The SWSIS program provides scholarships of up to $10,000 for women studying for their Bachelors and Masters degrees in fields relating to information security.
The purpose of these scholarships is to provide assistance to women at the formative stages of their careers in these fields.
SWSIS is a partnership of Applied Computer Security Associates (ACSA) and CRA-W, with sponsorship from ACSA, Hewlett Packard Enterprise and Symantec. ACSA has been providing these scholarships since 2011. With the addition of Hewlett Packard Enterprise’s multi-year financial commitment to this program starting with the 2014-15 academic year, and Symantec’s addition in 2017, ACSA was able to increase the number of scholarships, in turn helping to increase the number of women in the field.
Find recent press releases and coverage, here.
SWSIS announces the first named SWSIS Scholarship, which will be known as the Rebecca Gurley Bace SWSIS Scholarship, in memory of this founder of the information security field. Information about Becky may be found at https://www.cerias.purdue.edu/
generally tax deductible. Consult your tax advisor for details.
Women studying information security may apply for consideration to receive the scholarship for their third or fourth year of undergraduate studies, or for a Masters’ program. To be eligible, you must be accepted at or enrolled in a US campus of a US university. Applicants must be US citizens or permanent residents. More details under FAQ.
Questions can be sent to firstname.lastname@example.org
For the SWSIS Application, applicants must provide:
- An essay describing her interest and background in the information security field.
- A current official or unofficial transcript.
- A resume or CV.
- Letters of reference (typically from faculty members).
- University name and class status.
* If the applicant is in her first semester at her current university, she should submit her class schedule and transcript(s) from prior universities. Official transcripts may be required for scholarship recipients, but not for application.
**The scholarship may be renewable for a second year if eligibility conditions are still met, given proof of satisfactory academic progress and availability of funds.
Questions can be sent to email@example.com
CRA-W Evaluation Committee:
Terry Benzel, University of Southern California
Marina Blanton, University at Buffalo
Diana Burley, George Washington University
Melissa Chase, Microsoft
Tadayoshi Kohno, University of Washington
Daniela Oliveira, University of Florida
Zachary Peterson, Cal Poly, San Luis Obispo
Bhavani Thuraisingham, University of Texas at Dallas
Rebecca Wright, Rutgers University (Chair)
Jeremy Epstein, National Science Foundation (ACSA director of scholarship programs)
Ann Marmor-Squires, The Sq Group
Cristina Serban, AT&T Security Research Center
Mary Ellen Zurko
Madeleine Barowsky, Wellesley College
Madeleine Barowsky is a junior at Wellesley College studying computer science and mathematics. She has a passion for all things cybersecurity and is particularly interested in cryptography. Madeleine plans to pursue research in mathematics and cryptography in graduate school.
Brooke Bullek, Bucknell University
Brooke Bullek is a junior at Bucknell University majoring in computer science & engineering. This past year, she’s conducted research within the intersection of data privacy and human-computer interaction through involvement with the CREU program, and will present peer-reviewed original research at the ACM SIGCHI international conference. In her ongoing research, she plans to cultivate privacy literacy by further contributing to a holistic understanding of privacy definitions. Brooke aspires to integrate her passions for software development and usability upon graduation, while at the same time motivating other women to pursue interests in computer science.
Robin Burkett, George Mason University
Robin Burkett is a second year Master’s student in Computer Forensics at George Mason University. She has a BS in Management Information Systems from Florida State University and her first career was in Information technology. She took the opportunity to pursue a life-long dream to start a photography business where she became an award-winning professional photographer. She ran her photography business for over a decade. Craving a new challenge, when she learned about information security, she decided to go back to school to get a certificate in cybersecurity at Northern Virginia Community College and then went on to pursue her Master’s Degree. She was a speaker at BSides Las Vegas in 2016 and participates in Capture the Flag individual and team competitions. She was chosen to participate in the DHS Secretary’s Honors Cyber Student Volunteer Initiative and now works full-time at a security research lab.
