(ISC)² Women in Information Security Scholarships

Centre for Cyber Safety and Education
Deadline:  21st February
Results on:  01st September

Computers
All Nationalities
B.Tech. (Bachelor of Technology),M.Tech. (Master of Technology),B.Arch. (Bachelor of Architecture),M.Arch. (Master of Architecture),M.Plan. (Master of Planning),B.Plan. (Bachelor of Planning),B.Com. (Bachelor of Commerce),M.Com. (Master of Commerce),B.Voc. (Bachelor of Vocation),M.S. (Master of Surgery),M.Phil. (Master of Philosophy),M.B.A. (Master of Business Administration),B.Sc. (Bachelor of Science),M.Ed. (Master of Education),B.B.A. (Bachelor of Business Administration),B.F.Tech. (Bachelor of Fashion Technology),M.S. (Master of Science),M.Des. (Master of Design),B.F.Sc. (Bachelor of Fishery Science),M.C.A. (Master of Computer Applications),B.H.M. (Bachelor of Hotel Management),B.Des. (Bachelor of Design),B.Text. (Bachelor of Textile),M.Optom. (Master of Optometry),M.P.H. (Master of Public Health),M.Voc. (Master of Vocation),M.H.R.D.M. (Master in Human Resources Development Management),B.Pharm. (Bachelor of Pharmacy),M.Ch. (Master of Chirurgiae),B.B.I. (Bachelor of Banking and Insurance),M.Sc. (Master of Science),M.Text. (Master of Textile)
United States

Scholarship Overview

Every year, up to 10 (ISC)² Women in Information Security Scholarships are awarded to meritorious female students who wish to pursue careers in Cybersecurity or Information assurance. This scholarship programme is administered by the Centre for Cyber Safety and Education. Female students who wish to pursue higher education anywhere in the world are eligible to apply. This scholarship is applicable for Bachelors Degree, Masters Degree only.

Shortlisting Process

The selection of scholars for the (ISC)² Women in Information Security Scholarships involves a multi-stage process. The scholars will be selected after a thorough assessment of all the applicants. Scoring will be based on three categories:

  • Passion
  • Merit
  • Financial Need

Terms and Conditions

The continuation of the scholarship depends on the good academic performance of the scholars in the examinations conducted by their respective universities.

Renewal cases of stipend holders who are not promoted to the next year will not be considered for further renewal.

 

Eligibility

  • Applicants:
    • Must be pursuing, or plan to pursue, a degree with a focus on cybersecurity or information assurance.
    • Maybe a senior in high school, an undergraduate student, graduate or postgraduate student to be eligible.
    • Must have achieved or maintained a GPA of at least 3.3 on a 4.0 scale (or an analogous rank based on a comparable scale).
    • May be attending on campus or online.
    • May be attending full time or part-time.
    • May be attending in the US or Internationally.
  • Applicants do not currently need to be enrolled, however, no awards will be disbursed until the recipient is enrolled in a college or university

How To Apply

This scholarship needs a separate external application.

Application Documents

  • One Letter of Recommendation outlining the following:
    • How long have you known the applicant and in what capacity?
    • What skills or abilities does the applicant have that will support him/her in completing a degree?
    • What other information about the applicant should be taken into consideration?
    • NOTE: Academic references are preferred; however, you may submit a professional letter of reference addressing the points above.
  • Essay questions to be filled out in application:
    • Tell us why you should be chosen to receive this women's cybersecurity scholarship and what makes you stand out from your peers?
    • Describe why you need the scholarship.
    • Describe your personal and educational backgrounds.
    • What - or who - inspired you to pursue a career in cybersecurity? What makes you a candidate for success in information security and what are your goals for your professional career.
    • When you graduate and secure a career in our industry, what steps can you take to “pay it forward” by supporting other women (currently in school, recent graduates, mid-career transition) new to our field? 
    • Describe any contributions to the cybersecurity field i.e., volunteer work, articles, etc., and any other hobbies or extracurricular activities and what they mean to you. (Do not include links to articles).
  • Resume/CV – No more than 3 pages maximum. Do not include links to publications.
  • Unofficial transcripts from your current (or most recent) educational institution. If awarded; no funds will be disbursed until official transcripts have been received