(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients

Size: px
Start display at page:

Download "(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients"

Transcription

1 NEWS FOR IMMEDIATE RELEASE Media Contact: Alex Lyons Merritt Group, Inc (ISC)² Foundation Announces 2014 Information Security Scholarship Recipients 33 recipients of scholarships that foster the next generation of cybersecurity professionals and research (ISC)² Security Congress Atlanta, Ga., September 29, 2014 The (ISC)² ( ISC-squared ) Foundation, a charitable trust that aims to empower students, teachers, and the general public to secure their online life with cybersecurity education and awareness programs, today announced the recipients of its 2014 Information Security Scholarships. Recipients were selected by the (ISC)² Scholarship Review Committee, which consists of representatives from (ISC)² Chapters, academia, and the (ISC)² membership. The (ISC)² Foundation Scholarship Program aims to fill society s need for trained cybersecurity professionals by building the workforce of the future through meaningful scholarships. This program opens doors for current and aspiring information security professionals, with scholarships for women, undergraduate, graduate, and post-graduate students as well as certification exam vouchers for qualifying faculty to ensure a sufficient supply of qualified instructors at the university level. On behalf of the (ISC)² Foundation, I d like congratulate this year s scholarship recipients for their impressive applications and a commitment to joining the cybersecurity workforce, said Julie Peeler, director, (ISC)² Foundation. These scholarships are making a real impact on students lives around the globe, and fulfilling our goal to meet the demand for more qualified information security professionals. Many of our scholarship recipients have told us they wouldn t be able to continue

2 their studies without this financial assistance. We re so pleased to offer this program to deserving, passionate students in need. The following Scholarship recipients were recognized at the 2014 (ISC)² Security Congress Town Hall Meeting last night: Women s Scholarship o M. Alexis Greenidge, U.S.A. o Sreedevi Sreekandan, India o Shruti Gupta, India Graduate Research Project(s) o Scott Ruoti, U.S.A. o Mark O Neill, U.S.A. o Anna Truss, Turkmenistan o Lokesh Pidawekar, India o Chunyue Du, China o Cheryl Devaney, U.S.A. o Pratibha Dohare, India o Saradha Kannan, India Undergraduate Scholarship o Christopher Goes, U.S.A. o Kyle Murbach, U.S.A. o Lassine Cherif, Ivory Coast o Dulce Gonzalez, Mexico o Robin Saunders, U.S.A. o Katherine McGinn, U.S.A. o Fumi Honda, U.S.A. o Rose Reinlib, U.S.A. o Yue Zhu, China o Samantha Houston, U.S.A. o Patrick Katamba, Uganda Faculty Exam Vouchers o Eamon Doherty, U.S.A. o Mohamed Kazi, United Kingdom o Louay Karadsheh, Kuwait o Tahir Abbas, Pakistan

3 o Rizwan Ahmad, Pakistan o Helio de Castro, Sao Tome and Principe o Diane Murphy, United Kingdom o Timothy Perez, U.S.A. o Vivek Gupta, India o Donna Schaeffer, U.S.A. o Trevor Chandler, U.S.A. By selecting me, the (ISC)² Foundation gave me a luxury of focusing on my education rather than worrying about how to pay for it, said Undergraduate Scholarship recipient Lassine Cherif, Ivory Coast. It gives me a unique opportunity to obtain both a degree and a globally recognized certification; skills that I need to achieve my goal which is help secure cyberspace. The assistance provided by the (ISC)² Foundation allows me to pursue research within the field of information security while completing a Master of Science degree in information systems management, said Graduate Scholarship recipient Cheryl Devaney, U.S.A. "I hope to pursue a career in information security after completing my degree, and the funding provided will give me the opportunity to gain vital experience within this field while a student." I consider this scholarship a recognition and approval of my decision to specialize in cybersecurity as part of my continuing education, said Women s Scholarship recipient Sreedevi Sreekandan, India. The award committee also recognized the hard work I put into the first year of the graduate level course work. On a personal level, I believe this award also shows the foundation's commitment to bring more women into the cybersecurity profession and to extend a helping hand in their journey to become a confident and knowledgeable IT security professional. I hope this award will continue to encourage women all over the world to take a keen interest in cybersecurity education in future. The (ISC)² Foundation will accept applications for the 2015 scholarships during the following periods: January 1, 2015 March 31, 2015 for Women s Scholarships; January 1, 2015 December 31, 2015 for Faculty Exam Vouchers; and March 1, 2015 June 17, 2015 for Undergraduate and Graduate Scholarships. For additional information on the (ISC)²

