HP Supports Women on the Front Lines of IT Security Through 2015 Scholarship Funding

SAN FRANCISCO, CA -- (Marketwired) -- Apr 20, 2015 -- HP (NYSE: HPQ), in collaboration with Applied Computer Security Associates (ACSA) and the Computing Research Association's Committee on the Status of Women in Computing Research (CRA-W), today announced the 15 winning recipients of the 2015 Scholarship for Women Studying Information Security ( SWSIS). Now in its second year funding the scholarship, HP's contributions to the SWSIS program reinforce its commitment to supporting women on the front lines of IT security through academic funding and hands-on internship opportunities.

As the cost, frequency and sophistication of cyberattacks continue to rise, enterprises face the critical challenge of staffing their organizations to adequately combat the growing number of threats and protect their organizations from potential data breaches. At the same time, filling open positions with qualified cybersecurity professionals has emerged as a significant obstacle in the war against hackers. On the heels of research indicating a 40 percent gap in the IT security workforce in 2014(1), HP committed to education and training initiatives aimed at closing the gap. To ensure diversity in this workforce, HP also committed a $250,000 grant to the SWSIS scholarship program, to be distributed to winners over four years.

"Cybercrime, and its financial and reputational damage, will only increase as our adversaries evolve and continue to outpace the industry," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "To stay ahead we must inspire a new generation of talent to enter the IT security field, and HP is committed to providing support for women in particular through programs such as SWSIS to ensure a diverse group of students acquire the skills needed to address this evolving threat landscape."

Together, HP, ACSA and CRA-W have funded scholarships for undergraduates and master's degree candidates from 13 colleges and universities across the United States including:

  • California State University, Dominguez Hills
  • Embry Riddle Aeronautical University, Prescott
  • Kentucky State University
  • Marshall University
  • Michigan State University
  • Northern Kentucky University
  • Pennsylvania State University
  • Stony Brook University
  • University of Cincinnati
  • University of Maryland Baltimore County
  • University of Maryland at College Park
  • University of Washington, Tacoma
  • Virginia Polytechnic Institute and State University

"The pool of scholarship candidates this year was impressive -- the new SWSIS fellows demonstrate academic excellence and engagement in their universities and communities, as well as participation in information security events beyond their academic course work," said Rebecca Wright, professor at Rutgers University and Co-Director of the ACSA/CRA-W SWSIS scholarship program. "It is our goal for these SWSIS fellows to contribute to the representation of women in the information security workforce not only by their own career development, but as ambassadors who encourage others to pursue similar paths."

"There is so much opportunity to pursue a career in the security field, and it's great to see that HP and ASCA are encouraging more women to go down this path," said Brooke Young, University of Maryland, Baltimore County. "I look forward to starting the new academic year with their support, and continuing to explore new security challenges."

SWSIS scholarship details
The SWSIS program was founded by ACSA, a nonprofit organization dedicated to improving the understanding, theory and practice of cybersecurity. The SWSIS scholarship program is a joint effort between HP, the ACSA and CRA-W.

  • HP funds will be allocated to the ACSA over a four-year period, beginning in 2014.
  • While there is no preset scholarship amount, students are eligible for scholarships in the amount of $5,000-10,000 per individual each year, and can be awarded up to $20,000 total over a two year period.
  • For each individual, the scholarship is effective for two years, but the student must reapply after the first year to confirm continued interest in the IT security industry.
  • Scholarship winners have the option to intern at HP, although it is not a mandatory requirement.
  • To apply, candidates must provide a statement of interest in the field of information security, a transcript and a statement of their current educational status.
  • CRA-W reviews all applications and recommends one or more outstanding candidates to the ACSA to receive scholarship funding.

HP will be addressing this news and the latest trends in enterprise security at the RSA Conference 2015, taking place Apr. 20-24 in San Francisco. To hear more about the "New School of Cyber Defense", attend Gilliland's keynote presentation on the main stage on Wednesday, April 22, 3:05 p.m. PT. Additional information about HP Security solutions is available at HP booth No. 3403. Keep up with RSA Conference happenings by following the hashtag #RSAC and follow @HPsecurity.

About HP Security
HP enables organizations to take a proactive approach to security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative research, HP Enterprise Security enables organizations to integrate information correlation, application analysis and network-level defense. Additional information about HP Enterprise Security can be found at www.hp.com/go/esp.

Join HP Software on Linkedin and follow @HPSoftware on Twitter. To learn more about HP Fortify and HP Enterprise Security Products on Twitter, please follow @HPsecurity and join HP Enterprise Security on Linkedin.

HP's annual enterprise security user conference, HP Protect, takes place September 1-4 in Washington, D.C.

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.

(1) "IT Security Jobs Study," The Ponemon Institute, February 2014.

This news release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of management for future operations; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy and plans for future operations; the impact of macroeconomic and geopolitical trends and events; the need to manage third-party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers, clients and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2013, and that are otherwise described or updated from time to time in HP's Securities and Exchange Commission reports. HP assumes no obligation and does not intend to update these forward-looking statements.

© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

1 | 2  Next Page »
Featured Video
Jobs
Design Verification Engineer for Blockwork IT at Milpitas, California
CAD Engineer for Nvidia at Santa Clara, California
Senior Firmware Architect - Server Manageability for Nvidia at Santa Clara, California
Senior Platform Software Engineer, AI Server - GPU for Nvidia at Santa Clara, California
GPU Design Verification Engineer for AMD at Santa Clara, California
Upcoming Events
SEMICON Japan 2024 at Tokyo Big Sight Tokyo Japan - Dec 11 - 13, 2024
PDF Solutions AI Executive Conference at St. Regis Hotel San Francisco - Dec 12, 2024
DVCon U.S. 2025 at United States - Feb 24 - 27, 2025



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise