Top of Page
 

Awards and Designations

ISLA AwardPeople, policies, and processes are the keys to protecting or securing information assets. (ISC)² offers several awards to recognize the people that make a difference in this ever evolving industry, honoring their tireless efforts and standards of excellence.

Harold Tipton Award

(ISC)² Harold F. Tipton Lifetime Achievement Award

The Harold F. Tipton Lifetime Achievement Award is awarded by the (ISC)² Board of Directors as the highest tribute bestowed in the information security industry. Named after Harold F. Tipton, CISSP, known as the “George Washington of information security,” the award is to honor his memory and tradition of passionately promoting and enhancing the information security and the information security profession. This award therefore recognizes member(s) for his or her lifelong contributions to the advancement of information security and the information security profession by serving, over the long term, with excellence and distinction.
  • Harold F. Tipton Award Criteria Harold F. Tipton Award Criteria
    (ISC)² certification is required to be eligible; the recipient must have demonstrated sustained excellence throughout their entire information systems security career.
  • Nomination Process Nomination Process
    • Candidates must be members in good standing , or a Fellow of (ISC)².
    • Any (ISC)² member can be nominated by either the members in good standing or by the Board Awards Committee.
    • The Awards Committee selects the recipients and puts forth a motion to the board for approval at the Q3 board meeting each year.
    • The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the
    • Awards Committee Nominations should be submitted to awards@isc2.org.
  • 2016 Award Recipient 2016 Award Recipient
    Howard Schmidt Professor Howard Schmidt – the award was presented by Wim Remes, Board Chairman in Orlando at the Q1 Board of Directors Dinner on 14 January 2017
  • Past Award Recipients Past Award Recipients
    • 2015 Dr. Frederick Piper
    • 2013 Dr. Eugene Spafford
    • 2012 Prof. Hiroshi Yasuda, Dr.E, CISSP
    • 2011 John O'Leary, CISSP
    • 2010 Lt. Col. Husin bin Jazri (Retired), CISSP
    • 2009 Sandra M. Lambert. CISSP-ISSMP
    • 2008 The late James R. Wade, CISSP-ISSAP, ISSMP
    • 2007 Dr. Jae Woo Lee, CISSP 2006 William H. Murray, CISSP
    • 2005 Dr. Willis H. Ware
    • 2004 Dr. Dorothy Denning, Fellow of (ISC)²
    • 2003 Donn B. Parker
    • 2002 Micki S. (Krause) Nozaki, CISSP
    • 2001 Harold F. Tipton, CISSP and Prof. Corey Schou, Ph.D., CSSLP, Fellow of (ISC)²

James R. Wade Service Award

The James R. Wade (ISC)² Service Award is awarded by the Board to acknowledge the involvement of those volunteers who merit special distinction for their sustained and valuable service to (ISC)². James R. Wade was an esteemed, long-time contributor to (ISC)², and it is our privilege to honor his memory with this award.

  • Award Criteria Award Criteria
    The award is given out to one person annually. (ISC)² certification is not required to be eligible; the recipient is a volunteer who has made a significant contribution to (ISC)².
  • Nomination Process Nomination Process
    • Any (ISC)² volunteer can be nominated by either the members or by the Board Awards Committee.
    • The Awards Committee selects the recipients and puts forth a motion to the board for approval at the summer board meeting each year.
    • The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the Awards Committee.
    • Awards Committee Nominations should be submitted to awards@isc2.org.
  • Past Award Recipients Past Award Recipients
    • 2017 F. Lynn McNulty
    • 2016 Professor Daniel Ryan
    • 2015 Dr. Peter Berlich
    • 2014 Meng Chow Kang, CISSP, CCSP
    • 2013 Diana-Lynn Contesti CISSP-ISSAP, ISSMP, SSCP, CSSLP
    • 2012 Rick Koenig, CISSP
    • 2011 Warren Pearce, CISSP
    • 2010 Richard Nealon, CISSP, SSCP
    • 2009 Benjamin H. Gaddy, Jr., CISSP, SSCP
    • 2008 Randolph N. Sanovic, CISSP-ISSAP, ISSMP

F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award

The (ISC)² F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award recognizes a member of the U.S. federal information security community who upholds McNulty's legacy as a visionary and innovator through outstanding service and commitment.

  • About Lynn McNulty About Lynn McNulty
    Lynn McNulty Photo

    "Lynn McNulty made a significant mark in his efforts to achieve the ambitious goal of building a professional government information security workforce and to strengthen the security posture of the country's information resources and infrastructure," says W. Hord Tipton, CISSP-ISSEP, CAP, CISA, executive director of (ISC)2. "One of Lynn's very tangible legacies was the GISLA program that he championed and which has since become one of the most coveted recognition programs for federal cybersecurity professionals today."

    McNulty was a true pioneer in government information security circles, having served in a number of critical and high-profile capacities, including as associate director for computer security at the National Institute of Standards and Technology, as the first information systems security director at the U.S. State Department and as director of government affairs for RSA.

    Known for his dedication to professionalizing the government workforce and often referred to by those within the community as the "pioneer" of government information security, Lynn had a tremendous impact on the entire industry. He passed away at the age of 73 on June 4, 2012.

    In recognition of all of his contributions, (ISC)² created the F. Lynn McNulty Tribute GISLA. Members of the (ISC)² U.S. Government Advisory Board hand-select a recipient for the Tribute Award annually.

    McNulty spent his post-government career working in key roles within (ISC)² including as a member of the (ISC)² Board of Directors, (ISC)² director of government affairs and founding co-chair of the (ISC)² U.S. Government Advisory Board for Cyber Security. His achievements were recognized with various designations, such as the exclusive Fellow of (ISC)², the ISSA Hall of Fame Award, the Cyber Security Hall of Fame, the Fed 100 Award, and as one of Federal Computer Week's top 25 federal IT influencers.

    In June 2012, McNulty was recognized posthumously with one of the industry's top honors, the RSA Lifetime Achievement Award.


  • 2018 Award Recipient 2018 Award Recipient

    Essye B Miller

    Acting Principal Deputy, Department of Defense Chief Information Officer


  • Past Award Recipients Past Award Recipients

    2017 Brig. Gen. (Ret.) Gregory Touhill, CISSP

    Former Federal Chief Information Security Officer.


    Richard Hale

    2016 Richard A. Hale 

    Richard Hale is the Deputy CIO for Cyber Security, Department of Defense. In this position he acts as the department’s Chief Information Security Officer. Mr. Hale is responsible for ensuring the department has a well defined and well executed cyber security program, and is responsible for coordinating cyber security standards, policies and procedures with other federal agencies, coalition partners and industry.


    Hord Timpton

    2015 Hord Tipton 

    W. Hord Tipton, CISSP, former executive director, (ISC)², was the first government CIO to obtain a CISSP, helping to bring high-profile attention to the need for a more professionalized information security workforce. Hord has been instrumental in fostering the security education and certification of hundreds of thousands of individuals worldwide. He has dedicated his life to the advancement of the information security profession in the U.S. government and beyond, and is considered one of the most influential people in security


    Bobbie Stempfley

    2014  Roberta "Bobbie" Stempfley 

    Ms. Stempfley came to DHS in 2010 to serve as the director for the National Cyber Security Division (NCSD), and she was later selected to serve as the deputy assistant secretary for Cybersecurity and Communications (CS&C). Thanks to her vision and tenacity, the CS&C - now comprised of five divisions -- leads interagency and public-private initiatives that enable all to better secure their parts of cyber space.


