Build Your Own Bouquet

This event has already taken place. Please visit for upcoming events near you.

Women Who Cyber brings together a diverse group of aspiring and thriving cybersecurity professionals for dynamic and interactive events where they can network with peers, establish meaningful mentoring relationships, share knowledge, and enjoy unique experiences.

You’ll learn from, and be inspired by, our panel of influential women as they discuss how they broke through the glass ceiling and continue to pave the way for women to lead and excel in the industry. They’ll also discuss the unique challenges women face, as well as the importance of diversity and gender equality in the workplace.

Learn and be inspired as our panel of influential women discuss:

  • How women are reshaping the industry
  • How women can grow and enhance their career
  • The importance of interpersonal skills, including leadership skills and emotional intelligence
  • How to engage and encourage the younger generation

Build Your Own Bouquet
After the discussion, explore your creative side with a floral workshop hosted by local floral shop, Flower Social. You'll be able to take home a beautiful arrangement created entirely by you and learn tips and tricks that will have all future arrangements looking professional and intentional. Lunch will be provided during the panel discussion.

Register now to support women in changing the face of cybersecurity!


  • 11:00AM-11:15AM
  • 11:15AM-11:30AM
    Welcome & Introductions
  • 11:30AM-12:30PM
    Women Who Cyber Panel Discussion & Lunch
  • 12:30PM-1:30PM
    Build Your Own Bouquet & Networking

Featured Panelists

Deborah Watson
Deborah Watson | Resident CISO, Proofpoint, Inc.

Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah has worked with both public and private sector organizations across the Fortune 1000 as an employee or consultant. Deborah has a Master’s degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University. Ms. Watson has published papers and presented on a variety of topics including GDPR, IoT, BEC and Phishing, Third-Party Risk Management, and Open Source Security.

Jennifer Nicastro
Jennifer Nicastro | Sr. Manager, Threat Intelligence, Proofpoint, Inc.

With more than a decade of experience spanning the intelligence community and private sector, Jen Nicastro has held roles focusing on a variety of subjects in support of tactical and strategic intelligence objectives. Since joining Proofpoint in 2019, Jen leads the Proofpoint’s Premium Threat Information Service to share research and advise Proofpoint customers on current and emerging trends in the threat landscape and targeted activity by APT and crimeware threat actors.

Shana Holt
Shana Holt | Senior Solutions Engineer, Proofpoint, Inc.

Shana (pronounced Shah-nuh) Holt is a Senior Solutions Engineer at Proofpoint in the South Central SLED team since 2021. She maintains a working knowledge of all Proofpoint solutions and she works with the account managers to present solutions and business reviews with customers. Prior to this role at Proofpoint, Holt retired after 25 years of service from the State of Mississippi as a Technology Security Officer for the Mississippi Development Authority, where she was responsible for all aspects of cybersecurity policy and management of the cybersecurity operations team. Holt brings her unique experience to Proofpoint, having been an email security customer in the public sector and with hands-on experience using Proofpoint’s solutions. Holt began her career in the private sector providing the United States Navy with logistics supply support of government-furnished equipment and military weaponry for the Arleigh-Burke class AEGIS Destroyers, including the U.S.S. Cole. Holt graduated summa cum laude from Belhaven University with a Bachelors of Science in Management in 2011. Holt just completed her second two-year term as the President of the statewide MS Technology Users Group (MSTUG). She serves on the board of directors for the MS Public Employees Credit Union. In her spare time, Holt enjoys speaking about cybersecurity and best practices for universities, business, and non-profit organizations. Shana also enjoys painting abstract art and watching true crime documentaries.

Who Should Attend

While we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity, we welcome everyone - all genders, identities, and generations!

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

Government and public sector employees are reminded to ensure that their acceptance and participation are permitted by applicable rules and regulations.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted. Yahoo or any other ISP are not accepted.