BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Women Cyber Force - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Women Cyber Force
X-ORIGINAL-URL:https://www.womencyberforce.lu
X-WR-CALDESC:Events for Women Cyber Force
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Luxembourg
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Luxembourg:20250904T170000
DTEND;TZID=Europe/Luxembourg:20250904T180000
DTSTAMP:20260405T040229
CREATED:20250731T141338Z
LAST-MODIFIED:20250805T090041Z
UID:5322-1757005200-1757008800@www.womencyberforce.lu
SUMMARY:Phishing Workshop
DESCRIPTION:Phishing is evolving — are your skills keeping up?\nWe’re excited to launch a Phishing Analysis Workshop designed for IT professionals ready to go beyond awareness and get hands-on with how phishing campaigns really work. \nThis session will equip you with the skills and tools to not only identify and analyze phishing attempts — but also to report them effectively within your organization or to national authorities. \nWhat You’ll Learn:\n\n\nHow to recognize and dissect phishing campaigns \n\n\nTechniques for analyzing email headers\, URLs\, and payloads \n\n\nHow to use open-source tools \n\n\nBest practices on how and where to report phishing (internally and externally) \n\n\nWhy it matters:\nPhishing remains one of the most common entry points for cyberattacks. Being able to analyze and escalate these threats quickly can stop incidents before they start — and help protect users\, data\, and systems. \nTakeaways:\n\n\nA technical workflow for phishing email analysis \n\n\nA toolkit of open-source resources \n\n\nReporting workflows for enterprise environments and national CSIRTs \n\n\nStronger readiness for blue team\, SOC\, or IR roles
URL:https://www.womencyberforce.lu/event/phishing-workshop/
LOCATION:LHC
ATTACH;FMTTYPE=image/jpeg:https://www.womencyberforce.lu/wp-content/uploads/2025/07/Phishing-Worshop-Website.jpg
END:VEVENT
END:VCALENDAR