-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #21 from ritsec/2023-2024-rewrite
2023-2024-rewrite
- Loading branch information
Showing
16 changed files
with
180 additions
and
68 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | ||
% ARTICLE 14: External Organizations/Clubs Use of RITSEC Resources | ||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | ||
|
||
\Article{External Organizations} | ||
|
||
% SECTION A: Purpose | ||
\Section{Purpose} | ||
|
||
\begin{enumerate} | ||
\item Allowing and establishing a process for external organizations to use RITSEC resources for their own needs. | ||
\item Any agreement between RITSEC and the external club/organization with relation to this article does not mean that the external org is now a part of RITSEC in any way. | ||
\end{enumerate} | ||
|
||
|
||
% SECTION B: Process | ||
\Section{Process} | ||
|
||
\begin{enumerate} | ||
\item The leadership of the external org must submit a written request to an E-Board member at least 2 weeks before the requested time. This request must include the following: | ||
\begin{enumerate} | ||
\item The timeframe the resources are being requested for | ||
\item The reason for the request | ||
\item What resources are being requested | ||
\item Contact information | ||
\item Any other additional information | ||
\end{enumerate} | ||
\item The E-Board member must present this request to the E-Board at the next E-Board meeting no matter what. | ||
\begin{enumerate} | ||
\item If the E-Board member cannot attend the meeting, the responsibility passes on to the President (and follows the order of succession). | ||
\end{enumerate} | ||
\item Any questions will be directed towards the contact information and must be performed before the following E-Board meeting. | ||
\item Once everything else has been performed, a vote by all active E-Board members must reach a majority. | ||
\begin{enumerate} | ||
\item Once this vote has passed or failed, the external org must be notified and either the request be fulfilled or the reason for the deny be given. | ||
\end{enumerate} | ||
\end{enumerate} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | ||
% ARTICLE 15: WiCyS at RIT | ||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | ||
|
||
\Article{WiCyS at RIT} | ||
|
||
% SECTION A: Name | ||
\Section{Name} | ||
|
||
\begin{enumerate} | ||
\item Women in Cybersecurity (WiCyS) RIT Student Chapter | ||
\end{enumerate} | ||
|
||
% SECTION B: Purpose | ||
\Section{Purpose} | ||
|
||
\begin{enumerate} | ||
\item To keep alumnae connected to the RIT community and to strengthen the bond between current female students. | ||
\item Present opportunities through the WiCyS Organization, such as attending the annual conference and career fairs. | ||
\item To ensure members are prepared and have the accessibility to land their dream jobs. | ||
\end{enumerate} | ||
|
||
|
||
% SECTION C: WiCyS Non-Profit Organization | ||
\Section{WiCyS Non-Profit Organization} | ||
|
||
\begin{enumerate} | ||
\item WiCyS Non-Profit Organization | ||
\begin{enumerate} | ||
\item Local RIT chapter members do not need to be a member of the WiCyS International organization. Becoming a member is \$20 a year and allows access to the WiCyS Job Portal, Job Chat Portal, and the ability to be considered for a student scholarship to the annual WiCyS conference. | ||
\end{enumerate} | ||
\end{enumerate} | ||
|
||
% SECTION D: Target Audience | ||
\Section{Target Audience} | ||
|
||
\begin{enumerate} | ||
\item Women in CyberSecurity (WiCyS) is the premier organization with national reach dedicated to bringing together non-male identifying people in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring. Membership in the WiCyS Student Chapter shall be open to all students within RIT without restrictions according to race, creed, age, gender, disability, nationality, sexual orientation, economic status, veteran status, or parenthood. | ||
\end{enumerate} | ||
|
||
% SECTION E: WiCyS Structure | ||
\Section{WiCyS Structure} | ||
|
||
\begin{enumerate} | ||
\item Liaison for RITSEC Eboard Meetings: The President of WiCyS shall serve as the official liaison for all meetings between WiCyS and RITSEC. The WiCyS President will represent the organization's interests, share updates, and facilitate communication between the two clubs. If the President cannot attend or is on the RITSEC E-Board then the line of succession will be followed and the next WiCyS E-Board member will attend as a non-voting member. | ||
\item Liaison for WiCyS Eboard Meetings: The Vice President of RITSEC shall serve as the official liaison for all meetings between WiCyS and RITSEC. The RITSEC Vice President will represent the organization's interests, share updates, and facilitate communication between the two clubs. If the Vice President cannot attend or is on the WiCyS E-Board then the line of succession will be followed and the next RITSEC E-Board member will attend as a non-voting member. | ||
\item Budget from RITSEC: WiCyS will receive a budget from RITSEC, contingent upon the availability of funds in the RITSEC budget. This budget will contribute to the successful execution of WiCyS events and initiatives. | ||
\item WiCyS Finances: WiCyS Treasurer will maintain open communication with the RITSEC treasurer on all major purchases that the club may need to make. | ||
\item Sponsorship: WiCyS will maintain open communication with RITSEC on all sponsorship opportunities. | ||
\end{enumerate} |
File renamed without changes.
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
% SECTION I: INTEREST_GROUP_NAME | ||
\Section{Incident Response} | ||
|
||
% SUBSECTION 1: NAME | ||
\Subsection{Name} | ||
|
||
\begin{enumerate} | ||
\item Incident Response | ||
\end{enumerate} | ||
|
||
% SUBSECTION 2: PURPOSE | ||
\Subsection{Purpose} | ||
|
||
\begin{enumerate} | ||
\item To research and educate about cyber incidents, and how to respond to these incidents. This includes Topics such as SANS PICERL and NIST frameworks, SOC/SIEM/SOAR monitoring tools, Forensics analysis, Log analysis, and cyber defense techniques. | ||
\end{enumerate} | ||
|
||
% SUBSECTION 3: TARGET AUDIENCE | ||
\Subsection{Target Audience} | ||
|
||
\begin{enumerate} | ||
\item Those interested in learning more about the field of Incident Response and forensics, and understand the responsibilities of the day-to-day life of being a professional SOC and Incident Responder. | ||
\end{enumerate} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters