(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients
|
|
|
- Shana Clark
- 10 years ago
- Views:
Transcription
1 NEWS FOR IMMEDIATE RELEASE Media Contact: Alex Lyons Merritt Group, Inc (ISC)² Foundation Announces 2014 Information Security Scholarship Recipients 33 recipients of scholarships that foster the next generation of cybersecurity professionals and research (ISC)² Security Congress Atlanta, Ga., September 29, 2014 The (ISC)² ( ISC-squared ) Foundation, a charitable trust that aims to empower students, teachers, and the general public to secure their online life with cybersecurity education and awareness programs, today announced the recipients of its 2014 Information Security Scholarships. Recipients were selected by the (ISC)² Scholarship Review Committee, which consists of representatives from (ISC)² Chapters, academia, and the (ISC)² membership. The (ISC)² Foundation Scholarship Program aims to fill society s need for trained cybersecurity professionals by building the workforce of the future through meaningful scholarships. This program opens doors for current and aspiring information security professionals, with scholarships for women, undergraduate, graduate, and post-graduate students as well as certification exam vouchers for qualifying faculty to ensure a sufficient supply of qualified instructors at the university level. On behalf of the (ISC)² Foundation, I d like congratulate this year s scholarship recipients for their impressive applications and a commitment to joining the cybersecurity workforce, said Julie Peeler, director, (ISC)² Foundation. These scholarships are making a real impact on students lives around the globe, and fulfilling our goal to meet the demand for more qualified information security professionals. Many of our scholarship recipients have told us they wouldn t be able to continue
2 their studies without this financial assistance. We re so pleased to offer this program to deserving, passionate students in need. The following Scholarship recipients were recognized at the 2014 (ISC)² Security Congress Town Hall Meeting last night: Women s Scholarship o M. Alexis Greenidge, U.S.A. o Sreedevi Sreekandan, India o Shruti Gupta, India Graduate Research Project(s) o Scott Ruoti, U.S.A. o Mark O Neill, U.S.A. o Anna Truss, Turkmenistan o Lokesh Pidawekar, India o Chunyue Du, China o Cheryl Devaney, U.S.A. o Pratibha Dohare, India o Saradha Kannan, India Undergraduate Scholarship o Christopher Goes, U.S.A. o Kyle Murbach, U.S.A. o Lassine Cherif, Ivory Coast o Dulce Gonzalez, Mexico o Robin Saunders, U.S.A. o Katherine McGinn, U.S.A. o Fumi Honda, U.S.A. o Rose Reinlib, U.S.A. o Yue Zhu, China o Samantha Houston, U.S.A. o Patrick Katamba, Uganda Faculty Exam Vouchers o Eamon Doherty, U.S.A. o Mohamed Kazi, United Kingdom o Louay Karadsheh, Kuwait o Tahir Abbas, Pakistan
3 o Rizwan Ahmad, Pakistan o Helio de Castro, Sao Tome and Principe o Diane Murphy, United Kingdom o Timothy Perez, U.S.A. o Vivek Gupta, India o Donna Schaeffer, U.S.A. o Trevor Chandler, U.S.A. By selecting me, the (ISC)² Foundation gave me a luxury of focusing on my education rather than worrying about how to pay for it, said Undergraduate Scholarship recipient Lassine Cherif, Ivory Coast. It gives me a unique opportunity to obtain both a degree and a globally recognized certification; skills that I need to achieve my goal which is help secure cyberspace. The assistance provided by the (ISC)² Foundation allows me to pursue research within the field of information security while completing a Master of Science degree in information systems management, said Graduate Scholarship recipient Cheryl Devaney, U.S.A. "I hope to pursue a career in information security after completing my degree, and the funding provided will give me the opportunity to gain vital experience within this field while a student." I consider this scholarship a recognition and approval of my decision to specialize in cybersecurity as part of my continuing education, said Women s Scholarship recipient Sreedevi Sreekandan, India. The award committee also recognized the hard work I put into the first year of the graduate level course work. On a personal level, I believe this award also shows the foundation's commitment to bring more women into the cybersecurity profession and to extend a helping hand in their journey to become a confident and knowledgeable IT security professional. I hope this award will continue to encourage women all over the world to take a keen interest in cybersecurity education in future. The (ISC)² Foundation will accept applications for the 2015 scholarships during the following periods: January 1, 2015 March 31, 2015 for Women s Scholarships; January 1, 2015 December 31, 2015 for Faculty Exam Vouchers; and March 1, 2015 June 17, 2015 for Undergraduate and Graduate Scholarships. For additional information on the (ISC)²
4 Foundation Scholarship program, please visit About the (ISC) 2 Foundation ### The (ISC) 2 Foundation is a non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life by supporting cybersecurity education and awareness in the community through its programs and the efforts of its members. Through the (ISC) 2 Foundation, (ISC) 2 s global membership of over 100,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cybersecurity professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit About (ISC)² Formed in 1989 and celebrating its 25 th anniversary, (ISC)² is the largest not-forprofit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP ), the Certified Cyber Forensics Professional (CCFP SM ), Certified Authorization Professional (CAP ), HealthCare Information Security and Privacy Practitioner (HCISPP SM ), and Systems Security Certified Practitioner (SSCP ) credentials to qualifying candidates. (ISC)² s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK, a compendium of information and software security topics. More information is available at # # #
5 2014, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC) 2, Inc.
