BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTAMP:20250707T173120Z
UID:B6A6999D-4375-4CFC-B054-64A60327825C
DTSTART;TZID=Etc/GMT+12:20250706T170000
DTEND;TZID=Etc/GMT+12:20250706T191500
DESCRIPTION:WIE SUP’COM and WIE ENSIT are proud to join forces to organiz
 e Cyber Bridge – WIE Day 2025\, under the theme &quot;Cybersecurity: Awarenes
 s\, Ethics &amp; Fundamentals.&quot; This two-day collaborative event aims to empow
 er students and the public through engaging discussions\, hands-on cyberse
 curity workshops\, and inspiring testimonials.\n\n[]\n\nThe second day of 
 CyberBridge was dedicated to a hands-on and highly insightful workshop tit
 led “Cybersecurity: The Essentials”\, led by the talented Ichrak Eddor
  Mnijli\, an IoT Developer and Hardware Security Specialist. With her stro
 ng background in both software and hardware security\, Ichrak delivered a 
 rich and practical session that brought participants closer to the real-wo
 rld applications and threats of cybersecurity.\n\nThe workshop was designe
 d to go beyond theory — it offered a detailed\, beginner-friendly explor
 ation into how cyberattacks happen and how individuals can actively protec
 t themselves in an increasingly connected digital world. Ichrak began by b
 reaking down the different types of cyberattacks\, from phishing\, malware
 \, and ransomware to more sophisticated forms like man-in-the-middle attac
 ks and social engineering. She explained these concepts in an engaging and
  accessible way\, ensuring that everyone — regardless of technical backg
 round — could follow and participate.\n\nWhat made this workshop especia
 lly impactful were the practical tips and real-world tricks Ichrak shared.
  She covered everyday habits that can make a huge difference in personal c
 ybersecurity\, such as secure password management\, the risks of public Wi
 -Fi\, the importance of software updates\, and recognizing suspicious link
 s or emails.\n\nMoreover\, she introduced participants to some of the key 
 tools and devices used in the field of cybersecurity\, including hardware 
 security modules\, encryption tools\, and IoT security devices\, offering 
 an exclusive look at how professionals secure networks and data on a more 
 technical level. Her approach successfully combined technical depth with c
 lear explanations\, making complex ideas feel tangible and relevant.\n\nPa
 rticipants were actively engaged throughout the session\, asking questions
 \, sharing their own experiences\, and showing strong curiosity about how 
 to pursue cybersecurity as a future career. The session concluded with a d
 eeper appreciation for the importance of digital safety\, and many attende
 es expressed their eagerness to explore the field further.\n\nOverall\, th
 e second day of CyberBridge offered an essential\, eye-opening learning ex
 perience\, bridging the gap between theory and practice while reinforcing 
 the event’s mission to equip students with the tools\, awareness\, and c
 onfidence to thrive in the world of technology and security.\n\nSpeaker(s)
 : Ichrak Eddor Mnijli \, \n\nVirtual: https://events.vtools.ieee.org/m/491
 967
LOCATION:Virtual: https://events.vtools.ieee.org/m/491967
ORGANIZER:nourchene_brika@ieee.org
SEQUENCE:51
SUMMARY:Cyber Bridge Day 2 : Cybersecurity Workshop – WIE Day 2025: Cyber
 security Edition
URL;VALUE=URI:https://events.vtools.ieee.org/m/491967
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;WIE SUP&amp;rsquo\;COM and WIE ENSIT are proud
  to join forces to organize Cyber Bridge &amp;ndash\; WIE Day 2025\, under the
  theme &quot;Cybersecurity: Awareness\, Ethics &amp;amp\; Fundamentals.&quot; This two-d
 ay collaborative event aims to empower students and the public through eng
 aging discussions\, hands-on cybersecurity workshops\, and inspiring testi
 monials.&lt;/p&gt;\n&lt;p&gt;&lt;img style=&quot;display: block\; margin-left: auto\; margin-r
 ight: auto\;&quot; src=&quot;https://events.vtools.ieee.org/vtools_ui/media/display/
 ddaab447-19c1-41e0-a42b-ce33acfc008e&quot; alt=&quot;&quot; width=&quot;670&quot; height=&quot;320&quot;&gt;&lt;/p&gt;