    Ron Ross

    2013 Dr. Ronald "Ron" Ross 

    Dr. Ross, senior fellow at the National Institute of Standards and technology (NIST), played a key role in establishing cyber security requirements for federal agencies for decades. By honoring Ron with this designation, we are ensuring that Lynn's legacy of influence and commitment to government information security is recognized for years to come.


The (ISC)² President's Award

The (ISC)² President’s Award recognizes volunteers who have made a significant impact on and/or contribution to (ISC)² through their dedicated volunteer efforts throughout the past year. Multiple recipients are chosen annually for each region at the sole discretion of (ISC)²’s CEO.

  • 2018 Award Recipients 2018 Award Recipients

    Kevin L. Jackson, CISSP, CCSP

    Founder & CEO, GovCloud Network

     

    Presented at 2018 ISLA Government ceremony

     

     

    Wilson España, CISSP

    Deputy Manager of Information Security and Fraud Prevention, REDBANC S.A.

     

    Presented at 2018 ISLA Americas ceremony

     

  • Past President's Award Recipients Past President's Award Recipients
    • Pete Gouldmann, CISSP
    • Glenn Leifheit, CISSP, CSSLP
    • Bart Lauwers, CISSP
    • Sandy Bacik, CISSP
    • Peter Berlich, CISSP
    • Neil Breden, CISSP
    • Devon Bryan, CISSP
    • Edmund Chua, CISSP, CSSLP
    • David Church, CISSP
    • Diana-Lynn Contesti, CISSP
    • Frank Dey, CISSP
    • James Doyle, CISSP
    • Peter Drabwell, CISSP
    • Art Friedman, CISSP
    • Simone Gauthier
    • Jakob Frydendal Gercke, CISSP
    • Adam Gordon, CISSP-ISSAP, ISSMP, SSCP
    • Kevin Gourlay, CISSP
    • Richard Harrison, CISSP
    • Scott Hayden, CISSP
    • Stephen Hernandez, CISSP, CAP, SSCP, CSSLP
    • Chuan-Wei Hoo, CISSP
    • S.C. Leung, CISSP
    • Sujit Christy, CISSP
    • Eric A. Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CCSP
    • Steve Hindle, CISSP
    • Prinya Hom-Anek, CISSP
    • Sung Jae, Joo
    • Randy Johnson, CISSP
    • Robert Johnston, CISSP
    • Hye Jung, Yang (Ms)
    • Meng Chow Kang, CISSP
    • Gurdeep Kaur, CISSP
    • Ang Hock Kheng
    • David Krehnke, CISSP
    • Simon Philip Lamb, CISSP
    • Richard Lane, CISSP
    • Howard Lau, CISSP
    • Jae-Woo Lee - Honorary CISSP
    • Richard Nealon, CISSP
    • Anthony Lim, CSSLP
    • Eamonn McCoy, CISSP
    • James McQuiggan, CISSP
    • James Molini, CISSP, CSSLP
    • Henry Ng, CISSP-ISSAP
    • Stanley M. Ng, CISSP
    • Tae Soon Park
    • Matthew Parker, CISSP
    • Manoranjan Paul, CISSP, CSSLP
    • Warren Pearce, CISSP
    • Wasantha Perera, CISSP
    • Ralph Poore, CISSP
    • Rainer Rehm, CISSP
    • Martin Reynolds, CISSP
    • Brian Shorten, CISSP
    • Chester Soong, CISSP
    • Richard Starnes, CISSP
    • Tony Vargas, CISSP-ISSAP, CSSLP
    • Yi Wan Suck
    • Freddy Tan, CISSP
    • Dan Waddell, CISSP, CAP
    • Tim Wilson, CISSP
    • Dr. Duan Hai Xin, CISSP
    • Jong Youn, Kim
    • Chung Wei Paul Wang, CISSP


ISLA Americas

The call for nominations for the eighth annual (ISC)² Information Security Leadership Awards (ISLA) Americas Program is now closed. Held annually by (ISC)² in cooperation with the North and Latin American Advisory Councils, the ISLA Americas Program recognizes information security and management professionals throughout the private and public sectors in North, Central and South America, with the exception of the U.S. federal government (recognized through the ISLA Government Program), for their outstanding leadership and achievements in workforce improvement.

  • Award Categories Award Categories
    • Senior Information Security Professional (examples include: CSO, CISO, information security manager or senior security manager with significant information security management responsibilities) who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
    • Information Security Practitioner who has distinguished themselves for implementing and/or managing the implementation of a component of a security program (examples include: managing a security awareness and training program and, conducting difficult, complex security evaluations) Candidates in this category typically should have at least three years of work experience directly related to information security.
    • Up-and-Coming Information Security Professional who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational work (e.g., university research project, implemented emerging technology, or outstanding work in security operations).
    • Community Awareness - A project, initiative or program represented by information or non-information security personnel who have significantly contributed to building or broadening security awareness in the local or information security community within the last 12 months.

    Submissions must align with the category for which they are nominated and are judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the ISLA Americas Judges Committee to confirm the accuracy of the information provided.

    The awards luncheon is open to the All Access Pass at Security Congress with roughly 2,000 attendees. It takes place on Tuesday, October 9th as a plated luncheon at the New Orleans Marriott.

    If you are interested in sponsoring, please see our Sponsorship Opportunities.

  • 2018 ISLA Americas Award Recipients 2018 ISLA Americas Award Recipients

    The 2018 ISLA Americas winners are as follows:


    Community Awareness:

    Joseph Carson, CISSP

    Chief Security Scientist, Thycotic

    Project/Initiative: Cyber Security for Dummies

     

     

    Information Security Practitioner:

    Domingo Castillo, CISSP

    AVP Regional Information Security Officer, Chubb

    Project/Initiative: Information Security Technology Convergence

     

     

    Senior Information Security Professional:

    Rinki Sethi, CISSP

    Vice President of Information Security, Palo Alto Networks

    Project/Initiative: Security Education Growth Initiative

     

     

  • 2018 Judging Committee 2018 Judging Committee

    Chuck McGann, CISSP
    Chief Operating Officer, The McGann Group LLC

    Mr. Chuck McGann is a nationally awarded security professional with over 40 years in the technology field. He retired as the Corporate Information Security Officer from the USPS in 2014 and moved into the private sector working with government and commercial clients looking to increase their security capability. Mr. McGann was a member of the Government Advisory Council for 10 years, seven of those years he was a GISLA Judge and 2 years as the Co-Chair of the GAC. Chuck is currently a Cybersecurity Consultant and a Cybersecurity Instructor for EC-Council and Learning Tree International and is the COO for The McGann Group LLC, a small consulting firm in Raleigh NC.

    Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, SSCP, CSSLP
    CEO, DLConsulting Inc.

    Diana-Lynn Contesti is currently an independent contractor focusing on Critical Infrastructure. Previously, Ms. Contesti was the CISO for a Fortune 100 company. Ms. Contesti has done security presentations globally.

    She served on the (ISC)² Board of Directors and during her tenure, she held various positions including Chairperson of the (ISC)² Board, Treasurer, Secretary and lead a number of committees. Ms. Contesti played a key role in the implementation of the Women's Scholarship. In January, 2017, Ms. Contesti was named to the Fifty Top Women in Internet Security. She holds multiple certifications including the CISSP, ISSAP, ISSMP, SSCP and CSSLP.

    Glenn Leifheit, CISSP, CSSLP
    Senior Security Engineering Program Manager, Microsoft

    Glenn Leifheit is a Senior Security Engineering Program Manager within the Microsoft Customer Security and Trust (CST) organization where he currently leads large cross-company security initiatives. Mr. Leifheit has more than 22 years of experience in technology including software, financial and healthcare industries. His experience covers providing C-level security guidance, acting as a cross-team business security liaison, driving static code analysis across the enterprise, leading application security and PCI programs, as well as architecture and design of large scale applications and associated infrastructure.

