Top of Page
 

Awards and Designations

ISLA AwardPeople, policies, and processes are the keys to protecting or securing information assets. (ISC)² offers several awards to recognize the people that make a difference in this ever evolving industry, honoring their tireless efforts and standards of excellence.

Harold Tipton Award

(ISC)² Harold F. Tipton Lifetime Achievement Award

The Harold F. Tipton Lifetime Achievement Award is awarded by the (ISC)² Board of Directors as the highest tribute bestowed in the information security industry. Named after Harold F. Tipton, CISSP, known as the “George Washington of information security,” the award is to honor his memory and tradition of passionately promoting and enhancing the information security and the information security profession. This award therefore recognizes member(s) for his or her lifelong contributions to the advancement of information security and the information security profession by serving, over the long term, with excellence and distinction.
  • Harold F. Tipton Award Criteria Harold F. Tipton Award Criteria
    (ISC)² certification is required to be eligible; the recipient must have demonstrated sustained excellence throughout their entire information systems security career.
  • Nomination Process Nomination Process
    • Candidates must be members in good standing , or a Fellow of (ISC)².
    • Any (ISC)² member can be nominated by either the members in good standing or by the Board Awards Committee.
    • The Awards Committee selects the recipients and puts forth a motion to the board for approval at the Q3 board meeting each year.
    • The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the
    • Awards Committee Nominations should be submitted to awards@isc2.org.
  • 2016 Award Recipient 2016 Award Recipient
    Howard Schmidt Professor Howard Schmidt – the award was presented by Wim Remes, Board Chairman in Orlando at the Q1 Board of Directors Dinner on 14 January 2017
  • Past Award Recipients Past Award Recipients
    • 2015 Dr. Frederick Piper
    • 2013 Dr. Eugene Spafford
    • 2012 Prof. Hiroshi Yasuda, Dr.E, CISSP
    • 2011 John O'Leary, CISSP
    • 2010 Lt. Col. Husin bin Jazri (Retired), CISSP
    • 2009 Sandra M. Lambert. CISSP-ISSMP
    • 2008 The late James R. Wade, CISSP-ISSAP, ISSMP
    • 2007 Dr. Jae Woo Lee, CISSP 2006 William H. Murray, CISSP
    • 2005 Dr. Willis H. Ware
    • 2004 Dr. Dorothy Denning, Fellow of (ISC)²
    • 2003 Donn B. Parker
    • 2002 Micki S. (Krause) Nozaki, CISSP
    • 2001 Harold F. Tipton, CISSP and Prof. Corey Schou, Ph.D., CSSLP, Fellow of (ISC)²

James R. Wade Service Award

The James R. Wade (ISC)² Service Award is awarded by the Board to acknowledge the involvement of those volunteers who merit special distinction for their sustained and valuable service to (ISC)². James R. Wade was an esteemed, long-time contributor to (ISC)², and it is our privilege to honor his memory with this award.

  • Award Criteria Award Criteria

    James R. Wade Service Award

    The James R. Wade (ISC)² Service Award is awarded by the Board to acknowledge the involvement of those volunteers who merit special distinction for their sustained and valuable service to (ISC)². James R. Wade was an esteemed, long-time contributor to (ISC)², and it is our privilege to honor his memory with this award.

  • Nomination Process Nomination Process
    • Any (ISC)² volunteer can be nominated by either the members or by the Board Awards Committee.
    • The Awards Committee selects the recipients and puts forth a motion to the board for approval at the summer board meeting each year.
    • The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the Awards Committee.
    • Awards Committee Nominations should be submitted to awards@isc2.org.
  • 2016 Award Recipient 2016 Award Recipient
    Daniel Ryan Professor Daniel Ryan – the award was presented by Wim Remes, Board Chairman, in Orlando at the Q1 Board of Directors Dinner on 14 January 2017
  • Past Award Recipients Past Award Recipients
    • 2015 Dr. Peter Berlich
    • 2014 Meng Chow Kang, CISSP, CCSP
    • 2013 Diana-Lynn Contesti CISSP-ISSAP, ISSMP, SSCP, CSSLP
    • 2012 Rick Koenig, CISSP
    • 2011 Warren Pearce, CISSP
    • 2010 Richard Nealon, CISSP, SSCP
    • 2009 Benjamin H. Gaddy, Jr., CISSP, SSCP
    • 2008 Randolph N. Sanovic, CISSP-ISSAP, ISSMP
GISLA Logo

F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award

The (ISC)² F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award recognizes a member of the U.S. federal information security community who upholds McNulty's legacy as a visionary and innovator through outstanding service and commitment.


