CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◈ Women in Cyber

Information Networking Institute - Carnegie Mellon University

Carnegie Mellon University Archived Mar 17, 2026 ✓ Full text saved

Information Networking Institute Carnegie Mellon University

Full text archived locally
✦ AI Summary · Claude Sonnet


    Skip to main content College of Engineering  ›  Information Networking Institute  ›  News  ›  2025  ›  INI Students Grow Their Networks and Skills at Cybersecurity Conferences April 08, 2025 INI Students Grow Their Networks and Skills at Cybersecurity Conferences By Evan Lybrand Media Inquiries This spring, nine Information Networking Institute (INI) students made their way to two cybersecurity conferences in Dallas, Texas; the Women in Cybersecurity (WiCyS) conference and the Minorities in Cybersecurity (MiC) conference. The INI has been a regular sponsor of  WiCyS, the premier conference dedicated to advancing women in cybersecurity and MiC, an executive leadership conference for minority, women, and nonbinary professionals in cybersecurity, and provides scholarships for students to attend.  Cybersecurity professionals gathered at the 2025 WiCyS conference. WiCyS has been bringing together leaders in government, academia and industry for over a decade and this year it continued that trend with Keynote speaker Ashley Fisher. Fisher is the director of cyber operations for Falcon Complete at Crowdstrike, the cybersecurity company. From April 2 to 5, attendees networked and participated in workshops on subjects ranging from utilizing Artificial Intelligence (AI) in the job hunt to public speaking. This year, eight INI student attended the conference to learn valuable insights and grow their networks.  First-time attendee Akanksha Dhanwal, a student in the M.S. in Artificial Intelligence  Engineering - Information Security (MSAIE-IS) program, was thrilled to attend WiCyS 2025. “I was looking forward to connecting with the incredible and diverse community of WiCyS professionals who are not only driving progress in the field but also empowering others along the way,” said Dhanwal. “In addition to building these meaningful connections, I was especially excited to attend workshops that explore the intersection of AI and security—and of course, to dive into the Capture the Flag (CTF) competitions!”  M.S. in Information Security (MSIS) student and INI ambassador Gabrielle Calderon was excited to meet other professionals. “I was looking forward to attending my first conference, not just to represent the INI but to develop relationships with accomplished women in cybersecurity,” said Calderon. “WiCyS is a perfect blend for both developing technical skills and getting to know other attendees. The main draw for me is meeting as many people as possible. I'm excited to be in the same space as women who have taken different paths towards the same professional goals, and who can advise on how to make the most of my career.”  Yashashvi Thukar, a M.S. in Information Technology - Information Security (MSIT-IS) student, presented a poster on the Practicum project she particpated in. "I had the chance to present my practicum project on building a Generative AI Assistant for NIST Cybersecurity Control Responses," said Thukar. "I never thought a poster session could lead to so many meaningful conversations. There’s something incredibly energizing about being in a space filled with brilliant women who are not only leading in cybersecurity but also building a more inclusive future for the field." INI alumni were also in attendance, including Dhvani Kapadia, a recent graduate of the MSIT-IS program, as well as MSIS alumni Dianelys Soto-Cruz and Victoria Zheng. To celebrate the gathering the INI hosted a dinner with local alumni, pictured below. Building a strong community through face-to-face connection is a valuable part of what makes the INI the powerful supportive network that it is.  Earlier in the spring, the INI also sponsored MSIT-IS student Adit Verma to attend the 2025 MiC conference. “I had an incredible time at the MiC Conference, where I had the opportunity to learn from industry experts, engage in thought-provoking discussions, and connect with so many inspiring professionals in the field,” said Verma. “From insightful panels on emerging threats to meaningful conversations about diversity in cybersecurity, this experience has been truly eye-opening.”  Explore Our Programs MS in Information Security MS in Artificial Intelligence Engineering - Information Security MS in Information Technology - Information Security Directory/Contact Faculty & Staff Resources News Events Student Resources CA Education Regulations REQUEST INFORMATION VISIT US HOW TO APPLY FEEBACK ▴ Opt-Out Request Honored Do Not Sell or Share My Personal Data When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link. More information Allow All Manage Consent Preferences STRICTLY NECESSARY COOKIES These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices
    💬 Team Notes
    Article Info
    Source
    Carnegie Mellon University
    Category
    ◈ Women in Cyber
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