    Hillary Lewis J.D., MBA, CISSP
    Information Risk Manager, Freddie Mac

    Hillary is a technology-focused leader who has served in key executive roles including CEO of a Washington, DC based Health IT Consulting firm, Chief Privacy and Security Officer for a technology startup out of the University of Texas Medical School and Senior Official for Privacy at the Office of the Inspector General for the US Department of Health and Human Services. Her particular expertise is in building collaborations and coalitions to bridge the gap between technology and business and enable innovation.

    James R. McQuiggan, CISSP
    Product & Solutions Security Officer, Siemens Gamesa Renewable Energy

    James appreciates the (ISC)² community as he is the President of the (ISC)² Central Florida chapter. In 2016 he was the (ISC)² President’s Award winner for his valuable contributions toward advancing the information security profession. In 2017 he was awarded the first ever Julie Peeler Franz “Do it for the Children Award” as Volunteer of the Year for his work with the Safe & Secure Online Education program. He is also a member of the (ISC)² North American Advisory Council.

  • ISLA® Americas Sponsorship Opportunities ISLA® Americas Sponsorship Opportunities

    ISLA Americas VIP Sponsor: $7,500 (limit 1)

    • VIP room signage, inside and outside room
    • Table tents to include “Refreshments sponsored by “SPONSOR”
    • Company logo, description and link listed on ISLA Americas website
    • Two (2) seats at ISLA Americas ceremony
    • Sponsor attendance of two (2) individuals at pre-ceremony VIP gathering
    • Verbal recognition from podium by Master of Ceremonies during ceremony
    • Company logo in PowerPoint presentation at awards ceremony

    Platinum Sponsor: $8,500 (limit 1)

    • Company logo, description and link on ISLA website
    • One table positioned front and center or option to sit executives at winner / finalist tables (8 seats)
    • Two corporate executives seated at Gala VIP table
    • Verbal recognition from podium by Master of Ceremonies
    • Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
    • Company logo on reception signage
    • Company logo in PowerPoint presentation at awards ceremony
    • Opportunity for a corporate executive to briefly address attendees before the ceremony begins
    • Opportunity to supply each seat with a token corporate gift

    Gold Sponsor: $6,500 (limit 2)

    • Company logo, description and link on ISLA website
    • One table positioned in prime location (8 seats)
    • Verbal recognition from podium by Master of Ceremonies
    • Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
    • Company logo on reception signage

    Silver Sponsor: $4,000 (limit 3)

    • Company logo, description and link on ISLA website
    • Half-table at Ceremony (4 seats)
    • Verbal recognition from podium by Master of Ceremonies

 

ISLA Asia-Pacific

The (ISC)² Asia-Pacific Information Security Leadership Achievements (ISLA®) program is held annually by (ISC)² in cooperation with the (ISC)² Asia-Pacific Advisory Council to recognize outstanding leadership and achievements in workforce improvement and foster public awareness of cyber, information, software and infrastructure security professionals, educators and management throughout the Asia-Pacific region.

The (ISC)² 12th ISLA Asia-Pacific award presentation gala dinner will be held at Conrad Hong Kong on the evening of July 9, 2018. The Gala will be by invitations only: invitations will be extended to award honorees and their guests, judges of ISLA Asia-Pacific, members of the Asia-Pacific Advisory Council, the (ISC)² Board of Directors, VIPs and guests from local and regional government agencies and other influential members of the security profession.

View the 2018 ISLA Asia-Pacific honorees here.

  • Nomination Categories Nomination Categories
    • Information Security Educator
      An individual who has significantly contributed to the enhancement of education on cyber/ information/software/ infrastructure security for the workforce (examples include: Full-time Teaching Staff/Lecturer/Professor/Dean in tertiary education on the subject of cyber, information, software or infrastructure security at the department of Information Assurance/ Computer Science/ Cyber Security/ Electronic Engineering/ Information & Communication Technology/ Information Technology/ Information Management or any faculty that is related to cyber, information, software or infrastructure security). Candidates in this category typically should have at least 10 years of full-time teaching experience, 7 of which are related to cyber/ information/ software/ infrastructure security. Research experience in any cyber/ information/ software/ infrastructure security topic is required, at least 10 years of postdoctoral experience is preferred.
    • Senior Information Security Professionals
      An individual who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (examples include: CSO, CISO, information security director, designer, architect or manager with significant security project lead responsibilities). Candidates in this category typically should have at least 10 years of work experience, 7 of which are directly related to cyber/ information/ software/ infrastructure security.
    • Managerial Professional for an Information Security Project
      An individual with managerial position who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (candidates who are not cyber/ information/ software/ infrastructure security practitioner but involve in professional work for management of security project examples include: CEO, CIO, CFO, program/project manager, etc.). Candidates in this category typically should have at least 10 years of work experience and occupy a senior management level position within their organization.
    • Information Security Practitioner
      An individual who has distinguished him/herself for implementing and/or managing the implementation of a component of a cyber/ information/ software /infrastructure security program (examples include: an executive or officer managing a security awareness and training program, conducting difficult, complex security executions and evaluations, etc.). Candidates in this category typically should have at least 6 years of work experience, 3 of which are directly related to cyber/ information/ software/ infrastructure security.
  • Judging Criteria for Honoree, Showcased Projects & Special Recognition Judging Criteria for Honoree, Showcased Projects & Special Recognition

    (ISC)² will honor all candidates who have attained the requirements set by the nomination review committee as 'Honoree'. Amongst all the Honorees, (ISC)² will highlight an initiative, program or project conducted by at least one Honoree from each of the categories. The criteria for showcasing these initiatives are:

    • Impact: The impact the initiative, program; or project had on the organization and/or community
    • Implementation: How the initiative, program; or project leveraged people, processes, and technology for successful implementation
    • Innovation: Innovative approaches to overcoming obstacles or how the initiative, program, or project built a foundation for workforce improvement in the future
    • Dedication: Distinctive achievement to the workforce or industry that was outside one's regular job responsibility
    • Research: Outstanding research experience or outcome on any cyber, information, software or infrastructure security topic

    Special Recognition - Community Service Star

    In an effort to bolster public awareness of information security throughout the region, ISLA Asia-Pacific will recognize an honoree's project which has significantly contributed to building or broadening security awareness within their community or beyond within the last 12 months.

    For enquiries, please email the ISLA Asia-Pacific team at isla.apac@isc2.org or call 852.5808.5352.

    Close of Nomination for 2018, April 3, 2018. Questions? Email isla.apac@isc2.org

  • FAQs FAQs
    Q:

    Why has (ISC)² created the Information Security Leadership Achievements (ISLA) program in Asia-Pacific? Is it just for the benefit of (ISC)² certifications?

    A:

    People are the key to a secure organization. Since its inception in 2007, the ISLA Asia-Pacific program has been created to recognize all cyber, information, software, infrastructure security professionals or educators or management professionals' outstanding efforts in the field with particular focus on workforce improvement. While nominees may hold one of our certifications, the program is designed to raise awareness of the many successes and achievements of professionals in this industry, regardless of their certification status.

    Q:

    Is ISLA sponsored by any commercial organizations?

    A:

    (ISC)² is currently seeking ISLA sponsorship from organizations who want to join in the mission of creating awareness for the outstanding work of cyber/ information/ software/ infrastructure security professionals in the Asia-Pacific region. For more details, please contact isla.apac@isc2.org

     

    Q:

    Are professionals who hold either a non- (ISC)² certification or no certification at all eligible for ISLA Asia Pacific?