  • About Lynn McNulty About Lynn McNulty
    Lynn McNulty

    "Lynn McNulty made a significant mark in his efforts to achieve the ambitious goal of building a professional government information security workforce and to strengthen the security posture of the country's information resources and infrastructure," says W. Hord Tipton, CISSP-ISSEP, CAP, CISA, executive director of (ISC)2. "One of Lynn's very tangible legacies was the GISLA program that he championed and which has since become one of the most coveted recognition programs for federal cybersecurity professionals today."

    McNulty was a true pioneer in government information security circles, having served in a number of critical and high-profile capacities, including as associate director for computer security at the National Institute of Standards and Technology, as the first information systems security director at the U.S. State Department and as director of government affairs for RSA.

    Known for his dedication to professionalizing the government workforce and often referred to by those within the community as the "pioneer" of government information security, Lynn had a tremendous impact on the entire industry. He passed away at the age of 73 on June 4, 2012.

    In recognition of all of his contributions, (ISC)² created the F. Lynn McNulty Tribute GISLA. Members of the (ISC)² U.S. Government Advisory Board hand-select a recipient for the Tribute Award annually.

    McNulty spent his post-government career working in key roles within (ISC)² including as a member of the (ISC)² Board of Directors, (ISC)² director of government affairs and founding co-chair of the (ISC)² U.S. Government Advisory Board for Cyber Security. His achievements were recognized with various designations, such as the exclusive Fellow of (ISC)², the ISSA Hall of Fame Award, the Cyber Security Hall of Fame, the Fed 100 Award, and as one of Federal Computer Week's top 25 federal IT influencers.

    In June 2012, McNulty was recognized posthumously with one of the industry's top honors, the RSA Lifetime Achievement Award.


  • 2017 Award Recipient 2017 Award Recipient

    Brig. Gen. (ret.) Gregory Touhill, CISSP

    Former Federal Chief Information Security Officer.


  • Past Award Recipients Past Award Recipients
    Richard Hale

    2016 Richard A. Hale

    Richard Hale is the Deputy CIO for Cyber Security, Department of Defense. In this position he acts as the department’s Chief Information Security Officer. Mr. Hale is responsible for ensuring the department has a well defined and well executed cyber security program, and is responsible for coordinating cyber security standards, policies and procedures with other federal agencies, coalition partners and industry.


    Hord Timpton

    2015 Hord Tipton

    W. Hord Tipton, CISSP, former executive director, (ISC)², was the first government CIO to obtain a CISSP, helping to bring high-profile attention to the need for a more professionalized information security workforce. Hord has been instrumental in fostering the security education and certification of hundreds of thousands of individuals worldwide. He has dedicated his life to the advancement of the information security profession in the U.S. government and beyond, and is considered one of the most influential people in security


    Bobbie Stempfley

    2014 Roberta "Bobbie" Stempfley

    Ms. Stempfley came to DHS in 2010 to serve as the director for the National Cyber Security Division (NCSD), and she was later selected to serve as the deputy assistant secretary for Cybersecurity and Communications (CS&C). Thanks to her vision and tenacity, the CS&C - now comprised of five divisions -- leads interagency and public-private initiatives that enable all to better secure their parts of cyber space.


    Ron Ross

    2013 Dr. Ronald "Ron" Ross

    Dr. Ross, senior fellow at the National Institute of Standards and technology (NIST), played a key role in establishing cyber security requirements for federal agencies for decades. By honoring Ron with this designation, we are ensuring that Lynn's legacy of influence and commitment to government information security is recognized for years to come.


The (ISC)² President's Award

The (ISC)² President’s Award recognizes volunteers who have made a significant impact on and/or contribution to (ISC)² through their dedicated volunteer efforts throughout the past year. Multiple recipients are chosen annually for each region at the sole discretion of (ISC)²’s CEO.

