GConferenceGridThe Conference Catalogue · Vol. 2026Folio № 18A721
Of the Field

WiCyS Minnesota Affiliate | HERoic Hacks 2026

J

oin WiCyS Minnesota affiliate at HERoic Hacks: a welcoming, hands-on cybersecurity experience built for women and nonbinary technologists who want to explore, experiment, and grow. Set at O’Shaughnessy Distillery, this all-day event offers networking, collaboration, and inspiration, dedicated to celebrating the bold, brilliant women shaping the future of in…

Visit the official site
1Voices
0Underwriters
0Exhibitors
17On the bill · sessions
0Companies · in total
§I

The Voices

Programmed at WiCyS, in alphabetical order.
Mia Khedairy
§III

The Programme

Selected from 17 sessions on the bill.
  • Wednesday, April 9 10:00 am – 10:10 am

    Opening Ceremony

  • Wednesday, April 9 10:15 am – 11:00 am

    AI Agents: A Balancing Act Between Power and Peril

    Isaac Asimov once said, “Any sufficiently advanced technology is indistinguishable from magic.” When ChatGPT first arrived on the scene, it felt like magic. Ask a question, get an …

  • Wednesday, April 9 10:15 am – 11:00 am

    Cloud Security: How to Build a Cloud Center of Excellence

    Building infrastructure on the cloud is very different from building workloads on premise. This is why security in the cloud is very different from on-premise security. The main f…

  • Wednesday, April 9 10:15 am – 11:00 am

    From Briefs to Breaches: How Lawyers Can Fortify the Cybersecurity Workforce

    With the scarcity of skilled cybersecurity professionals and the ever-growing risk of breaches, cybersecurity tech experts are overextended, and it’s time to start looking for non-…

  • Wednesday, April 9 11:15 am – 12:00 pm

    A Proposal for Incorporating Accessible, Gamified Cybersecurity Awareness Training

    Gamification is an interactive technology that enhances the user experience by designing modular objectives into game-design elements. In the same manner, gamification has the pote…

  • Wednesday, April 9 11:15 am – 12:00 pm

    The Infrastructure, Compliance and Policy - Chronicles of Security in Public Cloud

    The ever-growing “everything as code” approach has given people the ability to imagine and design new ways of baking security into everything they do. When it comes to managing inf…

  • Wednesday, April 9 11:15 am – 12:00 pm

    The Leadership Leap: From Cybersecurity Consultant to Enterprise Builder

    Sometimes destiny pulls a person in or, depending on how someone looks at it, pushes an individual out of the nest so they can become the person they were destined to be. For indiv…

  • Wednesday, April 9 12:15 pm – 1:00 pm

    Securing Kubernetes Clusters: Best Practices and Strategies

    With Kubernetes becoming a vital part of modern cloud infrastructure, securing clusters has become a key challenge. This session focuses on equipping attendees with the knowledge a…

  • Wednesday, April 9 12:15 pm – 1:00 pm

    So You Want to be a CISO? Pathways and Challenges to Becoming a Cybersecurity Leader

    In today’s rapidly evolving cybersecurity landscape, the role of the chief information security officer (CISO) is more critical than ever. For those seeking the pathway to the C-su…

Intermission
Part the Second · For the Buyer

An audience of 0 companies, parsed from the program.

An audience yet to be tallied.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
0All threespeak · spons · exh
0Sponsoringsponsor only
0Exhibitingexhibitor only
0Speakingspeaker only
02Fig. 02 — The Voices, by Seniority
  • Other roles1100%

Of 1 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
    04Fig. 04 — By Tier

    Tiers were not disclosed for this convocation.