    A:

    Yes. ISLA Asia-Pacific is open to all cyber/ information/ software/ infrastructure security professionals or educators or management who meet the criteria and is independent of certification.

     

    Q:

    Can I nominate myself?

    A:

    No. A supervisor, employee, mentor, peer or colleague that is aware of the nominee's successes and achievements must submit the nomination. The ISLA Asia Pacific Nomination Review Committee will evaluate all submissions based on the feedback from the nominator and other input that is included in the submission.

     

    Q:

    Can I nominate a member of the Nomination Review Committee or the (ISC)² Asia-Pacific Advisory Board (APAC)?

    A:

    Yes. You can nominate a member of the Nomination Review Committee or (ISC)² APAC. However, once a member of the Nomination Review Committee accepts the nomination, they will need to excuse themselves from the Committee.

     

    Q:

    Does ISLA Asia-Pacific recognize individuals only? Can the project that the person involved will be recognized?

    A:

    The purpose of ISLA Asia-Pacific is to recognize qualified nominees for their individual accomplishments. In addition, with the permission of the nominees and nominator, ISLA Asia-Pacific will mention the project that he or she works for. (ISC)² will also showcase several projects, at least one from each category, by ISLA Asia-Pacific nominees during the ISLA Asia-Pacific Ceremony.

    Q:

    Is there a limit to the number of nominees who will be recognized this year?

    A:

    No. All nominees who meet the qualification criteria will be recognized.

     

    Q:

    If the person I nominate is not aware of the nomination, can he/she decline the recognition?

    A:

    The nominee can choose not to participate at any stage during the process.

     

    Q:

    I am planning to nominate someone, but I am not sure if the company wants the project to be mentioned (as it is company confidential information). Will (ISC)² accept a nomination form without the project's details?

    A:

    No. If the nominee does not want some of the information on the application known, the nominator may indicate which parts of the application should be kept confidential. Further, the information will only be used to judge against criteria and will not be distributed outside of the committee or announced publicly without express consent of the company and the nominee. The members of the Nomination Review Committee are members of (ISC)²'s Asia-Pacific Advisory Council or previous ISLA Asia-Pacific Honorees and must abide by (ISC)²'s non-disclosure policy. In addition, (ISC)² has a strict privacy policy and will respect all requests for confidentiality.

     

    Q:

    Can I submit the application form in a language other than English?

    A:

    No. All submissions should be in English. Please provide a brief description of supporting document and any material submitted in English if only local language is available, otherwise the supporting document or the material submitted not in English would not be considered.

     

    Q:

    How does the review process work? Do I need to meet with the Nomination Review Committee in person? Do I need to provide follow-up information to the Committee?

    A:

    All the completed nomination forms are sent to the Nomination Review Committee during the review session. The committee members will review the applications individually. A group discussion will be held to review each of the applications in all program categories. At the review session, the committee will determine whether a nominee meets the qualification criteria and select the at least one individual from each category whose project initiative will be showcased at the ISLA Asia-Pacific Ceremony. It is not necessary to interview the nominees in person. For certain circumstances, if the committee has a specific question, a representative from (ISC)² will contact the nominee. All nominees who meet the criteria will be honored at the ISLA Asia-Pacific Ceremony.

     

    Q:

    Will the marking scheme the Nomination Review Committee uses be made public? Will (ISC)² share the final scores with the nominees?

    A:

    The results of the committee's review session are kept confidential and will not be shared with anyone other than the (ISC)² ISLA Program Committee and the Nomination Review Committee.

     

    Q:

    When will the results be announced?

    A:

    After the review session, all qualified nominees will be notified by (ISC)² of the recognition results individually in early June 2018. The official press release would be announced in June 2018.

     

    Q:

    When/Where is the ISLA Asia-Pacific Ceremony being held?

    A:

    The (ISC)² 12th ISLA Asia-Pacific award presentation gala dinner will be held at Conrad Hong Kong on the evening of July 9, 2018. The Gala will be by invitations only: invitations will be extended to award honorees and their guests, judges of ISLA Asia-Pacific, members of the Asia-Pacific Advisory Council, the (ISC)² Board of Directors, VIPs and guests from local and regional government agencies and other influential members of the security profession.

     

    Q:

    If I qualify for ISLA Asia-Pacific and I am invited to the ISLA Asia-Pacific Ceremony, who will pay for my travel and lodging expenses? Can I get a complimentary seat at the (ISC)² Security Congress APAC? What if I cannot attend the ceremony?

    A:

    All qualified nominees (Honorees) will be invited to attend the ISLA Asia-Pacific gala dinner and award presentations ceremony. Each nominee is responsible for their own travel and lodging to the ISLA Asia-Pacific Ceremony. Fees for the (ISC)² Security Congress APAC and the ISLA Asia-Pacific Ceremony will be waived for all invited nominees.

    Nominees who cannot attend the ISLA Asia-Pacific Ceremony will still be recognized. (ISC)² requests that an absent nominee send a representative to attend on their behalf. If a representative is sent, the ISLA Asia-Pacific program will be complimentary. If the nominee's representative wants to attend the (ISC)² Security Congress, they will be responsible for paying the discounted conference fees.

     

    Q:

    Can I be nominated for ISLA Asia-Pacific again next year if I win this year?

    A:

    A nominee can participate in the award program each year if they qualify. If a nominee was showcased this year, the Nomination Review Committee would like them to consider serving on the Nomination Review Committee in the future. If they agree to serve on the committee, they will not be eligible to participate as a nominee during that year.

     

  • 2018 ISLA Asia-Pacific Showcased Honorees and Honorees 2018 ISLA Asia-Pacific Showcased Honorees and Honorees

    Showcased Honorees

    Information Security Educator Category



    Prof. Ryoichi Sasaki
    Special Full-time Professor
    Tokyo Denki University
    Showcased Project: CySec, a Course of Human Resource Development Focusing on Cybersecurity Conducted by Tokyo Denki University

    Managerial Professional For An Information Security Project Category



    Manoj Abraham
    Inspector General of Police & Nodal Officer, Cyberdome
    Kerala Police
    Showcased Project: Kerala Police Cyberdome - A Public Private Partnership Initiative for Cybersecurity

    Senior Information Security Professional Category


    Community Service Star special recognition

    Hikohiro Y Lin
    Head of Panasonic PSIRT and General Manager of Product Security Global Strategy Office
    Panasonic
    Showcased Project: Building and Planning the Security Assessment Technology and Manufacture Strategies to Improve the Capability of Product Security (IoT Security)

    Information Security Practitioner Category


    Seungyeon Han
    Assistant Manager
    Korea Southern Power Co., Ltd
    Showcased Project: Enhancing the Security of National Critical Infrastructure and Industrial Control System (ICS)

    Honorees

    Managerial Professional For An Information Security Project Category


    Nick Charnley, BMechEng(Hons)
    Deputy Director - Group Cyber Security
    CLP Holdings


    Goh Eng Choon
    Deputy President, Cybersecurity Systems Group and General Manager, Info-Security
    ST Engineering Electronics


    Soon Dol Hong
    Director for ICT Management
    Ministry of Justice


    Yuichi Kuramoto, CISSP
    CEO
    White Motion

    Senior Information Security Professional Category


    Shinji Abe, CISSP
    Director
    NTT Security (Japan) KK


    Wai Keung Liu, CISSP, ISSAP, CRISC
    Head of Information Security Risk Management
    DBS Bank (Hong Kong) Limited


    Dr. Jaemo Seung, CISA, CISO, CPO
    Vice President
    Samsung Card Co., Ltd


    Yong Seok Shin
    CISO
    Viva Republica Co., Ltd.


