ISACA Central Ohio Chapter Academic Scholarship 2018

Similar documents
2014 ISACA Academic Scholarship Competition DUE DATE EXTENDED TO MAY 1, 2014

ISACA Chicago Chapter Scholarship Application

McDonald s HACER National Scholarship

Iranian Scholarship Foundation Application Form

Iranian Scholarship Foundation Graduate Scholarship Application Form

2019 Academy Scholarship

THE ORANGE SCHOLARS SCHOLARSHIP PROGRAM

CDK/NAMAD Fueling Careers Scholarship Program

APPLICATION DEADLINE:

ISACA is excited to announce the unique opportunity for up to 50 students to receive a scholarship award to attend day

Schlumberger Founders Scholarship Program

National Association of Steel Pipe Distributors Scholarship Program

THE ORANGE SCHOLARS SCHOLARSHIP PROGRAM

The Nikon Storytellers Scholarship Frequently Asked Questions

Scholarship Program

AGING STUDIES ADMISSIONS APPLICATION

Frequently Asked Questions

cimc Information Brochure Chartered Institute of Management Consultants

EXAM PREPARATION GUIDE

CTENT Region 10 & Region 11 Scholarship for CTE Students

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

ESA Foundation Computer and Video Game Scholarship Program

Johnson Controls Foundation Scholarship Program

CYBERSECURITY: Scholarship and Job Opportunities

EXAM PREPARATION GUIDE

Introduction to CPIP

National Defense University and IRMC. National Defense University

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Trend Micro Professional Services Partner Program

EXAM PREPARATION GUIDE

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

EXAM PREPARATION GUIDE

Foundation Scholarship Application Tips

Computer Networking Technologies and Information Assurance & Cybersecurity

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE

Associate Tuition Scholarship 2019 Application Form The Associate Scholarship covers tuition only. First Middle Last 2. DATE OF BIRTH: DD MM YR

EXAM PREPARATION GUIDE

2018 Sarepta Therapeutics Route 79, The Duchenne Scholarship Program

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

REQUEST FOR PROPOSAL DATABASE DEVELOPMENT FOR THE DISTRICT OF COLUMBIA COLLEGE ACCESS PROGRAM

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

2019 FTBA SCHOLARSHIP APPLICATION. FTBA SCHOLARSHIP 1007 Desoto Park Dr. Tallahassee, FL 32301

Go to to register. Click Sign Up in the upper right corner.

Graduate Award Application Worksheet

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

EXAM PREPARATION GUIDE

APA LOCAL CHAPTER RCH PROGRAM INFORMATION PACKET

MISSOURI S A+ SCHOOLS PROGRAM

Yawkey Scholars Program for Massachusetts Residents

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

MASTER OF ACCOUNTING

Radware. Training Policies V001.70

EXAM PREPARATION GUIDE

NIS Directive : Call for Proposals

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

The fast track to top skills and top jobs in cyber. Guaranteed.

OHIO PUBLIC LIBRARIAN CERTIFICATION PROGRAM

3rd update March

St. Pius X High School 1030 St. Pius Drive Festus, Missouri Karen DeCosty, Principal/A+ Coordinator (636) 931-PIUS

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

ASCPA Road to the CPA Toolkit

IMA and the CMA How They Can Help Your Career. Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA

Authorized ICPM Instructional Partner FACT SHEET

Docker Business Partner Program Guide

CEM class in N.E.O. Northern Ohio Chapter. DATES: March 24-28, LOCATION: Goodyear Global HQ in Akron, OH. Curtis Dixon

EXAM PREPARATION GUIDE

Academic Program Review Cyber Security College of Southern Nevada 2017

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

Introduction to CPIP

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS

The Power of Partnership

PARTNER PROGRAM OVERVIEW

How PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP.

OHIO PUBLIC LIBRARY STAFF CERTIFICATION PROGRAM

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Certification. What: Who: Where:

Certificate in Estate and Trust Administration (CETA) Frequently Asked Questions

EXAM PREPARATION GUIDE

Graduate Certificate in Internet Business

EXAM PREPARATION GUIDE

Micro Focus Partner Program. For Resellers

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

Vision Develop ethically sound global professionals.

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

Medication Assisted Treatment Specialist Application

Request for Qualifications for Audit Services March 25, 2015

Professional Evaluation and Certification Board Frequently Asked Questions

Delta Sigma Theta Sorority, Inc. A SERVICE SORORITY

AICP Exam Application Tips + Preparation

How to Become a CMA (Certified Management Accountant) May 10, 2017

(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES AND GUIDELINES

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Transcription:

ISACA Central Ohio Chapter Academic Scholarship 2018 What is ISACA? ISACA is a worldwide association of IS governance professionals ISACA advances global business leaders in technology, information and cyber security, governance, risk and innovation. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance The Central Chapter of the ISACA is making $2,250 available for scholarships in 2018 (two individual scholarships - one in the amount of $1,250 and one in the amount of $1000). Current full-time or part-time undergraduate or graduate students who are studying information systems, business, accounting, or computer science at an accredited college in Central Ohio are invited to apply. Award Title ISACA Central Ohio Chapter Academic Scholarship 2018 Contact University_Relations@isacacoh.org Website Central Ohio ISACA Chapter Website Submission Due Date April 13, 2018 Award Date Winners will be notified by May 4, 2018 Awards 1 st Place - $1250 Available 2 nd Place - $1000 1