  • 2017 Award Recipient 2017 Award Recipient

    Pete Gouldmann, CISSP
    Enterprise Risk Officer - Cyber, U.S. Department of State

     

  • Past President's Award Recipients Past President's Award Recipients
    • Sandy Bacik, CISSP
    • Peter Berlich, CISSP
    • Neil Breden, CISSP
    • Devon Bryan, CISSP
    • Edmund Chua, CISSP, CSSLP
    • David Church, CISSP
    • Diana-Lynn Contesti, CISSP
    • Frank Dey, CISSP
    • James Doyle, CISSP
    • Peter Drabwell, CISSP
    • Art Friedman, CISSP
    • Simone Gauthier
    • Jakob Frydendal Gercke, CISSP
    • Adam Gordon, CISSP-ISSAP, ISSMP, SSCP
    • Kevin Gourlay, CISSP
    • Richard Harrison, CISSP
    • Scott Hayden, CISSP
    • Stephen Hernandez, CISSP, CAP, SSCP, CSSLP
    • Chuan-Wei Hoo, CISSP
    • S.C. Leung, CISSP
    • Sujit Christy, CISSP
    • Eric A. Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CCSP
    • Steve Hindle, CISSP
    • Prinya Hom-Anek, CISSP
    • Sung Jae, Joo
    • Randy Johnson, CISSP
    • Robert Johnston, CISSP
    • Hye Jung, Yang (Ms)
    • Meng Chow Kang, CISSP
    • Gurdeep Kaur, CISSP
    • Ang Hock Kheng
    • David Krehnke, CISSP
    • Simon Philip Lamb, CISSP
    • Richard Lane, CISSP
    • Howard Lau, CISSP
    • Jae-Woo Lee - Honorary CISSP
    • Richard Nealon, CISSP
    • Anthony Lim, CSSLP
    • Eamonn McCoy, CISSP
    • James McQuiggan, CISSP
    • James Molini, CISSP, CSSLP
    • Henry Ng, CISSP-ISSAP
    • Stanley M. Ng, CISSP
    • Tae Soon Park
    • Matthew Parker, CISSP
    • Manoranjan Paul, CISSP, CSSLP
    • Warren Pearce, CISSP
    • Wasantha Perera, CISSP
    • Ralph Poore, CISSP
    • Rainer Rehm, CISSP
    • Martin Reynolds, CISSP
    • Brian Shorten, CISSP
    • Chester Soong, CISSP
    • Richard Starnes, CISSP
    • Tony Vargas, CISSP-ISSAP, CSSLP
    • Yi Wan Suck
    • Freddy Tan, CISSP
    • Dan Waddell, CISSP, CAP
    • Tim Wilson, CISSP
    • Dr. Duan Hai Xin, CISSP
    • Jong Youn, Kim


Americas ISLA®

The call for nominations for the seventh annual (ISC)² Americas Information Security Leadership Awards (ISLA) Program is now closed. Held annually by (ISC)² in cooperation with the North and Latin American Advisory Councils, the Americas ISLA Program recognizes information security and management professionals throughout the private and public sectors in North, Central and South America, with the exception of the U.S. federal government (recognized through the GISLA Program), for their outstanding leadership and achievements in workforce improvement.
  • Americas ISLA Video Americas ISLA Video
  • Award Categories Award Categories
    • Senior Information Security Professional (examples include: CSO, CISO, information security manager or senior security manager with significant information security management responsibilities) who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
    • Information Security Practitioner who has distinguished themselves for implementing and/or managing the implementation of a component of a security program (examples include: managing a security awareness and training program and, conducting difficult, complex security evaluations) Candidates in this category typically should have at least three years of work experience directly related to information security.
    • Up-and-Coming Information Security Professional who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational work (e.g., university research project, implemented emerging technology, or outstanding work in security operations).
    • Community Awareness - A project, initiative or program represented by information or non-information security personnel who have significantly contributed to building or broadening security awareness in the local or information security community within the last 12 months.

    Submissions must align with the category for which they are nominated and are judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the Americas ISLA Judges Committee to confirm the accuracy of the information provided.

    The awards luncheon will now be open to the All Access Pass at Security Congress with almost 1,500 attendees. It takes place on Tuesday, September 26th as a plated luncheon at the JW Marriott Austin.

    If you are interested in sponsoring, please see our Sponsorship Opportunities.

  • 2016 Americas ISLA Winners 2016 Americas ISLA Winners

    Americas ISLA 2016 Banner

    (ISC)² President’s Award
    James McQuiggan, Product & Solution Security Officer at Siemens Wind Service (U.S.A.)