4 Foundation Scholarship program, please visit About the (ISC) 2 Foundation ### The (ISC) 2 Foundation is a non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life by supporting cybersecurity education and awareness in the community through its programs and the efforts of its members. Through the (ISC) 2 Foundation, (ISC) 2 s global membership of over 100,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cybersecurity professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit About (ISC)² Formed in 1989 and celebrating its 25 th anniversary, (ISC)² is the largest not-forprofit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP ), the Certified Cyber Forensics Professional (CCFP SM ), Certified Authorization Professional (CAP ), HealthCare Information Security and Privacy Practitioner (HCISPP SM ), and Systems Security Certified Practitioner (SSCP ) credentials to qualifying candidates. (ISC)² s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK, a compendium of information and software security topics. More information is available at # # #

5 2014, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC) 2, Inc.

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow (ISC) 2 2012 Career Impact Survey Executive Summary The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow Skilled security professionals enjoy job stability and mobility,

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES (ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES 2015 (ISC)² CPE Policies & Guidelines (Rev. 10, April 21, 2015) 2015 International Information Systems Security Certification Consortium,

More information

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

WCA WEBINAR SERIES: The Case for Cyber Security Training

WCA WEBINAR SERIES: The Case for Cyber Security Training WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference

More information

Healthcare Privacy and Security: Workforce Competency. #privacysummit. Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014

Healthcare Privacy and Security: Workforce Competency. #privacysummit. Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014 Healthcare Privacy and Security: Workforce Competency Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014 Agenda: State of healthcare information protection Current solutions and impact Special environment

More information

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008 Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals

Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals About Us About Apollo Education Group, Inc. Apollo Education Group, Inc. is one of the world s largest private education

More information

Understanding the Federal IT Security Professional (FITSP) Certification

Understanding the Federal IT Security Professional (FITSP) Certification Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday

More information

Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals

Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals About Us About University of Phoenix University of Phoenix is constantly innovating to help working adults move efficiently

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You. ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

WHITE PAPER SPON. The Need for Improved Software Quality. Published January 2015 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. The Need for Improved Software Quality. Published January 2015 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER N The Need for Improved An Osterman Research White Paper Published January 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

Information Systems Security Engineering Professional (ISSEP)

Information Systems Security Engineering Professional (ISSEP) Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering

More information

MARION STATE MEMORIAL MYELOMA CANADA NURSING AWARD NOMINATION FORM

MARION STATE MEMORIAL MYELOMA CANADA NURSING AWARD NOMINATION FORM MARION STATE MEMORIAL MYELOMA CANADA NURSING AWARD NOMINATION FORM DEADLINE FOR NOMINATIONS: NOVEMBER 1st, 2013 Page 1 Nominations are now open for the first annual Marion State Memorial Myeloma Canada

More information

Dean of the School of Adult Learning North Park University Chicago, IL

Dean of the School of Adult Learning North Park University Chicago, IL Dean of the School of Adult Learning North Park University Chicago, IL Click Here To Apply Dean of the School of Adult Learning North Park University POSITION PROFILE and ANNOUNCEMENT North Park University

More information

The National Skills Academy for IT. Cyber Security

The National Skills Academy for IT. Cyber Security The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

Securing the Organization: Creating a Partnership Between HR and Information Security

Securing the Organization: Creating a Partnership Between HR and Information Security Securing the Organization: Creating a Partnership Between HR and Information Security A White Paper from (ISC) 2 Securing infrastructure is one of the most critical issues facing business and governments

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt stan2007@sluug.org Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

Name of presentation Company name

Name of presentation Company name Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Manatee Community Foundation

Manatee Community Foundation Manatee Community Foundation The Manatee Community Foundation was established in 1998 as a very different non-profit charitable organization that provides the opportunity for individuals to create low-cost

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Master of Arts in Political Science

Master of Arts in Political Science Master of Arts in Political Science Department of Political Science California State University, Chico Chico, California 95929-0455 www.csuchico.edu/pols Matthew Thomas, Coordinator Political Science M.A.