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES
(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES 2015 (ISC)² CPE Policies & Guidelines (Rev. 10, April 21, 2015) 2015 International Information Systems Security Certification Consortium,
IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES
IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
WCA WEBINAR SERIES: The Case for Cyber Security Training
WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference
Healthcare Privacy and Security: Workforce Competency. #privacysummit. Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014
Healthcare Privacy and Security: Workforce Competency Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014 Agenda: State of healthcare information protection Current solutions and impact Special environment
Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008
Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Understanding the Federal IT Security Professional (FITSP) Certification
Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday
Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals
Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals About Us About University of Phoenix University of Phoenix is constantly innovating to help working adults move efficiently
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Information Systems Security Engineering Professional (ISSEP)
Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering
Dean of the School of Adult Learning North Park University Chicago, IL
Dean of the School of Adult Learning North Park University Chicago, IL Click Here To Apply Dean of the School of Adult Learning North Park University POSITION PROFILE and ANNOUNCEMENT North Park University
The National Skills Academy for IT. Cyber Security
The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
SANS CyberTalent VetSuccess Immersion Academy. VetSuccess
SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many
Security Certifications. A Short Survey. Welcome. Stan Reichardt [email protected]
Security Certifications A Short Survey Welcome Stan Reichardt [email protected] Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily
Name of presentation Company name
Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Manatee Community Foundation
Manatee Community Foundation The Manatee Community Foundation was established in 1998 as a very different non-profit charitable organization that provides the opportunity for individuals to create low-cost
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
Master of Arts in Political Science
Master of Arts in Political Science Department of Political Science California State University, Chico Chico, California 95929-0455 www.csuchico.edu/pols Matthew Thomas, Coordinator Political Science M.A.
The Society of Women in Business At Georgia Institute of Technology. 2015-2016 Sponsor Guide
The Society of Women in Business At Georgia Institute of Technology 2015-2016 Sponsor Guide 1 Table of Contents Georgia Tech & Scheller Rankings and Facts p. 3 Letter from the EVP p. 4-5 SWiB Goals p.
Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board
Update on the CSSLP And its Impact on the SDLC Profession Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board (ISC)² Built the largest, most comprehensive Software Security Body of
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
AMCF. Association of Management Consulting Firms. As the leader of a large consulting firm, I welcome the
AMCF Association of Management Consulting Firms As the leader of a large consulting firm, I welcome the opportunity to get together A and learn from the experience of leaders from other global firms. Only
The Association of Energy Engineers
The Association of Energy Engineers (AEE), a nonprofit organization of 9,000 members in 77 countries, is your source for information on the dynamic field of energy efficiency, utility deregulation, facility
Application Instructions for Merit Based Scholarship Eligibility To be eligible an applicant must meet all of the following qualifications:
The Anthony F. Farma, CFP Scholarship Application The scholarship, initially introduced in 2004, is awarded to a student who is pursuing the CERTIFIED FINANCIAL PLANNER certification. The scholarship honors
How To Become Associate Dean Of Accountancy At Wake Forest University
Associate Dean of Accountancy OVERVIEW: The Wake Forest University School of Business is seeking qualified candidates to lead its accounting programs and faculty beginning July 1, 2014. Both academically
CPHQ. Training Preparation Program. KnowLogic Center for Management & Training. Healthcare Division. KnowLogic Professional Certification Programs
Certified Professional Healthcare Quality CPHQ Training Preparation Program KnowLogic Center for Management & Training Healthcare Division KnowLogic Professional Certification Programs Certified Professional
CMA Scholarship Program
CMA Scholarship Program Overview The Certified Management Accountant (CMA) is the gold standard of certification in management accounting. It is unique among professional and academic credentials, designed
13 th Annual General Meeting
13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm
How To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide
HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme
HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper Piloted by the Cyber Security Programme Published August 2015 2 Copyright 2015, Health and Social Care Information Centre.
Master of Public Administration
Master of Public Administration Department of Political Science California State University, Chico Chico, California 95929-0455 www.csuchico.edu/pols Dr. Lori Weber, Coordinator Master of Public Administration
What is the ACCA Approved Employer Programme?
About ACCA ACCA (the Association of Chartered Certified Accountants) is the global body for professional accountants with 428,000 trainees and 162,000 qualified members in 170 countries. We help the world
Nursing Certification
o v e r v i e w o f A N C C Nursing Certification Achieve your professional best with ANCC Certification. Visit www.nursecredentialing.org/cert to get more information and to download application forms
THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT. Your global network of procurement professionals
THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT Your global network of procurement professionals A Global Network Do you want to reach a market of 250,000 procurement professionals internationally?
