Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:58 AM
Dark Reading
Dark Reading
Products and Releases

(ISC)2 Foundation Announces 2013 Information Security Scholarship Recipients

Three European recipients of scholarships that foster next generation of cybersecurity professionals and research

London, U.K., September 16, 2013 -- The (ISC)² ("ISC-squared") Foundation, a charitable trust that aims to empower students, teachers and the general public to secure their online life with cyber security education and awareness programmes, today announced the recipients of its 2013 information security scholarships. The (ISC)² Foundation Scholarship Programme aims to fill society's need for trained cyber security professionals by building the workforce of the future through meaningful scholarships. This programme opens doors for current and aspiring information security professionals, with scholarships for women, undergraduate, graduate and post-graduate students and certification exam vouchers for qualifying faculty to ensure a sufficient supply of qualified instructors at the university level. Recipients were selected by the (ISC)² Scholarship Review Committee, which consists of representatives from the (ISC)² Board of Directors, academia, and the (ISC)² membership.

"On behalf of the (ISC)² Foundation, I'd like to congratulate this year's scholarship recipients for their outstanding applications and a commitment to joining the cyber security workforce," said Julie Peeler, director for the (ISC)² Foundation. "The goal of the scholarship programme is to help aspiring and practicing professionals achieve their educational goals and put them on a solid track to join the cyber security workforce. We're thrilled that the programme has assisted so many deserving students across the globe that are truly passionate about a career in information security."

The following Scholarship recipients will be recognised at the 2013 (ISC)² Security Congress taking place later this month:

· Women's Scholarship:

o Catherine Deleare, USA

o Pratibha Anjali Dohare, Bhopal, India

o Veelasha Moonsamy, Australia

· Graduate Research Project(s):

o Mohannad Alhanahnah, UK

o Innocent Barigye, Uganda

o Pei-Yu Chen, Taiwan

o Scott Ruoti, USA

o Mahdi Zamani, USA

· Undergraduate Scholarship:

o Mary Brewer, USA

o William Choi, USA

o Bruce Clair, USA

o Christopher Goes, USA

o Raymond Hernandez, USA

o Patrick Katamba, UK

o Micah Lippold, USA

o Scott Lohin, USA

o Kyle Murbach, USA

· Faculty Certification Exam Vouchers:

o Tahir Abbas, Pakistan

o Raymond Albert, USA

o Feroze Ashraff, New Zealand

o John Daniels, USA

o Tom Imboden, USA

o Supakorn Kungpisdan, Thailand

o Vijaya Raju Mullagiri, Albania

Findings from (ISC)²'s 2013 Global Information Security Workforce Study validate the acute need to develop the information security workforce, with data indicating that the major shortage of skilled cyber security professionals is negatively impacting organisations and their customers, leading to more frequent and costly data breaches. The scholarship programme aims to combat these realities by providing scholarships to help individuals break into the field of cyber security, ultimately protecting organisations against these cyber threats with a more skilled and qualified workforce.

"I am extremely happy to learn that once again, I am the recipient of the 2013 (ISC)2 Foundation Undergraduate Scholarship," said two-time recipient Patrick Katamba. "With this continued financial support, I am able to concentrate on what is important: becoming a highly qualified information security professional. (ISC)²'s financial generosity has allowed me to achieve this goal and also continue to strive for excellence in my university studies."

"I am currently a graduate student of Information Technology Security at Carnegie Mellon University," said Women's Scholarship recipient Pratibha Anjali Dohare. "In the future, I am determined to pursue a PhD in Information and Cyber Security. Through my education in this field, I aspire to make the Internet safer against cyber-attacks and internal and external security threats."

"Being chosen as a recipient for the (ISC)² Undergraduate Scholarship has been an unforgettable experience," commented Kyle Murbach. "It has served as a tremendous confidence booster in terms of my academics, knowing that (ISC)² views me as a fantastic candidate to continue gaining knowledge and starting a career in the field of information security."

"The 2013 Undergraduate Scholarship award will allow me to finish my Information Systems Security degree sooner than expected, as I will be able to attend classes year-round with the extra funding," commented Undergraduate Scholarship recipient Micah Lippold. "I am extremely excited to get into the workplace and help to defend the nation's information systems."

The (ISC)² Foundation will begin accepting applications for the 2014 grants on January 2, 2014. Applications must be submitted by April 1, 2014. For additional information on the (ISC)² Foundation Scholarship Programme, please visit https://www.isc2cares.org/Scholarships/


About The (ISC)² Foundation

The (ISC)2 Foundation is a non-profit charitable trust that aims to empower students, teachers and the general public to secure their online life by supporting cyber security education and awareness in the community through its programs and the efforts of its members. Through the (ISC)2 Foundation, (ISC)2's global membership of nearly 90,000 information and software security professionals seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cyber security professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit www.isc2cares.org.

About (ISC)²®

(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 90,000 members in more than 135 countries. Globally recognised as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorisation Professional (CAP®), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²'s certifications are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programmes and services based on its CBK®, a compendium of information and software security topics. More information is available at www.isc2.org.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-16
IBM Sterling File Gateway through is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.