What we're about

WICCA is a circle of women in cybersecurity based in The Netherlands with a vision to spread the infosec word to everyone.

https://womenofwicca.nl/

Our goal is to bring infosec ladies and female security enthusiasts together to learn about exploits, hacking, incident response, forensics, the low-level stuff, and especially make bad crypto jokes! We want to build a community of badass women in the Netherlands and hopefully inspire future generations to join keyboards and get the hacking started!

We meet monthly in Amsterdam, The Hague, Utrecht, Rotterdam, and more, sometimes even abroad! Are you a woman working or interested in computer security? Then by all means, do sign up!

WICCA is an entirely volunteer-driven community and all our meetups are free.

Women-only?

Meetups are usually women-only, but as we want to spread knowledge everywhere, we have many mixed events. The main idea is for it to be a community where everyone is at ease and feels welcome. We want to create a strong circle of women, but we are not an exclusive circle. WICCA is basically a group of badass hacker ladies where everyone is welcome to learn from and with us!

In our group, we look at the positive results of the many initiatives to increase diversity in the infosec community and in the tech world in general. We focus on good work, good research, and strong efforts that makes our community thrive. We do not let negative thoughts and endless debates take too much time away from us. We goof together, we laugh together, and we hack together!

$ who

> Valentine

As a researcher for McAfee, her work consists of threat hunting, making pretty graphs, and bugging the red team for shells. Besides computers, she likes Star Wars, heavy metal, and useless things like stickers and D&D.

> Chantal

Head of operations at Zerocopter helping clients get the best of their researchers and researchers get the best of their clients. Started in marketing, hacking her way up.

> Andrea (previous)

A security consultant at Deloitte, who is mainly involved in web and infrastructure pentesting. She is particularly interested in OSINT, cybercrime, cyber warfare and cats.

Support us

We make some costs to organise WICCA events. We pay for Meetup, hosting, mail, a video conferencing platform, etc. Every little bit helps and you can make it possible for us to continue organising our events with pleasure.

If you enjoy coming to our events and would like to buy a Club Mate without any glances, you can consider helping us. Please don’t give us anything if you can’t miss it with ease.

As far as we are concerned, WICCA will always be free to attend and your presence is very valuable to us. If you want to support us in increasing our quality and quantity and you think that our events are worth a Euro, we would like to get it from you.

You can order something from our Etsy shop to support us:

https://www.etsy.com/shop/womenofwicca

Or support us with a donation via PayPal:

https://paypal.me/pools/c/8s8hc7ojD9

For companies that want to donate: please contact us here. (https://womenofwicca.nl/contact/)

Upcoming events (1)

Follow the Unicorn

Online event

The date is CONFIRMED! It is with immense pleasure that we announce that Amanda Rousseau, or Malware Unicorn on Twitter, has agreed to give the ladies of WICCA one of her 101 workshops. (This workshop is women-only) Before we can get started, there are two VMs to download. You can find them here: https://malwareunicorn.org/#/downloads You need both VMs, which may take up to 50GB of space. This is what this workshop is about: Provides the fundamentals of reversing engineering (RE) Windows malware using a hands-on experience with RE tools and techniques. Attendees will be introduced to RE terms and processes, followed by basic x86 assembly, and reviewing RE tools and malware techniques. It will conclude by attendees performing a hands-on malware analysis that consists of Triage, Static, and Dynamic analysis. Prerequisites: Basic understanding of programming C/C++, Python, or Java Provided: A virtual machine and tools will be provided. They must be downloaded in advanced. COMING SOON. Features: 6 Sections in 3 hours: ~15 min Fundamentals ~15 min Tools/Techniques ~30 Set Up ~30 min Triage Static Analysis + Lab ~1hr min Dynamic Analysis + Lab EQUIPMENT NEEDS & SPECIAL REQUESTS: At least 8 GB of RAM At least 20 GB of storage Internet connection DETAILS: What you’ll do You will be setting up your own malware analysis environment. You will learn to install virtual machine software and set up networking. What you’ll learn Setting up a safe virtual malware analysis environment. Going over operating system and assembly concepts. Typical Attack Flow, Malware Classes, and Malware techniques. Disassembler, Debuggers, & Information Gathering. Narrow down specific information and indicators before moving on to deeper static and dynamic analysis. How to jump into code in static disassembly then rename and comment on interesting assembly routines that you will debug. Deeper analysis of the program to understand hidden functionality not understood statically. Find Amanda's website here: https://malwareunicorn.org/#/ She has a ton of resources available, and even an online workshop already out there! Amanda is one of the top cybersecurity specialists in the world, so it is a great honour to have her share her knowledge with us.

Past events (27)

WICCA Holidays Edition

Online event

Photos (113)

Find us also at