Calendar of Events

WiCyS Minnesota Affiliate | 6th Annual Golf Open and Tournament Sponsorship Webinar

Virtual

We are excited to announce that the WiCyS Minnesota Affiliate will be hosting an informative webinar on January 7, 2025, at 3pm CST. This webinar is designed to provide comprehensive details on sponsorship costs and benefits for our 6th Annual WiCyS MN Golf Open and Tournament to be held at Dellwood Country Club MN on […]

WiCyS Chicago Affiliate | 2025 – Elevating Cyber Luncheon

Union League Club 65 West Jackson Boulevard Chicago, IL 60604 65 West Jackson Boulevard, Chicago, United States

Join Women in Cybersecurity Chicago Affiliate for an exciting in-person luncheon where we'll be diving deep into all things cybersecurity. Network with industry professionals, learn from experts, and elevate your knowledge in a supportive and engaging environment. Don't miss this opportunity to connect with like-minded individuals and take your cybersecurity skills to the next level. […]

$20

WiCyS Chicago Affiliate | ChiBrrCon V 2025

Hermann Hall Conference Center 3241 South Federal, Chicago, IL, United States

Join our WiCyS Chicago Affiliate at ChiBrrCon V to connect with WiCyS members. Please stop by our booth to meet our affiliate, snag some swag, and learn more about WiCyS. And do not miss WiCyS Executive Director Lynn Dohm participating in a Fireside Chat. ChiBrrCon is a privately funded, not-for-profit, charitable organization established for information […]

WiCyS Minnesota | CypherCon: “Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets”

Baird “Wisconsin” Center 400 W Wisconsin Ave, Milwaukee, WI, United States

Join WiCyS Minnesota’s Jessa Gegax as she presents at CypherCon on Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets.  This talk explores how to leverage the nooks and crannies of Salesforce to find and abuse misconfigurations that chain together and create serious vulnerabilities that leak sensitive data to adversaries. It highlights that […]