 \n&lt;p data-start=&quot;146&quot; data-end=&quot;587&quot;&gt;The second day of &lt;em data-start=&quot;164
 &quot; data-end=&quot;177&quot;&gt;CyberBridge&lt;/em&gt; was dedicated to a hands-on and highly i
 nsightful &lt;strong data-start=&quot;228&quot; data-end=&quot;279&quot;&gt;workshop titled &amp;ldquo\;
 Cybersecurity: The Essentials&amp;rdquo\;&lt;/strong&gt;\, led by the talented &lt;stro
 ng data-start=&quot;301&quot; data-end=&quot;324&quot;&gt;Ichrak Eddor Mnijli&lt;/strong&gt;\, an &lt;stro
 ng data-start=&quot;329&quot; data-end=&quot;379&quot;&gt;IoT Developer and Hardware Security Spe
 cialist&lt;/strong&gt;. With her strong background in both software and hardware
  security\, Ichrak delivered a rich and practical session that brought par
 ticipants closer to the real-world applications and threats of cybersecuri
 ty.&lt;/p&gt;\n&lt;p data-start=&quot;589&quot; data-end=&quot;1167&quot;&gt;The workshop was designed to 
 go beyond theory &amp;mdash\; it offered a &lt;strong data-start=&quot;650&quot; data-end=&quot;
 693&quot;&gt;detailed\, beginner-friendly exploration&lt;/strong&gt; into how cyberattac
 ks happen and how individuals can actively protect themselves in an increa
 singly connected digital world. Ichrak began by breaking down the &lt;strong 
 data-start=&quot;853&quot; data-end=&quot;888&quot;&gt;different types of cyberattacks&lt;/strong&gt;\,
  from phishing\, malware\, and ransomware to more sophisticated forms like
  man-in-the-middle attacks and social engineering. She explained these con
 cepts in an engaging and accessible way\, ensuring that everyone &amp;mdash\; 
 regardless of technical background &amp;mdash\; could follow and participate.&lt;
 /p&gt;\n&lt;p data-start=&quot;1169&quot; data-end=&quot;1513&quot;&gt;What made this workshop especial
 ly impactful were the &lt;strong data-start=&quot;1223&quot; data-end=&quot;1263&quot;&gt;practical 
 tips and real-world tricks&lt;/strong&gt; Ichrak shared. She covered &lt;strong dat
 a-start=&quot;1291&quot; data-end=&quot;1310&quot;&gt;everyday habits&lt;/strong&gt; that can make a hu
 ge difference in personal cybersecurity\, such as secure password manageme
 nt\, the risks of public Wi-Fi\, the importance of software updates\, and 
 recognizing suspicious links or emails.&lt;/p&gt;\n&lt;p data-start=&quot;1515&quot; data-end
 =&quot;1943&quot;&gt;Moreover\, she introduced participants to some of the &lt;strong data
 -start=&quot;1568&quot; data-end=&quot;1628&quot;&gt;key tools and devices used in the field of c
 ybersecurity&lt;/strong&gt;\, including &lt;strong data-start=&quot;1640&quot; data-end=&quot;1713
 &quot;&gt;hardware security modules\, encryption tools\, and IoT security devices&lt;
 /strong&gt;\, offering an exclusive look at how professionals secure networks
  and data on a more technical level. Her approach successfully combined &lt;s
 trong data-start=&quot;1850&quot; data-end=&quot;1893&quot;&gt;technical depth with clear explana
 tions&lt;/strong&gt;\, making complex ideas feel tangible and relevant.&lt;/p&gt;\n&lt;p 
 data-start=&quot;1945&quot; data-end=&quot;2301&quot;&gt;Participants were actively engaged throu
 ghout the session\, asking questions\, sharing their own experiences\, and
  showing strong curiosity about how to pursue cybersecurity as a future ca
 reer. The session concluded with a deeper appreciation for the &lt;strong dat
 a-start=&quot;2193&quot; data-end=&quot;2225&quot;&gt;importance of digital safety&lt;/strong&gt;\, and
  many attendees expressed their eagerness to explore the field further.&lt;/p
 &gt;\n&lt;p data-start=&quot;2303&quot; data-end=&quot;2594&quot;&gt;Overall\, the second day of CyberB
 ridge offered an &lt;strong data-start=&quot;2353&quot; data-end=&quot;2399&quot;&gt;essential\, eye
 -opening learning experience&lt;/strong&gt;\, bridging the gap between theory an
 d practice while reinforcing the event&amp;rsquo\;s mission to equip students 
 with the tools\, awareness\, and confidence to thrive in the world of tech
 nology and security.&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