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

Full Employment: Good Or Bad News For The Information Security Profession? John Colley, CISSP Managing Director, EMEA (ISC) 2

Full Employment: Good Or Bad News For The Information Security Profession? John Colley, CISSP Managing Director, EMEA (ISC) 2 Full Employment: Good Or Bad News For The Information Security Profession? John Colley, CISSP Managing Director, EMEA (ISC) 2 Session ID: PROF-106 Session Classification: General Interest Agenda What do

More information

The Society of Women in Business At Georgia Institute of Technology. 2015-2016 Sponsor Guide

The Society of Women in Business At Georgia Institute of Technology. 2015-2016 Sponsor Guide The Society of Women in Business At Georgia Institute of Technology 2015-2016 Sponsor Guide 1 Table of Contents Georgia Tech & Scheller Rankings and Facts p. 3 Letter from the EVP p. 4-5 SWiB Goals p.

More information

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board Update on the CSSLP And its Impact on the SDLC Profession Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board (ISC)² Built the largest, most comprehensive Software Security Body of

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

AMCF. Association of Management Consulting Firms. As the leader of a large consulting firm, I welcome the

AMCF. Association of Management Consulting Firms. As the leader of a large consulting firm, I welcome the AMCF Association of Management Consulting Firms As the leader of a large consulting firm, I welcome the opportunity to get together A and learn from the experience of leaders from other global firms. Only

More information

The Association of Energy Engineers

The Association of Energy Engineers The Association of Energy Engineers (AEE), a nonprofit organization of 9,000 members in 77 countries, is your source for information on the dynamic field of energy efficiency, utility deregulation, facility

More information

APA JUDITH McMANUS PRICE SCHOLARSHIP 2015-2016 Academic Year

APA JUDITH McMANUS PRICE SCHOLARSHIP 2015-2016 Academic Year APA JUDITH McMANUS PRICE SCHOLARSHIP 2015-2016 Academic Year The Program Judith McManus Price, a planner for more than 30 years before her death in 2001, was an exceptional woman with extraordinary talents

More information

Application Instructions for Merit Based Scholarship Eligibility To be eligible an applicant must meet all of the following qualifications:

Application Instructions for Merit Based Scholarship Eligibility To be eligible an applicant must meet all of the following qualifications: The Anthony F. Farma, CFP Scholarship Application The scholarship, initially introduced in 2004, is awarded to a student who is pursuing the CERTIFIED FINANCIAL PLANNER certification. The scholarship honors

More information

Put Your Passion for Education to Work Graduate with Your Master s in About 1 Year

Put Your Passion for Education to Work Graduate with Your Master s in About 1 Year Put Your Passion for Education to Work Graduate with Your Master s in About 1 Year Transformative teachers and educational leaders are vital to the growth and success of nearly every organization from

More information

How To Become Associate Dean Of Accountancy At Wake Forest University

How To Become Associate Dean Of Accountancy At Wake Forest University Associate Dean of Accountancy OVERVIEW: The Wake Forest University School of Business is seeking qualified candidates to lead its accounting programs and faculty beginning July 1, 2014. Both academically

More information

CPHQ. Training Preparation Program. KnowLogic Center for Management & Training. Healthcare Division. KnowLogic Professional Certification Programs

CPHQ. Training Preparation Program. KnowLogic Center for Management & Training. Healthcare Division. KnowLogic Professional Certification Programs Certified Professional Healthcare Quality CPHQ Training Preparation Program KnowLogic Center for Management & Training Healthcare Division KnowLogic Professional Certification Programs Certified Professional

More information

An Actionable. exposure. Do not miss an opportunity to attend Mr. Pabrai s presentation. You will not be disappointed.

