Speaker Spotlight Program Applications Now Open!
WiCyS is excited to announce the launch of the WiCyS Speakers Spotlight Program! This new program is designed to help women like you, professionals working in cybersecurity, to develop public […]
WiCyS is excited to announce the launch of the WiCyS Speakers Spotlight Program! This new program is designed to help women like you, professionals working in cybersecurity, to develop public […]
Join Lynn Dohm, Executive Director (WiCyS), Pam Lindemoen, CISO Advisor (Cisco Secure), and Bobbie Carlton, Founder at Innovation Women as they share how this Speakers Spotlight Program allows WiCyS members […]
Please join WiCyS San Diego for our third Speaker Series, in-person event at the La Jolla/Riford Public Library on Sunday, January 14, 2023 at 2:30 pm PST. Presented by Sanjana […]
WiCyS Cybersecurity & Technology Manager Quintana Patterson will be part of Uplift Panel 1 and 2 at the SheLeads Tech lunch hosted by the ISACA Denver chapter. Join an afternoon […]
Join University of Michigan-Dearborn's Women In Cybersecurity (WiCyS) chapter for a jam-packed workshop all about resumes! Our favorite local women leaders in tech will be attending and reviewing one of […]
Join us at the La Jolla/Riford Public Library on Saturday, February 24th at 2:30 pm for a presentation by Dr. Vanessa Bourgeois. Dr. Bourgeois has a Masters degree in Information […]
Join Women in Cybersecurity at UM-Dearborn for a day-long conference all about cybersecurity! We have many keynote speakers, an industry women leaders panel, a uniquely styled CTF and a research […]
Join our Minnesota Affiliate at SecretCon! We are thrilled to announce that one of our very own WiCyS members, Jessa Gegax, will be taking the stage at this year’s SecretCon, […]
Our fifth installment of the Cyber Speaker Series! Join us IN PERSON for a lively all-female panel discussion with the members of WiCyS San Diego. We are going to hit […]
This cyber speaker series event will focus on how strategic vendor management is essential for maintaining robust security postures. It will explore the challenges of managing third-party vendors, including the […]