SlideShare una empresa de Scribd logo
1 de 3
NEWS
                                                       FOR IMMEDIATE RELEASE
                                                       Contact:
                                                       Stephanie Olsen or Mike Kilroy
                                                       Maples Communications, Inc.
                                                       (949) 855-3555
                                                       solsen@maples.com
                                                       mkilroy@maples.com



         (ISC)2® ANNOUNCES WINNERS OF
      CYBER SECURITY AWARENESS CONTEST
   (ISC)² Donates US$5,000 to Winners for Their Commitment to
          Promoting Cyber Security for the Common Good

        PALM HARBOR, Fla., USA, Feb. 12, 2008 – (ISC)2® (“ISC-squared”), the non-profit
global leader in educating and certifying information security professionals throughout their
careers, today announced the winners of its Cyber Security Awareness Month contest, where top
professionals from around the world submitted security awareness tools on an online repository
free to the public.
        (ISC)²-certified members, representing preeminent information security experts from
corporate, government and academic arenas spanning North America, Europe and Asia-Pacific,
were invited to post materials that organizations and individuals could download to promote
online safety at work or within the community. A total of 118 materials were uploaded to the
(ISC)² Cyber Security Awareness Resource Center, including templates that can be customized
by end users, such as posters, flyers, brochures, presentations and games.
        Winners were selected based on a combination of rankings and public downloads of their
materials. Each will receive US$1,000 from (ISC)². The winners are:
            •   Boris Loza, a CISSP based in Canada, for “Anti-Hacking School, Lessons One
                and Two”
            •   Hayman Ezzeldin, a CISSP based in Germany, for “Backup Your Data!” poster
            •   Jay Schwitzgebel, a CISSP-ISSMP based in the U.S., for a “Consumer Internet
                Security Awareness on Emerging Security Threats” presentation
            •   Pedro Verdin Jimenez, a CISSP based in Mexico, for a Spanish-language
                presentation on cyber safety and security
                                              -more-
(ISC)2® Announces Winners of Cyber Security Awareness Contest                                 Page 2


            •    Nishidhdha Shah, a CISSP based in the U.S., for a presentation entitled
                 “Approach to Information Security”

        Mr. Schwitzgebel commented, “There is a real need to educate people about the best way
to protect themselves online. As a CISSP and security practitioner, I routinely network with my
colleagues and share awareness materials for adapted re-use.
        “That the (ISC)² Cyber Security Awareness Resource Center facilitates such professional
sharing, while also making the materials available to an even broader public audience, is a
tremendous value to the security industry. I’m proud to be a member of an organization that has
made awareness part of its core mission.”
        “Due to the success of the online resource center, we’ve decided to build out and enhance
the site, keep it operational year-round and hold the contest again this year,” said Eddie Zeitler,
CISSP, executive director of (ISC)2. “Our members have invaluable expertise and experience to
share. The Cyber Security Awareness Resource Center is an important vehicle to make that
knowledge available to the public for the greater cyber good.”
        To continue building the repository with compelling materials, (ISC)² plans to run the
contest annually. To access the Cyber Security Awareness Resource Center, please visit
www.isc2.org/csa.
        Another (ISC)² initiative to support Cyber Security Awareness Month included
participation in National Cyber Security Awareness Day in Tallahassee, Fla. (ISC)2 Security
Strategist and former White House cyber security advisor Howard Schmidt was joined by Miss
America Lauren Nelson and Tallahassee Mayor John Marks at Florida State University to
discuss ways families can better protect themselves from online threats. Sponsored by the
National Cyber Security Alliance (NCSA), the event was part of a nationwide campaign to
educate the American public, businesses, schools and government agencies about ways to secure
their part of cyber space, computers and the nation’s critical infrastructure.
        Assuring public awareness of cyber security has become an official element of the (ISC)2
mission designed to enhance and support the information security profession. (ISC)2 has
alliances with several organizations around the world who are committed to bring cyber security
awareness to the public, including Childnet International and SCIPP International® and the
Information Security Awareness Forum. Over 100 (ISC)2 member volunteers have received
training from Childnet International, a charity whose mission is to work with others to help make
the Internet a great and safe place for children, to give presentations on Internet safety to 11- to

