RSS feed of Women in Infosec Blogs
I am currently working on this list. More RSS are coming soon 🙂
Alyssa’s Blog – Alyssa Miller Hacker, Researcher, and Security Advocate
- What is a Business Information Security Officer (BISO)?
A Business Information Security Officer (BISO) is a senior security leader assigned to lead the security strategy of a division or business unit. They provide […]
- Don’t Tap That Mic
Top 1o tips for working with production crews as a speaker A colleague and I were recently talking about the bad habits we’ve seen from speakers at various […]
- A Promotions Gap
Could it be that our promotions practices are helping fuel the supposed skills gap in security. Organizations can do much more when it comes to developing […]
CryptoKait Home of the National Cyber League Player Ambassadors
- How Playing War Games Can Help You with Learning Command Line
Do you want to be a hacker? IF you do I suggest you start by playing War Games. By far the best way to learn the command line and navigate through Linux.
- Announcement: Beginner Python Bootcamp with wolfshirtz
We know what you're thinking: Now that the semester is over and with finals out of the way, what's a student gotta do to learn some Python during winter break […]
- What Are the NCL Power Rankings?
Hush1e Wondering how your school performed overall? Take a gander at the National Cyber League Power Rankings—the leaderboard for schools! Hush1e […]
0x1338 One Step Ahead Of The Average Nerd
- BlackHoodie comes back to San Franciscopar Unknown le 18 mars 2019 à 17 h 51 min
I promised we’d be back! So here we roll again, BlackHoodie is coming back to San Francisco, this time filling the Google campuses in downtown with a crowd […]
- BlackHoodie Bay Area 2018par Unknown le 10 juillet 2018 à 22 h 18 min
Years ago I was listening to a talk at the CCC Congress in Hamburg, where a hackerette explained to us how she managed to exploit a Tamagotchi. I was […]
- BlackHoodie #3 - Staring assembly to deathpar Unknown le 7 juillet 2017 à 12 h 19 min
I am happy to announce BlackHoodie #3, a free reverse engineering workshop for women, taking place the 25th and 26th of November in the beautiful city of […]
Blackhoodie Homepage for Blackhoodie
- BlackHoodie Virtual - Introduction to Reverse Engineering x86-64
Dedicated to Ruth Bader Ginsburg “Women belong in all places where decisions are being made” - RBG, 2009
- Blackhoodie at Grehack 2020 - Virtual
When Thursday November 19, 2020 from 9h00 CET to 17h00 CET (this is an indication, agenda may change, you will have more precise information when you register.)
- BlackHoodie NorthSec May 2020 - CANCELLED
Blackhoodie Crash Course in Binary Exploitation (CANCELLED) by Mary Walker (@mairebear)
Stories by its C0rg1 on Medium Stories by its C0rg1 on Medium
- Challenge writer POV: BSidesSF 2020 CTF
Following the tradition of the past few years, here is this year’s writeup for my challenges. Unlike previous years where I (almost) exclusively wrote mobile […]
- Mentoring: the biggest problem we don’t know we have
Disclaimer: I am not an expert on mentoring, this originally started as a philosophical rant that ended with a caffeine fueled research binge. It is a topic I […]
- BsidesSF CTF — Challenge Write-up Part 2
BsidesSF CTF — Challenge Write-up Part 2 Weather Companion — 350 points, 11 solves — Mobile, Reversing “A simple weather application that […]
WeAreCyber – NousSommesCyber aka WoSEC Montreal
Depuis mon arrivée au Canada je m’investis auprès de NousSommesCyber chapitre montréalais de WoSEC.
Since my arrival in Canada I have been involved with We AreCyber Montreal Chapter of WoSEC.
Wosec Montreal’s official website: WoSEC Montreal
Compte rendu de la participation de WoSEC Paris au Spying Challenge de LeHack 2019
Scroll down for english version
Dans le cadre des activités du WoSEC Paris, j’ai créé une équipe de CTF pour le Spying Challenge 2019 de la conférence LeHack à Paris.

