Sign up for an invitation to apply! Our application season opens each spring, but it’s never too soon to collect references and transcripts.
To be eligible for an ISSAEF scholarship a student must be pursuing a career in computer science with a focus on information security or privacy, and must be an active, full-time undergraduate or graduate student in an information security related program. The applicant must fulfill the eligibility requirements as established by the ISSA Educational Foundation (ISSAEF) Scholarship Committee.
Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.
For additional assistance in financing your education, consider researching available support at FastWeb.com. For 15 years, Fastweb has been helping students realize their educational dreams free of charge. Their goal is to encourage every student to maximize their potential and improve their lives. They have now streamlined the application process for scholarship providers by matching only qualified applicants to relevant funding opportunities.
- Checks for approved grant or scholarship recipients are made payable to the educational institution the recipient will attend.
- Recipient will demonstrate an interest in Information Security, but need not be an ISSA member.
- Recipient must be enrolled in an accredited college or university that is authorized to confer degrees at or above the baccalaureate level.
Scholarship Eligibility Criteria is as Follows:
- Community service and extracurricular activities
- Security-related work experience and security coursework
- Have an undergraduate GPA of 2.5 or graduate of 3.0 or higher (on a 4.0 scale), averaged over the period of attendance at the current institution
- Be a full-time undergraduate or full-time graduate student in a degree program
- Be classified as a sophomore, junior or senior or enrolled in a Graduate program as of the semester in which the award is received.
- Submit a one-page letter describing applicant’s background, chosen academic program, interests and goals in the information security field
- Each scholarship applicant must submit a completed application, including a short biography, at least one letter of recommendation with two preferred, and unofficial transcripts of the current institution attended. At least one letter of recommendation must be from a current or former instructor/faculty, cybersecurity employer or cybersecurity association member.
- Final candidates may be asked to participate in a thirty-minute telephone interview with a Scholarship Committee member.
The Foundation Board of Directors and its Scholarship Committee serve as the selection board for all grants andscholarships.
Each scholarship recipient must be intending to pursue a career in the field of information security.
Recipients are encouraged to consider drafting an article for publication in the ISSA Journal, although this is not a requirement. The Foundation will assist in this effort, if desired.