Your Skillset Transformed

Take your skills to the next level by registering for one our upcoming webinars below. Don’t forget to check out our list of recent recordings to see what we’ve been up to.


Upcoming WEBINARS:

Fundamentals of AWS Security with Becky Weiss, Senior Principal Engineer (AWS)

The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure are simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.

Sep 30 2020 2:00 pm

Recorded WEBINARS:

Firewalking: A Female Perspective on Breaking Barriers with Dr. Dawn Beyer, Jacque Blanchard, Tammy McNeley, and Valerie Underwood

In 2018, 20% of all jobs in technology were held by women (Source: Small Business Trends). Fortune 500 companies with at least 3 women in leading positions saw a 66% increase in ROI (Source: Women Who Tech). In this panel, led by Dr. Dawn Beyer, we will share our unique experiences on how we have bypassed firewalls to enter a male dominated field while opening doors for others to do the same.

Aug 26 2020 | 45 mins

Build Your Virtual Brand: Tips for Navigating Online Recruitment with Target experts

Join the Target team for a fun career development workshop focused on building your virtual brand. You’ll have the opportunity to connect with the Target Recruitment team on learning valuable skills to help you navigate the job hunt during this unprecedented time.

Aug 11 2020 | 56 mins

[PANEL] Security as a Service with Stephanie Olsen | Sailaja Kotra-Turner | John Frazier | Jeremiah Dewey, Rapid7

As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

-Why your organisation needs to move towards SEaaS
-The different models of security as a service
– SEaaS solutions and strategies

Stephanie Olsen, Customer Trust Manager, Product & Application Security, Netflix & WiCyS Silicon Valley Affiliate President
Sailaja Kotra-Turner, CISO
John Frazier, Chief Operating Officer, Synoptek
Jeremiah Dewey, VP Managed Services, Rapid7

Jul 13 2020 | 53 mins

AWS Security JAM x WiCyS | Interactive Learning Series with AWS experts

Are you interested in learning how YOU can build securely on AWS? Join us for the AWS Security Jam learning series – a hands-on, team-oriented, gamified learning experience which will enable you to leverage a wide range of AWS security services. If you get excited about securing workloads in the cloud, come and challenge your skills while learning new techniques. AWS will host three Security Jam sessions (beginners, intermediate, and advanced), so join us for all three or pick the session most relevant to you. We will have a number of AWS experts virtually available to discuss ideas, provide guidance, and help your team get through any challenges.

Jul 9 2020 | 60 mins

Security Frenemies: Red & Blue Boosting Each Other with Matt Linton, Detection and Response, and Niru Ragupathy, Offensive Security

Matt Linton, a member of Google’s Detection and Response team and Niru Ragupathy, a member of Google’s Offensive Security team pair up to showcase how red and blue teamers can learn from each other. They walk through a hypothetical attack from start to finish, at each step switching between the point of view of Attackers and Defenders to highlight what each side sees and does, showcasing what makes each side rewarding and fun.

Jun 24 2020 | 61 mins

Q&A: Racial Equity and Inclusion, Cybersecurity and What it Means to be an Ally
with Jessica Robinson, CEO, PurePoint International

We are committed to racial equity within WiCyS and the cybersecurity profession. Join us for a candid conversation on what it means to be an ally for the BIPOC cybersecurity community. Jessica Robinson will host a Q&A session to share more about her experience in infosec through the lens of race and gender and how we can all be allies.

Jun 23 2020 | 61 mins

Cyber Breach Fatigue with Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)

The stream of near constant data breaches has left consumers desensitized to the news their information was lost or stolen. We’ll discuss issues around complacency both in consumers and enterprises such as how long the customer cares after a breach occurs, whether data loss is as negatively impactful to an organization’s reputation as it used to be, and how breach fatigue benefits hackers.

Mar 31 2020 | 35 mins

Orchestrating Various Roles to Uplift Security at Acquisitions with Ruchi Shah, Sr Security Engineering Manager at Google

Security is becoming an integral part of the M&A decision making process. In this talk, we will discuss what Google Security worries about when we acquire or start a company and how different roles within the security organization work in synchronization to make the overall integration secure and successful.