Qu’est-ce que le Spying Challenge ?
Pour cette troisième édition lors de « leHACK » et dans un contexte d’intelligence économique omniprésent, vous aurez comme mission de collecter des informations sur un ensemble de cibles avec pour but de satisfaire vos clients floués.
Cette mission fera intervenir des recherches en sources ouvertes, du vishing, de la filature, du social engineering, des intrusions physiques, du lockpicking, etc.
Comment ça marche ?
Une première épreuve de qualification avant « leHACK » permettra de départager les meilleures équipes qui pourront continuer l’expérience. C’est dans un second temps, le 6 juillet, que vous serez dans l’action réelle !
(source: https://spyingchallenge.com/edition-2019/)
Les phases du Spying Challenge
Phase 1: OSINT, GEOINT, Social Engineering et rapport
Les agents Dupont et Martin ont fait appel à des agences dont WoSEC Paris afin d’enquêter sur une entreprise suspecte, voici l’ordre de mission (mail et PDF joint décrivant l’objectif de la mission) :

Présentation des agentes du WoSEC Paris
Christine Granville aka @Gabrielle_BGB

Ash aka @asdmhx

Lucy Elizabeth Smith @catr42

Pour être sélectionnées, il nous fallait réussir cette phase qui consistait à écrire un rapport documenté sur nos démarches telles que de l’OSINT, du GEOINT et du social engineering par téléphone ou par mail/chat.

Voici le rapport que nous avons soumis aux agents Dupont et Martin:
Voici également l’enregistrement de l’appel de l’agent Ash à Lictor (le lien dans le rapport n’est plus valide):

Nous avons été reçues pour passer aux phases suivantes que je vais ici vous décrire.
Phase 2: Le Spying Challenge Physique à LeHack Paris
Avant de commencer cette phase, nous avons reçu un e-mail avec de plus amples informations sur le déroulement de la mission:

Pour décrire la phase je vais présenter chaque mission qui nous ont été confiées tout au long de la journée.
1. Interagir avec le maximum d’interlocuteurs employés par Lictor afin de récupérer de nouvelles informations sur vos cibles.
Equipées de micros, les agentes ont rapidement repéré le stand de Lictor.
- Ash portait un t-shirt Spartan et a du aborder Liliana (Ingénieure d’affaire chez Lictor) ;
- Granville s’est fondue dans la salle pour arriver incognito au stand de Lictor et intéragir avec les différents employés ;
- Smith joue le rôle de la stagiaire en recherche d’un poste stylé et aborda Lictor pour en savoir plus sur leur actions.
2. Identifier et prendre en photo l’employé Jack Barrel
Opération toujours en cours…
3. 11:35 am Rencontre avec le PDG de Lictor
A cette étape de nouvelles missions (en temps limité) nous ont été confiées:
- Faire du Social Engineering sur le PDG de Lictor afin d’obtenir plus d’informations sur lui (effectué par l’agente Ash) tout en faisant diversion.
- Récupérer discrètement le sac du PDG afin d’échanger un CD et de prendre un maximum de photo du contenu du sac (effectuée par agente Smith et agente Granville)
4. Neutralisation et fouille

Lors de cet entretien, on nous a confié les missions suivantes:
- Les employés de Lictor ayant découvert que l’agent Dupont était sous couverture, ils décidèrent de l’éliminer. Pour les stopper, l’agente Smith eu pour mission d’empoisonner le verre de l’employé chargé de la neutralisation de l’agent Dupont.
- Une salle suspecte certainement équipée de micro devait être fouillée à l’aide d’un détecteur. La salle étant sous surveillance, il fallait que l’agente Ash fasse diversion afin que l’agente Granville puisse entrer pour fouiller la salle et détecter les micros. Des employés surprirent l’agent Granville pendant sa fouille elle a du utiliser ses talents de persuasion pour ne pas éveiller les soupçons.
5. Filature

Lors de cette phase il était question de suivre les employés de Lictor qui avaient kidnappé Gustave Leproleau. Il s’agissait donc de retrouver l’endroit ou était enfermé Gustave. Les agentes ont procédé à différentes filatures et ont identifié la cachette ou était enfermé Gustave Leproleau.
6. Libérer Gustave
Pour la dernière nous devions libérer Gustave. Toutefois, nos plans ne se passèrent pas comme prévu. En effet une horde de sbires cagoulés et tout de noir vêtu nous ont poursuivi et enfermé séparément.
L’agente Ash et l’agente Granville, furent enfermées dans une salle. Menottée, l’agente Granville utilisa sa pince à cheveux pour se libérer. Les mains liées, l’agente Ash réussit à casser le filament de plastique afin d’ouvrir le coffre fort ou étaient dissimulées des informations TOP SECRÈTES.
Pendant ce temps, l’agente Smith subit un interrogatoire musclé qui ne l’impressionna pas du tout.
Les élites de la France selon l’équipe du Spying Challenge
WoSEC Paris: gagnantes du Spying Challenge 2019, LeHack Paris
Nous avons honoré notre mission en libérant Gustave Leproleau des griffes de cette entreprise peu scrupuleuse.

