SlideShare a Scribd company logo
NEWS
                                                       FOR IMMEDIATE RELEASE
                                                       Contact:
                                                       Stephanie Olsen or Mike Kilroy
                                                       Maples Communications, Inc.
                                                       (949) 855-3555
                                                       solsen@maples.com
                                                       mkilroy@maples.com



         (ISC)2® ANNOUNCES WINNERS OF
      CYBER SECURITY AWARENESS CONTEST
   (ISC)² Donates US$5,000 to Winners for Their Commitment to
          Promoting Cyber Security for the Common Good

        PALM HARBOR, Fla., USA, Feb. 12, 2008 – (ISC)2® (“ISC-squared”), the non-profit
global leader in educating and certifying information security professionals throughout their
careers, today announced the winners of its Cyber Security Awareness Month contest, where top
professionals from around the world submitted security awareness tools on an online repository
free to the public.
        (ISC)²-certified members, representing preeminent information security experts from
corporate, government and academic arenas spanning North America, Europe and Asia-Pacific,
were invited to post materials that organizations and individuals could download to promote
online safety at work or within the community. A total of 118 materials were uploaded to the
(ISC)² Cyber Security Awareness Resource Center, including templates that can be customized
by end users, such as posters, flyers, brochures, presentations and games.
        Winners were selected based on a combination of rankings and public downloads of their
materials. Each will receive US$1,000 from (ISC)². The winners are:
            •   Boris Loza, a CISSP based in Canada, for “Anti-Hacking School, Lessons One
                and Two”
            •   Hayman Ezzeldin, a CISSP based in Germany, for “Backup Your Data!” poster
            •   Jay Schwitzgebel, a CISSP-ISSMP based in the U.S., for a “Consumer Internet
                Security Awareness on Emerging Security Threats” presentation
            •   Pedro Verdin Jimenez, a CISSP based in Mexico, for a Spanish-language
                presentation on cyber safety and security
                                              -more-
(ISC)2® Announces Winners of Cyber Security Awareness Contest                                 Page 2


            •    Nishidhdha Shah, a CISSP based in the U.S., for a presentation entitled
                 “Approach to Information Security”

        Mr. Schwitzgebel commented, “There is a real need to educate people about the best way
to protect themselves online. As a CISSP and security practitioner, I routinely network with my
colleagues and share awareness materials for adapted re-use.
        “That the (ISC)² Cyber Security Awareness Resource Center facilitates such professional
sharing, while also making the materials available to an even broader public audience, is a
tremendous value to the security industry. I’m proud to be a member of an organization that has
made awareness part of its core mission.”
        “Due to the success of the online resource center, we’ve decided to build out and enhance
the site, keep it operational year-round and hold the contest again this year,” said Eddie Zeitler,
CISSP, executive director of (ISC)2. “Our members have invaluable expertise and experience to
share. The Cyber Security Awareness Resource Center is an important vehicle to make that
knowledge available to the public for the greater cyber good.”
        To continue building the repository with compelling materials, (ISC)² plans to run the
contest annually. To access the Cyber Security Awareness Resource Center, please visit
www.isc2.org/csa.
        Another (ISC)² initiative to support Cyber Security Awareness Month included
participation in National Cyber Security Awareness Day in Tallahassee, Fla. (ISC)2 Security
Strategist and former White House cyber security advisor Howard Schmidt was joined by Miss
America Lauren Nelson and Tallahassee Mayor John Marks at Florida State University to
discuss ways families can better protect themselves from online threats. Sponsored by the
National Cyber Security Alliance (NCSA), the event was part of a nationwide campaign to
educate the American public, businesses, schools and government agencies about ways to secure
their part of cyber space, computers and the nation’s critical infrastructure.
        Assuring public awareness of cyber security has become an official element of the (ISC)2
mission designed to enhance and support the information security profession. (ISC)2 has
alliances with several organizations around the world who are committed to bring cyber security
awareness to the public, including Childnet International and SCIPP International® and the
Information Security Awareness Forum. Over 100 (ISC)2 member volunteers have received
training from Childnet International, a charity whose mission is to work with others to help make
the Internet a great and safe place for children, to give presentations on Internet safety to 11- to