Caroline M. Cox, Washington College
Caroline Cox is going into her junior year at Washington College, in Maryland, where she is double majoring in Mathematics and Computer Science, with minors in German and Dance. At Washington College, she is the president of the computer club, a member of the Pi Mu Epsilon mathematics honor society, Media Intern for the Admissions Office, and the Treasurer of Dance club, among many other clubs and activities. While finishing up her undergraduate degree, she hopes to further her knowledge and interest in the cyber security field.
Loan Hanlon, University of Maryland University College
Loan Hanlon is a graduate student at University of Maryland University College working toward her Master of Science in Cybersecurity. She received a Bachelor of Science in Management Information Systems from George Mason University. After graduation, she plans to pursue a career in cyber security and help people/organizations to protect against cybercrime.
Hannah Kabir, University at Albany
Hannah Kabir is a senior at University at Albany who will be graduating with a Bachelor’s of Science in May of 2017. She will be attending Johns Hopkins Whiting School of Engineering to pursue a Master’s in Cyber security. She has attended the Workshop for Minorities and Women at the Cyber Huntsville conference and been chosen to be featured in a blog called “Reigningit” supporting women in STEM. Hannah plans to use her Master’s degree to be a leader in the cyber security field and also create out-reach programs to inspire young girls and women to pursue education and carers in STEM. She starts a full time job at KeyBank as a Cyber Security Analyst this summer.
Scarlett Levine, University at Albany
Scarlett Levine is a sophomore at University at Albany majoring in Digital Forensics and minoring in Criminal Justice. She is pursuing a career in cyber security and law enforcement. Scarlett is a member of the Digital Forensics Association and Presidential Honors Society, yet her passion is the Albany Bowling Club.
Catherine McLean, Northeastern University
Catherine McLean is an undergraduate honors student at Northeastern University pursuing both her Bachelors in Computer Science and Cyber Operations and Masters in Computer Science. She is currently completing an internship as a Cyber Engineer at Raytheon. At Northeastern, she works as a Teaching Assistant for an introductory computer science class, mentors incoming freshmen, and participates in the Women in Technology club. Catherine is passionate about supporting the next generation of women in the security field.
Yin Mei, NYU Tandon School of Engineering
Yin Mei is a graduate student at NYU Tandon School of Engineering, Computer Science department, working towards a Masters in Cyber Security. She is a graduate of the NYU CS Bridge Program and was selected into the NYU Cyber Scholars Program for researching topics surrounding journalism and security as part of the non-federally funded interdisciplinary scholarship program. After obtaining a B.A in Psychology at UC Berkeley, she has worked in international cities spanning San Francisco, Paris, Beijing and New York. With a media and public relations background, she has lead the organization of global, multi-lingual communities around innovation such as Barcamp Beijing and TEDxBeijing. Having worked full time as a software engineer since 2013, she hopes to combine technical skills with interdisciplinary knowledge to strengthen the application of information security. Yin also looks forward to supporting the leadership of more women in the field.
Victoria Mondragon, University at Albany
Victoria Mondragon is currently a junior at University at Albany studying Digital Forensics and Cyber Security. She is greatly involved with clubs on campus including The DFA (Digital Forensics Association). She also donates much of her time to volunteering and giving back in her community. Victoria has received many great opportunities to further her knowledge in the field of Cyber Security including attending WiCyS in Tucson, AZ this past year. After graduation she hopes to use her knowledge and passion for Cyber Security as well as the criminal justice field as a whole to focus on becoming a homicide detective. She is honored to be a recipient of SWSIS scholarship and is looking forward to making great contributions within the Cyber Security and Forensics fields.
Ivy Oeltjenbruns, Dakota State University
Ivy Oeltjenbruns is a junior studying Cyber Operations at Dakota State University with a focus in computer forensics. She is very involved on campus as the current President of Computer Club (Association for Computing Machinery Student Chapter), secretary of CybHer Club (Women in Cyber Security), and a member of Defensive Security Club. After graduation, she plans to get a master’s degree in Applied Computer Science.