    Dr. Ming-Kung Sun, Lead Auditor ISO 27001, CEH, CHFI
    Senior Manager
    Acer Cyber Security Inc.


    Yudong Zhang
    Senior Director
    Alibaba Group

    Information Security Practitioner Category


    Minseok Cha
    Senior Principal Malware Researcher
    AhnLab


    Mayumi Hirata
    Representative/ Community Organizer
    Mew Labo


    Hayato Kiriyama, CISSP, CISA, MBA
    Senior Security Solutions Architect
    Amazon Web Services Japan K.K.

  • 2018 Nomination Review Committee 2018 Nomination Review Committee
    Dr Jae-Woo Lee Photo

    Dr Jae-Woo Lee, Fellow of (ISC)², CISA, CISM
    Chair Professor Graduate School of International Affairs and Information, Dongguk University 

    Dr. Jae Woo Lee is Chair Professor at Dongguk University, and president of the Cyber Forensic Professional Association Korea. He is also chairperson of the (ISC)² APAC and Advisory Board of CISO Association in Seoul. Following his retirement from his position as a major general in the Korean Air Force, Dr Lee pursued his career in the information security profession. He was the first president of the Korean Information Security Agency and an organizer of the Korean National Computerization Agency. He holds a Master of Science degree in systems management from the University of Southern California, U.S.A. and a doctorate degree from Konkuk University in Korea.
    Kamlseh Bajaj Photo

    Dr. Kamlesh Bajaj, Ph D
    Mentor Professor, NIIT University

    Dr. Kamlesh Bajaj holds a Ph.D. (Physics) from McMaster University, Canada; and a Masters degree in Physics from the University of Delhi. He is a Fellow of the National Academy of Sciences (FNASc), and a Fellow of the Institution of Electronics Engineers (FIETE). He is also a Distinguished Fellow, EastWest Institute, New York. Dr. Bajaj was the Founder CEO of Data Security Council of India – an industry initiative - in cyber security and data privacy. At DSCI, Dr. Bajaj guided the development of best practices Frameworks for data security and privacy protection. He has served on various Government Committees on cyber security, privacy and ICT, and contributed to the activities of global bodies like OECD and EWI. He was also the Founder Director of the Indian Computer Emergency Response Team (CERT-In); he directed the cyber security initiatives in the government. He has published and lectured extensively on the IT Act 2000, cyber security and cyber crimes, privacy and data protection, Internet governance, e-commerce, digital signatures, in national and international journals and conferences. He has authored two books, and co-authored two books. Dr Bajaj also helped set up the techno-legal infrastructure for PKI in the country. He also served as Global Head, Information Risk Management Consulting Practice, Tata Consultancy Services.
    Prinya Hom-anek Photo

    Prinya Hom-anek, CISSP, CSSLP, SSCP, SANS GIAC GCFW, CGEIT, CRISC, CISA, CISM
    President & Founder, ACIS Professional Center

    Mr. Prinya Hom-anek has over 20 years of experience in IT and information security, network and data communications, Internet and network security, information security, fraud and forensic investigation, penetration testing, ISMS, and generic information security consulting in both the public and private sectors. He is recognized as one of Asia-Pacific's leading information security professionals. Mr. Hom-anek founded and serves as the president for the most successful information security training, consulting, and managed security services provider in Thailand - "ACIS Professional Center" or "ACIS". He is also a senior IT and information security consultant for Thailand's government departments and agencies, including the Revenue Department, Ministry of Finance, Department of Special Investigation, Ministry of Justice, National Intelligence Agency, Bank of Thailand and several major banks in Thailand, Metropolitan Waterworks Authority, the Government Pension Fund, National Electronics and Computer Technology Center (NECTEC), and Software Park Thailand, National Science and Technology Development Agency (NSTDA). He currently serves as a senior committee member on various boards, including the (ISC)² Asian Advisory Board, the ISACA Thailand committee, and as secretary of the Thailand Information Security Association (TISA) committee. He has published over 130 information security articles in magazines and newspapers such as eEnterprise, eLeader, Telecom Journal, Thairath, DailyNews, The Nation, and Bangkok Post. He is frequently invited to appear on TV and radio programs and is a visiting lecturer at a number of universities and colleges within Thailand.
    Meng-Chow Kang's Photo

    Meng-Chow Kang, PhD, CISSP
    Head, Security Assurance, Asia Pacific Region, Amazon Web Services (AWS)

    Meng-Chow has been a practicing information security professional for more than 25 years with field experience spanning from technical to management in the various information security and risk management roles, including the Singapore government, major multi-nationals financial institutions, and global security and technology providers. His research and part of his experience in the field have been published in his book, "Responsive Security - Be ready to be secure", by CRC Press in Oct 2013. His contributions to the information security industry and community have also been marked by numerous industry awards.

    As leader of the security assurance team in AWS Asia Pacific, China, and Japan region, Meng-Chow works with customers to identify and address related concerns and needs in cloud computing security.

    Meng-Chow has been active in the information security community, and was elected as a Director of the (ISC)² Board effective Jan 2015, and recipient of the (ISC)² James Wade Service Award in 2014. Meng-Chow has also been contributing to both local and international security standardization efforts since 1998, in which he has held several committee and working group chair and editorial positions in the Singapore national standards body, ITU-T SG17, and ISO/IEC JTC 1 SC 27. Meng- Chow is also co-Chair of the Asia Regional Information Security Exchange (RAISE) Forum, which he co-founded with a group of security experts in 2004. Besides contributing to the industry and community, Meng-Chow continues to conduct research and teach information security as an Associate Professor (Adjunct) with the School of Computer Science & Engineering at Nanyang Technology University, Singapore.

    Meng-Chow received his MSc degree in Information Security from the Royal Holloway and Bedford New College, University of London, and completed his PhD in Information Security Risk Management at the Southern Cross University, Australia. He has also been a Certified Information Systems Security Professional (CISSP) since 1998.


    Haruto Kitano Photo

    Haruto Kitano, CISSP, JGISP
    Senior Manager, Deliotte Tohmatsu Risk Services Co, Ltd.

    Dr. Haruto Kitano is currently senior manager and consultant for Deloitte Tohmatsu Risk Services Co., Ltd. His consulting is focused on security and risk management governance, database security, identity management, regulatory compliance, and privacy. He is currently a committee member of the Database Security Consortium in Japan and a member of (ISC)² Asia-Pacific Advisory Council. Dr. Kitano has been a vocal professional within the IT security industry in Japan and previously worked as a Telecom and internet networking engineer for 10 years, and at Oracle for 11 years specializing in Database Security and Identity Management. He earned his Master of Informatics from the Institute of Information Security (IISEC), the first Japanese graduate school specializing in information security, where he is researched security management and information protection against internal threat.
    Dr Melvyn Kuan Photo

    Dr. Melvyn Kuan
    Lead Consultant (Ecosystem Development), Cyber Security Agency of Singapore