                                                  -more-
(ISC)2® Announces Winners of Cyber Security Awareness Contest                                                  Page 3


14 year-old students in the United Kingdom. The program is expected to expand to schools in
the U.S. and Asia later this year. SCIPP International, a global non-profit organization dedicated
to providing world-class security awareness training and certificates for end users, has invited
Zeitler to sit on their advisory board to provide counsel and exchange ideas between the two
organizations. John Colley, CISSP, managing director for (ISC)² EMEA, represents (ISC)² as a
founding member of the Information Security Awareness Forum, a cross-industry initiative
supported by former UK Home Secretary David Blunkett and organized by the Information
Systems Security Association (ISSA) UK Chapter Advisory Board.
         In January, (ISC)² also launched a pilot program in Hong Kong, “Youngsters Information
Security Awareness Program”, in conjunction with its Hong-Kong based Affiliated Local Interest
Group, the Professional Information Security Association (PISA), the Hong Kong Office of
Government Chief Information Officer (OGCIO) and the Hong Kong Police. The program aims
to promote information security awareness to local students through school tours. To date,
volunteers have reached approximately 300 students.
         (ISC)2 and its members are also advocates for, participate in and sponsor a number of
year-round security-related events throughout the world that support security awareness,
including:
    •    Safer Internet Days in the EU
    •    Clean PC Day in Hong Kong
    •    Global Security Week in New Zealand
    •    Computer Security Day in the U.S.

About (ISC)²
The International Information Systems Security Certification Consortium, Inc. [(ISC)2®] is the
internationally recognized Gold Standard for certifying information security professionals. Founded in
1989, (ISC)² has certified over 57,000 information security professionals in 135 countries. Based in Palm
Harbor, Florida, USA, with offices in Washington, D.C., London, Hong Kong and Tokyo, (ISC)2 issues
the Certified Information Systems Security Professional (CISSP®) and related concentrations,
Certification and Accreditation Professional (CAPCM), and Systems Security Certified Practitioner
(SSCP®) credentials to those meeting necessary competency requirements. The CISSP, CISSP-ISSEP®,
CISSP-ISSAP® and SSCP are among the first information technology credentials to meet the stringent
requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying
personnel. (ISC)² also offers a continuing professional education program, a portfolio of education
products and services based upon (ISC)2’s CBK®, a compendium of information security topics, and is
responsible for the annual (ISC)² Global Information Security Workforce Study. More information is
available at www.isc2.org.

                                                        ###
© 2008, (ISC)2 Inc. (ISC)², CISSP, ISSAP, ISSMP, ISSEP, SSCP and CBK are registered marks and CAP is a certification
mark of (ISC)², Inc.

More Related Content

Viewers also liked

Nixia (2)
Nixia (2)Nixia (2)
Nixia (2)
magal94
 
Who is TelePacific?
Who is TelePacific? Who is TelePacific?
Who is TelePacific?
k_graves
 
My curriculum vitae
My curriculum vitaeMy curriculum vitae
My curriculum vitae
Mario Setiawan
 
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
Sharon Gal Or
 
Presentación de power point 2007
Presentación de power point 2007Presentación de power point 2007
Presentación de power point 2007
Riinkiitakutoka ShiikuFu
 
lko
lkolko
CV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HILCV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HIL
Made Suwandi
 
Applying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship FundingApplying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship Funding
Graduate and Postdoctoral Studies - University of British Columbia (UBC)
 
Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure
Damien ARNAUD
 
Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016
yStats.com
 
CTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letterCTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letter
Jonathan Sprague
 
La semiotica
La semioticaLa semiotica
La semiotica
solsiresalazar
 
Practica3 uisrael
Practica3 uisraelPractica3 uisrael
Practica3 uisrael
Cristian Crs
 
Broch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_frBroch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_fr
Med Aymen Lejmi
 
MAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-studyMAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-study
Manet Schuman
 
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Damien ARNAUD
 
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Alexander Sirotin
 
Sales Analysis spreadsheet group
Sales Analysis spreadsheet groupSales Analysis spreadsheet group
Sales Analysis spreadsheet group
Chanel Vorster
 

Viewers also liked (18)

Nixia (2)
Nixia (2)Nixia (2)
Nixia (2)
 
Who is TelePacific?
Who is TelePacific? Who is TelePacific?
Who is TelePacific?
 
