The WiCyS Vulnerability Disclosure Program (VDP) is designed to provide WiCyS members with hands-on, technical training in identifying, reporting, and remediating cybersecurity vulnerabilities. Utilizing the WiCyS website and platform as a live training environment, participants gain real-world experience in vulnerability discovery, triage, and reporting—key skills that enhance their résumés and prepare them for careers in […]
The WiCyS Security Training Scholarship, made possible by WiCyS Tier 1 Partners and Premier Supporters, is a multi-staged scholarship opportunity for WiCyS members. Those selected will participate in a reliable pathway to launch and advance in their cybersecurity careers through skills development. The focus of this scholarship is to award WiCyS members who are seeking cybersecurity employment within the next […]
WiCyS encourages its members to submit to Identiverse 2026. The annual Identiverse Conference is the keystone event for digital identity practitioners, professionals, and leaders. 2026 will be the seventeenth year bringing together the best across industry and enterprise to share insights, synthesize new ideas, and advance the state of modern digital identity and security. The […]
WiCyS and skillrex have partnered to launch the WiCyS Talent Assessment, a vital research tool designed to better understand the background, skills, and professional development needs of our members. This is not a test or a certification exam, and no prerequisite knowledge is required. By participating between December 1 and December 31, 2025, you'll help […]
Are you ready to boost your cybersecurity career? Start with networking—the essential cybersecurity skill! In this bootcamp, participants will learn the importance of understanding technologies like IP addressing, layer four protocols and ports, routing, switching, and other foundational technical concepts. This education is delivered through the Fortinet Networking Bootcamp, which kicks off for WiCyS members […]
WiCyS Education and Training Affiliate has partnered with DefCon Training to bring greater exposure to training opportunities in CyberSecurity. Call for trainers for DefCon 2026 in Las Vegas, August 8-11, is NOW open. Training can be an excellent way to grow your career by learning a new skill and showcase your expertise. Submit your training […]
Apply to attend RSAC 2026 with WiCyS! We have complimentary full conference passes to provide as scholarships open to ALL of our members. We request that only those committed to attending the entire event complete the complimentary pass application. We will also have a few WiCyS-specific events throughout RSAC 2026 that recipients must attend. NO travel […]
Join the WiCyS Educational and Training Affiliate for an informative webinar on how and why to facilitate a training at DefCon. Learn the career growth opportunities that on-site training can […]
Join us for an in-depth look at the WiCyS GRC - Governance, Risk & Compliance program, a 14-week intensive training for early to mid-career women professionals in cybersecurity. This program uses the NIST Risk Management Framework (RMF) to teach the fundamentals of GRC, covering policy writing, control implementation, evidence gathering, and risk identification. The course […]
The Executive Leaders Network brings together top cybersecurity leaders to share insights, solve challenges, and build a trusted community of peers. In a field that is constantly changing and where leadership can often feel isolating, this network offers a space for open dialogue, collaborative problem-solving, and strategic support. It also serves as a platform to […]
Governance, Risk and Compliance (GRC) has long been seen as a process heavy, documentation-driven function, but the future demands something very different. As organizations scale and threats evolve, GRC can no longer rely on manual workflows, fragmented tools, and traditional governance models. It must transform into a discipline that is engineered, automated, and deeply integrated […]
The rise of AI agents introduces a new frontier of security challenges that go beyond traditional cybersecurity. In this WiCyS webinar, Christine Sizemore, a Security Specialist at Google Cloud, will guide you through the unique security architecture of AI agents. She will explore the top risks, including prompt injection and tool manipulation, and provide a […]
Join WiCyS and SANS Technology Institute for an informative webinar designed for women at every stage of their cybersecurity career, discussing how the SANS Technology Institute's degree and certificate programs turn potential into day-one impact and long-term growth. We’ll explore the journeys of alumnae from varied backgrounds who found opportunity, confidence, and career success through […]
Join WiCyS Western Canada and ASIS Chapter 162, Calgary for the first Canadian screening of "The Women in Security Documentary" featuring WiCyS Executive Director Lynn Dohm! followed by networking, appetizers and drinks. A Resilient Features production and directed by Yvette Freeman, The Women in Security Documentary brings to life the often untold stories of women […]
Create a digital vision board focused on career growth, personal goals, and professional development in cybersecurity and tech. Kick off 2026 with clarity, intention, and community. Join WiCyS Florida for a virtual Vision Board Workshop: “Map Your 2026”, led by a member of our Leadership Team. This interactive session will guide participants through creating a […]
AI-driven threats are evolving fast — and so should our defenses. We’re excited to bring the community together for a practical, expert-led discussion on defending against rogue AI agents in real-world environments. This session will feature lightning talks and interactive Q&A with industry leaders who are shaping the future of cybersecurity. Featured Speakers: • Chitra […]
WiCyS Student Chapter Leaders-Only Meeting: WiCyS Student Chapters are developed and launched at a rapid rate around the world and help showcase the collective strength of the Women in the CyberSecurity community. Each month, these outstanding women student leaders and their faculty advisors connect to share updates on WiCyS global, best student chapter practices, upcoming […]
WiCyS is proud to partner with the Tampa Official Cybersecurity Summit on January 30th and provide our community with free admission. The Seventh Annual Tampa Official Cybersecurity Summit is the must-attend event for CISOs and senior leaders looking to strengthen resilience, reduce risk, and align security with business goals. Join top executives, innovators, and experts for a full […]
Don't miss “The WOMEN IN SECURITY Documentary” Columbus Screening Premiere featuring WiCyS Executive Director Lynn Dohm! Experience the power of The WOMEN IN SECURITY Documentary in Columbus! Don't miss the unforgettable film + networking! Join the community and WiCyS' Executive Director, Lynn Dohm, for an exclusive in-person event. Witness the powerful stories of women […]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.