Location/Region/Verticle
The event has already taken place, thanks for checking!
Sign up for the event before time runs out and receive a free t-shirt
The event has already taken place, thanks for checking!
Location/Region/Verticle
Women Who Cyber brings together a curated community of aspiring and accomplished cybersecurity professionals for intimate, interactive events focused on connection, mentorship, and shared insight—paired with unforgettable experiences.
You’ll learn from, and be inspired by, our panel of influential women as they share candid insights on breaking barriers, leading with impact, and driving meaningful progress for women in cybersecurity. They’ll also discuss the unique challenges women face, as well as the importance of advancing diversity and gender equity in the workplace. Gain insight from influential women in cybersecurity as they share perspectives on:
A Bonsai Practice
After the discussion, we’ll enjoy a Bonsai 101 class. Each participant will work hands-on with their tree, learn basic pruning and shaping techniques, and leave with a finished bonsai in a proper pot to take home.
Register now to support women in changing the face of cybersecurity!
Become the ultimate cybersecurity hero and embark on a quest like no other, where every click and keystroke brings you closer to mastering the art of cyber defense. Join your fellow cybersecurity peers for Proofpoint Defenders, an interactive journey into human-centric security. Harness the strength of Proofpoint’s People Protection platform to compete live with other players to stop threats from treacherous phishing schemes to relentless malware assaults leveraging multi-layered, AI-augmented email threat defense and a chance to win amazing prizes! With our cutting-edge tools at your fingertips, you'll uncover hidden dangers, outmaneuver cyber villains, and shed light on the human element of security to emerge as the true champion of digital justice. At this Capture the Flag event, you’ll get to:
Prizes will be awarded to the Top 3 Defenders (winners have the option to decline prizes). They are determined by highest scores, time to complete, or both.
You'll receive this badge upon completion of Proofpoint Defenders, designed to help organizations stop email threats including business email compromise, ransomware, and credential phishing.
You'll receive this badge upon completion of Proofpoint
You'll receive this badge upon completion of Proofpoint
You'll receive this badge upon completion of Proofpoint
You'll receive this badge upon completion of Proofpoint
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultricies eros, facilisis hendreit turpis. Optional text section. Can be toggled on/off.
CISOonline South
Virtual | 11:00
am-11:45 am ET
Identity Deception Healthcare
SHERATON
CENTRE | 123 Queen St W Toronto M5H 2M9 Canada
Proofpoint Usergroup Federal
Virtual,
USA
CISOonline South
Virtual | 11:00
am-11:45 am ET
Identity Deception Healthcare
SHERATON
CENTRE | 123 Queen St W Toronto M5H 2M9 Canada
Proofpoint Usergroup Federal
Virtual,
USA
Nulla eleifend dapibus mi, sed tempus sapien placerat quis. Maecenas at orci est. Nulla mattis, juto sit amet alementum tincidunt, metus ipsum pretium nunc, ut eestas dian risus efficitur nulla. Dus assumsan, ligula non malesuada consequat, sem nunc pulvinar.
Optional text section. Can be toggled on/off.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Optional text section. Can be toggled on/off.
Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.

Kay Cee Drass is Senior Director of Sales for the Strategic Team at Proofpoint, where she leads teams delivering advanced cybersecurity solutions to the world’s largest enterprises. With over 20 years in enterprise sales, she specializes in solving complex business challenges through technology. She previously held leadership roles at Check Point and Tenable. Passionate about mentorship, Kay Cee actively supports women entering enterprise sales and cybersecurity. Based in Boulder, Colorado, she enjoys skiing, mountain biking, and climbing with her daughter. She holds an MBA from Drexel and studied as an undergrad at the Wharton School of Business.

Erika Carrara is the dual-hat leader of Cybersecurity and IT Infrastructure for The Greenbrier Companies (NYSE: GBX), where she bridges the gap between enterprise resilience and operational excellence. Responsible for the global architecture powering Greenbrier’s manufacturing and leasing operations, Erika ensures that the company’s technical foundation is as high-performing as it is secure. Beyond the technical lifecycle, Erika is a dedicated champion of people and a vocal advocate for Diversity, Equity, and Inclusion (DEI). By unifying infrastructure modernization with inclusive leadership, she has transformed IT from a cost center into a strategic engine for global growth. Whether navigating complex data mandates or architecting scalable cloud environments, her focus remains on protecting enterprise value while accelerating a digital transformation that empowers every member of the organization.