Nicole Price, New Mexico State University
Nicole Price, a senior at New Mexico State University, is majoring in Information Engineering Technology and minoring in Security Technology and Music. She currently works as an undergraduate research assistant for Young Women in Computing, where she designs/instructs courses in Cyber Security, Encryption, Robotics, and more Computer Science related subjects. She is also an Information Security Analyst intern for an insurance company, and will be interning with Google IT during the summer of 2017. In addition to this, Nicole is a part of the Network Security Group at school where she competed in the Southwest Collegiate Cyber Defense Competition. Her plans for the future include pursuing a Master’s degree in Information Security, Computer Science, or a closely related subject.
Angela Rice, Western Governors University
Angela Rice found her passion for cyber security while taking courses for a business related degree. She is currently majoring in IT Security at Western Governors University, where she plans to continue and complete a Masters. Angela enhanced her abilities in the security field during an internship where she was immersed in IT security policy, standards, and compliance work, updating the IT Security Plan for a government agency. She is excited to pursue a career in cyber security, and looks forward to growing her expertise in the field.
Kimberly Ruth, University of Washington
Kimberly Ruth is a sophomore studying computer engineering at the University of Washington. She has been actively involved in security research, with her current focus being security for augmented reality systems; she has also been a security intern at Google. Kimberly is excited to pursue a PhD followed by a research-based career in computer security. In addition to being a SWSIS Scholar, she is the first winner of the SWSIS Rebecca Gurley Bace Scholarship.
Rachel Cohen is a senior at University of Maryland, Baltimore County studying Computer Science. At UMBC, she is a member of the Cyber Scholars Program and involved with the Center for Women in Technology. She is a native of Columbia, Maryland where she attended Atholton High school.
Sarah Earle is currently an Associate Principal for a high school technology program in Charleston County School District, Charleston, SC where she is working with a variety of organizations to build a state-of-the-art information security pathway for high school students. Her passion for security developed while working with her students and noticing strong need for balance between policy and practice. She will attend University of Maryland University College to obtain a Master of Science in Cybersecurity Policy. In addition to pursuing a career in information security, Sarah plans to continue working to encourage underrepresented students to choose a variety of computer science avenues. Sarah is currently working to increase her technical knowledge by studying for several industry certifications. She enjoys traveling, reading and spending time with her family.
Kaitlyn Kelly is currently a junior at SUNY Albany double majoring in Digital Forensics and Financial Market Regulation. She grew up in Millbrook, NY. She helped found a new club as secretary of the Cyber Defense Organization, which is committed to providing a platform for students interested in cyber security to learn and practice their technical skills, while also competing in competitions in the local area and beyond. She has also interned at the US SEC Regional office in NYC and will be an intern at the Department of Defense in Washington DC this summer. After graduation she hopes to start a career in cyber intelligence and attend graduate school. She is honored to be a recipient of the SWSISscholarship and looking forward to providing solutions to the emerging issues found in the changing landscape of cyber security.
Michelle Lam is a third year Computer Science major at Cal Poly SLO, focusing in computer security. She has taken coursework in cryptography, network security, and web security, and is returning to Apple for a second security internship, after having interned at Northrop Grumman. She is the president of her school’s chapter of Association for Computing Machinery and has also been an officer of Women Involved in Software and Hardware as well as White Hat Computer Security.
Kelsey McKinley is an Information Security major at Ferris State University. She plans on using her degree to pursue cyber terrorism and forensics with the federal government. In addition to her studies, she is a two time All-American Scholar for the Ferris State Women’s Golf Team.
Sarah Miller, Carnegie Mellon University
Sarah Miller is entering her second year at Carnegie Mellon University in Fall 2016 to complete a Master of Science in Information Security Policy and Management. Sarah has received a Master of Arts in Rhetoric from Carnegie Mellon University and a BA from McDaniel College after double-majoring in English and Psychology. Sarah hopes to advocate for women in other fields to consider cyber security as a career.
Mary Anne Smart is a junior from Bloomington, Indiana, studying math, computer science, and Spanish at Indiana University. For the past two years, she has enjoyed working as a peer-led team learning leader at IU’s School of Informatics and Computing.
Dralia Tulley-Patton became passionate about working at the intersection of Natural Language Processing (NLP) and Security, after she attended several related talks at Grace Hopper. Specifically, she plans to advance research in the area of insider threat detection, exploring the use of NLP and ML in analyzing the differences between the language of a typical employee and the language of an insider who poses a security threat.
