Your Skillset Transformed
Take your skills to the next level by registering for one our upcoming webinars below. Don’t forget to check out our list of recent recordings to see what we’ve been up to.
Fundamentals of AWS Security with Becky Weiss, Senior Principal Engineer (AWS)
The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure are simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.
Sep 30 2020 2:00 pm
In 2018, 20% of all jobs in technology were held by women (Source: Small Business Trends). Fortune 500 companies with at least 3 women in leading positions saw a 66% increase in ROI (Source: Women Who Tech). In this panel, led by Dr. Dawn Beyer, we will share our unique experiences on how we have bypassed firewalls to enter a male dominated field while opening doors for others to do the same.
Aug 26 2020 | 45 mins
Join the Target team for a fun career development workshop focused on building your virtual brand. You’ll have the opportunity to connect with the Target Recruitment team on learning valuable skills to help you navigate the job hunt during this unprecedented time.
Aug 11 2020 | 56 mins
As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:
-Why your organisation needs to move towards SEaaS
-The different models of security as a service
– SEaaS solutions and strategies
Stephanie Olsen, Customer Trust Manager, Product & Application Security, Netflix & WiCyS Silicon Valley Affiliate President
Sailaja Kotra-Turner, CISO
John Frazier, Chief Operating Officer, Synoptek
Jeremiah Dewey, VP Managed Services, Rapid7
Jul 13 2020 | 53 mins
Are you interested in learning how YOU can build securely on AWS? Join us for the AWS Security Jam learning series – a hands-on, team-oriented, gamified learning experience which will enable you to leverage a wide range of AWS security services. If you get excited about securing workloads in the cloud, come and challenge your skills while learning new techniques. AWS will host three Security Jam sessions (beginners, intermediate, and advanced), so join us for all three or pick the session most relevant to you. We will have a number of AWS experts virtually available to discuss ideas, provide guidance, and help your team get through any challenges.
Jul 9 2020 | 60 mins
Matt Linton, a member of Google’s Detection and Response team and Niru Ragupathy, a member of Google’s Offensive Security team pair up to showcase how red and blue teamers can learn from each other. They walk through a hypothetical attack from start to finish, at each step switching between the point of view of Attackers and Defenders to highlight what each side sees and does, showcasing what makes each side rewarding and fun.
Jun 24 2020 | 61 mins
We are committed to racial equity within WiCyS and the cybersecurity profession. Join us for a candid conversation on what it means to be an ally for the BIPOC cybersecurity community. Jessica Robinson will host a Q&A session to share more about her experience in infosec through the lens of race and gender and how we can all be allies.
Jun 23 2020 | 61 mins
The stream of near constant data breaches has left consumers desensitized to the news their information was lost or stolen. We’ll discuss issues around complacency both in consumers and enterprises such as how long the customer cares after a breach occurs, whether data loss is as negatively impactful to an organization’s reputation as it used to be, and how breach fatigue benefits hackers.
Mar 31 2020 | 35 mins
Security is becoming an integral part of the M&A decision making process. In this talk, we will discuss what Google Security worries about when we acquire or start a company and how different roles within the security organization work in synchronization to make the overall integration secure and successful.
Ruchi is a Sr Security Engineering Manager at Google where she manages an organization whose mission is to secure Acquisitions and Alphabets. In her role, she leads security engineering and technical program management functions. Prior to joining Google, she spun up the Subsidiary Security Program at Amazon and managed the product roadmap for AWS Identity and Access Management and AWS Key Management services. Ruchi has worked at Deloitte and Touche LLP and Ernst and Young, where she helped clients implement security solutions ranging from Identity and Access Management (IAM), Security Information and Event Management (SIEM) to Network Security Products. She has over 13 years of experience in Security.
Feb 19 2020 | 48 mins
Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.
Feb 18 2020 | 30 mins
US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?
Jan 22 2020 | 25 mins
In this talk, we will discuss the portion of cybersecurity known as ‘market access’. We will dive into what market access requirements are and what they mean for cybersecurity professionals as well as to the world. We will go over the different types of market access requirements as well as discuss from a geopolitical standpoint where cybersecurity is moving in this space and what we are expecting to happen in the near future.
We will breakdown the most common/popular market access requirements and discuss the security domains that are tested as well as the most common security best practices covered. We will cover both the differences and similarities in cloud and on-premises based cybersecurity market access requirements as well as go into the different cybersecurity requirements per business need (i.e. financial, medical, etc.).
We will also go through who specifically is involved in influencing and creating these global market access requirements, the specific technical and business requirements that go into these regulations, the specific types of businesses, users, or governments affected, as well as what these market access requirements satisfy in the global cybersecurity landscape, and what they are lacking in the current market. We will map out the global viewpoint of cybersecurity market access certifications, attestations, regulations, and accreditations as well as dive into what the typical engagement process looks like, and how the overall cybersecurity posture of what is being tested is determined.
In summary, this is meant to be a technical discussion on cybersecurity certifications/attestations/regulations/accreditations from the global perspective to take a deeper look at what we are seeing from different countries and where we are seeing trends emerge from key influential regulating bodies. Some market access requirements we will go into are ISO 27001, SOC2, C5 (Germany), SecNumCloud (France), R226, Common Criteria, and many more.