Ruchi is a Sr Security Engineering Manager at Google where she manages an organization whose mission is to secure Acquisitions and Alphabets. In her role, she leads security engineering and technical program management functions. Prior to joining Google, she spun up the Subsidiary Security Program at Amazon and managed the product roadmap for AWS Identity and Access Management and AWS Key Management services. Ruchi has worked at Deloitte and Touche LLP and Ernst and Young, where she helped clients implement security solutions ranging from Identity and Access Management (IAM), Security Information and Event Management (SIEM) to Network Security Products. She has over 13 years of experience in Security.

Feb 19 2020 | 48 mins

Good vs Bad Metrics with Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)

Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.

Feb 18 2020 | 30 mins

Offensive vs Defensive Security with Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)

US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?

Jan 22 2020 | 25 mins

Taking a Global Look at Market Access Requirements in Cybersecurity Landscape with Samantha Symonds, Security & Trust Cybersecurity Advisor for Cisco Systems

In this talk, we will discuss the portion of cybersecurity known as ‘market access’. We will dive into what market access requirements are and what they mean for cybersecurity professionals as well as to the world. We will go over the different types of market access requirements as well as discuss from a geopolitical standpoint where cybersecurity is moving in this space and what we are expecting to happen in the near future.

We will breakdown the most common/popular market access requirements and discuss the security domains that are tested as well as the most common security best practices covered. We will cover both the differences and similarities in cloud and on-premises based cybersecurity market access requirements as well as go into the different cybersecurity requirements per business need (i.e. financial, medical, etc.).

We will also go through who specifically is involved in influencing and creating these global market access requirements, the specific technical and business requirements that go into these regulations, the specific types of businesses, users, or governments affected, as well as what these market access requirements satisfy in the global cybersecurity landscape, and what they are lacking in the current market. We will map out the global viewpoint of cybersecurity market access certifications, attestations, regulations, and accreditations as well as dive into what the typical engagement process looks like, and how the overall cybersecurity posture of what is being tested is determined.

In summary, this is meant to be a technical discussion on cybersecurity certifications/attestations/regulations/accreditations from the global perspective to take a deeper look at what we are seeing from different countries and where we are seeing trends emerge from key influential regulating bodies. Some market access requirements we will go into are ISO 27001, SOC2, C5 (Germany), SecNumCloud (France), R226, Common Criteria, and many more.

Dec 17 2019 | 42 mins

Women in Cyber | Top Talent Initiatives with Dawn Beyer, Senior Fellow, Lockheed Martin Space

Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).

Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.

Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.

Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.

Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.

Dec 6 2019 | 51 mins

Cyber Skills for the Security Industry: How to Bridge the Talent Gap with Min Kyriannis, Head, Technology Business Development, Jaros, Baum & Bolles, Andrew Lanning, Co-Founder, Integrated Security

Join the Security Industry Association (SIA) and the Women in CyberSecurity (WiCyS) for the reveal of insights from a research project into the cyber skills gap within the electronic physical security industry.

In addition to presenting findings from SIA’s 2019 Security Industry Cyber Skills Gap Study, our speakers will explore how both industries must change to help attract talented cybersecurity professionals and will examine the wave of emerging high-tech cybersecurity employment roles within systems integration firms and physical security IoT-device and solution developers.

The webinar will:
•Analyze the types of cybersecurity skills that electronic physical security technology companies need
•Educate cybersecurity professionals about employment opportunities within systems integration firms and producers of IoT devices, physical security solutions and software.
•Correlate skills held by young cyber professionals with the skills required by technology companies producing physical security solutions
•Share insight into the industry perceptions and career motivations of cybersecurity students and professionals

Dec 5 2019 | 59 mins

Getting Started with WiCyS Student Chapters and Making an Impact with Dr. Vitaly Ford, Professor Pauline Mosley, and the Tennessee Tech Chapter Students

In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.

Oct 16 2019 | 60 mins

N00bSec to Cyber-Champion: How I Used CTFs Launch My Career in Cybersecurity
with Kaitlyn Bestenheider, Senior Information Security Associate for Tevora and Chief Player Ambassador for National Cyber League

Too often, when I tried to learn cybersecurity in a classroom lab, I found that it existed in a sphere of ideal conditions: we were given the perfect command on the perfect target to get the perfect results on that target. As it turns out, the real world has less than ideal conditions, so I wasn’t sure how my education was going to translate to the real world. That’s when I discovered cyber competitions. In the CTF’s I began to play, I found that there were no wrong ways to get a right answer and I was finally able to hit the ground running in a way that felt like I was preparing for the workforce. Just over a year into my career, I can say that Cyber CTF’s prepared me better than any classroom experience could. Join me on Wednesday, October 2nd to find out how this newbie took her skills from #N00bSec to #Cyber-Champion using CTF’s!