An Actionable. exposure. Do not miss an opportunity to attend Mr. Pabrai s presentation. You will not be disappointed. An Actionable Cyber Security Program! Ali Pabrai is an exceptional presenter who possesses a broad-based knowledge of cybersecurity and compliance. The scope of his talents range from boardroom-level strategic

More information

CMA Scholarship Program

CMA Scholarship Program CMA Scholarship Program Overview The Certified Management Accountant (CMA) is the gold standard of certification in management accounting. It is unique among professional and academic credentials, designed

More information

13 th Annual General Meeting

13 th Annual General Meeting 13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper Piloted by the Cyber Security Programme Published August 2015 2 Copyright 2015, Health and Social Care Information Centre.

More information

Master of Public Administration

Master of Public Administration Master of Public Administration Department of Political Science California State University, Chico Chico, California 95929-0455 www.csuchico.edu/pols Dr. Lori Weber, Coordinator Master of Public Administration

More information

What is the ACCA Approved Employer Programme?

What is the ACCA Approved Employer Programme? About ACCA ACCA (the Association of Chartered Certified Accountants) is the global body for professional accountants with 428,000 trainees and 162,000 qualified members in 170 countries. We help the world

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

Nursing Certification

Nursing Certification o v e r v i e w o f A N C C Nursing Certification Achieve your professional best with ANCC Certification. Visit www.nursecredentialing.org/cert to get more information and to download application forms

More information

THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT. Your global network of procurement professionals

THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT. Your global network of procurement professionals THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT Your global network of procurement professionals A Global Network Do you want to reach a market of 250,000 procurement professionals internationally?

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

2015 INFORMATION SECURITY BREACHES SURVEY

2015 INFORMATION SECURITY BREACHES SURVEY 2015 INFORMATION SECURITY BREACHES SURVEY Executive Summary Survey conducted by In association with 2 INFORMATION SECURITY BREACHES SURVEY 2015 executive summary Commissioned by: The UK Cyber Security

More information

KSU/NOHIMSS Webinar in Health Informatics

KSU/NOHIMSS Webinar in Health Informatics KSU/NOHIMSS Webinar in Health Informatics Benefits for Individuals Professional recognition Career advancement Improve earning potential Increase job mobility Connect with peers Benefits for Employers

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

JOIN AUSTRALIA S. leading professional. COMMUNITY of FINANCIAL PLANNERS

JOIN AUSTRALIA S. leading professional. COMMUNITY of FINANCIAL PLANNERS JOIN AUSTRALIA S leading professional COMMUNITY of FINANCIAL PLANNERS The FPA vision: THROUGH our members we STAND with AUSTRALIANS for a BETTER financial FUTURE. B THE FPA IS AUSTRALIA S LEADING PROFESSIONAL

More information

NOW THAT S COMPETITIVE EDGE.

NOW THAT S COMPETITIVE EDGE. IIT STUART SCHOOL OF BUSINESS A BACHELOR S DEGREE PROGRAM IN A TECHNOLOGY-FOCUSED UNIVERSITY. NOW THAT S COMPETITIVE EDGE. OUR UNDERGRADUATE BUSINESS DEGREE IS DESIGNED TO GIVE YOU AN UNPARALLELED CAREER

More information

Making Facility Management a Career of Choice by Expanding Educational Opportunities.

Making Facility Management a Career of Choice by Expanding Educational Opportunities. Making Facility Management a Career of Choice by Expanding Educational Opportunities. IFMA Foundation Global Workforce Initiative The FM profession is at risk. The FM workforce gap is getting larger. Join

More information

HRINZ Postgraduate Scholarship

HRINZ Postgraduate Scholarship HRINZ Postgraduate Scholarship The Human Resources Institute of New Zealand (HRINZ) will not be offering the Postgraduate Scholarship for the 2012 academic year. HRINZ Postgraduate Scholarship Closing

More information

BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor

BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor 1 CSF Roadmap 2015 BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Steve Penn is an experienced security professional with 15+ years of informa;on security experience. He currently