                                                  -more-
(ISC)2® Announces Winners of Cyber Security Awareness Contest                                                  Page 3


14 year-old students in the United Kingdom. The program is expected to expand to schools in
the U.S. and Asia later this year. SCIPP International, a global non-profit organization dedicated
to providing world-class security awareness training and certificates for end users, has invited
Zeitler to sit on their advisory board to provide counsel and exchange ideas between the two
organizations. John Colley, CISSP, managing director for (ISC)² EMEA, represents (ISC)² as a
founding member of the Information Security Awareness Forum, a cross-industry initiative
supported by former UK Home Secretary David Blunkett and organized by the Information
Systems Security Association (ISSA) UK Chapter Advisory Board.
         In January, (ISC)² also launched a pilot program in Hong Kong, “Youngsters Information
Security Awareness Program”, in conjunction with its Hong-Kong based Affiliated Local Interest
Group, the Professional Information Security Association (PISA), the Hong Kong Office of
Government Chief Information Officer (OGCIO) and the Hong Kong Police. The program aims
to promote information security awareness to local students through school tours. To date,
volunteers have reached approximately 300 students.
         (ISC)2 and its members are also advocates for, participate in and sponsor a number of
year-round security-related events throughout the world that support security awareness,
including:
    •    Safer Internet Days in the EU
    •    Clean PC Day in Hong Kong
    •    Global Security Week in New Zealand
    •    Computer Security Day in the U.S.

About (ISC)²
The International Information Systems Security Certification Consortium, Inc. [(ISC)2®] is the
internationally recognized Gold Standard for certifying information security professionals. Founded in
1989, (ISC)² has certified over 57,000 information security professionals in 135 countries. Based in Palm
Harbor, Florida, USA, with offices in Washington, D.C., London, Hong Kong and Tokyo, (ISC)2 issues
the Certified Information Systems Security Professional (CISSP®) and related concentrations,
Certification and Accreditation Professional (CAPCM), and Systems Security Certified Practitioner
(SSCP®) credentials to those meeting necessary competency requirements. The CISSP, CISSP-ISSEP®,
CISSP-ISSAP® and SSCP are among the first information technology credentials to meet the stringent
requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying
personnel. (ISC)² also offers a continuing professional education program, a portfolio of education
products and services based upon (ISC)2’s CBK®, a compendium of information security topics, and is
responsible for the annual (ISC)² Global Information Security Workforce Study. More information is
available at www.isc2.org.

                                                        ###
© 2008, (ISC)2 Inc. (ISC)², CISSP, ISSAP, ISSMP, ISSEP, SSCP and CBK are registered marks and CAP is a certification
mark of (ISC)², Inc.

Más contenido relacionado

Destacado

Nixia (2)
Nixia (2)Nixia (2)
Nixia (2)magal94
 
Who is TelePacific?
Who is TelePacific? Who is TelePacific?
Who is TelePacific? k_graves
 
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)Sharon Gal Or
 
CV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HILCV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HILMade Suwandi
 
Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure Damien ARNAUD
 
Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016yStats.com
 
CTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letterCTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letterJonathan Sprague
 
Broch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_frBroch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_frMed Aymen Lejmi
 
MAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-studyMAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-studyManet Schuman
 
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...Damien ARNAUD
 
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)Alexander Sirotin
 
Sales Analysis spreadsheet group
Sales Analysis spreadsheet groupSales Analysis spreadsheet group
Sales Analysis spreadsheet groupChanel Vorster
 

Destacado (18)

Nixia (2)
Nixia (2)Nixia (2)
Nixia (2)
 
Who is TelePacific?
Who is TelePacific? Who is TelePacific?
Who is TelePacific?
 