Classement du top 3:



Les Rankings successifs de la journée



Tweet du Spying Challenge sur notre victoire

Write-up officiel de l’équipe WoSEC Paris
Remerciements
Merci à @asdmhx et à @catr42 pour leur enthousiasme et leur détermination!
WoSEC Paris remercie l’équipe du Spying Challenge pour l’organisation de ce palpitant challenge et les mise en situation réaliste lors de LeHack.

Merci également à tous les participants du Spying Challenge de nous avoir donné du fil à retordre.
Enfin, un grand merci à LeHack d’hoster un tel évènement.
Report on WoSEC Paris’ participation in the Spying Challenge of LeHack 2019
As part of the activities of WoSEC Paris, I created a CTF team for the Spying Challenge 2019 of LeHack conference in Paris.

What is the Spying Challenge?
For this third edition during the “leHACK” and in a context of omnipresent economic intelligence, you will have the mission to collect information on a set of targets with the aim of satisfying your customers.
This mission will involve open source research, vishing, tracking, social engineering, physical intrusions, lockpicking, etc.
How does it work?
A first qualifying event before “leHACK” will allow to decide between the best teams who will be able to continue the experience. It is in a second time, on July 6, that you will be in the real action!
(source: https://spyingchallenge.com/en/2019-edition/)
The phases of the Spying Challenge
Phase 1: OSINT, GEOINT, Social Engineering and report
Agents Dupont and Martin called different agencies including WoSEC Paris to investigate a suspicious company, here is the mission order (email and PDF attached describing the objective of the mission):

Presentation of the agents of WoSEC Paris:
Christine Granville aka @Gabrielle_BGB

Christine Granville, a social engineering enthusiast, is very persuasive. When she was a baby, she hacked the exit code from her mother’s womb. As a child, lockpicking was her favourite extracurricular activity. Today at the WoSEC Paris agency, nothing can resist her, her two favourite sidekicks (Ash and Lucy Elizabeth) and she are in charge of the most dangerous missions.
Ash aka @asdmhx

Iron fist in a velvet glove, Ash has always known how to distinguish herself by her taste for fighting and high-risk excursions. Her passions in life: knee breaking and videos of axolotl babies. She recently joined the WoSEC Paris team to use her social engineering skills – and also to learn how to pull the worms out of a source without having it end up in an IKEA kit.
Lucy Elizabeth Smith

Passionate since her early childhood about puzzles, investigations, coded messages and everything that makes knots in the brain, Lucy decided one day to put her talents at the service of the WoSEC Paris agency.
To be selected, we had to succeed in this phase, which consisted in writing a documented report on our approaches such as OSINT, GEOINT and social engineering by phone or email/chat.