    Fellow of (ISC)²
    Mike Jacobs

    Senior Information Security Professional Category

    Diego Andres Zuluaga Urrea, Information Security Officer, ISAGEN S.A. (Colombia)
    Project: Colombian Energy Sector Cyber Security Improvement

    Information Security Practitioner Category

    Mack Bhatia, Senior Practice Director, Enterprise Integration (U.S.A.)
    Project: Enterprise Integration - SOC 2 and SOC 3 Compliance

    Up-and-Coming Information Security Professional Category

    Jennifer Chermoshnyuk, Paralegal, Davis Wright Tremaine LLP (U.S.A.)
    Project: Continuing Legal Education Program

    Community Awareness Category


    Sandra Toner, Sr. Technical Specialist, ICF International (U.S.A.)
    Project: Online Cybersecurity Awareness Tools

  • 2017 Judging Committee 2017 Judging Committee
    Diana-Lynn Contesti

    Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, SSCP, CSSLP

    Diana-Lynn Contesti is currently an independent contractor focusing on Security Architecture and Critical Infrastructure and has over thirty years of computer security experience. Previously, Ms. Contesti was the CISO for a Fortune 500 company. Ms. Contesti is the co-author of the first edition of the SSCP Study Guide and has done security presentations globally. She served on the (ISC)² Board of Directors and during her tenure, she held various positions including Chairperson of the (ISC)² Board of Directors, Treasurer, Secretary and lead a number of committees. Ms. Contesti played a key role in the implementation of the Women's Scholarship. In January 2017, Ms. Contesti was named to the Fifty Top Women in Internet Security. She holds multiple certifications including the CISSP, ISSAP, ISSMP, SSCP and CSSLP.

     

    Daniel Diniz

    Daniel Diniz, CISSP, IRCA ISO 27.001

    Daniel Diniz is currently responsible for Information Security & Privacy Management at a Fortune 500 Company in the Healthcare Market.  Daniel’s responsibilities include all aspects of Information Security Management, Privacy, Information Risk Management and Incident Management disciplines. With 19 years of experience in IT and the last 16 years focused on Information Security and disciplines of internal control, Daniel has worked for Sao Paulo State Government’s tax agency and in some of the largest national and multinational companies in industries such as telecom, internet providers, IT professional services, travel, civil engineering and financial services. Daniel is CISSP certified since 2008 and IRCA ISO 27.001 Lead Auditor certified. He holds a Bachelor’s degree in Information Systems and an MBA in Information Security Management from University of Sao Paulo (USP). He's a member of (ISC)² Latin American Advisory Council (LAAC) since its creation in 2011 and has served as the Brazil Lead Volunteer in 2012 for Safe and Secure Online Program aiming to bring the initiative to Brazilian Schools. He served at the (ISC)² Foundation Committee in 2012 and now serves at Board Trustee for Center for Cyber Safety and Education since 2016.

     

    Jefferson Gutierrez

    Jefferson Gutierrez, CFC, CISA, CISM, CISSP

    Jefferson is a Director in the Mexico office of KPMG’s Advisory Forensics practice. 
    With over more than 18 years of professional experience, he leads technical-related investigations where Digital Forensics, e-Discovery, Cyber Investigations / Cyber Incident Response and Forensic Data & Analytics techniques are used for fraud, corruption, money laundry and violation of regulatory compliance prevention, detection and reaction.
    Jefferson is knowledgeable on Data Privacy regulations across Latin America and member of the Latin American Advisory Board for (ISC)².
    Jefferson has managed electronic investigations through digital evidence recovery and forensic data analysis; he has also overseen and conducted forensic examinations of computer systems for the collection, preservation and admissibility of electronic evidence in support of FCPA, cybercrime and fraud investigations.
    Jefferson has provided services for companies located in Mexico, Colombia, Venezuela, Panama, Guatemala, Honduras, Nicaragua, Peru, Ecuador, Costa Rica, Uruguay, United States, Canada and Greece.

     

     

    Gurdeep KaurGurdeep Kaur, CISSP, CISA, CCSK, ITIL

    Gurdeep Kaur is an accomplished information security professional with more than 20 years of experience in IT and 12 years of core experience in enterprise IT security management in financial sector. She served as the Founder-President of the (ISC)² New Jersey Chapter from 2012 to 2015. She is also the member of (ISC)² North American Advisory Council, and CSA Global Enterprise Advisory Board. She received a Bachelor’s degree in Electrical Engineering from Delhi College of Engineering in New Delhi, India. She holds multiple certifications including CISSP, CISA, CCSK and ITIL.
    Gurdeep has led and participated in panel discussions focused on technical as well as diversity issues. She firmly believes that it takes a village to secure the village.

