(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients



Similar documents
The Value of Information Security Certifications

Security Transcends Technology

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

Certification and Training

WCA WEBINAR SERIES: The Case for Cyber Security Training

Healthcare Privacy and Security: Workforce Competency. #privacysummit. Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

The Next Generation of Security Leaders

Understanding the Federal IT Security Professional (FITSP) Certification

Cybersecurity Workforce Competencies: Preparing Tomorrow s Risk-Ready Professionals

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Certification for Information System Security Professional (CISSP)

Information Security Principles and Practices

Information Systems Security Engineering Professional (ISSEP)

Dean of the School of Adult Learning North Park University Chicago, IL

The National Skills Academy for IT. Cyber Security

Shon Harris s Newly Updated CISSP Materials

Access FedVTE online at: fedvte.usalearning.gov

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Name of presentation Company name

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Manatee Community Foundation

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Master of Arts in Political Science

The Society of Women in Business At Georgia Institute of Technology Sponsor Guide

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

AMCF. Association of Management Consulting Firms. As the leader of a large consulting firm, I welcome the

The Association of Energy Engineers

Application Instructions for Merit Based Scholarship Eligibility To be eligible an applicant must meet all of the following qualifications:

How To Become Associate Dean Of Accountancy At Wake Forest University

CPHQ. Training Preparation Program. KnowLogic Center for Management & Training. Healthcare Division. KnowLogic Professional Certification Programs

CMA Scholarship Program

13 th Annual General Meeting

How To Become A Security Professional

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

HealthCare Information Security and Privacy Practitioner (HCISPP) Briefing Paper. Piloted by the Cyber Security Programme

Master of Public Administration

What is the ACCA Approved Employer Programme?

Nursing Certification

THE INTERNATIONAL FEDERATION OF PURCHASING AND SUPPLY MANAGEMENT. Your global network of procurement professionals

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

2015 INFORMATION SECURITY BREACHES SURVEY

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor

2015 CENTRAL FLORIDA GATOR CLUB SCHOLARSHIP APPLICATION UNIVERSITY OF FLORIDA

Strategic Plan. Page 1 of 6

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

Investing in the College of Business and Economics

School of Sciences. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan

Undergraduate Resource Series

Robert Noyce Teacher Scholarship Program. Directorate for Education and Human Education Resources Division of Undergraduate Education

DIPLOMA IN FINANCIAL STRATEGY: PWC SCHOLARSHIP

Sport. Did you know...

How To Get A Masters Of Accountancy At Duquesne University

Advantages of Formal Training for Project Managers

Online Accounting Program

Report of the Quality Assurance Review Team for Big A Elementary School Route 2, Box 384 Sorrells Road Eastanollee, Georgia United States

THE CANADA COURSE FOR EDUCATION AGENTS (CCEA)

Earn Your Mark of Distinction. BOARD of CERTIFICATION for EMERGENCY NURSING.

CHRE. CERTIFIED HUMAN RESOURCES EXPERT An Exam Based Certification for HR Professionals

Preparing to Take the Certification Exam

Our Program. Counselor Education 10/24/14. This Overview Will: An Overview of the CACREP-Accredited Programs The University of Alabama

Insurance Industry Qualifications

kaplan University to help you Succeed

Leadership in public education

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Transcription:

NEWS FOR IMMEDIATE RELEASE Media Contact: Alex Lyons Merritt Group, Inc. 703-390-1527 lyons@merrittgrp.com (ISC)² Foundation Announces 2014 Information Security Scholarship Recipients 33 recipients of scholarships that foster the next generation of cybersecurity professionals and research (ISC)² Security Congress Atlanta, Ga., September 29, 2014 The (ISC)² ( ISC-squared ) Foundation, a charitable trust that aims to empower students, teachers, and the general public to secure their online life with cybersecurity education and awareness programs, today announced the recipients of its 2014 Information Security Scholarships. Recipients were selected by the (ISC)² Scholarship Review Committee, which consists of representatives from (ISC)² Chapters, academia, and the (ISC)² membership. The (ISC)² Foundation Scholarship Program aims to fill society s need for trained cybersecurity professionals by building the workforce of the future through meaningful scholarships. This program opens doors for current and aspiring information security professionals, with scholarships for women, undergraduate, graduate, and post-graduate students as well as certification exam vouchers for qualifying faculty to ensure a sufficient supply of qualified instructors at the university level. On behalf of the (ISC)² Foundation, I d like congratulate this year s scholarship recipients for their impressive applications and a commitment to joining the cybersecurity workforce, said Julie Peeler, director, (ISC)² Foundation. These scholarships are making a real impact on students lives around the globe, and fulfilling our goal to meet the demand for more qualified information security professionals. Many of our scholarship recipients have told us they wouldn t be able to continue

