Command Palette

Search for a command to run...

Page Inspect

https://wicys.org/
Internal Links
70
External Links
13
Images
6
Headings
8

Page Content

Title:WiCyS - Women in Cybersecurity |
Description:
HTML Size:100 KB
Markdown Size:5 KB
Fetched At:November 18, 2025

Page Structure

h1Advancing
h2Women in CyberSecurity
h2What You Can Do
h2Subscribe
h2Success!
h1WANT TO DO MORE?
h2Want to drive the change needed in the cybersecurity workforce?
h1Already Involved?

Markdown Content

WiCyS - Women in Cybersecurity |

- About
- Our Story
- Our Committees
- Our Team
- WiCyS Overview Slidedeck
- WiCyS Stories
- Annual Report Archive
- Join Us
- Become a Member
- Professional Affiliates
- Student Chapters
- Programs
- All Programs
- AI Learning Series
- Capture the Flag
- Book Club
- Create Your Leading Edge
- Executive Leaders Network
- Google Cybersecurity Certificate Program
- ISC2 Certified in Cybersecurity Certification
- Professional Mentorship Program
- SANS Executive Cybersecurity Exercise Program
- Security Training Scholarship
- Stage Ready Public Speaking Fellowship
- Target Cyber Defense Challenge
- Vulnerability Disclosure Program
- WiCyS Talent Assessments
- Support
- Conference Sponsorship
- Strategic Partnerships
- Donate
- WiCyS 2026
- WiCyS 2026 About
- WiCyS 2026 Sponsorship
- WiCyS 2026 Call for Presenters
- WiCyS 2026 Scholarships
- Events
- WiCyS 2026 Conference
- Virtual Career Fair 2025
- Calendar of Events
- Global Webinars
- Archive
- WiCyS @ RSAC 2025
- WiCyS Virtual 2025
- WiCyS 2025 Conference
- 2024 Virtual Career Fair
- WiCyS Virtual 2024
- WiCyS 2024 Conference
- WiCyS 2023 Conference
- WiCyS 2022 Conference
- WiCyS 2021 Conference
- WiCyS Virtual 20
- WiCyS 2020 (Cancelled)
- Leadership Summit 2021
- WiCyS Around the World
- Leadership Summit 2020
- WiCyS 2019 Conference
- WiCyS 2018 Conference
- WiCyS 2017 Conference
- WiCyS 2016 Conference
- WiCyS 2015 Conference
- WiCyS 2014 Conference
- Resources
- Cybersecurity Awareness Month
- Job Board++
- News, Newsletters, Blogs & Podcasts
- Research and Resource Library
- Veteran Resources
- Speakers Bureau
- Subscribe
- Login

Select Page

# Advancing
## Women in CyberSecurity

A community of women, men, allies, and advocates that support the WiCyS mission to **recruit, retain and advance women in cybersecurity** as part of a ***workforce solution***.

join us

Support

## What You Can Do

Join us to build a strong cybersecurity workforce! Explore our Membership Benefits page to determine if WiCyS is your community. We have professional and student communities, professional development programs, mentor/mentee programs, virtual and in-person conferences/career fairs, Job Board++, resources and events for women in cybersecurity and their supporters.

JOIN US

## Subscribe

Stay in touch with WiCyS activities and news by subscribing to our emails.

## Success!

First Name

Last Name

Email

Subscribe



# WANT TO DO MORE?
## Want to drive the change needed in the cybersecurity workforce?

Check out our Support WiCyS page to see all of the ways you can sponsor, partner or donate to help us shift the paradigm.

SUPPORT

# Already Involved?

Connect with others by logging into the WiCyS Member Community Portal. Network with your peers. Join a special interest group such as neurodiversity, data privacy, research or start your own interest group!

COMMUNITY PORTAL

- ADA Statement

- Code of Conduct

- Contact Us

- Privacy Policy

- Terms of Use

- Women in CyberSecurity (WiCyS)
370 S. Lowe Avenue, Suite A-244
Cookeville, TN 38501

- Follow
- Follow
- Follow
- Follow
- Follow
- Follow

subscribe to wicys mailing list

Copyright 2025. All Rights Reserved.



Manage Cookie Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Functional  Functional Always active

The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.

Preferences  Preferences

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.

Statistics  Statistics

The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

Marketing  Marketing

The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.

- Manage options
- Manage services
- Manage {vendor\_count} vendors
- Read more about these purposes

Accept Deny View preferences Save preferences View preferences

- {title}
- {title}
- {title}

Manage consent