Click here to close now.


News Feed Item

11 Women Awarded Cybersecurity Scholarships by Applied Computer Security Associates and CRA-W

"Scholarship for Women Studying Information Security" Receives Grant From HP to Support a New Generation of IT Security Talent

WASHINGTON, DC -- (Marketwired) -- 08/06/14 -- Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the Computing Research Association's Committee on the Status of Women in Computing Research (CRA-W) announced the winning recipients of the 2014 Scholarship for Women Studying Information Security (SWSIS). In collaboration with HP, the organizations have awarded college scholarships to 11 women, reinforcing their commitment to support a new generation of IT security talent.

ACSA, CRA-W and HP are working to close a gap where it's estimated that 40% of available information security positions in the United States are unfilled, according to a recent study by the Ponemon Institute. By awarding scholarships to 11 female students for security-focused studies at academic institutions across the United States, the scholarship program also addresses the shortage of women in IT security positions throughout industry.

The SWSIS program was originally founded by ACSA, a non-profit organization dedicated to improving the understanding, theory and practice of cybersecurity. "We were incredibly impressed by the quality, diversity and response of the scholarship candidate pool this year," said Rebecca Wright, professor at Rutgers University and Co-Director of the ACSA/CRA-W SWSIS scholarship program. "We look forward to seeing how the scholarship winners progress in their careers and contribute directly in the fight against cyber attacks."

Scholarship winners are undergraduates and masters' degree candidates from 11 colleges and universities across the United States including:

  • Bradley University
  • California Polytechnic State University - San Luis Obispo
  • California State University, Northridge
  • Columbia University
  • Columbus State University
  • Eastern Michigan University
  • National University
  • Rochester Institute of Technology
  • University of Maryland Baltimore County
  • University of North Carolina at Charlotte
  • Wellesley College

"ACSA started this scholarship program recognizing the need to increase support for women in the field," said Jeremy Epstein, director of scholarship programs at ACSA and founder of SWSIS. "With the announcement of 11 more scholarship winners, we're pleased to help address the shortage of qualified cybersecurity experts. At a time when the industry is understaffed and underequipped for the escalating threat environment, we welcome more companies to join and help us expand the scholarship program."

"The computer security club at my school has provided an amazing opportunity for me to learn about the industry and solidify my interest in pursuing security as a career," said Jessie Pease, rising senior at California Polytechnic State University - San Luis Obispo. "Security is like a puzzle where I'm constantly trying to break and fix things, and I'm excited to continue developing those skills with support from HP, ACSA and CRA-W."

As part of a HP's larger academic initiative to enhance IT security education and training, HP granted $250,000 to expand the ACSA/CRA-W SWSIS scholarship program and will offer winners potential internship opportunities.

"HP is committed to closing the skills gap and arming a future generation of security professionals against the growing number of cyber threats," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "The SWSIS program enables us to directly support students with their academic journeys, provide them with real-life opportunities to apply the skills that they learn and receive hands-on experience through HP's broader education program."

Starting this year, the application and selection processes are being managed by CRA-W, whose goal is to increase the number of successful women in computing research. With support from HP, the SWSIS program can now enable greater opportunity and incentive to explore a security career path.

Additional information about the SWSIS program can be found at Scholarship submission deadline for the 2015-16 academic year will be February 1 2015.

ABOUT ACSA: ACSA is sponsor of the ACSAC, NSPW, and LASER conferences as well as the SWSIS scholarship program. ACSA is a non-profit corporation with a 30+ year legacy of supporting research and education in cybersecurity.

ABOUT CRA-W: The goal of the CRA Committee on the Status of Women in Computing Research (CRA-W) is to take positive action to increase the number of women participating in Computer Science and Engineering (CSE) research and education at all levels.

ACSA Media Contact:

Joel Greenberg
Email Contact
202-669-3639 cell

Nancy Amato
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...