Jessica Wilson is a current Honors student from Eastern Michigan University majoring in Information Assurance and minoring in Computer Engineering Technologies. She is an active member of the information security community, leading the Information Assurance Student Association, as well as founding the Women in IA group at her university. She has also interned at Virta Labs working on security testing for health care and medical devices including side channel analysis.
Evelyn Brown, Embry Riddle Aeronautical University
Evelyn Brown is currently a sophomore at Embry Riddle Aeronautical University studying Cyber Security and Intelligence. She grew up in Kingman, Arizona and was home schooled, graduating from both high school and Mohave Community College with an Associate’s Degree in 2014. She is very grateful to be a SWSIS scholarship recipient and looking forward to her career in Cyber Security!
Priya Chawla, University of Cincinnati
Priya Chawla is an actively involved student at University of Cincinnati studying Computer Science. This year, she founded a student chapter of ACM-W for her university. The chapter has received generous amounts of support and funding from many top engineering firms. She is also currently enrolled in the ACCEND program, a dual-degree program for students to receive their Master’s degree and Bachelor’s degree at the same time. Priya’s Master’s thesis research will be focused in the area of data mining. After graduation, Priya looks forward to developing innovative solutions that will help safeguard our nation’s information.
Shelby Cunningham, Carnegie Mellon University
Shelby Cunningham is a first-year master’s student at Carnegie Mellon University studying information security policy and management. A life-long resident of the Pittsburgh area, she also received a B.S. in psychology from Carnegie Mellon in 2014.
Alejandra Diaz, University of Maryland, Baltimore County
Alejandra is a rising junior at the University of Maryland, Baltimore County majoring in Computer Science with a focus on Cyber Security. As part of the Cyber Security Scholars, she has had great opportunities to expand her skills as a student. After graduation, she is looking forward to pursuing a Master’s degree in Computer Science and Cyber Security.
Fumi Honda, Stony Brook University
Fumi Honda is a senior from Stony Brook University majoring in Computer Science with a focus in information assurance. She also double major in Psychology and minor in Business. She hopes her interdisciplinary background will help her become a better security consultant on problems of security trade-offs.
Ashley Huffman, Northern Kentucky University
Ashley Huffman is a dual major at Northern Kentucky University studying Computer Science and Computer Information Technology. She is actively involved with the schools cyber-defense team and information security club along with the schools Women in Informatics group. She hopes to go into the field of information Security after she graduates and is particularly interested in application security and malware analysis.
Cindy Jong, DePaul University
Cindy Jong is studying Information Assurance and Security Engineering at DePaul University. Cindy is originally from Taiwan and she hopes to pursue a career in either application security, or network security. She enjoys reading cyber security books on different topics during her free time; she also enjoys playing video games.
Madison Oliver, Pennsylvania State University
Madison Oliver is a Security and Risk Analysis Major at Penn State’s main campus and has been here throughout her entire undergraduate degree. Madison is originally from Pittsburgh, Pennsylvania. She plans on taking the LSATs this upcoming October to pursue a career in Intellectual Property Law. For fun, she likes to play video games and board games with friends.
Mary Sharp, Marshall University
Imani Sherman, Kentucky State University
Imani is a graduate student at Kentucky State University working towards her Masters in Computer Science Technology with a concentration in Cyber Security. She received her Bachelor’s degree in Electrical Engineering from the University of Dayton. After graduation she plans to pursue a Technology and Public Policy doctoral degree.
Angela Sun, Michigan State University
Angela Sun is a student at Michigan State University studying smartphone systems and security. She has previously interned for Google. In addition to information security, she also has strong interests in business and product management.
Kebra Thompson, University of Washington
Kebra Thompson was a high school math teacher for eighteen years before deciding to return to school and study some exciting applications of math. She is just finishing up an undergraduate degree in Computer Engineering and starting on a Masters degree in Computer Science with a focus on Cyber security. She is very interested in math and its applications in cryptography and hopes to use those skills in industry after her graduation.
