Day of Shecurity Conference Tracks

Day of Shecurity offers three core conference tracks, each uniquely designed for information security enthusiasts of all levels.  Jump in to the track that best fits you and unlock an abundance of resources including access to tools, professionals in the industry, and numerous opportunities to discover security. 


putting "she" into shecurity

This track brings on stage a variety of security professionals - all from various backgrounds.  Throughout the day join in on engaging presentations about all the different career paths you can take within security and what are the next steps to start your journey.  We have invited some of the most well-renowned female leaders in business & the security industry to provide a perspective and advice on becoming the "she" in shecurity.

Included Topics:
* Discovering different types of jobs within security
* Essential skills to have when joining this workforce
* Advice and guidance on how to get started
* Practical tips & tricks for navigating your way into a cybersecurity-specific career
* Preparing for Leadership – gaining credibility and being heard
* Diversifying your skillset to create truly transferable skills
* How to stop being a ‘doer’ and be seen more strategically
* How to plan career breaks without needing to sacrifice your goals
* Embracing the idea of pulling people up with you

Who Should Attend: This track is recommended for those who are interested in learning more about what a career in cybersecurity can look like, how they can transition their career into cybersecurity and much more.  This track is designed for anyone who has no prior experience in security and even those without a technical background.


DISCOVERING cybersecurity industry frameworks beyond just theory

OWASP Foundation, National Institute of Standards and Technology, Center for Internet Security - Critical Security Controls are known industry frameworks and key resources for application security, internet security, computer security and cybersecurity concepts that every software, security, information technology, and cybersecurity professional should know about. An understanding of real-world software engineering, engineering, security and or cybersecurity are required as the content will be technical in nature.

Included Topics: 

  • OWASP Top 10

  • NIST Cybersecurity Framework v 2.0

  • Secure development, cloud, mobile practices

  • Code review for security matters

Who Should Attend: This track is recommended for those who have at least some technical experience with coding, software engineering, computer engineering, cloud technology, cybersecurity, information security and or mobile platforms.  Perfect for those who have completed a bootcamp or some courses related to these fields.


SECURITY tool tracks: Building your professional security tool kit

Burp Suite, Metasploit, WireShark are just a few of the indispensable tools available to cybersecurity professionals.  This highly-technical track will feature hands-on classes and self-directed labs so that participants can follow their own interests while getting help from teaching assistants with expertise in the tools. Each hands-on session will have setup requirements for you to follow to ensure you can the most knowledge, experience and value from the session.

Included Topics: 

  • How to brute force passwords

  • Drop databases

  • Scan website for vulnerabilities

  • Scan for mobile application vulnerabilities, learn how to defend

  • Become a security tool expert in one-day

Who Should Attend: Attendees for this track will be required to have the technical tool or tools running prior to the event.  There will be a private Slack Channel to help admitted participants set up the respective technical tool one to two weeks prior to the conference.  This track is suitable for those who are technical and have basic knowledge around the security tools identified within this track.