Pivoting to a Career in Cybersecurity Teresa Merklin, Lockheed Martin Aeronautics Company

This Lockheed Martin presentation introduces the concepts of career pivots for women who are contemplating or executing a pivot as well as anyone who might have the need to navigate a career pivot in the future. Keys to successful career pivots are identified and the general steps to be performed are described. Specific considerations for pivoting into careers in cybersecurity are also provided.

Sep 12 2019 | 60 mins

Why Cybersecurity and Physical Security Belong Together with Min Kyriannis, Head of Cybersec, Jaros, Baum & Bolles & Valerie Thomas, Exec Information Security Consultant, Securicon

In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.

Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.

Key Focuses:
•How to evaluate and improve the cybersecurity of cyber-physical systems
•How threat actors are targeting cyber weaknesses in physical security systems
•Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
•How new technologies like AI are evolving security

Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management

Sep 4 2019 | 50 mins

Women Leaders in Equifax Security: Diverse Perspectives Meghan Caputo, Ahmad Douglas, Diana Dudas, Courtney Healey, Jamila Ramsay, and Katalina Reynolds

The terms security and cyber (short for cybersecurity) are often used interchangeably, referring to the profession narrowly defined as a team of professionals who leverage technologies and processes to defend an organization’s systems and networks from attack. However, this narrow use of security sells the field short – there are in fact a number of key functions under the security umbrella, one of which is cybersecurity, all of which are essential to the success of the organization. Some such functions are: physical security, fraud prevention, privacy, business continuity, disaster recovery, and risk management, although there are still more. And though the security field is defined by the technical “hacker” persona, people with backgrounds, skills, and interests of a wide variety have all found success under the umbrella of work in the security field.

Join our webinar to hear from several of Equifax’s women leaders who have come to security from different educational backgrounds, former careers, and interests, but who share a passion for challenging work, career growth, and personal excellence. Learn about their career journeys that led them to security, how they apply their interests and training to their current work and future professional goals, and hear the advice they have for the next generation of women in security. Bring your questions, too, and participate in this lively interactive discussion!

Aug 15 2019 | 59 mins

Pwn Your Growth | Life Hacks Leading to Career Advancement
with Jacquelyn Blanchard

When was the last time you did something new for the first time? Your career growth requires you to be intentional. In this presentation, you’ll gain insights on ways you, as a female in cybersecurity, can hack your way into a successful cyber career.

Jun 26 2019 | 60 mins

Launching an Affiliate: Lessons Learned from the Mid-Atlantic Affiliate Chapter with Nikkia Henderson

Join WiCyS in an open conversation with board members from the first WiCyS Affiliate Chapter! These dynamic ladies will be discussing the steps to successfully launch an affiliate chapter which includes the trials, the tribulations, the challenges, and most importantly… the lessons learned!

Jun 14 2019 | 59 mins

Benchmarks for Corporate Cybersecurity with Marilia Wyatt (WSJ Pro Cybersecurity), Lou Celi (ESI ThoughtLab) and Kim Landgraf (Security Industry Association/SIA Women)

Presented by WiCyS and SIA…

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.

In this 45-minute program, we’ll also share a new tool that allows you to compare your own organization’s preparedness to the aggregated data of study participants.

Expect to Learn:
•Current threats organizations are facing
•Cyber risk management approaches
•Where organizations plan technology and staffing investments for cybersecurity
•The impact of cybersecurity “maturity”
•The costs of cybersecurity breaches

•Marilia Wyatt (WSJ Pro Cybersecurity)
•Lou Celi (ESI ThoughtLab)
•Kim Landgraf (Security Industry Association / SIA Women in Security Forum)

•Taly Walsh, Executive Director (WiCyS)

Feb 26 2019 | 61 mins

Moving the Needle – Women in CyberSecurity with Taly Walsh, Executive Director, WiCyS

A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let’s do something to move the needle to 50% women in cybersecurity!

Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.

During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.

Dr. Janell Straach, Chairman of the Board, WiCyS – Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas

Dr. Costis Toregas, Treasurer, WiCyS – Director, Cyber Security and Privacy Research Institute, George Washington University

Interviewer: Taly Walsh, Executive Director, WiCyS

Feb 8 2019 | 60 mins