Welcome!

News Feed Item

11 Women Awarded Cybersecurity Scholarships by Applied Computer Security Associates and CRA-W

"Scholarship for Women Studying Information Security" Receives Grant From HP to Support a New Generation of IT Security Talent

WASHINGTON, DC -- (Marketwired) -- 08/06/14 -- Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the Computing Research Association's Committee on the Status of Women in Computing Research (CRA-W) announced the winning recipients of the 2014 Scholarship for Women Studying Information Security (SWSIS). In collaboration with HP, the organizations have awarded college scholarships to 11 women, reinforcing their commitment to support a new generation of IT security talent.

ACSA, CRA-W and HP are working to close a gap where it's estimated that 40% of available information security positions in the United States are unfilled, according to a recent study by the Ponemon Institute. By awarding scholarships to 11 female students for security-focused studies at academic institutions across the United States, the scholarship program also addresses the shortage of women in IT security positions throughout industry.

The SWSIS program was originally founded by ACSA, a non-profit organization dedicated to improving the understanding, theory and practice of cybersecurity. "We were incredibly impressed by the quality, diversity and response of the scholarship candidate pool this year," said Rebecca Wright, professor at Rutgers University and Co-Director of the ACSA/CRA-W SWSIS scholarship program. "We look forward to seeing how the scholarship winners progress in their careers and contribute directly in the fight against cyber attacks."

Scholarship winners are undergraduates and masters' degree candidates from 11 colleges and universities across the United States including:

  • Bradley University
  • California Polytechnic State University - San Luis Obispo
  • California State University, Northridge
  • Columbia University
  • Columbus State University
  • Eastern Michigan University
  • National University
  • Rochester Institute of Technology
  • University of Maryland Baltimore County
  • University of North Carolina at Charlotte
  • Wellesley College

"ACSA started this scholarship program recognizing the need to increase support for women in the field," said Jeremy Epstein, director of scholarship programs at ACSA and founder of SWSIS. "With the announcement of 11 more scholarship winners, we're pleased to help address the shortage of qualified cybersecurity experts. At a time when the industry is understaffed and underequipped for the escalating threat environment, we welcome more companies to join and help us expand the scholarship program."

"The computer security club at my school has provided an amazing opportunity for me to learn about the industry and solidify my interest in pursuing security as a career," said Jessie Pease, rising senior at California Polytechnic State University - San Luis Obispo. "Security is like a puzzle where I'm constantly trying to break and fix things, and I'm excited to continue developing those skills with support from HP, ACSA and CRA-W."

As part of a HP's larger academic initiative to enhance IT security education and training, HP granted $250,000 to expand the ACSA/CRA-W SWSIS scholarship program and will offer winners potential internship opportunities.

"HP is committed to closing the skills gap and arming a future generation of security professionals against the growing number of cyber threats," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "The SWSIS program enables us to directly support students with their academic journeys, provide them with real-life opportunities to apply the skills that they learn and receive hands-on experience through HP's broader education program."

Starting this year, the application and selection processes are being managed by CRA-W, whose goal is to increase the number of successful women in computing research. With support from HP, the SWSIS program can now enable greater opportunity and incentive to explore a security career path.

Additional information about the SWSIS program can be found at www.swsis.org. Scholarship submission deadline for the 2015-16 academic year will be February 1 2015.

ABOUT ACSA: ACSA is sponsor of the ACSAC, NSPW, and LASER conferences as well as the SWSIS scholarship program. ACSA is a non-profit corporation with a 30+ year legacy of supporting research and education in cybersecurity.

ABOUT CRA-W: The goal of the CRA Committee on the Status of Women in Computing Research (CRA-W) is to take positive action to increase the number of women participating in Computer Science and Engineering (CSE) research and education at all levels.

ACSA Media Contact:

Joel Greenberg
DCPR
Email Contact
202-363-1065
202-669-3639 cell

Nancy Amato
CRA-W
979-862-2275
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"Storage is growing. All of IDC's estimates say that unstructured data is now 80% of the world's data. We provide storage systems that can actually deal with that scale of data - software-defined storage systems," stated Paul Turner, Chief Product and Marketing Officer at Cloudian, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
SYS-CON Events announced today that Hitrons Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Hitrons Solutions Inc. is distributor in the North American market for unique products and services of small and medium-size businesses, including cloud services and solutions, SEO marketing platforms, and mobile applications.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develop...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
In his session at @ThingsExpo, Steve Wilkes, CTO and founder of Striim, will delve into four enterprise-scale, business-critical case studies where streaming analytics serves as the key to enabling real-time data integration and right-time insights in hybrid cloud, IoT, and fog computing environments. As part of this discussion, he will also present a demo based on its partnership with Fujitsu, highlighting their technologies in a healthcare IoT use-case. The demo showcases the tracking of patie...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software securi...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facing...