HP Grants $250K to Scholarship for Women Studying IT Security


PALO ALTO, Calif., Feb. 24, 2014 — HP today announced that the company will grant $250,000 to the Scholarship for Women Studying Information Security (SWSIS) program, and will work closely with academic institutions worldwide to develop security-centric course content eligible for Certified Information Systems Security Professional (CISSP) credit.

The IT security jobs market will be 40 percent vacant in 2014, according to a new IT Security Jobs Study conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products. This gap in the labor force will continue to grow, compounding today’s reality that the adversary is innovating faster than the market can keep pace.

This new scholarship effort is part of HP’s larger academic initiative to enhance IT security education and training, and to address the industry’s urgent need for highly skilled security professionals. In addition to developing security-centric course content, HP will extend product accessibility to university classrooms, covering HP ArcSight, HP TippingPoint, HP Fortify and HP Atalla technology. Currently, more than 60 accredited universities have signed up for the program with HP, including the University of North Carolina Charlotte, University of California Berkeley and the University of Michigan.

“The security industry has a pressing need for skilled security talent that can function fluidly in today’s environment,” said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. “With this new educational program, HP will support security career growth and introduce new talent to the field.”

SWSIS Scholarship Details

The SWSIS program was founded by the Applied Computer Security Associates (ACSA), a non-profit organization dedicated to improving the understanding, theory and practice of cybersecurity. The SWSIS Scholarship program will be a joint effort between HP, the ACSA and the Computer Research Association’s Committee on the Status of Women in Computing Research (CRA-W).

  • While there is no preset scholarship amount, HP funds will be allocated to the ACSA over a four year period and awarded in the amount of $5-10K per individual.

  • For each individual, the scholarship is effective for two years, but the student must re-apply after the first year to confirm continued interest in the security domain.

  • Scholarship winners will have the option to intern at HP, although it is not a mandatory requirement.

  • To apply, candidates will need to provide a statement of interest in the field of information security, a transcript and a statement of their current educational status.

  • CRA-W will review applications and recommend one or more outstanding candidates to the ACSA to receive scholarship funding.

  • Applications will be accepted during the spring, and awarded scholarships will be for the academic year the following fall term.

Addressing the Skills Gap

The evolving threat landscape is driving the need for increased security support and protection within organizations, as highlighted by the IT Security Jobs Study. To gain a clear understanding of what the IT security jobs landscape looks like moving into 2014, and to identify the key challenges the industry is facing in filling and maintaining security roles within organizations, the Ponemon Institute surveyed more than 500 human resources and IT security specialists. Key findings from the study include:

  • The IT security jobs market will be 40 percent vacant in 2014. Furthermore, 58 percent of jobs at the supervisory level remain unfilled, with 56 percent of organizations surveyed reporting that they do not have a chief information security officer (CISO) as part of their C-suite.

  • IT security professionals don’t have a clear professional development track. Only 32 percent(1) of organizations view IT security as a career path, which may discourage candidates from entering the field.

  • Degree programs are important for IT security candidates. The completion of a recognized college or graduate-level degree program is important to the hiring process for 84 percent of organizations – and essential to 14 percent.(1)

  • Hiring packages may be missing features needed to attract quality candidates. 51 percent of IT security employees are paid more than other IT employees – yet 43 percent of respondents indicated that the main reason for high vacancy rates in security is the inability for organizations to offer a competitive salary.(1)

  • Senior IT security jobs are difficult to fill, leaving organizations with a lack of highly skilled security professionals. On average it takes five months to fill a staff level position, but it takes nine months to a year to fill a senior level position.(1)

  • Placeholder for gender stat

In addition, the Ponemon Institute conducted a survey among approximately 2,000 certified IT security professionals to develop an objective rankings list for universities that offer cyber security courses and degree programs. The University of Texas San Antonio, Norwich University and Mississippi University ranked in the top three.

Related Projects