Welcome!

News Feed Item

11 Women Awarded Cybersecurity Scholarships by Applied Computer Security Associates and CRA-W

"Scholarship for Women Studying Information Security" Receives Grant From HP to Support a New Generation of IT Security Talent

WASHINGTON, DC -- (Marketwired) -- 08/06/14 -- Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the Computing Research Association's Committee on the Status of Women in Computing Research (CRA-W) announced the winning recipients of the 2014 Scholarship for Women Studying Information Security (SWSIS). In collaboration with HP, the organizations have awarded college scholarships to 11 women, reinforcing their commitment to support a new generation of IT security talent.

ACSA, CRA-W and HP are working to close a gap where it's estimated that 40% of available information security positions in the United States are unfilled, according to a recent study by the Ponemon Institute. By awarding scholarships to 11 female students for security-focused studies at academic institutions across the United States, the scholarship program also addresses the shortage of women in IT security positions throughout industry.

The SWSIS program was originally founded by ACSA, a non-profit organization dedicated to improving the understanding, theory and practice of cybersecurity. "We were incredibly impressed by the quality, diversity and response of the scholarship candidate pool this year," said Rebecca Wright, professor at Rutgers University and Co-Director of the ACSA/CRA-W SWSIS scholarship program. "We look forward to seeing how the scholarship winners progress in their careers and contribute directly in the fight against cyber attacks."

Scholarship winners are undergraduates and masters' degree candidates from 11 colleges and universities across the United States including:

  • Bradley University
  • California Polytechnic State University - San Luis Obispo
  • California State University, Northridge
  • Columbia University
  • Columbus State University
  • Eastern Michigan University
  • National University
  • Rochester Institute of Technology
  • University of Maryland Baltimore County
  • University of North Carolina at Charlotte
  • Wellesley College

"ACSA started this scholarship program recognizing the need to increase support for women in the field," said Jeremy Epstein, director of scholarship programs at ACSA and founder of SWSIS. "With the announcement of 11 more scholarship winners, we're pleased to help address the shortage of qualified cybersecurity experts. At a time when the industry is understaffed and underequipped for the escalating threat environment, we welcome more companies to join and help us expand the scholarship program."

"The computer security club at my school has provided an amazing opportunity for me to learn about the industry and solidify my interest in pursuing security as a career," said Jessie Pease, rising senior at California Polytechnic State University - San Luis Obispo. "Security is like a puzzle where I'm constantly trying to break and fix things, and I'm excited to continue developing those skills with support from HP, ACSA and CRA-W."

As part of a HP's larger academic initiative to enhance IT security education and training, HP granted $250,000 to expand the ACSA/CRA-W SWSIS scholarship program and will offer winners potential internship opportunities.

"HP is committed to closing the skills gap and arming a future generation of security professionals against the growing number of cyber threats," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "The SWSIS program enables us to directly support students with their academic journeys, provide them with real-life opportunities to apply the skills that they learn and receive hands-on experience through HP's broader education program."

Starting this year, the application and selection processes are being managed by CRA-W, whose goal is to increase the number of successful women in computing research. With support from HP, the SWSIS program can now enable greater opportunity and incentive to explore a security career path.

Additional information about the SWSIS program can be found at www.swsis.org. Scholarship submission deadline for the 2015-16 academic year will be February 1 2015.

ABOUT ACSA: ACSA is sponsor of the ACSAC, NSPW, and LASER conferences as well as the SWSIS scholarship program. ACSA is a non-profit corporation with a 30+ year legacy of supporting research and education in cybersecurity.

ABOUT CRA-W: The goal of the CRA Committee on the Status of Women in Computing Research (CRA-W) is to take positive action to increase the number of women participating in Computer Science and Engineering (CSE) research and education at all levels.

ACSA Media Contact:

Joel Greenberg
DCPR
Email Contact
202-363-1065
202-669-3639 cell

Nancy Amato
CRA-W
979-862-2275
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.