Scholarship Eligibility To be eligible for the scholarships, the following criteria must be met: Completed application Essays will be double-spaced 10-point font and must be less than 1000 words, excluding names, headers, and endnotes. Video Submissions should not exceed 7 minutes. Full or part-time undergraduate or graduate student at an accredited Central Ohio institution in good standing. Pursuing business or information systems related degrees, such as: Business Information Systems, Computer Information Systems, Accounting, Business or Computer Science. Must be a currently enrolled student as of the scholarship award date. Provide a copy of recent transcripts to prove enrollment and current GPA Award winners have the option (not required) to attend a complimentary ISACA meeting in order to be presented the scholarship and meet the membership. These meetings are held on a weekday usually during the hours of 11 am to 2 pm. Application and scholarship materials must be in English. ISACA members are not eligible, except for student members. Applications, transcripts, and essays/video submissions must be emailed or mailed to University_Relations@isacacoh.org 11:59 pm EST on April 13, 2018 all attached in one email. The subject line should read Applicant Name Scholarship Submission (e.g. Jane Doe Scholarship Submission). Application forms and essays/video submissions will be evaluated by volunteer ISACA members. Student applicants are expected to use the scholarship funds for academic related expenses (tuition, room and board, lab fees, books, laptops, software purchases) Funds will be issued directly to the student by the ISACA Central Oho Chapter. Please contact Zenniere Bowry-Thomas with any questions via email at University_Relations@isacacoh.org 2

Essay/Video Submission Requirements Essays/Video will only be accepted from graduate or undergraduate students who are enrolled and in good standing in a full-time program at a higher education institution in Central Ohio Only one essay or video per student will be considered. Essays will be double-spaced 10-point font and must be less than 1000 words, excluding names, headers, and endnotes. Video Submissions should not exceed 7 minutes. Essays should be submitted in a standard word processing format such as MS Word. When citing sources, essays must follow either the MLA or APA format and the essay must contain a reference page. The essays/applications and videos will be submitted in English. Essays/videos must be submitted and received no later than April 13, 2018. Any entries received after this date will not be considered. Students will be notified no later than May 4, 2018 All competition submissions must include a Cover Sheet (Form 1), Student Certification (Form 2), and a transcript in addition to the video or essay submission Submit all materials in one email from your student email account ending in.edu to University_Relations@isacacoh.org Submissions not meeting the requirements defined above will be disqualified from the competition. All essay competition entries along with the cover sheet, and student certification and must be submitted for consideration via e-mail using your official school email address ending in.edu to University_Relations@isacacoh.org 3

Essay/Video Topics Please select 1 out of the 3 topics below for your essay or video. Essay submissions and video will be evaluated based on main focus, relevance to the topic provided, organization, understanding of subject, and grammar/mechanics. Video submissions will be evaluated based on main focus, relevance to the topic provided, organization, understanding of subject, and grammar/mechanics, clarity and flow of the verbal presentation. Topic #1: Incident Detection and Response Advanced, targeted attacks have become more widespread over the last few years, attracting the attention of governments, business executives, and the news. Of particular concern are advanced persistent threats (APTs). These covert and sophisticated attacks focus on gathering secret information over time as opposed to immediate financial rewards. In response, information security organizations are investing in APT protection products and revisiting their threat monitoring and detection strategies. Organizations around the world are struggling to find a comprehensive solution for APTs. Please discuss each of the following: 1) Characteristics of an APT and the difficulties with preventing these types of attacks 2) How security analytics can be used to understand and predict cyber attacks 3) Approaches for building a security architecture for APTs 4) Methods for responding to these security breaches Topic #2: Third Party Risk Management In business, outsourcing involves the contracting out of a business process to another third party. Organizations often use outsourcing to reduce operating costs and increase focus on business core competencies. While this practice has been happening for several decades, high profile data breaches traced back to third party outsource vendors has brought this practice under intense scrutiny of regulators around the world. Please discuss each of the following: 1) The business advantages and risks associated with use of third party vendors 2) Develop a high-level business case for establishing a Third-Party Risk Management Program 3) How you would implement a Third-Party Risk Management Program 4) Various approaches for measuring the effectiveness of Third Party Risk management activities Topic #3: Mobile Applications Take a good look at your smartphone or tablet. What you are looking at is considered a disruptive technology. Disruptive technology? Really? Yes, these devices and their apps have had a major impact on the way we communicate in our personal lives and at work. The devices and more importantly the apps have replaced cell phones, PDAs and cameras and are quickly replacing garage door openers and televisions. Mobile apps for employees, business partners and customers may be cheaper and quicker to develop and deploy than full-blown enterprise applications, but they still must work securely and in concert with an organization's overall IT infrastructure. Please discuss each of the following: 1) How mobile apps are changing and will continue to change the way businesses operate. 2) Revenue opportunities and security concerns (risks) associated with the use of mobile apps. 3) Approaches to addressing confidentiality, data integrity, and app availability risks. 4) Approaches to monitoring and reporting on these opportunities and risks. 4

FORM 1 COVER SHEET Student s Name: Student s Mailing Address: Student s Email Address: Student s Area of Study: Student s Year in School: School Name: School Address: School Phone Number: Department Head or Counselor s Name & Phone Number: Current GPA: 5

FORM 2 STUDENT CERTIFICATION Certification: I hereby certify that the information provided in this application and during the application process is the original work of the applicant and is true and correct to the best of my knowledge. I have not knowingly withheld or misstated any facts or circumstances that would be relevant to the consideration of this application. During the period that my essay submission is under consideration by the Central Ohio ISACA Chapter, I am also certifying that it has not been published elsewhere and is not being considered for publication elsewhere. Applicant Signature Date Applicant Name (Printed) 6