Subscribe Login
WiCyS
Women in CyberSecurity

Advancing

Women in CyberSecurity

A community of women, men, allies, and advocates that support the WiCyS mission to recruit, retain and advance women in cybersecurity as part of a workforce solution.

WiCyS 2026
Conference

Members Register Here

Join thousands of women in cybersecurity for our flagship annual conference.

Non-Members
Welcome

Non-Members Register Here

Not yet a member? You can still register for WiCyS 2026.

Learn More

Learn More Here

Explore the full agenda, speakers, workshops, and career fair details.

What You Can Do

Join us to build a strong cybersecurity workforce! Explore our Membership Benefits page to determine if WiCyS is your community. We have professional and student communities, professional development programs, mentor/mentee programs, virtual and in-person conferences/career fairs, Job Board++, resources and events for women in cybersecurity and their supporters.

Join Us

Subscribe

Stay in touch with WiCyS activities and news by subscribing to our emails.

Want to Do More?

Want to drive the change needed in the cybersecurity workforce? Check out our Support WiCyS page to see all of the ways you can sponsor, partner or donate to help us shift the paradigm.

Support

Already Involved?

Connect with others by logging into the WiCyS Member Community Portal. Network with your peers. Join a special interest group such as neurodiversity, data privacy, research or start your own interest group!

Community Portal

Special Thanks to Our Founding & Strategic Partners

⚠️

You've Been Phished

Don't worry — this was a simulated phishing exercise for CS 6035 Information Security Policies at Georgia Tech. No data was stolen, but here's what you should know.

📧 What Just Happened?

You received an email that appeared to come from WiCyS Georgia Tech offering discounted conference registration for WiCyS 2026. The email contained a "Register Now" button and a link to claim a limited-time 50% discount. That link brought you to what looked like the real WiCyS website — but it was a clone hosted on wicys.dev instead of wicys.org.

In a real attack, that fake site could have presented a registration form to harvest your payment details, credentials, and personal information — all while you believed you were completing a legitimate conference registration.

💳 Data That Could Have Been Stolen

  • Payment transaction details. Information submitted during a time-sensitive professional registration process, resulting in an immediate financial transaction tied to a legitimate cybersecurity event.
  • Registrant identity and professional affiliation. Name, institutional association, and role-based eligibility information used to validate access to conference-related benefits or future exploits.
  • Contact information. Email address and related confirmation details necessary to complete and acknowledge the transaction.
  • Engagement confirmation. Evidence that the target interacted with a professionally framed conference message appearing consistent with expected organization outreach.

💥 Potential Damage

  • Direct financial loss. Unauthorized or misdirected charge associated with conference registration fees.
  • Administrative and time burden. Target must identify the issue, dispute the transaction, and coordinate with financial institutions and event organizers.
  • Erosion of trust. Exploitation undermines confidence in future event announcements and organizational communications.
  • Reputation impact. Fraudulent activity may negatively affect the perceived credibility of legitimate event-related messaging.

🏳 Red Flags You Should Have Noticed

  • The sender domain was wrong. The email came from @wicys.dev, not @wicys.org or @gatech.edu. Always check the full sender address, not just the display name.
  • The website URL was wrong. You landed on wicys.dev, not wicys.org. Always check the address bar before interacting with any site.
  • Too-good-to-be-true pricing. A 50% discount on conference registration available only through an email link is a classic urgency-and-scarcity tactic.
  • "Limited spots remaining." Artificial scarcity pressures you to act before thinking critically about the legitimacy of the offer.

🛡️ How to Protect Yourself

  • Always verify the sender domain. Hover over or tap the "From" address. @gatech.edu@wicys.dev.
  • Check the URL bar. Before entering any information, confirm you're on the real site. Bookmark important sites.
  • Verify discounts independently. Go directly to the official website or contact the organization to confirm any deals.
  • Verify out-of-band. Got a suspicious email? Check the official website or message the sender on a trusted platform.
  • Report phishing to GT. Forward suspicious emails to [email protected].
  • Use 2FA everywhere. Even if your password is compromised, 2FA prevents account takeover.