    Dr. Melvyn Kuan is currently Lead Consultant (Ecosystem Development) at the Cyber Security Agency of Singapore (CSA) where he is responsible for professional workforce development planning and programmes. Prior to the CSA, he was Head of Strategy and Digital Economy at the National Research Foundation where he was responsible for the priority setting of research areas and capability development and the development of the Services and Digital Economy R&D strategy. Dr. Kuan has also served in various capacities in the former Infocomm Development Authority (IDA) such as the Technology and Planning Group and the Smart Cities Programme Office. Before joining the former IDA, he was pursuing his PhD and was a Teaching Assistant at the Department of Information Systems, National University of Singapore. His work has been published in journals such as Information & Management and Behaviour and Information Technology and; leading Information Systems conferences such as International Conference on Information Systems (ICIS), European Conference on Information Systems (ECIS) and Pacific Asia Conference on Information Systems (PACIS).
    SC Leung Photo

    SC Leung, CISSP, CISA, CBCP
    Centre Manager, Hong Kong Computer Emergency Response Team
    Coordination Centre (HKCERT)

    Mr. SC Leung is currently the Centre Manager of the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), supervising the security incident response team and coordinating with local and overseas parties. He has over 25 years of working experience serving banking, Internet solution provider, telecommunication and the consultancy industries. SC Leung holds several information security designations including CISSP, CCSP, CISA and CBCP. He is a frequent speaker in promoting information security awareness. He had been invited to speak for Hong Kong Monetary Authority, Securities and Futures Commission, Hong Kong Police Force, Government departments, enterprises, schools and local non-governmental organizations, while he had also spoken in overseas conferences of the (ISC)², FIRST, APCERT, NatCSIRT Meeting, APECTEL, CNCERT/CC of China and National University of Singapore. He was given by (ISC)² the President's Award in 2013 and the Asia-Pacific Information Security Leadership Achievement honouree in 2007 for his voluntary work and product neutral security awareness education to the public. He was the founding member of the Internet Society, Cloud Security Alliance Hong Kong and Macau Chapter and the Professional Information Security Association and had held key positions in these organizations.
    Ching-Hao Mao Photo

    Dr. Ching-Hao Mao, CCSK, OCPJWCD, SCJP
    Director, Cyber Security Technology Institute, Institute for Information Industry

    Dr. Ching-Hao Mao is the Director, Cyber Security Technology Institute (CTTI), Institute for Information Industry (III) in Taiwan, where he has been the technical leader in data analytics and security intelligence. He has great knowledge about data science and six years of practical experience in cybersecurity. He is now leading a research and development team with 20 engineers and most of them have master's degrees or above qualifications. Dr. Mao earned his Ph.D. degree in the Department of Computer Science and Information Engineering at the National Taiwan University of Science and Technology and was a member of the Intelligent System Laboratory. He was a visiting scholar at Carnegie Mellon University and collaborated with Prof. Tsuhan Chen at Cornell University and Prof. Christos Faloutsos at Carnegie Mellon University. Dr. Mao joined the iCAST (International Collaboration for Advancing Security Technology) project from 2006 to 2008 and the Taiwan Information Security Center (TWISC) from 2005 to 2010 for the research of network security. His research interests are network security and data mining, more specifically, learning and inferring from a graphical model for causal relations of malicious network behaviors. He is also interested in botnet related issues, such as Fast-flux, phishing and spam emails, and web application security issues, such as web mimicry attacks and obfuscated attacks. He has published over 30 international conference and journal papers. Dr. Mao has earned the following honors and awards: the Best Newcomer Award by III in 2015, the Excellent Paper Award by III in 2012, and 2014; the College Outstanding Youth Award by the National Taiwan University of Science and Technology in 2010; the Best Student Paper Award by the 19th Cryptology and Information Security Conference in Taiwan in 2009; the Scholarship of Graduate Research by the Computer Society of the Republic of China, Taiwan in 2008. He was also the Showcased Honoree in the category of Information Security Practitioner of (ISC)² Asia-Pacific ISLA program in 2016. Dr. Mao has obtained the following certifications: Oracle Certified Professional, Java EE 5 Web Component Developer (OCPJWCD, SCWCD) in 2012, Certificate of Cloud Security Knowledge (CCSK) in 2011, Capability Maturity Model Integration (CMMI) Introduction in 2008 and Sun Certified Java Programmer (SCJP) in 2001.
    Jill Slay Photo

    Prof. Jill Slay, PhD, FACS, CP, MIEEE, Fellow of (ISC)², CISSP, CCFP
    Optus Chair of Cyber Security, La Trobe University

    Professor Jill Slay is Optus Chair of Cyber Security at La Trobe University and Director of Cyber Resilience Initiatives for the Australian Computer Society. She has established an international research reputation in cyber security (particularly Digital Forensics) and has worked in collaboration with many industrial partners. She was made a Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism. She is a Fellow of ACS and a Fellow of the International Information Systems Security Certification Consortium, both for her service to the information security industry (and is MACS CP and holds CISSP and CCFP certifications). She has published one book and more than 120 refereed book chapters, journal articles or research papers in information assurance, critical infrastructure protection, security and forensic computing in the last 10 years. She has completed the supervision of 19 PhDs and many Masters and Honours theses and has been awarded over AUD 2 million in Australian Government Category 1 research income, including a Future Fellowship.
    Wansuck yi Photo

    Dr. Wan S. Yi, CISSP
    Vice-President, Information Security Industry Group, Korea Internet & Security Agency

    Dr. Wan S. Yi is the Vice-President, Information Security Industry Group in Korea Internet and Security Agency (KISA). He received BS degree in Computer Science from Virginia Polytechnic Institute and State University in US. He also received MS degree in information security from Dongguk University and Ph.D. in computer engineering from SungKyunKwan University in Korea. Since 2014, he is an adjunct professor at SungKyunKwan University. He served in a variety of important career building assignments including Director of Incident Prevention Division, Internet Industry Division, Infrastructure Protection Division and Regional Information Security Center. Finally, he served as the Vice-President of International Cooperation Group. Before joining KISA, he worked for Hyundai Information Technology, LTD. During his military service, he was an Aide de Camp for Deputy Commander in Chief, ROK/US Combined Forces Command. He retired from service in 1994 as a Korean Air Force lieutenant. His award includes two ROK/US CFC DCINC Awards (1993, 1994), US Army Achievement medal (1993) and commendation Medal (1993), National Intelligence Service Award (2000), ISC² ISLA (2008), ISC² Presidential Award (2008), Minister of Public Affairs and Security Award (2009, 2016), and ROK President Award (2012).


    Chuan-Wei Hoo Photo

    Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE
    Technical Advisor, Asia-Pacific, (ISC)²
    Chief CyberSecurity Technology Officer, ST Electronics (Info-Security) Pte Ltd.

    As technical advisor of (ISC)2 Asia-Pacific, Chuan-Wei Hoo provides strategic and technical advice to (ISC)² Asia-Pacific on security issues affecting the region and membership. Chuan-Wei has 25 years of IT experience, assuming various IT management roles in the financial and telecommunication sector regionally. He also serves as an adjunct lecturer with NTU, ISS-NUS and Temasek Polytechnic, and a guest lecturer with the Business Continuity Management Institute. He is currently the Chief CyberSecurity Technology Officer at ST Electronics Info-Security.


    Andy Ho Photo

    Andy Ho, CISSP, CISA, EnCE
    President, (ISC)2 Hong Kong Chapter
    Senior Security Manager, IBM, Greater China

    Commencing his career as a security analyst, Andy Ho spent more than 25 years of his time dedicated to the security profession and has worked throughout the Asia Pacific countries.

    As a security professional, Andy has been responsible for performing and managing a wide range of security consulting, investigative tasks including risk and threat assessments, security surveys, security briefings, crisis management and emergency response planning program.

    Andy is currently the corporate Senior Security Manager of IBM in Greater China. In this capacity, Andy has the regional responsibility to oversee corporate security investigations and IT forensic in the region.