Dec 17 2019 | 42 mins
Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).
Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.
Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.
Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.
Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.
Dec 6 2019 | 51 mins
Join the Security Industry Association (SIA) and the Women in CyberSecurity (WiCyS) for the reveal of insights from a research project into the cyber skills gap within the electronic physical security industry.
In addition to presenting findings from SIA’s 2019 Security Industry Cyber Skills Gap Study, our speakers will explore how both industries must change to help attract talented cybersecurity professionals and will examine the wave of emerging high-tech cybersecurity employment roles within systems integration firms and physical security IoT-device and solution developers.
The webinar will:
•Analyze the types of cybersecurity skills that electronic physical security technology companies need
•Educate cybersecurity professionals about employment opportunities within systems integration firms and producers of IoT devices, physical security solutions and software.
•Correlate skills held by young cyber professionals with the skills required by technology companies producing physical security solutions
•Share insight into the industry perceptions and career motivations of cybersecurity students and professionals
Dec 5 2019 | 59 mins
In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.
Oct 16 2019 | 60 mins
N00bSec to Cyber-Champion: How I Used CTFs Launch My Career in Cybersecurity
with Kaitlyn Bestenheider, Senior Information Security Associate for Tevora and Chief Player Ambassador for National Cyber League
Too often, when I tried to learn cybersecurity in a classroom lab, I found that it existed in a sphere of ideal conditions: we were given the perfect command on the perfect target to get the perfect results on that target. As it turns out, the real world has less than ideal conditions, so I wasn’t sure how my education was going to translate to the real world. That’s when I discovered cyber competitions. In the CTF’s I began to play, I found that there were no wrong ways to get a right answer and I was finally able to hit the ground running in a way that felt like I was preparing for the workforce. Just over a year into my career, I can say that Cyber CTF’s prepared me better than any classroom experience could. Join me on Wednesday, October 2nd to find out how this newbie took her skills from #N00bSec to #Cyber-Champion using CTF’s!
This Lockheed Martin presentation introduces the concepts of career pivots for women who are contemplating or executing a pivot as well as anyone who might have the need to navigate a career pivot in the future. Keys to successful career pivots are identified and the general steps to be performed are described. Specific considerations for pivoting into careers in cybersecurity are also provided.
Sep 12 2019 | 60 mins
In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.
Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.
•How to evaluate and improve the cybersecurity of cyber-physical systems
•How threat actors are targeting cyber weaknesses in physical security systems
•Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
•How new technologies like AI are evolving security
Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management
Sep 4 2019 | 50 mins
The terms security and cyber (short for cybersecurity) are often used interchangeably, referring to the profession narrowly defined as a team of professionals who leverage technologies and processes to defend an organization’s systems and networks from attack. However, this narrow use of security sells the field short – there are in fact a number of key functions under the security umbrella, one of which is cybersecurity, all of which are essential to the success of the organization. Some such functions are: physical security, fraud prevention, privacy, business continuity, disaster recovery, and risk management, although there are still more. And though the security field is defined by the technical “hacker” persona, people with backgrounds, skills, and interests of a wide variety have all found success under the umbrella of work in the security field.
Join our webinar to hear from several of Equifax’s women leaders who have come to security from different educational backgrounds, former careers, and interests, but who share a passion for challenging work, career growth, and personal excellence. Learn about their career journeys that led them to security, how they apply their interests and training to their current work and future professional goals, and hear the advice they have for the next generation of women in security. Bring your questions, too, and participate in this lively interactive discussion!
Aug 15 2019 | 59 mins
When was the last time you did something new for the first time? Your career growth requires you to be intentional. In this presentation, you’ll gain insights on ways you, as a female in cybersecurity, can hack your way into a successful cyber career.
Jun 26 2019 | 60 mins
Join WiCyS in an open conversation with board members from the first WiCyS Affiliate Chapter! These dynamic ladies will be discussing the steps to successfully launch an affiliate chapter which includes the trials, the tribulations, the challenges, and most importantly… the lessons learned!
Jun 14 2019 | 59 mins
Presented by WiCyS and SIA…
This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.
In this 45-minute program, we’ll also share a new tool that allows you to compare your own organization’s preparedness to the aggregated data of study participants.
Expect to Learn:
•Current threats organizations are facing
•Cyber risk management approaches
•Where organizations plan technology and staffing investments for cybersecurity
•The impact of cybersecurity “maturity”
•The costs of cybersecurity breaches
•Marilia Wyatt (WSJ Pro Cybersecurity)
•Lou Celi (ESI ThoughtLab)
•Kim Landgraf (Security Industry Association / SIA Women in Security Forum)
•Taly Walsh, Executive Director (WiCyS)
Feb 26 2019 | 61 mins
A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let’s do something to move the needle to 50% women in cybersecurity!
Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.
During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.
Dr. Janell Straach, Chairman of the Board, WiCyS – Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas
Dr. Costis Toregas, Treasurer, WiCyS – Director, Cyber Security and Privacy Research Institute, George Washington University
Interviewer: Taly Walsh, Executive Director, WiCyS
Feb 8 2019 | 60 mins