Elise Veazey Stacey is Chief of Staff to the CEO of Optiv, focused on strategic planning and execution of organizational goals. She holds leadership positions within Optiv as a mentor and committee co-chair for Optiv Women’s Network (OWN), where she oversees relationships with the Executive Women’s Forum (EWF) and Women of the Channel (WOTC).
Elise elevates cloud security awareness and education throughout the Nashville area as the co-founder and director of membership for the Music City chapter of the Cloud Security Alliance (CSA), a global nonprofit.
Prior to the institution's acquisition in October 2022, Elise served on the board of directors of Sycamore Bank and Tate Financial, a community bank in her home state of Mississippi, as the co-chair of the Information Technology committee. She also served on the Audit and Compliance, Nominating and Loan Committees. She holds the distinction of not only being the second woman to ever be elected to the bank’s board of directors but was also the youngest person ever elected in the institution’s 100-plus year history.
While earning her MBA from Belmont University, Elise chartered and served as the first chapter president of the university’s MBA Women International Chapter.
Elise lives in Tennessee with her two young daughters. She leads Bible study at her church and volunteers at her children's schools.

Tanya Lyde is a seasoned cybersecurity professional with over 30 years of experience in IS/IT, including 20 years in leadership roles. As the Senior Manager of Cybersecurity at Nissan Americas Headquarters, she oversees cybersecurity strategies across North and South American enterprise regions, ensuring the protection of organizational assets and driving proactive threat management.
Throughout her career, Tanya has excelled in vulnerability threat management, SOC operations, digital forensics, and data loss prevention, with a proven track record of minimizing cybersecurity incidents through strategic risk mitigation. She is a strong advocate for cybersecurity awareness, policy development, and training programs to enhance compliance and reduce security violations.
Before joining Nissan, Tanya held pivotal positions in Gaylord Entertainment (2010 Nashville Flood Rebuild), Verizon Telecommunications, Deloitte & Touché, Vanderbilt University Medical Center, and more, where she managed large-scale network operations and security initiatives. She has worked in industries ranging from automotive to healthcare, education, financial services, hospitality, and telecommunications, equipping her with a broad perspective on cybersecurity challenges across different sectors.
Tanya’s leadership philosophy centers on critical thinking, careful planning, and best practices to drive operational excellence and customer satisfaction. She brings invaluable insights into leading global cybersecurity teams, managing emerging threats, and fostering diversity and inclusion in tech leadership.
Tanya holds expertise in security architecture, enterprise network strategy, and incident response, making her a trusted advisor in cybersecurity resilience. She is dedicated to empowering the next generation of cybersecurity professionals through mentorship and collaboration.
She is 1996 alumni of Tennessee State University, with focus studies in Architectural Engineering and Computer Science, as well as was a member of the renowned TSU Aristocrat of Bands.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum.
Optional text section. Can be toggled on/off.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
While we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity, we welcome everyone—all genders, identities, and generations!
This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
Government and public sector employees are reminded to ensure that their acceptance and participation are permitted by applicable rules and regulations.
NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted. Yahoo or any other ISP are not accepted.

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.
Parking Information
Curabitur erat felis,
porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat
ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet
orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis,
porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat
ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet
orci placerat lacus condimentum, eu placerat dolor commodo.
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultricies eros, facilisis hendreit turpis. Optional text section. Can be toggled on/off.
CISOonline South
Virtual | 11:00
am-11:45 am ET
Identity Deception Healthcare
SHERATON
CENTRE | 123 Queen St W Toronto M5H 2M9 Canada
Proofpoint Usergroup Federal
Virtual,
USA
CISOonline South
Virtual | 11:00
am-11:45 am ET
Identity Deception Healthcare
SHERATON
CENTRE | 123 Queen St W Toronto M5H 2M9 Canada
Proofpoint Usergroup Federal
Virtual,
USA