  • Sponsorship Opportunities Sponsorship Opportunities

    For sponsorship opportunities, please contact Michaella Park at +852.2850.6951 or mpark@isc2.org.

 EMEA-ISLA-General-729x245

ISLA EMEA

Honoring the Information Security Workforce in the EMEA

After 11 consecutive years of success in the Americas and Asia Pacific, the Information Security Leadership Awards (ISLA) are coming to the EMEA!

The (ISC)² ISLA EMEA Awards are a unique opportunity for you to nominate fellow information security and management professionals that go the extra mile to enhance security throughout the private and public sectors across Europe, the Middle East and Africa. Your nominee could be a well-known figure, a stand out leader or equally, an unsung hero working tirelessly in the background.

These are the only awards that give the professional cybersecurity community — including our vast and vibrant membership of over 20,000 across the region — a credible opportunity to recognize peers and provide notable exposure from the world’s largest nonprofit membership organization in our field.

Why not show your appreciation for achievement that has impressed you as we shine a spotlight on and celebrate the tremendous amount of talent in this region.

  • Award Categories Award Categories

    Keep an eye out for remarkable projects and initiatives! 

    You will have a key role as you will be responsible for nominating the Information Security professionals who have distinguished themselves under specific projects, programmes and initiatives, over the region in the 4 following categories:

    • Senior Information Security Professional – someone who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
    • Information Security Practitioner – an individual who has distinguished themselves for implementing and/or managing the implementation of a component of a security program. Candidates in this category typically should have at least three years of work experience directly related to information security.
    • Up-and-Coming Information Security Professional – a person who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational.
    • Woman Information Security Professional - a female who through her work and commitment, has contributed to women’s representation in the profession and raised awareness to encourage vocations among women. Candidates in this category typically should have at least three years of work experience directly related to information security.

    Submissions must align with the category for which they are nominated and will be judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the ISLA EMEA Judges Committee to confirm the accuracy of the information provided.

  • 2017 ISLA EMEA Winners 2017 ISLA EMEA Winners
    wheeler
    Senior Information Security Professional

    Patrick Wheeler - Belgium

    Director, CyberWayFinder

    Increasing diversity in cybersecurity - through skills and community development and promoting career transitions for women. 

    peter oboyle
    Information Security Practitioner

    Peter O’Boyle, HCISPP – Ireland

    Information Security Manager, Icon

    Implementing of an Information Security Vendor risk programme.

    denise murtagh dunne
    Woman Information Security Professional

    Denise Murtagh-Dunne, CISSP – Ireland

    Information Security Manager, PwC 

    Improving the information security community within PwC and promoting events to encourage more women into cybersecurity.

    brencil kaimba
    Up-and-Coming Information Security Professional

    Brencil Kaimba -  Kenya

    Security Consultant, Serianu Limited

    Mentoring university and high school students across Kenya through the programme Cyber Security Training and Awareness for Young People in Kenya and the Cyber Immersion Programme.

  • Nomination Nomination

    Nomination open on the 12th June and close on the 12th July. You can make your submission via (ISC)² Global Awards Program nomination portal.

    Nominations are open to, members and non-members from the EMEA region (barring (ISC)² staff and the judging panel) and it is free to put someone forward. Nominators can come from anywhere, they do not have to be from the EMEA region.

    Submissions will be judged by members of the Europe, Middle East and Africa Advisory Council (EAC).

    For further information about nominations, please contact us.

  • Judging Committee Judging Committee

    Yves Le Roux, CISSP, CISM
    Yves Le Roux is the Co-chair of the (ISC)² EMEA Advisory Council

    Previously he undertook network security leadership roles at a variety of organisations including the Rothschild Group, CA Technologies and the French Ministry of Industry. Yves has also co-authored three books on security, and lectures at ISEP (Paris Graduate Engineering School).

    Yves Le Roux on LinkedIn.

     

    Dr. Yiannis Pavlosoglou, PhD, CISSP
    Yiannis Pavlosoglou is the Strategic Change Manager for Operational Resilience at global financial services firm UBS. He is also Co-chair of the (ISC)² EMEA Advisory Council and has held the chair of the Global Industry Committee for the Open Web Application Security Project (OWASP) and led a number of projects within that space.

    Yiannis Pavlosoglou on LinkedIn.

     

    Tom Gamali, CISSP, CISA 

     Tom Gamali heads up the Group Technology Risk and Business Continuity Management function for Kuwait Finance House (KFH) and an executive member of the US OSAC (Overseas Security Advisory Committee) for the US Embassy in Kuwait.

    Tom Gamali on Linkedin.

     

    Rainer Rehm, CISSP, CISM

    Rainer Rehm is a Security Architect at MAN, one of the founding members of The (ISC)² Chapter Germany and a member of the Alliance for Cybersecurity. He is also an official (ISC)² instructor and regularly contributes to the development and maintenance of the (ISC)² CBK.

    Rainer Rehm on LinkedIn.

     

    Sofiane Chafai, CISSP

     Sofiane Chafai is an Information Security expert with over 15 years’ experience in managing ICT and security projects, system implementation, security programmes and business continuity management for large international companies in Middle East and North Africa. Currently, he is the Managing Director of MFC Advisory, Sofiane is an (ISC)² and ISACA active member who contributed to numerous magazines and spoken at international conferences.

    Sofiane Chafai on LinkedIn.

     

    Paco Hope, CISSP, CSSLP

    Principal Consultant at Cigital, Paco Hope is a recognised expert in the field of software security. He has worked with many of the world’s leading organisations to help them create secure software. He is the author of two security books, a frequent conference speaker and a regular online author.

    Paco Hope on LinkedIn.

  • Award Ceremony Award Ceremony

    Hosted at the (ISC)² Secure Summit UK in London in December, shortlisted nominees from outside the host country will be sponsored to attend the evening ceremony. The awards will also be the perfect occasion for our community to come together and network as they celebrate the accomplishments of our friends and colleagues. The winners will join an elite global community of ISLA Americas and ISLA APAC award winners, recognised by the world’s largest information security membership organisation. 

    Follow (ISC)² to keep up-to-date with the latest ISLA EMEA News, follow on LinkedIn, Facebook, and Twitter.



ISLA Government 

Recognizing Federal Information Security Leaders 

This program recognizes the ongoing commitment of individuals whose initiatives, processes and projects have led to significant improvements in the security posture of a department, agency or the government (local, state, or federal). The nomination period is now closed for the (ISC)² Information Security Leadership Awards Government (formerly GISLA).

  • Congratulations to the 2018 ISLA Government Winners! Congratulations to the 2018 ISLA Government Winners!