Stefanye Walkes, California State University, Dominguez Falls
Stefanye Walkes is currently a senior at California State University, Dominguez Hills for a Bachelor’s degree in their Computer Technology, Homeland Security track. After getting her Bachelor’s, she will attend graduate school for a cyber security-related Master’s degree. Career-wise she hopes to do research for the United States’ intelligence community.
Gena Welk, University of Colorado at Boulder
After spending most of her professional career as a stay-at-home mom, Gena is venturing out into the world of technology in pursuit of making computers and data more secure for the humans they serve. She is passionately interested in privacy issues and laws, telecom policies in the US and abroad, and the way the brain is adapting to screen technology and the negative effects it could be having on our children.
Gena is pursuing a Masters Degree in ICTD from the University of Colorado.
Leah Xu, University of Maryland, College Park
Leah Xu is a junior Computer Engineering major at the University of Maryland, College Park who is deeply interested in intersection between technology, humanity, and other industries. She has been conducting cyber security research in an interdisciplinary lab with criminologists and computer scientists for the past two years. She will be spending her summer interning as a program manager at Microsoft on the Azure team and her fall at Google interning as a software engineer on the data infrastructure team at Nest.
Brooke Young, University of Maryland, Baltimore County
Brooke is a rising senior at the University of Maryland, Baltimore County majoring in Information Systems, with a concentration in Cyber Security. Brooke has an Associate’s Degree in Information Systems from Montgomery College. She was President of the Computer Science Club, DC-CAP College Representative, and an Intern at the U.S. Department of Agriculture’s Information System Security Branch Office. At the USDA, Brooke became fascinated with Cyber Security and the process of applying security measures to ensure confidentiality, integrity, and security of data. After graduation, she hopes to start a career in network security and risk management and attend graduate school. Brooke is a native of Washington, D.C. She attended The Field School and McKinley Technology High School.
Kira Ullman, Columbia University
Kira is a senior at Columbia University majoring in Math and Computer Science. She grew up in Washington, DC, and attended Sidwell Friends High School. She is hoping to get a job in cyber security and is thrilled to be an SWSIS awardee!
Veronica (Nick) Manfredi, Wellesley College
Nick Manfredi is a senior at Wellesley College, majoring in computer science with a focus in information security. After graduation, Nick plans to attend graduate school.
Nicholette Fortune, Rochester Institute of Technology
Nicholette is a rising senior at Rochester Institute of Technology. She is a double major in Information Security and Forensics, and Criminal Justice. After graduation she hopes to find employment doing either Cyber Security or Digital/Network Forensics. Although originally from Trinidad in the Caribbean, she is a native of Brooklyn, NY where she attended Midwood High School at Brooklyn College.
Katareena Geller, University of North Carolina at Charlotte
Victoria Lentz, University of Maryland, Baltimore County
Victoria Lentz is a senior at University of Maryland, Baltimore County studying computer science with a concentration in information assurance. After graduation, she plans to pursue a career in digital forensics. She is a native of Ellicott City, MD where she attended Howard High School.
Trang Nguyen, Columbus State University
Trang Nguyen is a graduate student at Columbus State University, where she is working towards her Masters in Computer Science, with a focus in information assurance. Her bachelor’s in biochemistry was received from the Georgia Institute of Technology. After graduation, she is looking into working in industry or pursuing a PhD where she could focus on biometric cyber security. She’s a native of Columbus, GA, where she went to Columbus High School.
Sherri Pearlman, National University
Sherri Pearlman is a senior at National University where she is majoring in Cyber Security with a focus in Information Assurance. After graduation she plans to get a job in the industry, where she hopes to work in Network Security.
Jessica Pease, California Polytechnic State University – San Luis Obispo
Jessie is a Senior at Cal Poly, San Luis Obispo. She is majoring in Computer Science with a focus in security. This fall she will be studying abroad at KTH in Stockholm, Sweden in the School of Computer Science and Communication. After graduation, she plans to work in industry where she hopes to work on privacy engineering. She’s a native of Elk Grove, CA where she went to Laguna Creek High School. Jessie is a Senior at Cal Poly, San Luis Obispo. She is majoring in Computer Science with a focus in security. This fall she will be studying abroad at KTH in Stockholm, Sweden in the School of Computer Science and Communication. After graduation, she plans to work in industry where she hopes to work on privacy engineering. She’s a native of Elk Grove, CA where she went to Laguna Creek High School.