My curriculum vitae
My curriculum vitaeMy curriculum vitae
My curriculum vitae
 
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
 
Presentación de power point 2007
Presentación de power point 2007Presentación de power point 2007
Presentación de power point 2007
 
lko
lkolko
lko
 
CV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HILCV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HIL
 
Applying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship FundingApplying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship Funding
 
Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure
 
Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016
 
CTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letterCTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letter
 
La semiotica
La semioticaLa semiotica
La semiotica
 
Practica3 uisrael
Practica3 uisraelPractica3 uisrael
Practica3 uisrael
 
Broch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_frBroch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_fr
 
MAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-studyMAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-study
 
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
 
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
 
Sales Analysis spreadsheet group
Sales Analysis spreadsheet groupSales Analysis spreadsheet group
Sales Analysis spreadsheet group
 

Similar to Csa Winners 2007

Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?
InfosecTrain
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
hymasakhamuri
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
IgorSamuel12
 
Sept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborneSept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborne
David A. Cruz MS, Author, CISSP, SANS GSEC
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
TopCyberNewsMAGAZINE
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
at MicroFocus Italy ❖✔
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
atlanticcouncil
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
Dawn Yankeelov
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ay
Glib Pakharenko
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
IT-oLogy
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6
César Celis
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
Chiranjit Adhikary
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
 

Similar to Csa Winners 2007 (20)

Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
 
Sept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborneSept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborne
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ay
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Csa Winners 2007

