GConferenceGridThe Conference Catalogue · Vol. 2026Folio № 568EA1
Construction & Real Estate

WiCyS NE Ohio Affiliate | Resume Building Workshop

J

oin WiCyS NE Ohio for this interactive, hands-on session for cybersecurity job seekers who want to strengthen how they present their experience to hiring managers. Experienced cybersecurity practitioners will be onsite reviewing resumes, providing direct feedback, and helping attendees interpret real job descriptions to tailor their resumes to roles they’re…

Visit the official site
1Voices
0Underwriters
0Exhibitors
34On the bill · sessions
0Companies · in total
§I

The Voices

Programmed at WiCyS, in alphabetical order.
Mia Khedairy
§III

The Programme

Selected from 34 sessions on the bill.
  • 10:00 am – 10:10 am

    Opening Ceremony

  • 10:15 am – 11:00 am

    AI Agents: A Balancing Act Between Power and Peril

    Isaac Asimov once said, “Any sufficiently advanced technology is indistinguishable from magic.” When ChatGPT first arrived on the scene, it felt like magic. Ask a question, get an …

  • 10:15 am – 11:00 am

    AI-Powered Penetration Testing: Paving the Way for Women in Offensive Security

    In the rapidly evolving landscape of cybersecurity, traditional penetration testing techniques are no longer sufficient to combat modern, complex threats. This session will explore…

  • 10:15 am – 11:00 am

    Cloud Security: How to Build a Cloud Center of Excellence

    Building infrastructure on the cloud is very different from building workloads on premise. This is why security in the cloud is very different from on-premise security. The main fa…

  • 10:15 am – 11:00 am

    Empowering Rural K-12 Cybersecurity Education: Overcoming Barriers and Building Pathways

    The demand for a skilled cybersecurity workforce has become a top national priority, yet the supply falls short, with only 69 qualified workers available for every 100 positions em…

  • 10:15 am – 11:00 am

    From Briefs to Breaches: How Lawyers Can Fortify the Cybersecurity Workforce

    With the scarcity of skilled cybersecurity professionals and the ever-growing risk of breaches, cybersecurity tech experts are overextended, and it’s time to start looking for non-…

  • 10:15 am – 11:00 am

    Securing the Olympic Games: Assessment and Perspectives After Paris 2024

    Peek behind the curtain with an insider and examine a comprehensive analysis of the large-scale cybersecurity measures implemented during the 2024 Olympic and Paralympic Games in P…

  • 11:15 am – 12:00 pm

    Advancing Cybersecurity Skills Through Prompt Engineering with ChatGPT

    This presentation introduces a novel approach to cybersecurity training through the lens of prompt engineering with ChatGPT. Prompt engineering enables targeted and nuanced AI inte…

  • 11:15 am – 12:00 pm

    A Proposal for Incorporating Accessible, Gamified Cybersecurity Awareness Training

    Gamification is an interactive technology that enhances the user experience by designing modular objectives into game-design elements. In the same manner, gamification has the pote…

Intermission
Part the Second · For the Buyer

An audience of 0 companies, parsed from the program.

An audience yet to be tallied.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
0All threespeak · spons · exh
0Sponsoringsponsor only
0Exhibitingexhibitor only
0Speakingspeaker only
02Fig. 02 — The Voices, by Seniority
  • Other roles1100%

Of 1 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
    04Fig. 04 — By Tier

    Tiers were not disclosed for this convocation.