ISACA Central Ohio Chapter Academic Scholarship 2018 What is ISACA? ISACA is a worldwide association of IS governance professionals ISACA advances global business leaders in technology, information and cyber security, governance, risk and innovation. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance The Central Chapter of the ISACA is making $2,250 available for scholarships in 2018 (two individual scholarships - one in the amount of $1,250 and one in the amount of $1000). Current full-time or part-time undergraduate or graduate students who are studying information systems, business, accounting, or computer science at an accredited college in Central Ohio are invited to apply. Award Title ISACA Central Ohio Chapter Academic Scholarship 2018 Contact University_Relations@isacacoh.org Website Central Ohio ISACA Chapter Website Submission Due Date April 13, 2018 Award Date Winners will be notified by May 4, 2018 Awards 1 st Place - $1250 Available 2 nd Place - $1000 1
Scholarship Eligibility To be eligible for the scholarships, the following criteria must be met: Completed application Essays will be double-spaced 10-point font and must be less than 1000 words, excluding names, headers, and endnotes. Video Submissions should not exceed 7 minutes. Full or part-time undergraduate or graduate student at an accredited Central Ohio institution in good standing. Pursuing business or information systems related degrees, such as: Business Information Systems, Computer Information Systems, Accounting, Business or Computer Science. Must be a currently enrolled student as of the scholarship award date. Provide a copy of recent transcripts to prove enrollment and current GPA Award winners have the option (not required) to attend a complimentary ISACA meeting in order to be presented the scholarship and meet the membership. These meetings are held on a weekday usually during the hours of 11 am to 2 pm. Application and scholarship materials must be in English. ISACA members are not eligible, except for student members. Applications, transcripts, and essays/video submissions must be emailed or mailed to University_Relations@isacacoh.org 11:59 pm EST on April 13, 2018 all attached in one email. The subject line should read Applicant Name Scholarship Submission (e.g. Jane Doe Scholarship Submission). Application forms and essays/video submissions will be evaluated by volunteer ISACA members. Student applicants are expected to use the scholarship funds for academic related expenses (tuition, room and board, lab fees, books, laptops, software purchases) Funds will be issued directly to the student by the ISACA Central Oho Chapter. Please contact Zenniere Bowry-Thomas with any questions via email at University_Relations@isacacoh.org 2
Essay/Video Submission Requirements Essays/Video will only be accepted from graduate or undergraduate students who are enrolled and in good standing in a full-time program at a higher education institution in Central Ohio Only one essay or video per student will be considered. Essays will be double-spaced 10-point font and must be less than 1000 words, excluding names, headers, and endnotes. Video Submissions should not exceed 7 minutes. Essays should be submitted in a standard word processing format such as MS Word. When citing sources, essays must follow either the MLA or APA format and the essay must contain a reference page. The essays/applications and videos will be submitted in English. Essays/videos must be submitted and received no later than April 13, 2018. Any entries received after this date will not be considered. Students will be notified no later than May 4, 2018 All competition submissions must include a Cover Sheet (Form 1), Student Certification (Form 2), and a transcript in addition to the video or essay submission Submit all materials in one email from your student email account ending in.edu to University_Relations@isacacoh.org Submissions not meeting the requirements defined above will be disqualified from the competition. All essay competition entries along with the cover sheet, and student certification and must be submitted for consideration via e-mail using your official school email address ending in.edu to University_Relations@isacacoh.org 3
Essay/Video Topics Please select 1 out of the 3 topics below for your essay or video. Essay submissions and video will be evaluated based on main focus, relevance to the topic provided, organization, understanding of subject, and grammar/mechanics. Video submissions will be evaluated based on main focus, relevance to the topic provided, organization, understanding of subject, and grammar/mechanics, clarity and flow of the verbal presentation. Topic #1: Incident Detection and Response Advanced, targeted attacks have become more widespread over the last few years, attracting the attention of governments, business executives, and the news. Of particular concern are advanced persistent threats (APTs). These covert and sophisticated attacks focus on gathering secret information over time as opposed to immediate financial rewards. In response, information security organizations are investing in APT protection products and revisiting their threat monitoring and detection strategies. Organizations around the world are struggling to find a comprehensive solution for APTs. Please discuss each of the following: 1) Characteristics of an APT and the difficulties with preventing these types of attacks 2) How security analytics can be used to understand and predict cyber attacks 3) Approaches for building a security architecture for APTs 4) Methods for responding to these security breaches Topic #2: Third Party Risk Management In business, outsourcing involves the contracting out of a business process to another third party. Organizations often use outsourcing to reduce operating costs and increase focus on business core competencies. While this practice has been happening for several decades, high profile data breaches traced back to third party outsource vendors has brought this practice under intense scrutiny of regulators around the world. Please discuss each of the following: 1) The business advantages and risks associated with use of third party vendors 2) Develop a high-level business case for establishing a Third-Party Risk Management Program 3) How you would implement a Third-Party Risk Management Program 4) Various approaches for measuring the effectiveness of Third Party Risk management activities Topic #3: Mobile Applications Take a good look at your smartphone or tablet. What you are looking at is considered a disruptive technology. Disruptive technology? Really? Yes, these devices and their apps have had a major impact on the way we communicate in our personal lives and at work. The devices and more importantly the apps have replaced cell phones, PDAs and cameras and are quickly replacing garage door openers and televisions. Mobile apps for employees, business partners and customers may be cheaper and quicker to develop and deploy than full-blown enterprise applications, but they still must work securely and in concert with an organization's overall IT infrastructure. Please discuss each of the following: 1) How mobile apps are changing and will continue to change the way businesses operate. 2) Revenue opportunities and security concerns (risks) associated with the use of mobile apps. 3) Approaches to addressing confidentiality, data integrity, and app availability risks. 4) Approaches to monitoring and reporting on these opportunities and risks. 4
FORM 1 COVER SHEET Student s Name: Student s Mailing Address: Student s Email Address: Student s Area of Study: Student s Year in School: School Name: School Address: School Phone Number: Department Head or Counselor s Name & Phone Number: Current GPA: 5
FORM 2 STUDENT CERTIFICATION Certification: I hereby certify that the information provided in this application and during the application process is the original work of the applicant and is true and correct to the best of my knowledge. I have not knowingly withheld or misstated any facts or circumstances that would be relevant to the consideration of this application. During the period that my essay submission is under consideration by the Central Ohio ISACA Chapter, I am also certifying that it has not been published elsewhere and is not being considered for publication elsewhere. Applicant Signature Date Applicant Name (Printed) 6