More information

2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA

2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA 2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA Congratulations on your acceptance to THE University of Florida! The Central Florida Gator Club, an affiliate organization

More information

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government

More information

Strategic Plan. Page 1 of 6

Strategic Plan. Page 1 of 6 Strategic Plan The following represents the current AACE International Strategic Plan as approved by the Board of Directors at our meeting in April 2014 in Chicago, IL. The Strategic Plan is organized

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

Investing in the College of Business and Economics

Investing in the College of Business and Economics Investing in the College of Business and Economics The College of Business and Economics: A State of Minds The WVU College of Business and Economics has never been stronger, more global, or more engaged

More information

School of Sciences. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan

School of Sciences. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan School of Sciences Science is a way of thinking much more than it is a body of knowledge. Carl Sagan School of Sciences The School of Sciences at Auburn Montgomery offers a combination of excellence in

More information

Undergraduate Resource Series

Undergraduate Resource Series OCS APPLYING TO BUSINESS SCHOOL Undergraduate Resource Series Office of Career Services 54 Dunster Street Harvard University Faculty of Arts and Sciences 617.495.2595 www.ocs.fas.harvard.edu Photo: Harvard

More information

Robert Noyce Teacher Scholarship Program. Directorate for Education and Human Education Resources Division of Undergraduate Education

Robert Noyce Teacher Scholarship Program. Directorate for Education and Human Education Resources Division of Undergraduate Education Robert Noyce Teacher Scholarship Program Directorate for Education and Human Education Resources Division of Undergraduate Education Robert Noyce Teacher Scholarship Program Initiated by Act of Congress

More information

DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP

DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP WWW.SBS.OXFORD.EDU EDUCATING LEADERS FOR 800 YEARS OXFORD DIPLOMA IN FINANCIAL STRATEGY The Oxford Diploma in Financial Strategy is a postgraduate qualification

More information

The Susan R. Meisinger Graduate Study Fellowship Frequently Asked Questions

The Susan R. Meisinger Graduate Study Fellowship Frequently Asked Questions The Susan R. Meisinger Graduate Study Fellowship Frequently Asked Questions 1. Who is Susan R. Meisinger? Susan R. Meisinger, SPHR, held numerous positions throughout her tenure with SHRM, beginning in

More information

Sport. Did you know...

Sport. Did you know... Sport If you re fanatical about all things Sport, then we have the course for you. Careers in Sport are hugely varied, exciting and could see you working anywhere in the world. With a range of courses

More information

Rethinking Cyber Security Threats

Rethinking Cyber Security Threats Rethinking Cyber Security Threats (ISC)² Update U.S. Government Advisory Board Meeting February 17, 2010 Frank Chow CISSP ISSAP ISSMP CSSLP CGEIT CRISC CISM CISA Chairperson of Professional Information

More information

How To Get A Masters Of Accountancy At Duquesne University

How To Get A Masters Of Accountancy At Duquesne University Master of Accountancy (MAcc) Full-time, one-year program Distinguish yourself and make an impact on the accounting profession by obtaining the coveted Master of Science in Accountancy degree. www.duq.edu/macc

More information

Advantages of Formal Training for Project Managers

Advantages of Formal Training for Project Managers Advantages of Formal Training for Project Managers Dr. J. Wayne McCain December 11, 2008 North Alabama PMI 2 PRESENTATION OUTLINE WHY PURSUE FORMAL TRAINING AND CERTIFICATIONS? - Organizations - Individuals

More information

Online Accounting Program

Online Accounting Program School of Business Online Accounting Program Dear Prospective Student, On behalf of the University of Alabama at Birmingham, I would like to personally invite you to apply for admission into UAB s Online

More information

The Global Not-for-Profit Leader in Project, Program and Portfolio Management. Name

The Global Not-for-Profit Leader in Project, Program and Portfolio Management. Name The Global Not-for-Profit Leader in Project, Program and Portfolio Management Name If you don t know where you ve come from, you don t know where you are. - James Burke, Futurist 1969 Apollo 11 Astronauts