My curriculum vitae
My curriculum vitaeMy curriculum vitae
My curriculum vitae
 
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)66 台灣龜   - 66 Taiwanese Turtles  by Galorian creations (Taiwanese)
66 台灣龜 - 66 Taiwanese Turtles by Galorian creations (Taiwanese)
 
Presentación de power point 2007
Presentación de power point 2007Presentación de power point 2007
Presentación de power point 2007
 
lko
lkolko
lko
 
CV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HILCV Made suwandi untuk luar HIL
CV Made suwandi untuk luar HIL
 
Applying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship FundingApplying Successfully for Graduate Scholarship Funding
Applying Successfully for Graduate Scholarship Funding
 
Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure Travaillons à rendre notre République meilleure
Travaillons à rendre notre République meilleure
 
Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016Product Brochure: Global E-Commerce Marketplaces 2016
Product Brochure: Global E-Commerce Marketplaces 2016
 
CTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letterCTI_Cardiff Scholarship letter
CTI_Cardiff Scholarship letter
 
La semiotica
La semioticaLa semiotica
La semiotica
 
Practica3 uisrael
Practica3 uisraelPractica3 uisrael
Practica3 uisrael
 
Broch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_frBroch commcollection19 plan_com_strategique_fr
Broch commcollection19 plan_com_strategique_fr
 
MAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-studyMAKNINE - resrch-li-mortality-delphi-study
MAKNINE - resrch-li-mortality-delphi-study
 
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
Marketing territorial : "c'est faire de la marqueterie avec les atouts du ter...
 
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
Бизнес завтрак газеты Metro Санкт-Петербург (ноябрь 2016)
 
Sales Analysis spreadsheet group
Sales Analysis spreadsheet groupSales Analysis spreadsheet group
Sales Analysis spreadsheet group
 

Similar a Csa Winners 2007

Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?InfosecTrain
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6hymasakhamuri
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfIgorSamuel12
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTopCyberNewsMAGAZINE
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...at MicroFocus Italy ❖✔
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsatlanticcouncil
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayGlib Pakharenko
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6César Celis
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 

Similar a Csa Winners 2007 (20)

Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
 
Sept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborneSept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborne
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ay
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Csa Winners 2007

