Slide 1
Mission
Image is not available

Our objectives are to Inspire, Engage and Empower women to take up positions in the cybersecurity industry.

Slide 1
Vision
Image is not available

Our objectives are to Inspire, Engage and Empower women to take up positions in the cybersecurity industry.

Slide 1
Core Values
Image is not available

Our objectives are to Inspire, Engage and Empower women to take up positions in the cybersecurity industry.

FUk7cx5XoAAr8Xm
FFr8w0oX0AcMY-L
previous arrowprevious arrow
next arrownext arrow

400+

Active members

40

STUDENT CLUBS

150+

CONFERENCES/WEBINARS

6

YEARS ACTIVE

ABOUT US

SheHacks KE is a non-profit organization that was founded in 2016 by Laura Tich and Evelyn Kilel and Patricia Jerotich, with the aim of providing women in cybersecurity a platform to interact and help each other grow professionally in a healthy environment

SheHacks KE is a community of Women in Cybersecurity from various backgrounds and counties in Kenya coming together to purposefully provide for women in cybersecurity an avenue of interaction, growth in knowledge and skill set and successfully pave a path for them in the cybersecurity industry. The need to establish the initiative came about upon realization of a lack of female representation in the industry, notably in the workplace and at conferences. The objective of establishing SheHacks_KE was to provide a platform for women to interact, learn and grow together as information security learners and professionals.

Meet Our Team

Shehacks_ke boasts of a number of trainers who have been providing support for the outreach programs. The team comprises students and professionals who have demonstrated exemplary performance in training and leadership. The team is selected on a voluntary basis.

Christine Wambiru
Content Manager
Restercuter Nyawira
Content Manager
Nancy Muriithi
Program Co-ordinator
Maria Ukpere
Communications

Our Blog

STAYING SAFE ONLINE

caydeeMar 17, 20235 min read

STAYING SAFE ONLINE The internet is here to stay so we can as well embrace it and learn how to protect ourselves while surfing through it. In fact, a recent…

Cyber Threat Intelligence: A Must-Have or Nice-To-Have?

Cyber Threat Intelligence: A Must-Have or Nice-To-Have?

caydeeMar 3, 2023

Cyber Threat Intelligence: A Must-Have or Nice-To-Have? What it is Cyber threat intelligence has staked its claim as one of the most prominent proactive cybersecuritymeasures because it helps organizations predict…

The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity

caydeeFeb 24, 2023

The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity You may have experienced Imposter syndrome as a cybersecurity professional at some point in your career. You might…

Setting up an AWS VPC

ShehackskeOct 17, 2022

Setting up an AWS VPC What is a VPC Amazon Virtual Private Cloud (Amazon VPC) is a service that lets you launch AWS resources in a logically isolated virtual network…

Digging into the PwnKit vulnerability.

ShehackskeOct 17, 2022

What if I told you, there has been a rather unnoticed vulnerability within most, if not all, Linux operating systems for over 10 years!? Well, this wouldn’t be a record-breaking…

Our Partners

Scroll to top