Women in Cybersecurity

Women in Cybersecurity (WiCyS) has just held third annual Women in Cybersecurity Event.

WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry. This event is designed as a forum for speakers and guests to exchange knowledge, experience, networking, and mentoring, with the ultimate goal of raising interest in the important, fascinating and lucrative field of cybersecurity. Any individual or organization interested in supporting recruiting and retention efforts for women in cybersecurity is encouraged to participate.

WiCyS is also highly regarded as the forum for women to expand their opportunities in the field of cybersecurity. An attendee from last year’s event said, “it really allowed me to see different paths and provided me advice that will lead me to a more successful career in this area.”

WiCyS was launched in 2013 by Dr. Ambareen Siraj, Computer Science, Tennessee Tech. University, as a collaborative project between Tennessee Tech, University of Memphis and Jackson State Community College.

“After seeing so few women in my courses, I wanted to create an opportunity for women to learn from other women about the field of cybersecurity and to be motivated to seek opportunities and resources within,” Dr. Siraj said.

The annual WiCyS conference is organised by the Cybersecurity Education, Research and Outreach Center at Tennessee Tech. in partnership with a regional university. This year’s local host for the conference is The University of Texas at Dallas.

CTO Vision: http://bit.ly/1SJ6WK2

« Were Brussels Terrorists Trying To Build 'dirty bomb'
FBI Says A Mysterious Hacking Group Has Had Access To US Government Networks For Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.