to join and partake in this exciting social event. We look forward to seeing all your beautiful faces. Join us here.
This 90-minute virtual SANS Executive Cyber Exercise on November 15th at 1 p.m. ET will put 24 WiCyS members inside a simulated cyber event to help their organization understand what it takes to respond to a cyber incident from a strategic perspective. The simulated exercise will emphasize the importance of a well-practiced cyber crisis plan […]
WiCyS members, as a benefit of your membership, we wish to invite you to an exclusive event! Empowering Women in Cybersecurity series aims to enable women to grow into senior leadership roles in cybersecurity. This series, a partnership between WiCyS Chicago Affiliate and the Chicago CISO of The Year (COTY) program, will begin on November […]
In the rapidly evolving landscape of AI and emerging technologies, the potential for groundbreaking innovation is undeniable. However, this surge of innovation brings forth a critical challenge: the delicate equilibrium between technological advancement and safeguarding security. In this WiCyS strategic partner webinar, Trend Micro will delve into the imperative need to balance Innovation and Security […]
Join WiCyS strategic partner IBM as they host a webinar about how organizations and governments worldwide face new cybersecurity risks as they adopt AI to help them boost operational efficiency, improve customer and employee experiences, modernize their applications, and grow revenue. 53% of business executives cite cybersecurity risks as a top barrier to adopting AI […]
Founded in London in 2015, Women of Silicon Roundabout is the original centerpiece of the global gender diversity movement in tech and the flagship event in the Women in Technology World Series. With the birth of a new paradigm and a tidal wave of tech innovation, we want our community to be at the forefront […]
As we build on the exciting findings from our WiCyS State of Inclusion Assessment we continue to collect additional data for our next industry benchmark report. Attend this webinar to learn more about our upcoming “Measuring Inclusion” workshops. Attendance is free and open to all individuals who work for a cybersecurity company or in a […]
THIS WEBINAR HAS BEEN CANCELED. RESCHEDULED DATE IS TBD. Sarah Beckel, Acting Deputy Associate Director for Vulnerability Management at the Cybersecurity and Infrastructure Security Agency (CISA), is presenting this WiCyS strategic partner webinar in conjunction with the DHS Cybersecurity Service. Ms. Beckel joined the Federal Service in 2013 as an IT Specialist serving in multiple […]
Join this WiCyS strategic partner webinar with Cisco to learn from a cybersecurity marketing expert how she helps her children safe online. Seema Kathuria will share five tips and tricks to encourage safe behavior and mitigate risk for children who use the Internet for school or recreation. This session will be fun and highly interactive. […]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.