The report is available only in french

We had been qualified to move on to the next phases that I will describe here.
Phase 2: The Physical Spying Challenge at LeHack Paris
Before starting this phase, we received an e-mail with more informations about the mission:
Dear agents,
Reading your report convinced us of your ability to
collect relevant information. Your feedback has allowed us to
make great progress in our investigation of Lictor.
As indicated above, we have therefore decided to keep you on
this mission which will continue on July 6, 2019.
Between 10am and 12pm, you should:
- Interact with as many people as possible employed by Lictor in order to
retrieve new information about your targets;
- Identify and take a picture of employee Jack Barrel (he is strong
suspicious and only shows up at the stand from time to time);
- Go to the place indicated in attachments at 11:35 a.m.
(no delays will be tolerated), where you will have to meet the CEO
of Lictor, and where you will be informed of your orders for the rest of
the operation.
If possible, bring back a lockpicking kit, enough to take pictures,
write a report in digital format, and your boldness.
We expect a brief report on your new findings to
1:30pm.
PS: Do not follow or interact with targets until it is
wears a cap with the Lictor logo on it (according to our information, the
CEO of Lictor and Jack Barrel will not wear hats: you
will still be able to talk to them).
Similarly, you will only be able to interact with Gustave Leproleau if
when he wears his beret.
PPS: The service apologizes for the late hour, there was a pot.
Sincerely,
Agents Dupont and Martin
To describe the phase I will present each mission that was given to us throughout the day.
1. Interact with as many people as possible employed by Lictor to retrieve new informations about your targets.
Equipped with microphones, the agents quickly spotted Lictor’s booth.
- Ash wore a Spartan t-shirt and had to approach Liliana (Business Engineer at Lictor);
- Granville melted into the room to arrive incognito at the Lictor booth and interact with the different employees ;
- Smith played the role of an intern in search of a cool position and came to see at Lictor’s stand to know more about their actions.
2. Identify and take a picture of the employee Jack Barrel
Operation still in progress…
3. 11:35 am Meeting with the CEO of Lictor
At this stage we have been entrusted with new missions (in limited time):
- Social Engineering on the CEO of Lictor to get more information about him (done by Agent Ash) while diverting.
- Secretly pick up the CEO’s bag to exchange a CD and take as many pictures as possible of the contents of the bag (done by Agent Smith and Agent Granville)
4. Neutralization and search
Agents,
Congratulations, your mission continues.
Meet us at 3:15 pm in front of the Lictor stand to receive your instructions.
Sincerely,
Agents Dupont and Martin
During this interview, we were given the following tasks:
- When Lictor’s employees discovered that Agent Dupont was undercover, they decided to eliminate him.
To stop them, Agent Smith was given the task of poisoning the glass of the employee responsible for Agent Dupont’s neutralisation. - A suspicious room certainly equipped with microphones had to be searched with a detector. With the room under surveillance, Officer Ash had to create a diversion so that Officer Granville could enter the room to search the room and detect the microphones. Some employees surprised Agent Granville during her search and she had to use her persuasive skills to avoid arousing suspicion.
Agents,
Phase 3 of your mission is not complete. We will meet at 4:30 pm at Lictor stand for a final spinning event. You will receive your orders on site.
At the end of this test, a selection will be made and only the
the best agents will participate in the final phase.
Sincerely,
Agents Dupont and Martin
During this phase, we had to follow Lictor’s employees who had kidnapped Gustave Leproleau. So it was a matter of finding the place where Gustave was locked up. The officers conducted various surveillance operations and identified the hiding place where Gustave Leproleau was locked up.
6. Releasing Gustave
For the last one we had to free Gustave. However, our plans did not go as planned. Indeed a horde of hooded and black-dressed minions chased us and locked us up separately.
Agent Ash and Agent Granville were locked in a room. Handcuffed, Agent Granville used her hair clip to free herself. With her hands tied, Agent Ash managed to break the plastic filament in order to open the safe in which were concealed TOP SECRET information.
Meanwhile, Agent Smith was subjected to a tough interrogation that did not impress her at all.
France’s elites according to the Spying Challenge team
WoSEC Paris: winners of the Spying Challenge 2019, LeHack Paris
We honoured our mission by freeing Gustave Leproleau from the clutches of this unscrupulous company.

Top 3 ranking



Rankings of the day



Spying challenge tweet about our victory
Thanks
Thanks to @asdmhx et à @catr42 for their enthusiasm and commitment!
WoSEC Paris thanks the Spying Challenge team for organizing this exciting challenge and the realistic role-playing during LeHack.

