Welcome!

Blog Feed Post

(ISC)²® Foundation to Offer US$145,000 for 2014 Information Security Scholarships

Grant opportunities available to women, undergraduate, graduate and post-graduate students and faculty worldwide; candidates must apply by April 1st

London, UK, January 14, 2014 — The (ISC)2® ("ISC-squared") Foundation, the non-profit charitable trust for (ISC)² that aims to empower students, teachers, and the general public to secure their online life with community cyber security education and awareness, today announced its scholarship application period for 2014. The application deadline for students and faculty to submit a completed application is 12:00 a.m. EST on Tuesday, April 1, 2014.

Through the (ISC)² Foundation's information security scholarship program, undergraduate, graduate, and post-graduate students have the opportunity to build stable careers in the field of information security. According to the 2013 Global Information Security Workforce Study, the global shortage of information security professionals is having a profound impact on the world economy. These scholarships not only encourage students to pursue careers in this industry, but they also help address the growing demand for skilled cyber security professionals worldwide.

"It is critical that we work to fill society's need for trained cyber security professionals by building the workforce of the future," said Julie Peeler, director of the (ISC)² Foundation. "For many of these students, their financial situations are challenging and our scholarships provide the funding they need to continue their education. I look forward to impacting more information security students with life-changing scholarships in 2014."

The 2014 scholarship categories include:

  • Women's Scholarships: To inspire women to join the ever-growing field of information security, each year, the (ISC)² Foundation grants up to two scholarships totaling up to US$40,000.

  • Undergraduate Scholarships: Aspiring information security professionals have the opportunity to ease some of their educational financial burden with the (ISC)2 Foundation Undergraduate Scholarship, offering undergraduate students studying information security grants of up to US$5,000 per recipient.

  • Graduate Research Project(s): Graduate students often need funding to conduct special research projects. Seed funding of up to eight grants will be given for up to US$3,000 per recipient.

  • Harold F. Tipton Memorial Scholarship: The (ISC)² Foundation Harold F. Tipton Memorial Scholarship was established to provide passionate, aspiring young information security professionals the means to follow the pathway to industry excellence, as constructed by the late Mr. Tipton.

  • Faculty Certification Exam Vouchers: To encourage more academic participation in the profession and the certification process, (ISC)² will provide vouchers valid for one CISSP® or CSSLP® exam and, upon certification, the first year of membership dues.

The (ISC)² Foundation evaluates applicants based on academic excellence, passion for the industry, and financial need. The (ISC)² Foundation scholarship programme has already had a lasting impact on these individuals:

"Since receiving the scholarship, my student life has dramatically changed for the better," said Patrick Katamba, 2012 & 2013 Undergraduate Scholarship recipient, London Metropolitan University. "Due to this financial support, this year I didn't have to worry about paying tuition fees. As a result, I also cut back on my weekly hours of work in order to fully concentrate on my studies. This change has drastically changed the way I learn and hopefully this has or will be reflected in my final results of the second year."

"The scholarship has come as a blessing as my financial situation had worsened and I don't think without this award coming my way I would have progressed well in my academics, especially with research as I was already planning to apply for a dead year," said Innocent Barigye, 2013 Graduate Scholarship recipient. Makerere University Kampala. "With this financial support I have got from the (ISC)² Foundation, I will be able to concentrate and finish my research and degree in time without much hassling looking for finances which I believe is every scholars wish."

"It is both an honor and privilege to be the recipient of the (ISC)² Women's Scholarship," said Catherine P. Delaere, 2013 Graduate Scholarship recipient, Capella University. "What does this gift mean to me? Quite simply: opportunity and impact. As a single working mother of two, it means the opportunity to achieve higher education and career goals, increasing my chances of success, while suffering less of a financial burden. It means a positive impact on my children, teaching them by example the importance of life-long learning and pursuing goals; on my employer, by pursuing my master's degree in IT security and assurance which will afford me greater opportunity to obtain CISSP certification, increasing my value and contribution in my workplace; and on me, by allowing me to reach my potential as a career woman and a dedicated IT professional. I am very grateful to the (ISC)² Foundation for the opportunity and the impact of this scholarship."

To apply, please visit:
https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/Applicant-Recipient-Qualifications-Requirements-Instructions-2014.pdf

For additional scholarship information, please visit:
https://www.isc2cares.org/Scholarships/

# # #

About the (ISC)2® Foundation
The (ISC)2 Foundation is a non-profit charitable trust that aims to empower students, teachers and the general public to secure their online life by supporting cyber security education and awareness in the community through its programs and the efforts of its members. Through the (ISC)2 Foundation, (ISC)2's global membership of nearly 93,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cyber security professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit www.isc2cares.org.

About (ISC)²
(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with over 93,000 members in more than 135 countries. Globally recognised as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorization Professional (CAP®), HealthCare Information Security and Privacy Practitioner (HCISPPSM), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²'s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programmes and services based on its CBK®, a compendium of information and software security topics. More information is available at www.isc2.org.

# # #

© 2013, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC)2, Inc.

Follow (ISC)² on Facebook, Twitter and YouTube.

Media contact:
Vidushi Patel
[email protected]
+44 7958474632

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...