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
2015 INFORMATION SECURITY BREACHES SURVEY
2015 INFORMATION SECURITY BREACHES SURVEY Executive Summary Survey conducted by In association with 2 INFORMATION SECURITY BREACHES SURVEY 2015 executive summary Commissioned by: The UK Cyber Security
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor
1 CSF Roadmap 2015 BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Steve Penn is an experienced security professional with 15+ years of informa;on security experience. He currently
2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA
2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA Congratulations on your acceptance to THE University of Florida! The Central Florida Gator Club, an affiliate organization
Strategic Plan. Page 1 of 6
Strategic Plan The following represents the current AACE International Strategic Plan as approved by the Board of Directors at our meeting in April 2014 in Chicago, IL. The Strategic Plan is organized
National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar
National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the
Investing in the College of Business and Economics
Investing in the College of Business and Economics The College of Business and Economics: A State of Minds The WVU College of Business and Economics has never been stronger, more global, or more engaged
School of Sciences. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan
School of Sciences Science is a way of thinking much more than it is a body of knowledge. Carl Sagan School of Sciences The School of Sciences at Auburn Montgomery offers a combination of excellence in
Undergraduate Resource Series
OCS APPLYING TO BUSINESS SCHOOL Undergraduate Resource Series Office of Career Services 54 Dunster Street Harvard University Faculty of Arts and Sciences 617.495.2595 www.ocs.fas.harvard.edu Photo: Harvard
Robert Noyce Teacher Scholarship Program. Directorate for Education and Human Education Resources Division of Undergraduate Education
Robert Noyce Teacher Scholarship Program Directorate for Education and Human Education Resources Division of Undergraduate Education Robert Noyce Teacher Scholarship Program Initiated by Act of Congress
DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP
DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP WWW.SBS.OXFORD.EDU EDUCATING LEADERS FOR 800 YEARS OXFORD DIPLOMA IN FINANCIAL STRATEGY The Oxford Diploma in Financial Strategy is a postgraduate qualification
Sport. Did you know...
Sport If you re fanatical about all things Sport, then we have the course for you. Careers in Sport are hugely varied, exciting and could see you working anywhere in the world. With a range of courses
How To Get A Masters Of Accountancy At Duquesne University
Master of Accountancy (MAcc) Full-time, one-year program Distinguish yourself and make an impact on the accounting profession by obtaining the coveted Master of Science in Accountancy degree. www.duq.edu/macc
Advantages of Formal Training for Project Managers
Advantages of Formal Training for Project Managers Dr. J. Wayne McCain December 11, 2008 North Alabama PMI 2 PRESENTATION OUTLINE WHY PURSUE FORMAL TRAINING AND CERTIFICATIONS? - Organizations - Individuals
Online Accounting Program
School of Business Online Accounting Program Dear Prospective Student, On behalf of the University of Alabama at Birmingham, I would like to personally invite you to apply for admission into UAB s Online
Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia 30538 United States
Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia 30538 United States Ms Gail S Fry Review Dates: 11/19/2008-11/20/2008 North Central
THE CANADA COURSE FOR EDUCATION AGENTS (CCEA)
THE CANADA COURSE FOR EDUCATION AGENTS (CCEA) Caroline Levesque Business Development Manager, Canada ICEF Beijing, October 14-16, 2015 Barometer Rising Attractiveness of Study Destinations in 2014 Barometer
Earn Your Mark of Distinction. BOARD of CERTIFICATION for EMERGENCY NURSING. www.bcencertifications.org
Earn Your Mark of Distinction BOARD of CERTIFICATION for EMERGENCY NURSING www.bcencertifications.org Enhance Your Life. Enrich Your Future. BCEN certifications provide designations to emergency nursing
CHRE. CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals
CHRE CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals About CHRE Highly Keen - The HR Institute offers for the first time in Pakistan an exam based HR certification with
Preparing to Take the Certification Exam
Page 1 Preparing to Take the Certification Exam SECTION I Page 2 Page 3 The Certification Process and the Exam CHAPTER 1 If you are reading this book, you are getting ready to take either the American
Our Program. Counselor Education 10/24/14. This Overview Will: An Overview of the CACREP-Accredited Programs The University of Alabama
10/24/14 Counselor Education An Overview of the CACREP-Accredited Programs The University of Alabama Graduate Programs in Counselor Education Welcome and thank you for your interest in our program. Counselor
Insurance Industry Qualifications
Insurance Industry Qualifications 2015 i ii In one of the world s most dynamic industries, knowledge, technical skill, creativity and professional relationships are what make for truly great performers.
kaplan University to help you Succeed
kaplan University Real-World Knowledge and Skills to help you Succeed LETTER FROM THE PRESIDENT CELEBRATING 75 YEARS: A LEGACY OF INNOVATION IN HIGHER EDUCATION In 1937, the founding campus of Kaplan University
Leadership in public education
Leadership in public education Policy direction overview Discussion paper three Great educational leaders transform the lives of young people and enrich our whole community. They are the exceptional men
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