    Workforce Improvement - Individual Category

    Aung Htein
    Administrator – Office of Information Systems and Technology, Employment and Training Administration, U.S. Department of Labor

    Project/initiative: DOL ETA Cybersecurity Awareness Campaign


    Technology Improvement - Individual Category

    Michael Sherwood
    Director of Technology and Innovation, City of Las Vegas

    Project/initiative: Las Vegas' Smart City Security Initiatives


    Process/Policy Improvement - Individual Category

    Glenn Hernandez, CISSP
    Captain, U.S. Coast Guard (Retired)
    Chief Information Security Officer

    Project/initiative: USCG: Cybersecurity Strategy


    Up-and-Coming Security Professional - Individual Category

    Mark Bacharach, CISSP
    Innovation Fellow, Environmental Protection Agency, Office of Environmental Information, Office of Information Security and Privacy

    Project/initiative: EPA's Continuous Monitoring Dashboard


    Community Awareness - Team Category

    Matt Goodrich, JD
    FedRAMP Director
    Technology Transformation Service
    US General Services Administration

    Project/initiative: Federal Risk and Authorization Management Program (FedRAMP) Tailored

    Supporting team:

    • Ashley Mahan
    • Claudio Belloli
    • John Hamilton
    • Betsy Steele
    • Ryan Hoesing

    Most Valuable Industry Partner (MVIP) - Team Category

    Nicholas Andersen, CISSP
    Vice President of Corporate Strategy, Invictus International Consulting

    Project/initiative: Invictus International Consulting, LLC Defense Intelligence Agency IA Enterprise Program

    Supporting team:

    • Sean Hensen
    • Cornelius Roberts, CISSP
    • Erin Clemens, CISSP
    • Mike Bernert, CISSP
    • Jimmy Jay, CISSP

     

  • Award Categories Award Categories

    Individual Awards

    • Up-and-Coming Information Security Professional -­ This award goes to a new, rising star in the U.S. federal, state or local government information security field. The project, improvement or initiative they represent should relate to their current position or educational work (e.g., research project, implemented emerging technology or outstanding work in security operations). The individual may not have more than 3 years of experience in the information security field and must be a current government employee (not a contractor/consultant).
    • Workforce Improvement ­- A U.S. federal, state or local government information security manager (examples include CISO, deputy CISO, information security manager, program manager, etc.) whose leadership role supporting an initiative, program or project has significantly contributed to the advancement of the government¹s information security workforce on government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
    • Technology Improvement ­- A U.S. federal, state or local government information security or information technology manager (examples include CIO, CISO, CTO, program/project manager, etc.) whose leadership role supporting a security technology initiative, program or project (e.g., cloud migration, information sharing, breach response/recovery, etc.) significantly contributed to the advancement of the government¹s information security technology on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
    • Process/Policy Improvement ­- A U.S. federal, state or local government manager (examples include CIO, CFO, program/project manager, etc.) whose leadership role supporting a security policy/process initiative, program or project significantly contributed to the advancement of the government's information security policy/process (e.g., training, incident response, risk management, etc.) on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).

     

    Team Awards

    A winning team will be recognized for its efforts on projects in each of the following categories. All team members will be recognized, with one award given to the team:

    • Most Valuable Industry Partner (MVIP) ­- A U.S. federal, state or local contractor or consultant team (currently supporting a government contract) whose project or initiative has significantly contributed to the advancement of information security in the areas of information security workforce, policy, process or technology. The project must have been implemented within the last 12 months. Nominations will be verified by the government agency supervisor for the nominated initiative.
    • Community Awareness - A U.S. federal, state or local information security team whose project has significantly contributed to building or broadening security awareness in the local community within the last 12 months (not a contractor/consultant).
  • ISLA Government 2018 Judges ISLA Government 2018 Judges

    Devon Bryan, CISSP

    Executive Vice President and Chief Information Security Officer

    Federal Reserve System, National IT

     

    Devon Bryan is Executive Vice President and Chief Information Security Officer for the Federal Reserve System.  As CISO, Devon oversees information security, including incident response, for the enterprise, ensuring information security architecture, standards, policies and programs remain effective and efficient. 

    Devon came to the Federal Reserve from Fortune 500 human resources and payroll provider ADP, where he served as Global CISO. Devon led ADP’s information security strategy, collaborating across the company’s geographically dispersed business operations to ensure coordination, consensus, and effective execution across global operations. Prior to joining ADP, he served as the Deputy CISO for the Internal Revenue Service (IRS).

    His information security career began in the U.S. Air Force, where he served as a Captain and Lead Network Security Engineer working on systems and programs to protect critical USAF applications, networks and data.

    Devon received a Bachelor of Science in Applied Mathematics from South Dakota Technological University and a Master of Science, Computer Science from Colorado Technological University.  He holds numerous industry cybersecurity certifications and regularly speaks at industry events and writes/publishes articles regularly in various industry publications. 

    Michael Stoner, CISSP 

    Chief Information Security Officer, Federal Government Civilian Agency

     

    Michael’s expertise is in executing enterprise security programs, establishing and implementing security standards and procedures, ensuring compliance with federal laws and regulations, identifying threats to agency assets and resources, and evaluating methodologies and alternatives for risk mitigation. He has overseen the proactive prevention, detection, and response to computer security incidents targeting government enterprise information technology assets and data. Before Michael began his civil service career, he provided management and technology consulting services to federal government agencies in the areas of information assurance and cybersecurity. Michael has experience in a number of security disciplines with a concentration in incident response, risk analysis, security engineering, and security policy development and compliance. He holds a bachelor’s degree in Computer Science from Ohio Northern University and a master’s degree in Information and Telecommunication Systems from Johns Hopkins University.

    Steven Hernandez, Vice Chair, CISSP, CAP, SSCP, CSSLP, HCISPP 

    Chief Information Security Officer

    Director, Information Assurance Services

    US Dept. Of Education

     

    Steven Hernandez is an information assurance veteran serving the past twenty years in a variety of contexts and missions. He has worked on the front lines in operations centers and led research teams attempting to balance security, privacy and other mission considerations. He has experience in international manufacturing, healthcare, non-profits, and government at the federal, state, and local levels. Presently he is the Chief Information Security Officer and Director of Information Assurance Services at the U.S. Department of Education.  Prior to his position at Education, he held a variety of roles at the Office of Inspector General, US Department of Education including CTO, CIO, CISO, Senior Official for Privacy and Chief Services Engineering Officer.  Steven has volunteered and served (ISC)² for the better part of the past decade. He served on the Board of Directors, volunteered to write exams, served on the U.S. Government Advisory Board for Cybersecurity (GAB), judge for the Government Information Security Leadership Awards (ISLA Government) and contribute to its Executive Writers Bureau.

  • Sponsorships Sponsorships

    Thank you to our Sponsor

     

    Raytheon

     

    For sponsorship opportunities, please contact Lisa O'Connell at 781-460-2105 or loconnell@isc2.org.

Fellow of (ISC)²

The Fellow of (ISC)² was established to honor and distinguish a select number of elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession.

  • Qualifications Qualifications

    Fellow of (ISC)² 

    Fellow of (ISC)² candidates must be nominated by a:

    • A sitting or former (ISC)² board member
    • A Fellow of (ISC)²
    • An (ISC)² Harold F. Tipton Award recipient
    • The sitting (ISC)² Board of Directors will make the final selection.

    Fellows of (ISC)² are entitled to:

    • A lifetime association with (ISC)² without fees or other maintenance requirements
    • Receive (ISC)² Official Communications
    • Access profile record on (ISC)²'s website to maintain contact information
    • Nominate other Fellows
    • Use of Fellow of (ISC)² designation
  • Past Recipients Past Recipients

    2018 Recipient:

    William Hugh Murray, CISSP
    Retired

    Fellow of (ISC)²

    • Dr. Ronald Ross
    • Steven B. Lipner
    • John McCumber
    • Koji Nakao
    • Prof. Edward J. Humphreys
    • Mike Jacobs
    • Frederick B. Cohen
    • Roger R. Schell
    • Dr. Ronald L. Rivest
    • Dr. Jill Slay
    • John "Jack" Holleran
    • William J. Caelli
    • Dorothy E. Denning
    • Whitfield Diffie
    • Jae-Woo Lee
    • Joseph T. Lisi
    • William Maconachy
    • F. Lynn McNulty
    • Peter G. Neumann
    • Steve Orlowski
    • Fred Piper
    • Daniel J. Ryan
    • Corey Schou
    • Eugene H. Spafford
OK