Abisola Togunde, Eastern Michigan University
Abisola Togunde is a senior at Eastern Michigan University. She is majoring in Information Assurance, with a concentration in Management. After graduation, she plans to get a job in industry, where she hopes to focus on network security and risk management. She’s a native of Ithaca, NY, however she attended Eaton Rapids High School in Eaton Rapids, MI.
Christa Cox, Bradley University
Geneva Capos, California State University, Northridge
Geneva Capos is a senior at California State University, Northridge (CSUN). She’s majoring in Information Technology and minoring in Sociology. Her hometown is Granite Bay, California where she went to Granite Bay High School and competed in varsity swimming and water polo. She was recruited to CSUN to play water polo. Interests in crime, computers and helping people lead her to the Information Security world. She is the president of the computer security club Layer 8 on her campus. Geneva is rejoining the water polo team after a 2-year retirement taken primarily to focus on schoolwork and studying computer security. That time off allowed her to become more involved with the Layer 8 club. With Layer 8 she has attended several security conferences and conventions, competed in several security competitions such as picoCTF, NCL (National Cyber League), CCDC (Collegiate Cyber Defense Competition) qualifiers, CCDC invitational, and attended the USCC (US Cyber Challenge) San Jose Summer Camp. Currently she is an intern at the Aerospace Corporation in the Information Security Department. After graduating from CSUN, she plans on going to graduate school to expand her security knowledge. Following that, she hopes to pursue a career in cyber security and help protect people against technological threats.
- SWSIS Scholarships: Where are They Now? Featured Scholar: Jill Jermyn January 23, 2018Jill Jermyn was the first recipient of a SWSIS Scholarship in 2012. SWSIS funds supported her Masters' degree at Columbia University, after which she transitioned into a Ph.D. program. SWSIS does not currently fund Ph.D. studies. Jill is a Software Engineer in Security and Privacy at Google. She recently received her Ph.D. from Columbia University, […]
- SWSIS Scholarships: Where are They Now? Featured Scholar: Kebra Thompson December 1, 2017Kebra Thomspon received an SWSIS scholarship from 2015 to 2016 while she earned a master’s degree in computer science at the University of Washington - Tacoma. She is currently an Information Specialist at the Naval Undersea Warfare Center in Keyport, Washington.
- Student Researchers Ask How Secure We Feel About Internet Security June 12, 2017Originally posted by Bucknell University BY MATT HUGHES You’ve probably noticed how well your internet browser has gotten to know you. Ever-advancing advertising algorithms serving up targeted ads, not to mention data breach after data breach, have made many internet users more attuned than ever to how little privacy we often have on the internet. […]
- What does the Scholarship for Women Studying Information Security mean to me? August 26, 2016Each year in co-sponsorship with Applied Computer Security Associates (ACSA) and the Hewlett-Packard Enterprise (HPE), CRA-W/ACSA presents the Scholarship for Women Studying Information Security (SWSIS) to 10-15 women in their undergraduate or Master’s studies. This year a SWSIS 2016 recipient shared her experience in the Information Security field and what it means to receive this scholarship. […]
- New America Foundation Blog Series – Humans of Cybersecurity July 8, 2016The New America Foundation has started a new series of blog posts about women in cybersecurity. Among the first are two SWSIS winners, writing about their careers and how they've become interested in cybersecurity. Read about Priya Chawla and Jill Jermyn. The blog is called Humans of Cybersecurity.
