Blog Feed Post

(ISC)²® Foundation to Offer US$145,000 for 2014 Information Security Scholarships

Grant opportunities available to women, undergraduate, graduate and post-graduate students and faculty worldwide; candidates must apply by April 1st

London, UK, January 14, 2014 — The (ISC)2® ("ISC-squared") Foundation, the non-profit charitable trust for (ISC)² that aims to empower students, teachers, and the general public to secure their online life with community cyber security education and awareness, today announced its scholarship application period for 2014. The application deadline for students and faculty to submit a completed application is 12:00 a.m. EST on Tuesday, April 1, 2014.

Through the (ISC)² Foundation's information security scholarship program, undergraduate, graduate, and post-graduate students have the opportunity to build stable careers in the field of information security. According to the 2013 Global Information Security Workforce Study, the global shortage of information security professionals is having a profound impact on the world economy. These scholarships not only encourage students to pursue careers in this industry, but they also help address the growing demand for skilled cyber security professionals worldwide.

"It is critical that we work to fill society's need for trained cyber security professionals by building the workforce of the future," said Julie Peeler, director of the (ISC)² Foundation. "For many of these students, their financial situations are challenging and our scholarships provide the funding they need to continue their education. I look forward to impacting more information security students with life-changing scholarships in 2014."

The 2014 scholarship categories include:

  • Women's Scholarships: To inspire women to join the ever-growing field of information security, each year, the (ISC)² Foundation grants up to two scholarships totaling up to US$40,000.

  • Undergraduate Scholarships: Aspiring information security professionals have the opportunity to ease some of their educational financial burden with the (ISC)2 Foundation Undergraduate Scholarship, offering undergraduate students studying information security grants of up to US$5,000 per recipient.

  • Graduate Research Project(s): Graduate students often need funding to conduct special research projects. Seed funding of up to eight grants will be given for up to US$3,000 per recipient.

  • Harold F. Tipton Memorial Scholarship: The (ISC)² Foundation Harold F. Tipton Memorial Scholarship was established to provide passionate, aspiring young information security professionals the means to follow the pathway to industry excellence, as constructed by the late Mr. Tipton.

  • Faculty Certification Exam Vouchers: To encourage more academic participation in the profession and the certification process, (ISC)² will provide vouchers valid for one CISSP® or CSSLP® exam and, upon certification, the first year of membership dues.

The (ISC)² Foundation evaluates applicants based on academic excellence, passion for the industry, and financial need. The (ISC)² Foundation scholarship programme has already had a lasting impact on these individuals:

"Since receiving the scholarship, my student life has dramatically changed for the better," said Patrick Katamba, 2012 & 2013 Undergraduate Scholarship recipient, London Metropolitan University. "Due to this financial support, this year I didn't have to worry about paying tuition fees. As a result, I also cut back on my weekly hours of work in order to fully concentrate on my studies. This change has drastically changed the way I learn and hopefully this has or will be reflected in my final results of the second year."

"The scholarship has come as a blessing as my financial situation had worsened and I don't think without this award coming my way I would have progressed well in my academics, especially with research as I was already planning to apply for a dead year," said Innocent Barigye, 2013 Graduate Scholarship recipient. Makerere University Kampala. "With this financial support I have got from the (ISC)² Foundation, I will be able to concentrate and finish my research and degree in time without much hassling looking for finances which I believe is every scholars wish."

"It is both an honor and privilege to be the recipient of the (ISC)² Women's Scholarship," said Catherine P. Delaere, 2013 Graduate Scholarship recipient, Capella University. "What does this gift mean to me? Quite simply: opportunity and impact. As a single working mother of two, it means the opportunity to achieve higher education and career goals, increasing my chances of success, while suffering less of a financial burden. It means a positive impact on my children, teaching them by example the importance of life-long learning and pursuing goals; on my employer, by pursuing my master's degree in IT security and assurance which will afford me greater opportunity to obtain CISSP certification, increasing my value and contribution in my workplace; and on me, by allowing me to reach my potential as a career woman and a dedicated IT professional. I am very grateful to the (ISC)² Foundation for the opportunity and the impact of this scholarship."

To apply, please visit:

For additional scholarship information, please visit:

# # #

About the (ISC)2® Foundation
The (ISC)2 Foundation is a non-profit charitable trust that aims to empower students, teachers and the general public to secure their online life by supporting cyber security education and awareness in the community through its programs and the efforts of its members. Through the (ISC)2 Foundation, (ISC)2's global membership of nearly 93,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cyber security professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit www.isc2cares.org.

About (ISC)²
(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with over 93,000 members in more than 135 countries. Globally recognised as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorization Professional (CAP®), HealthCare Information Security and Privacy Practitioner (HCISPPSM), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²'s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programmes and services based on its CBK®, a compendium of information and software security topics. More information is available at www.isc2.org.

# # #

© 2013, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC)2, Inc.

Follow (ISC)² on Facebook, Twitter and YouTube.

Media contact:
Vidushi Patel
[email protected]
+44 7958474632

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
As you move to the cloud, your network should be efficient, secure, and easy to manage. An enterprise adopting a hybrid or public cloud needs systems and tools that provide: Agility: ability to deliver applications and services faster, even in complex hybrid environments Easier manageability: enable reliable connectivity with complete oversight as the data center network evolves Greater efficiency: eliminate wasted effort while reducing errors and optimize asset utilization Security: implemen...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
@DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises - and delivering real results.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the IT and telecommunications industries developing strategies and implementing business initiatives. He has a breadth of expertise spanning technologies such as cloud computing, big data and analytics, cognitive computing, m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...