Thanks also to all the participants of the Spying Challenge for giving us a hard time.
Finally, a big thank you to LeHack for hosting such an event.
Compte rendu de notre visite au Meetup OWASP France
Le 4 avril nous sommes allées ensemble au Meetup d’OWASP France.
Différents sujets on été abordés et des groupes de discussions ont été proposés. Les membres du WoSEC Paris se sont joint à l’atelier ou il était question d’agilité dans la sécurité.
Le prochain meetup ou nous nous rendrons à plusieurs sera celui des cyber rencontres de Orange.
Retrouvez tous les prochains meetups ici: https://www.meetup.com/fr-FR/WoSEC-Women-of-security-Paris/
Compte rendu du meetup du 27 mars 2019
Ce meetup était le premier, il avait pour objectif de présenter les projets de #WoSECParis et de prendre contact avec les participant.e.s.
Le chapitre parisien du WoSEC a été présenté, il a pour objectif de:
- D’apprendre ensemble le Ethical Hacking par différents biais notamment via des entrainements à des CTF qui pourraient fort probablement déboucher sur la création d’une équipe de CTF majoritairement voire exclusivement féminine.
- Faire intervenir des personnalités de la Cyber grâce à des conférences
- Aller ensemble à des évènements pour ne pas se sentir seules.
- Et bien sûr toutes autres suggestions proposées par les participantes
Après un tour de table de présentation, nous avons décidé que la fréquence des meetups serait mensuelle avec une préférence pour les mercredis soirs ou jeudis soirs (à partir de 18:30).
Les suggestions des participant.e.s ont été les suivantes:
- Faire une conférence avec ateliers sur le thème du recrutement
- Faire intervenir des expert.e.s sur différents sujets
- Découper les meetups en deux temps: un temps conférence suivi d’un temps atelier d’entrainement aux CTF.
Il a été précisé que si certaines participantes le souhaitaient des Meetups pourraient être exclusivement féminin. Toutefois, pour le moment aucune demande de cet ordre n’a été formulée.
Il a été décidé de créer un groupe Linkedin pour échanger et s’informer: https://www.linkedin.com/groups/13694861/
Deux nouveaux events ont été créés sur meetup afin d’aller ensemble à des évènements:
- Allons ensemble au meetup OWASP France le 4 avril 2019
- Allons ensemble aux cyber rencontres de Orange le 18 avril 2019