- What the SWSIS Scholarship Means to Me December 18, 2014Receiving the SWSIS Scholarship means more to me than just the financial support. Receiving the recognition and support of the ACSA makes me feel even more determined to complete my degree in Computer Science with an emphasis in Security. This fall, I have the opportunity to study abroad in Stockholm, Sweden where I will also […]
- SWSIS scholarship helped me to start my career in cyber security March 11, 2014I was selected for the SWSIS scholarship during an unsettled time in my life. I just started graduate school at Columbia University after a career change, and although I was greatly interested in information security, I didn’t quite know how I wanted to apply it to my future plans. I received a great deal of […]
- How the ACSA Scholarship has helped me March 6, 2014After learning that I was receiving the SWSIS from ACSA in 2012, I was ecstatic and very grateful. I was studying to complete my Bachelor in Computer Science with a Concentration on Computer Security at Towson University in the next year. I had experience with an internship with a defense contracting firm, however I was […]
- Welcoming past SWSIS winners! February 24, 2014Welcoming past SWSIS winners! It’s my pleasure to welcome posts from past SWSIS winners. Over the next few weeks, you’ll see postings from some of the talented young women who were helped in their education by SWSIS scholarships. Join me in congratulating them – and I hope you’ll join them in applying for SWSIS scholarships! — […]
- What the SWSIS scholarship has meant to me… February 24, 2014I was honored and very grateful to receive the SWSIS from ACSA in 2012. By allowing me to focus full-time on my studies, the scholarship is helping make possible the completion of my Masters in Computer Science at UCLA. I’ve been exposed to many facets of information security while at school, and I interned at […]
Questions can be sent to firstname.lastname@example.org
It is my first semester in this graduate program, so I technically do not have any class records in my transcript for this campus.
Please include a copy of your class schedule, to show that you are an enrolled student, even though you don’t have a transcript yet.
I hope to enroll in a masters program next year, but I have not yet been accepted. Am I eligible to apply?
Yes, so long as you meet the other criteria. Before an award is made, we will verify that you will in fact be in a suitable masters program. Please include a statement about your plans in your essay, and list the programs to which you have applied.
Can a student in a two year master's program apply in their second year, having already completed the first year of the program?
If you will be in your second year of your two-year Master’s program in the upcoming Academic Year, then you are eligible. If you will be finished with the second year by the time the scholarship is awarded, then you are not eligible to apply.
I am a freshman in computer engineering, I don’t know yet whether I am interested in security – could I get a scholarship?
Probably not – you need to be a junior or senior or in a Master’s program next school year, plus already have security coursework in your studies, have held a security-related job, or otherwise exhibit security interest (e.g., through a club).
I have a BS in another field, now I am back at community college taking classes in Linux and Cisco so that I can get some certifications. Would I be eligible to apply for this scholarship?
Probably not – our goal is to encourage security education, not training, and certifications fall in the “training” category.
I’m pursuing a BA, not a BS. Am I eligible?
Yes, any Bachelors’ program, including BA, BS, BEng, etc., is acceptable for a SWSIS scholarship, assuming that you meet the other qualifications.
I’m pursuing a PhD. Am I eligible?
No. This program is only for undergraduates and masters students.
I am enrolled in an Information Security Certificate program – am I eligible to apply for a SWSIS scholarship?
Most likely not, as we do not support students in certificate programs, unless they’re also degree programs (Bachelors’ or Masters’ degree).
What topic areas constitute “information security”?
We have a broad interpretation of the field. Some relevant areas include:
* Software security / software assurance
* Intrusion detection
* Network security
* Security usability
* Operating systems security
* Database security
* Applications security
* Formal methods
* Privacy engineering
Who selects the winners?
CRA-W leads the selection process, assisted by a selection committee. The selection committee makes recommendations to ACSA, which finalizes the decisions.
How are applications evaluated? Are letters of recommendation important?
Letters of recommendation are one of the factors we consider, along with essays, transcripts, and resumes (e.g., clubs, honors, internships), along with diversity factors. There is no fixed weighting among the inputs, but all are important.
I am participating in an online program, not an on-campus program. Am I eligible?
Students in online degree programs offered by US institutions are eligible, so long as all of the other eligibility criteria are met.
What do scholarship winners receive?
Funds are paid directly to your account at your university for tuition, books, etc. Scholarship winners will be invited to attend security conferences held by ACSA and HP (expenses will be paid for winners who choose to attend) and will have opportunities to participate in career mentoring programs organized by the CRA-W. Some scholarship winners may also be offered summer internships with HP.
* For other Questions: Please contact SWSIS