  • 1. NEWS FOR IMMEDIATE RELEASE Contact: Stephanie Olsen or Mike Kilroy Maples Communications, Inc. (949) 855-3555 solsen@maples.com mkilroy@maples.com (ISC)2® ANNOUNCES WINNERS OF CYBER SECURITY AWARENESS CONTEST (ISC)² Donates US$5,000 to Winners for Their Commitment to Promoting Cyber Security for the Common Good PALM HARBOR, Fla., USA, Feb. 12, 2008 – (ISC)2® (“ISC-squared”), the non-profit global leader in educating and certifying information security professionals throughout their careers, today announced the winners of its Cyber Security Awareness Month contest, where top professionals from around the world submitted security awareness tools on an online repository free to the public. (ISC)²-certified members, representing preeminent information security experts from corporate, government and academic arenas spanning North America, Europe and Asia-Pacific, were invited to post materials that organizations and individuals could download to promote online safety at work or within the community. A total of 118 materials were uploaded to the (ISC)² Cyber Security Awareness Resource Center, including templates that can be customized by end users, such as posters, flyers, brochures, presentations and games. Winners were selected based on a combination of rankings and public downloads of their materials. Each will receive US$1,000 from (ISC)². The winners are: • Boris Loza, a CISSP based in Canada, for “Anti-Hacking School, Lessons One and Two” • Hayman Ezzeldin, a CISSP based in Germany, for “Backup Your Data!” poster • Jay Schwitzgebel, a CISSP-ISSMP based in the U.S., for a “Consumer Internet Security Awareness on Emerging Security Threats” presentation • Pedro Verdin Jimenez, a CISSP based in Mexico, for a Spanish-language presentation on cyber safety and security -more-
  • 2. (ISC)2® Announces Winners of Cyber Security Awareness Contest Page 2 • Nishidhdha Shah, a CISSP based in the U.S., for a presentation entitled “Approach to Information Security” Mr. Schwitzgebel commented, “There is a real need to educate people about the best way to protect themselves online. As a CISSP and security practitioner, I routinely network with my colleagues and share awareness materials for adapted re-use. “That the (ISC)² Cyber Security Awareness Resource Center facilitates such professional sharing, while also making the materials available to an even broader public audience, is a tremendous value to the security industry. I’m proud to be a member of an organization that has made awareness part of its core mission.” “Due to the success of the online resource center, we’ve decided to build out and enhance the site, keep it operational year-round and hold the contest again this year,” said Eddie Zeitler, CISSP, executive director of (ISC)2. “Our members have invaluable expertise and experience to share. The Cyber Security Awareness Resource Center is an important vehicle to make that knowledge available to the public for the greater cyber good.” To continue building the repository with compelling materials, (ISC)² plans to run the contest annually. To access the Cyber Security Awareness Resource Center, please visit www.isc2.org/csa. Another (ISC)² initiative to support Cyber Security Awareness Month included participation in National Cyber Security Awareness Day in Tallahassee, Fla. (ISC)2 Security Strategist and former White House cyber security advisor Howard Schmidt was joined by Miss America Lauren Nelson and Tallahassee Mayor John Marks at Florida State University to discuss ways families can better protect themselves from online threats. Sponsored by the National Cyber Security Alliance (NCSA), the event was part of a nationwide campaign to educate the American public, businesses, schools and government agencies about ways to secure their part of cyber space, computers and the nation’s critical infrastructure. Assuring public awareness of cyber security has become an official element of the (ISC)2 mission designed to enhance and support the information security profession. (ISC)2 has alliances with several organizations around the world who are committed to bring cyber security awareness to the public, including Childnet International and SCIPP International® and the Information Security Awareness Forum. Over 100 (ISC)2 member volunteers have received training from Childnet International, a charity whose mission is to work with others to help make the Internet a great and safe place for children, to give presentations on Internet safety to 11- to -more-
  • 3. (ISC)2® Announces Winners of Cyber Security Awareness Contest Page 3 14 year-old students in the United Kingdom. The program is expected to expand to schools in the U.S. and Asia later this year. SCIPP International, a global non-profit organization dedicated to providing world-class security awareness training and certificates for end users, has invited Zeitler to sit on their advisory board to provide counsel and exchange ideas between the two organizations. John Colley, CISSP, managing director for (ISC)² EMEA, represents (ISC)² as a founding member of the Information Security Awareness Forum, a cross-industry initiative supported by former UK Home Secretary David Blunkett and organized by the Information Systems Security Association (ISSA) UK Chapter Advisory Board. In January, (ISC)² also launched a pilot program in Hong Kong, “Youngsters Information Security Awareness Program”, in conjunction with its Hong-Kong based Affiliated Local Interest Group, the Professional Information Security Association (PISA), the Hong Kong Office of Government Chief Information Officer (OGCIO) and the Hong Kong Police. The program aims to promote information security awareness to local students through school tours. To date, volunteers have reached approximately 300 students. (ISC)2 and its members are also advocates for, participate in and sponsor a number of year-round security-related events throughout the world that support security awareness, including: • Safer Internet Days in the EU • Clean PC Day in Hong Kong • Global Security Week in New Zealand • Computer Security Day in the U.S. About (ISC)² The International Information Systems Security Certification Consortium, Inc. [(ISC)2®] is the internationally recognized Gold Standard for certifying information security professionals. Founded in 1989, (ISC)² has certified over 57,000 information security professionals in 135 countries. Based in Palm Harbor, Florida, USA, with offices in Washington, D.C., London, Hong Kong and Tokyo, (ISC)2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, Certification and Accreditation Professional (CAPCM), and Systems Security Certified Practitioner (SSCP®) credentials to those meeting necessary competency requirements. The CISSP, CISSP-ISSEP®, CISSP-ISSAP® and SSCP are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers a continuing professional education program, a portfolio of education products and services based upon (ISC)2’s CBK®, a compendium of information security topics, and is responsible for the annual (ISC)² Global Information Security Workforce Study. More information is available at www.isc2.org. ### © 2008, (ISC)2 Inc. (ISC)², CISSP, ISSAP, ISSMP, ISSEP, SSCP and CBK are registered marks and CAP is a certification mark of (ISC)², Inc.