their studies without this financial assistance. We re so pleased to offer this program to deserving, passionate students in need. The following Scholarship recipients were recognized at the 2014 (ISC)² Security Congress Town Hall Meeting last night: Women s Scholarship o M. Alexis Greenidge, U.S.A. o Sreedevi Sreekandan, India o Shruti Gupta, India Graduate Research Project(s) o Scott Ruoti, U.S.A. o Mark O Neill, U.S.A. o Anna Truss, Turkmenistan o Lokesh Pidawekar, India o Chunyue Du, China o Cheryl Devaney, U.S.A. o Pratibha Dohare, India o Saradha Kannan, India Undergraduate Scholarship o Christopher Goes, U.S.A. o Kyle Murbach, U.S.A. o Lassine Cherif, Ivory Coast o Dulce Gonzalez, Mexico o Robin Saunders, U.S.A. o Katherine McGinn, U.S.A. o Fumi Honda, U.S.A. o Rose Reinlib, U.S.A. o Yue Zhu, China o Samantha Houston, U.S.A. o Patrick Katamba, Uganda Faculty Exam Vouchers o Eamon Doherty, U.S.A. o Mohamed Kazi, United Kingdom o Louay Karadsheh, Kuwait o Tahir Abbas, Pakistan

o Rizwan Ahmad, Pakistan o Helio de Castro, Sao Tome and Principe o Diane Murphy, United Kingdom o Timothy Perez, U.S.A. o Vivek Gupta, India o Donna Schaeffer, U.S.A. o Trevor Chandler, U.S.A. By selecting me, the (ISC)² Foundation gave me a luxury of focusing on my education rather than worrying about how to pay for it, said Undergraduate Scholarship recipient Lassine Cherif, Ivory Coast. It gives me a unique opportunity to obtain both a degree and a globally recognized certification; skills that I need to achieve my goal which is help secure cyberspace. The assistance provided by the (ISC)² Foundation allows me to pursue research within the field of information security while completing a Master of Science degree in information systems management, said Graduate Scholarship recipient Cheryl Devaney, U.S.A. "I hope to pursue a career in information security after completing my degree, and the funding provided will give me the opportunity to gain vital experience within this field while a student." I consider this scholarship a recognition and approval of my decision to specialize in cybersecurity as part of my continuing education, said Women s Scholarship recipient Sreedevi Sreekandan, India. The award committee also recognized the hard work I put into the first year of the graduate level course work. On a personal level, I believe this award also shows the foundation's commitment to bring more women into the cybersecurity profession and to extend a helping hand in their journey to become a confident and knowledgeable IT security professional. I hope this award will continue to encourage women all over the world to take a keen interest in cybersecurity education in future. The (ISC)² Foundation will accept applications for the 2015 scholarships during the following periods: January 1, 2015 March 31, 2015 for Women s Scholarships; January 1, 2015 December 31, 2015 for Faculty Exam Vouchers; and March 1, 2015 June 17, 2015 for Undergraduate and Graduate Scholarships. For additional information on the (ISC)²

Foundation Scholarship program, please visit https://www.isc2.org/scholarship/default.aspx. About the (ISC) 2 Foundation ### The (ISC) 2 Foundation is a non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life by supporting cybersecurity education and awareness in the community through its programs and the efforts of its members. Through the (ISC) 2 Foundation, (ISC) 2 s global membership of over 100,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cybersecurity professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit www.isc2cares.org. About (ISC)² Formed in 1989 and celebrating its 25 th anniversary, (ISC)² is the largest not-forprofit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP ), the Certified Cyber Forensics Professional (CCFP SM ), Certified Authorization Professional (CAP ), HealthCare Information Security and Privacy Practitioner (HCISPP SM ), and Systems Security Certified Practitioner (SSCP ) credentials to qualifying candidates. (ISC)² s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK, a compendium of information and software security topics. More information is available at www.isc2.org. # # #

2014, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC) 2, Inc.