  • 1. NEWS FOR IMMEDIATE RELEASE Contact: Stephanie Olsen or Mike Kilroy Maples Communications, Inc. (949) 855-3555 solsen@maples.com mkilroy@maples.com (ISC)2® ANNOUNCES WINNERS OF CYBER SECURITY AWARENESS CONTEST (ISC)² Donates US$5,000 to Winners for Their Commitment to Promoting Cyber Security for the Common Good PALM HARBOR, Fla., USA, Feb. 12, 2008 – (ISC)2® (“ISC-squared”), the non-profit global leader in educating and certifying information security professionals throughout their careers, today announced the winners of its Cyber Security Awareness Month contest, where top professionals from around the world submitted security awareness tools on an online repository free to the public. (ISC)²-certified members, representing preeminent information security experts from corporate, government and academic arenas spanning North America, Europe and Asia-Pacific, were invited to post materials that organizations and individuals could download to promote online safety at work or within the community. A total of 118 materials were uploaded to the (ISC)² Cyber Security Awareness Resource Center, including templates that can be customized by end users, such as posters, flyers, brochures, presentations and games. Winners were selected based on a combination of rankings and public downloads of their materials. Each will receive US$1,000 from (ISC)². The winners are: • Boris Loza, a CISSP based in Canada, for “Anti-Hacking School, Lessons One and Two” • Hayman Ezzeldin, a CISSP based in Germany, for “Backup Your Data!” poster • Jay Schwitzgebel, a CISSP-ISSMP based in the U.S., for a “Consumer Internet Security Awareness on Emerging Security Threats” presentation • Pedro Verdin Jimenez, a CISSP based in Mexico, for a Spanish-language presentation on cyber safety and security -more-
  • 2. (ISC)2® Announces Winners of Cyber Security Awareness Contest Page 2 • Nishidhdha Shah, a CISSP based in the U.S., for a presentation entitled “Approach to Information Security” Mr. Schwitzgebel commented, “There is a real need to educate people about the best way to protect themselves online. As a CISSP and security practitioner, I routinely network with my colleagues and share awareness materials for adapted re-use. “That the (ISC)² Cyber Security Awareness Resource Center facilitates such professional sharing, while also making the materials available to an even broader public audience, is a tremendous value to the security industry. I’m proud to be a member of an organization that has made awareness part of its core mission.” “Due to the success of the online resource center, we’ve decided to build out and enhance the site, keep it operational year-round and hold the contest again this year,” said Eddie Zeitler, CISSP, executive director of (ISC)2. “Our members have invaluable expertise and experience to share. The Cyber Security Awareness Resource Center is an important vehicle to make that knowledge available to the public for the greater cyber good.” To continue building the repository with compelling materials, (ISC)² plans to run the contest annually. To access the Cyber Security Awareness Resource Center, please visit www.isc2.org/csa. Another (ISC)² initiative to support Cyber Security Awareness Month included participation in National Cyber Security Awareness Day in Tallahassee, Fla. (ISC)2 Security Strategist and former White House cyber security advisor Howard Schmidt was joined by Miss America Lauren Nelson and Tallahassee Mayor John Marks at Florida State University to discuss ways families can better protect themselves from online threats. Sponsored by the National Cyber Security Alliance (NCSA), the event was part of a nationwide campaign to educate the American public, businesses, schools and government agencies about ways to secure their part of cyber space, computers and the nation’s critical infrastructure. Assuring public awareness of cyber security has become an official element of the (ISC)2 mission designed to enhance and support the information security profession. (ISC)2 has alliances with several organizations around the world who are committed to bring cyber security awareness to the public, including Childnet International and SCIPP International® and the Information Security Awareness Forum. Over 100 (ISC)2 member volunteers have received training from Childnet International, a charity whose mission is to work with others to help make the Internet a great and safe place for children, to give presentations on Internet safety to 11- to -more-
  • 3. (ISC)2® Announces Winners of Cyber Security Awareness Contest Page 3 14 year-old students in the United Kingdom. The program is expected to expand to schools in the U.S. and Asia later this year. SCIPP International, a global non-profit organization dedicated to providing world-class security awareness training and certificates for end users, has invited Zeitler to sit on their advisory board to provide counsel and exchange ideas between the two organizations. John Colley, CISSP, managing director for (ISC)² EMEA, represents (ISC)² as a founding member of the Information Security Awareness Forum, a cross-industry initiative supported by former UK Home Secretary David Blunkett and organized by the Information Systems Security Association (ISSA) UK Chapter Advisory Board. In January, (ISC)² also launched a pilot program in Hong Kong, “Youngsters Information Security Awareness Program”, in conjunction with its Hong-Kong based Affiliated Local Interest Group, the Professional Information Security Association (PISA), the Hong Kong Office of Government Chief Information Officer (OGCIO) and the Hong Kong Police. The program aims to promote information security awareness to local students through school tours. To date, volunteers have reached approximately 300 students. (ISC)2 and its members are also advocates for, participate in and sponsor a number of year-round security-related events throughout the world that support security awareness, including: • Safer Internet Days in the EU • Clean PC Day in Hong Kong • Global Security Week in New Zealand • Computer Security Day in the U.S. About (ISC)² The International Information Systems Security Certification Consortium, Inc. [(ISC)2®] is the internationally recognized Gold Standard for certifying information security professionals. Founded in 1989, (ISC)² has certified over 57,000 information security professionals in 135 countries. Based in Palm Harbor, Florida, USA, with offices in Washington, D.C., London, Hong Kong and Tokyo, (ISC)2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, Certification and Accreditation Professional (CAPCM), and Systems Security Certified Practitioner (SSCP®) credentials to those meeting necessary competency requirements. The CISSP, CISSP-ISSEP®, CISSP-ISSAP® and SSCP are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers a continuing professional education program, a portfolio of education products and services based upon (ISC)2’s CBK®, a compendium of information security topics, and is responsible for the annual (ISC)² Global Information Security Workforce Study. More information is available at www.isc2.org. ### © 2008, (ISC)2 Inc. (ISC)², CISSP, ISSAP, ISSMP, ISSEP, SSCP and CBK are registered marks and CAP is a certification mark of (ISC)², Inc.