NEWS, NEWSLETTERS, BLOGS & PODCASTS
Delivered
Extra extra – read all about us! Check out our recent press release, news coverage and more below.
News
View WiCyS press releases, articles & news mentions
Read news
Newsletters
Read newsletters
BLOGS
View what our members have to share
Read blogs
PODCASTS
Listen to Podcasts
NEWS
12 Ways to Approach the Cybersecurity Skills Gap Challenge in 2023
A 2022 study from cybersecurity training and certifications non-profit the International Information System Security Certification Consortium (ISC)² found that the worldwide gap of cybersecurity workers totals 3.4 million. The need to fill those positions is unlikely...
Google Launches Entry-Level CyberSecurity Certificate To Teach Threat Detection Skills
By Michael Hill Google has announced a new entry-level cybersecurity certificate to teach learners how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them. Designed and taught by Google’s cybersecurity experts, the Google...
Computer Science Students Take First Place At CyberSecurity Competition
By Lisa Knebl At the Women in Cybersecurity (WiCyS) Colorado & Security Innovation Virtual Capture the Flag (CTF) in April, six students from Colorado State University’s WiCyS student chapter pit their cybersecurity skills against teams from around the nation in a...
Google Launches Cybersecurity Certificates for Entry-Level Workers
Google is expanding its Career Certificates program with a course in cybersecurity designed to teach newcomers to the field the basic skills necessary to work as an analyst. Phil Venables, chief information security officer at Google Cloud, said the course will teach...
The Systemic Barriers To Landing A Big Tech Internship
Farmer: One thing that I have heard is that recruiting budgets have been cut. And what that is going to mean is that the recruiting teams of companies aren’t going to have as much capacity to go beyond a handful of schools. And that’s where we start to have a...
GISF signs MoU with WiCyS West Africa to promote cybersecurity awareness
The Ghana Internet Safety Foundation (GISF) has signed a Memorandum of Understanding with the Women in Cybersecurity (WiCyS) West Africa, an affiliate of Women in Cybersecurity (WiCyS) Global. The partnership is to boost collaboration between the two parties as they...
Women in Cybersecurity Still Fight for Inclusion Despite the Talent Shortage
The cybersecurity field is riddled with stringent job descriptions that can alienate applicants across technical and non-technical roles. It’s also contributing to a broad gender imbalance. A global cybersecurity talent shortage continues to put networks and...
What’s Really Causing the Cybersecurity Gender Gap?
People, more than policies, are to blame for experiences of exclusion, according to Women in CyberSecurity research. Cybersecurity has a talent gap that may only get bigger as the industry races to catch up with continually more sophisticated cyber threats....
Women Feel Excluded in Cybersecurity Roles, Study Says
A lack of career and growth opportunities, as well as a lack of respect from company leadership, direct managers and peers may hold women back in the industry. Women in the cybersecurity industry experience workplace situations that contribute to an overall feeling...
How to Encourage Diversity in Cyber Security
In this exclusive interview ahead of her session at Cyber Security Hub’s All Access: Cyber Security Global, executive director of Women in Cyber Security (WiCyS) Lynn Dohm shares her views on why diversity is integral to cyber security and how to encourage this within...
BLOGS
Why Inclusive Language Matters ( Jenni Muñoz & Sofia Martinez)
Submitted By: Jenni Muñoz & Sofia Martinez One of the most impactful ways that we can create a welcoming environment is through our words. In every space that we enter, we have the opportunity to use language that makes everyone around us feel comfortable and...
BOOK REVIEW – Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier ( JoAnna Parker Martin)
Submitted by: JoAnna Parker Martin Don’t let the deliciously contrived title fool you; this book has substance. Best-selling author Bruce Schneier has the experience, qualifications, and titles to back up what he writes. His 16th book, Click Here to Kill Everybody:...
How internships in cybersecurity can help you bridge the talent acquisition gap (Alexis Culp)
Submitted by: Alexis CulpWe have been facing a cybersecurity talent shortage in this industry since the industry was born. As time elapsed, we started integrating more and more of our businesses and lives around the internet, which allowed for more vectors of...
Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study (Kate Esprit & Meghan Jacquot)
Submitted by: Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does Microsoft, Samsung, T-Mobile, Okta, and the Brazilian Ministry of Health all have in common? All of these entities have fallen victim to cyberattacks by the LAPSUS$ hacking group. LAPSUS$...
The Cybersecurity Playbook: How every leader and employee can contribute to a culture of security by Allison Cerra (Jo Anna Parker Martin)
Submitted by: Jo Anna Parker Martin When I look for cybersecurity books to review I specifically keep an eye out for books written by women and minorities for a broad range of perspectives. This one caught my interest with its strong title and black minimalist cover....
Running a WiCyS Chapter — tips, tricks, secrets and perks! (Yansi Keim)
Submitted by: Yansi Keim Hello all, thanks for visiting this article. I am Yansi Keim (former President of WiCyS Purdue University Chapter). Today, I am sharing my experience and advice on running a successful and engaging Women in Cybersecurity (WiCyS) Chapter. My...
What WiCyS Means to Me (April Hubbard)
Submitted by: April Hubbard During the final keynote of WiCyS 2022 in Cleveland, Ohio, we all had the wonderful pleasure of hearing some of the stories of individuals and what WiCys means to them. They joined the stage while “Can’t Stop This Feeling” by Justin...
Dissecting Imposter Syndrome by Dr. Dawn Beyer, Lockheed Martin Senior Fellow and WiCyS Board Member (Dawn Beyer)
Submitted by: Dawn BeyerHave you ever experienced "imposter syndrome" or felt like you don't have the knowledge for your role? Oh, yes!First, what is Imposter syndrome? According to Merriam-Webster Dictionary, Imposter Syndrome is a psychological condition that is...
My Time At WiCyS (Women in CyberSecurity) Cleveland 2022 (April Hubbard)
Submitted by: April Hubbard From Thursday, March 17th, 2022, until Saturday, March 19th, 2022, I attended my very first WiCyS (Women in CyberSecurity) conference, and let me just tell you in one word how this conference went --- Phenomenal! WiCyS (Women in...
There is no substitute for a CISO…or is there? (Pam Lindemoen)
Submitted by: Pam Lindemoen You haven’t had an uninterrupted vacation in years, your presentation at the last board meeting fell short, and it’s hard for you to imagine how the organization would function without you at the helm. These are all very real situations...
Have a blog to share…
PODCASTS
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.