More information

2010-2011 Annual Report. June, 2011

2010-2011 Annual Report. June, 2011 2010-2011 Annual Report June, 2011 Executive Summary The School of Accounting enjoys a reputation for excellence in teaching and our graduates are in high demand. Employment opportunities for accounting

More information

IDA Scholarship Foundation. 20/20+ Campaign

IDA Scholarship Foundation. 20/20+ Campaign IDA Scholarship Foundation 20/20+ Campaign Creating Educational Opportunities is Our Passion, Promise and Purpose 20/20+ Campaign In 1995, the leadership of DODA and FWGDA decided to combine the organizations

More information

Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia 30538 United States

Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia 30538 United States Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia 30538 United States Ms Gail S Fry Review Dates: 11/19/2008-11/20/2008 North Central

More information

How To Get A Degree From Davenport

How To Get A Degree From Davenport Career Focused Degrees Enroll before August 31 ONLINE / ON CAMPUS The Davenport Advantage 3 Fastest-Growing Career Areas We specialize in business, technology and health, three areas at the heart of the

More information

THE CANADA COURSE FOR EDUCATION AGENTS (CCEA)

THE CANADA COURSE FOR EDUCATION AGENTS (CCEA) THE CANADA COURSE FOR EDUCATION AGENTS (CCEA) Caroline Levesque Business Development Manager, Canada ICEF Beijing, October 14-16, 2015 Barometer Rising Attractiveness of Study Destinations in 2014 Barometer

More information

2014 IVAN WOOD MEMORIAL AWARD FOR EXCELLENCE IN HRM Application Package

2014 IVAN WOOD MEMORIAL AWARD FOR EXCELLENCE IN HRM Application Package 2014 IVAN WOOD MEMORIAL AWARD FOR EXCELLENCE IN HRM Application Package Proudly supported by and Who is Eligible? Applicants must be currently enrolled full-time in the Bachelor of Business (Human Resource

More information

Earn Your Mark of Distinction. BOARD of CERTIFICATION for EMERGENCY NURSING. www.bcencertifications.org

Earn Your Mark of Distinction. BOARD of CERTIFICATION for EMERGENCY NURSING. www.bcencertifications.org Earn Your Mark of Distinction BOARD of CERTIFICATION for EMERGENCY NURSING www.bcencertifications.org Enhance Your Life. Enrich Your Future. BCEN certifications provide designations to emergency nursing

More information

CHRE. CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals

CHRE. CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals CHRE CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals About CHRE Highly Keen - The HR Institute offers for the first time in Pakistan an exam based HR certification with

More information

Preparing to Take the Certification Exam

Preparing to Take the Certification Exam Page 1 Preparing to Take the Certification Exam SECTION I Page 2 Page 3 The Certification Process and the Exam CHAPTER 1 If you are reading this book, you are getting ready to take either the American

More information

Our Program. Counselor Education 10/24/14. This Overview Will: An Overview of the CACREP-Accredited Programs The University of Alabama

Our Program. Counselor Education 10/24/14. This Overview Will: An Overview of the CACREP-Accredited Programs The University of Alabama 10/24/14 Counselor Education An Overview of the CACREP-Accredited Programs The University of Alabama Graduate Programs in Counselor Education Welcome and thank you for your interest in our program. Counselor

More information

Insurance Industry Qualifications

Insurance Industry Qualifications Insurance Industry Qualifications 2015 i ii In one of the world s most dynamic industries, knowledge, technical skill, creativity and professional relationships are what make for truly great performers.

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

kaplan University to help you Succeed

kaplan University to help you Succeed kaplan University Real-World Knowledge and Skills to help you Succeed LETTER FROM THE PRESIDENT CELEBRATING 75 YEARS: A LEGACY OF INNOVATION IN HIGHER EDUCATION In 1937, the founding campus of Kaplan University

More information

Leadership in public education

Leadership in public education Leadership in public education Policy direction overview Discussion paper three Great educational leaders transform the lives of young people and enrich our whole community. They are the exceptional men

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information