Click here to close now.

SYS-CON MEDIA Authors: Blue Box Blog, Carmen Gonzalez, Lori MacVittie, Plutora Blog, Roger Strukhoff

News Feed Item

11 Women Awarded Cybersecurity Scholarships by Applied Computer Security Associates and CRA-W

"Scholarship for Women Studying Information Security" Receives Grant From HP to Support a New Generation of IT Security Talent

WASHINGTON, DC -- (Marketwired) -- 08/06/14 -- Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the Computing Research Association's Committee on the Status of Women in Computing Research (CRA-W) announced the winning recipients of the 2014 Scholarship for Women Studying Information Security (SWSIS). In collaboration with HP, the organizations have awarded college scholarships to 11 women, reinforcing their commitment to support a new generation of IT security talent.

ACSA, CRA-W and HP are working to close a gap where it's estimated that 40% of available information security positions in the United States are unfilled, according to a recent study by the Ponemon Institute. By awarding scholarships to 11 female students for security-focused studies at academic institutions across the United States, the scholarship program also addresses the shortage of women in IT security positions throughout industry.

The SWSIS program was originally founded by ACSA, a non-profit organization dedicated to improving the understanding, theory and practice of cybersecurity. "We were incredibly impressed by the quality, diversity and response of the scholarship candidate pool this year," said Rebecca Wright, professor at Rutgers University and Co-Director of the ACSA/CRA-W SWSIS scholarship program. "We look forward to seeing how the scholarship winners progress in their careers and contribute directly in the fight against cyber attacks."

Scholarship winners are undergraduates and masters' degree candidates from 11 colleges and universities across the United States including:

  • Bradley University
  • California Polytechnic State University - San Luis Obispo
  • California State University, Northridge
  • Columbia University
  • Columbus State University
  • Eastern Michigan University
  • National University
  • Rochester Institute of Technology
  • University of Maryland Baltimore County
  • University of North Carolina at Charlotte
  • Wellesley College

"ACSA started this scholarship program recognizing the need to increase support for women in the field," said Jeremy Epstein, director of scholarship programs at ACSA and founder of SWSIS. "With the announcement of 11 more scholarship winners, we're pleased to help address the shortage of qualified cybersecurity experts. At a time when the industry is understaffed and underequipped for the escalating threat environment, we welcome more companies to join and help us expand the scholarship program."

"The computer security club at my school has provided an amazing opportunity for me to learn about the industry and solidify my interest in pursuing security as a career," said Jessie Pease, rising senior at California Polytechnic State University - San Luis Obispo. "Security is like a puzzle where I'm constantly trying to break and fix things, and I'm excited to continue developing those skills with support from HP, ACSA and CRA-W."

As part of a HP's larger academic initiative to enhance IT security education and training, HP granted $250,000 to expand the ACSA/CRA-W SWSIS scholarship program and will offer winners potential internship opportunities.

"HP is committed to closing the skills gap and arming a future generation of security professionals against the growing number of cyber threats," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "The SWSIS program enables us to directly support students with their academic journeys, provide them with real-life opportunities to apply the skills that they learn and receive hands-on experience through HP's broader education program."

Starting this year, the application and selection processes are being managed by CRA-W, whose goal is to increase the number of successful women in computing research. With support from HP, the SWSIS program can now enable greater opportunity and incentive to explore a security career path.

Additional information about the SWSIS program can be found at www.swsis.org. Scholarship submission deadline for the 2015-16 academic year will be February 1 2015.

ABOUT ACSA: ACSA is sponsor of the ACSAC, NSPW, and LASER conferences as well as the SWSIS scholarship program. ACSA is a non-profit corporation with a 30+ year legacy of supporting research and education in cybersecurity.

ABOUT CRA-W: The goal of the CRA Committee on the Status of Women in Computing Research (CRA-W) is to take positive action to increase the number of women participating in Computer Science and Engineering (CSE) research and education at all levels.

ACSA Media Contact:

Joel Greenberg
DCPR
Email Contact
202-363-1065
202-669-3639 cell

Nancy Amato
CRA-W
979-862-2275
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...
There are lots of challenges in IoT around secure, scalable and business friendly infrastructure for enterprises. For large corporations, IoT implementations are one of the top priorities of the decade. All industries are seeing a competitive need to sustain by investing in IoT initiatives. The value addition comes from improved customer service, innovative product and additional revenue streams. The data from these IP-connected devices can be leveraged for a variety of business applica...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
In this session we look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. We will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in Computer Science. After graduation Peter worked on a PSTN switch dev...
Recent technology advances in miniaturization has positioned the wearables as the pinnacle of technology convergence with the human body. We inquire if wearables are mere standard miniaturized devices extended with the connectivity and present our views on considerations like design, applications, performance, efficiency, interoperability, usage scenarios, human device interaction and consequent trade-offs enabling wearables to impart optimal value.
The Internet of Things Maturity Model (IoTMM) is a qualitative method to gauge the growth and increasing impact of IoT capabilities in an IT environment from both a business and technology perspective. In his session at @ThingsExpo, Tony Shan will first scan the IoT landscape and investigate the major challenges and barriers. The key areas of consideration are identified to get started with IoT journey. He will then pinpoint the need of a tool for effective IoT adoption and implementation, whic...
Shipping daily, injecting faults, and keeping an extremely high availability "without Ops"? Understand why NoOps does not mean no operations. Agile development methodologies require evolved operations to be successful. In his keynote at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how Microsoft teams who have made huge progress with a DevOps transformation effectively utilize operations staff and how challenges were overcome. Regardless ...
Software is eating the world. Companies that were not previously in the technology space now find themselves competing with Google and Amazon on speed of innovation. As the innovation cycle accelerates, companies must embrace rapid and constant change to both applications and their infrastructure, and find a way to deliver speed and agility of development without sacrificing reliability or efficiency of operations. In her Day 2 Keynote DevOps Summit, Victoria Livschitz, CEO of Qubell, discussed...
Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility, and efficiency. No wonder leading innovators are adopting DevOps and cloud together! In his session at DevOps Summit, Andi Mann, Vice President of Strategic Solutions at CA Technologies, explored the synergies in these two approaches, with practical tips, techniques, research data, wa...
SYS-CON Events announced today that AIC, a leading provider of OEM/ODM server and storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. AIC is a leading provider of both standard OTS, off-the-shelf, and OEM/ODM server and storage solutions. With expert in-house design capabilities, validation, manufacturing and production, AIC's broad selection of products are highly flexible and are conf...
SYS-CON Events announced today that Vicom Computer Services, Inc., a provider of technology and service solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. They are located at booth #427. Vicom Computer Services, Inc. is a progressive leader in the technology industry for over 30 years. Headquartered in the NY Metropolitan area. Vicom provides products and services based on today’s requirements...