Learn the basics of Software Bill of Materials (SBOM) in this online event, SBOM 101 – your ultimate guide to understanding the ins and outs. This event is an one hour webinar hosted by the WiCyS Mid-Atlantic Affiliate and Victoria Ontiveros from Cybersecurity and Infrastructure Security Agency (CISA), as we dive into the fascinating world […]
Please join WiCyS San Diego for our third Speaker Series, in-person event at the La Jolla/Riford Public Library on Sunday, January 14, 2023 at 2:30 pm PST. Presented by Sanjana Sarda, an offensive Security Expert at Anduril and an Electrical Engineer who studied Machine Learning (ML) with an emphasis on Security, Privacy, and Algorithmic bias […]
The study is designed to diagnose and analyze cybersecurity skills across the WiCyS member community, leveraging the advanced N2K NICE Workforce Diagnostic assessment. Under this initiative, N2K will provide WiCyS members complimentary access to the NICE Diagnostic, allowing them to assess their knowledge-area strengths and weaknesses aligned to the NICE Cybersecurity Workforce Framework. Invest in […]
Leading with equity, inclusion, and allyship is a conversation where we, as volunteer leaders within the WiCyS organization, agree to engage in a conversation from a place of consent for all of us to learn and grow. The WiCyS Leadership Series: Speak. Listen. Community. Cultivates the community and space for that dialogue. During the January […]
Join this WiCyS Strategic Partner Webinar from Optum, hosted by Heather Stoner, Business Information Security Officer-State Government. Heather will explore the spectrum of human experience and discover how embracing neurodivergent perspectives can foster inclusive work environments, promote flexibility and advocate for conditions that empower neurodivergent talent. She will share her personal story and offer insights […]
Working hard and passionate about your career in cybersecurity, but not getting opportunities to shine? Join us to hear best practices for building your personal brand. Learn how to stand out from the crowd - both within your company and across the industry. Code Red Partners Cybersecurity staffing firm will share techniques for capturing the […]
Join WiCyS at the AI Virtual Cybersecurity Summit hosted by Data Connectors January 25th. Stop by the our booth to meet our members and learn more about WiCyS. Embark on a journey into the future of innovation at our Virtual AI Summit! Join thought leaders, experts, and enthusiasts from around the globe as we explore […]
Feeling intimidated by the cryptic language of assembly? Don't worry, even the most powerful programmers started somewhere! We are hosting a 2-hour beginner-friendly workshop where you'll unlock the secrets of assembly language, step-by-step. No prior experience needed, just a curious mind and a desire to dive into the core of computer architecture. In this workshop, […]
WiCyS Student Chapter Leaders-Only Meeting: WiCyS Student Chapters are developed and launched at a rapid rate around the world and help showcase the collective strength of the Women in the CyberSecurity community. Each month, these outstanding women student leaders and their faculty advisors connect to share updates on WiCyS global, best student chapter practices, upcoming […]
WiCyS Cybersecurity & Technology Manager Quintana Patterson will be part of Uplift Panel 1 and 2 at the SheLeads Tech lunch hosted by the ISACA Denver chapter. Join an afternoon of engaging panel discussions, keynote speakers, and interactive workshops led by industry experts. You'll have the opportunity to network with like-minded individuals and gain valuable […]
In-person lunch meeting for the WiCyS Rice University Student Chapter where we will discuss the recent appearance of MOAB (Mother of All Breaches) Here is the slide deck I will be using if anyone is interested in doing a presentation on the same topic.
Join University of Michigan-Dearborn's Women In Cybersecurity (WiCyS) chapter for a jam-packed workshop all about resumes! Our favorite local women leaders in tech will be attending and reviewing one of the most integral parts of the application process - your resume!
Join the WiCyS Chicago Affiliate at ChiBrrCon IV. Visit our booth to meet our affiliates, snag some swag, and learn more about WiCyS. The mission and vision of ChiBrrCon are the same as the ones our founders set with their own in-house programs; to provide attendees with high quality training, an opportunity to present to […]
Calling all Hamburg hackers and cybersecurity enthusiasts! Join us for an epic meetup to hack it out, share knowledge, and connect with fellow security pros in the vibrant Hamburg tech scene. ️ RSVP for this FREE event HERE
in Munich, WISP event was held and WiCyS were invited too. It was not just an event; it was a convergence of minds, a symphony of ideas, and most importantly, a shared space for growth and learning among us. We delved into the complexities of modern challenges, with a special focus on the transformative power […]
The Jeffco Public Schools IT department started Jeffcon event in 2017 as an offering a unique opportunity for the high school students in the district to dive deep into the world of information technology. The day is filled with exploration, that allows students to learn from seasoned Jeffco staff and industry professionals, including Quintana Patterson, […]
Join us for an exciting in-person event, The Art of Negotiation: Unlock Your Security Potential + Resume Workshop, on Friday, February 2, 2024 at the Microsoft Campus. This event is an incredible opportunity to enhance your negotiation skills while exploring the vast potential of the security industry. During this interactive workshop, you will learn valuable […]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.