List of communities and media for women and minorities in Cybersecurity and Tech

Do not forget to checkout Meetup groups and Eventbrite and to follow women influencer.
Women in cybersecurity (specific cybersecurity)
WoSEC
Women of Security (WoSEC) is a community for women, including LGBTQ+ women, non-binary, trans and gender nonconforming, who have an interest in cyber security.
We have chapters all over the world, find them here: https://www.womenofsecurity.com/
List of other communities for Women and minorities in Cybersecurity
- Infosec Girls, Global
- Women in Cybersecurity Community, Amsterdam
- ECSO – Women4Cyber, Europe
- Ladies Hacking Society, UK
- Leading Cyber Ladies, Toronto, Canada
- The InfoSec Hoppers, Manchester, UK
- Cult of the party parrot, 100% women CTF team from Australia and New Zealand
- Black hoodie, in Europe and US
- WISP: Women in Security and privacy, San Francisco, CA
- WSC: Women Society of Cyber Jutsu, USA
- WSS: Women’s security Society, UK
- WICS: Women in Cyber Security Foundation, The Hague, Netherlands
- CEFCYS: Cercle des femmes dans la cybersécurité, Paris, France
- OWASP Women in Appsec, many locations
- The InfoSec Society with Hacker Women’s CTF team an all women’s wargaming team, US
- EWF: Executive Women Forum, New Jersey, US
- Women in cyber
- She secures, online and offline (Africa)
- LoWiCyS: League of Women in Cybersecurity, Raleigh/Durham, NC, USA
- Crypto Chicks, Toronto, Ontario, Canada
- PenTest ladies, Nairobi ,Kenya
- AWSN: Australian Women in Security network
- Fraud women’s network
- WID: Women in defense, Arlington, VA, USA
- Haxx group, An ethical hacking learning group. Free security technical classes for women or people who identify as women or non-binary folks breaking into the infosec field, Melbourne Australia
- W0m3nWh0HackM3Lb0urn3 monthly ethical hacking group for women run by Brigitte Lewis in Melbourne Australia
- Blackhoodie, Global
- AWSN: Australian Women in Security Network
- Cyber Shikshaa, India
- infosecwomen
- WiS-KC: Women in Security, Kansas City, USA
- WOMCY: Latam Women In Cybersecurity, Latam
- WiCS: BAE Systems’ Women in Cybersecurity, Global
- She Ciso Exec, UK and Sri Lanka
- Seidea, UK
- International Consortium Of Minority Cybersecurity Professionals
- Infosec girl, Thailand
- WeAreHackerz, Global
Social Media Groups, Slack for Women in Cybersecurity and related areas
- WoSEC: Women of Security Global, Linkedin Group
- WoSEC Paris: Women of Security, Paris, Linkedin Group
- WoSEC Montreal: Women of Security Montreal, Linkedin Group
- WISECRA: Women in Security & Resilience Alliance
- Infosec Thai Girl, Thailand, Facebook Group
- Mentor & Mentee Women In Cybersecurity, Linkedin Group, Global
- Women Know Cyber Group, Linkedin Group, Global
- Women in Security group, Linkedin, Global
- Help A Sister Up, Linkedin Group, Global
- Women in CyberSec, Linkedin Group, Switzerland
- ASEAN Region Women in Security Network, Linkedin Group
- Canadian Women in Security Forum, Linkedin Group
- MYWiS: Malaysian Women in Security, Linkedin Group
- 한국 여성 사이버보안 네트워크 / Korean Network for Women in Cybersecurity, Linkedin Group
- Philadelphia Women & Cyber Security, Linkedin Group
- WiCyS: Women in CYberSecurity, Linkedin Group
- PWCA: The Philippine Women in Cyber Alliance, Linkedin Group
- NZNWS: New Zealand Network for Women in Security, Linkedin Group
- Women in Cybersecurity of Spain, Linkedin Group
- Security Divas, Linkedin Group
- Women in Cyber Security Middle East, Linkedin Group
- Women4Cyber, Linkedin Group
- BNWS: Balkan Network for Women in Security, Linkedin Group
- Belgian Network for Women in Security Initiative, Linkedin Group
- Turkish Women in Security Network, Linkedin Group
- REMS: Red Española de Mujeres en Seguridad, Linkedin Group
- WISE Women in Security Sweden, Linkedin Group
- Women in Crisis Management, Linkedin Group
- AFWSN: African Women in Security Network, Linkedin Group
- AWSN: Australian Women in Security Network, Linkedin Group
- WISP: Women in Security and Privacy, Linkedin Group
- WIIS: Women In International Security, Linkedin Group
- Executive Women’s Forum on Information Security, Risk Management, & Privacy, Linkedin Group
- Women of Color Advancing Peace & Security
- Women’s Security Society, Linkedin Group
- In WEM: International Network of Women in Emergency Management, Linkedin Group
- Women + Cybersecurity = Women’s Society of Cyberjutsu, Linkedin Group
- ASIS Women in Security Community, Linkedin Group
- SWiCSIS: Seattle Women in Cyber Security and Information Security, Linkedin Group
- Women in Cyber Leadership Corp., Linkedin Group
- Women and Minorities in Cybersecurity, Linkedin Group
- Women in Cybersecurity NB, Linkedin Group
- WICCA: Women In CYbersecurity Community Association, Linkedin Group
- Slack channel CTF circle (dm this twitter to be added in)
- Slack channel: defcongirlgang
List of initiatives and conferences for Women and minorities in Cybersecurity and in Tech
- NorthSec’s conference outreach initiative
- SANS’ Women’s immersion Academy
- SANS’ BIPOC in Cybersecurity Forum: From Inclusion to Equity
- WiCyS: Women in Cybersecurity (yearly conference) USA
- Diana initiative, Las Vegas (during Defcon)
- Ladies in CYbersecurity by DefCamp (Romania)
- UWIC: Uniting Women In Cyber Syposium, USA
- Day of Shecurity
- The Cyberwire Women In Cybser Security, USA
- Association de lutte contre l’utilisation de la technologie dans les violences faites aux femmes, France
- The Badass Army, Global
- Hack Blossom
- 1 million women in STEM
List of communities for women and minorities in Tech and related areas
- Unicorns in Tech, Global
- Lesbian who tech (Global)
- Heart of Code, Germany
- Manchester Girl Geeks, Manchester, UK
- PyLadies (Global)
- Railgirls (Global)
- Ladies of code, international community of professional women developers
- Code Like a Girl
- Black Women Talk Tech, New York, USA
- Women in technology, Washington DC, USA
- Womentech Network (Global)
- Witechrev, London UK
- Women in tech, Finland
- Forum for women in tech, Czech Republic
- Women in tech conference, Asia
- Stem for her, Washington DC, USA
- Outspoken women, providing support, mentorship and scholarships to speak at open source tech events.
- Women in Tech chat, initiative intended to inspire, share content and chat (Tuesdays 6PM CEST)
- WIT: Women in Technology, USA
Gender Equality, Diversity or programs for younger women
- WondHer is a worldwide online community to help women break their glass ceiling
- HeForShe
- Cyber mentor, Canada
- CybHER, USA
- Girl Security, New York, USA
- CyberReach is a non-profit organization intended to bring together individuals and industry representatives interested in supporting a qualified and diverse cyber workforce. (Huntsville, Alabama, USA)
- Girlsgo Cyberstart, USA
- Girls Scouts, Cybersecurity Patch, USA
- Mastercard’s Girls for tech program