     

    Glenn Leifheit Glenn Leifheit

     Glenn Leifheit is a Senior Security Engineering Program Manager within the Microsoft Information Security and Risk Management (ISRM) organization where he currently leads large cross-company security initiatives. Glenn has over 22 years of experience in technology including software, financial and healthcare industries. Prior to his current role, Glenn worked at FICO and was responsible for the build-out of the FICO’s Application Security and PCI programs. Glenn's experience covers providing C-level security guidance, acting as a cross-team business security liaison, driving static code analysis across the enterprise, leading application security and PCI programs, as well as architecture and design of large scale applications and associated infrastructure. Glenn is an advocate for building a strong technology community; he co-founded TechMasters, a Toastmasters club designed to build technical speaker skills within the Toastmasters framework. His passion is connecting technologists with the soft skills they need: public speaking, giving and receiving feedback and asking more informed questions. Glenn is also a past member of the (ISC)² Application Security Advisory Council (ASAC).

     

    James McQuiggan

    James R. McQuiggan, CISSP

    James R. McQuiggan is a Product & Solutions Security Officer for the Siemens Gamesa Renewable Energy company providing strategy and policies for its SCADA products including Incident Handling, Vulnerability Management, and regulatory best practices. With over 16 years working at Siemens, James has supported the multiple corporate divisions groups on NERC CIP regulations, information security awareness and training and other InfoSec topics.
    James has been an (ISC)² member since 2008 and has been a volunteer of the Safe and Secure Online Program for the Center for Cyber Education & Safety since 2010.  In 2015, he was the finalist for the (ISC)² Community Awareness award in 2016 he received the (ISC)² President’s Award.  He is a proud member of the North American Advisory Council (NAAC). Within the Central Florida community, he has been President of the Central Florida ISSA chapter and is now the President of the Central Florida (ISC)² chapter. James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.

     

    Marie OlsonMarie Olson, CISSP, CIPP, CIPM, CISM

    Marie Olson is the Deputy Chief Privacy Officer for The Boeing Company.  Prior to being selected to build the Global Privacy Team for Boeing, Marie was a Sr. Manager in Information Security responsible for Computing & Information Security Policy and Compliance Management.  Marie has been with Boeing for 30 years, during which time she has managed a variety of other functions including Government Programs Security Support, Security Quality Assurance, and Vulnerability Assessments.  
    Marie is nationally recognized for her expertise in global regulatory compliance issues, technical and business process safeguarding strategies, and meeting the challenges of balancing enterprise privacy and security issues with business realities.  She has presented on a variety of privacy and security topics at industry events and with various organizations and government agencies.  Marie holds a Master of Science degree in computer science from Pacific Lutheran University and a Bachelor of Arts degree in mathematics from the University of Washington.  She is a Certified Information Privacy Professional (CIPP/US) and a Certified Information Privacy Manager (CIPM).  She also holds two internationally-recognized security certifications:  Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).  Marie is also currently serving on the International Information Systems Security Certification Consortium (ISC)² Advisory Board of the Americas and is also the Chairperson of the Privacy Special Interest Group for the Information Security Forum (ISF).

     

     Randolph (Randy) N. Sanovic, CISSP-ISSAP, ISSMP

    Randy was an Industrial Engineer for the Youngstown Steel Co., a Sales Engineer for GATX, the Manager of Computer Security Planning for Mobil Corporation, and the Director of Information Systems Security for United Healthcare. In 1997 Randy became General Director, Information Security for General Motors Corporation responsible for GM’s information security strategy, programs, plans, and global information security posture. He holds several IT-Security Certifications and has traveled internationally for over forty-five years.  
    Some of Randy’s other professional affiliations include: being a member of the Board of Directors of the International Information Systems Security Certification Consortium (ISC)² from1989 to 2008; (ISC)²’s Treasurer; Chairman of (ISC)²’s Board of Directors; and a four-year member of the National Computer Systems Security & Privacy Advisory Board. Randy is also a presenter of the IT Security Safe & Secure Program for children in the schools.
    Randy has presented at major national and international IT-Security conferences, and is a published author, and publishes articles on IT-Security. Randy continues to do both IT-Security Assurance pro bono, and consulting services through his company, RNS Consulting. 
    Randy also serves as the Marketing Director for a Global IT Educational Foundation, a member of SC Magazine’s Editorial Board, and a judge for IT-Security Awards for SC Magazine. His educational background includes a B.B.A., and an M.B.A in Finance.

     

    Michael Stoner, CISSP, PMP, GSLC

    Mr. Stoner’s expertise is in executing enterprise security programs, establishing and implementing security standards and procedures, ensuring compliance with federal laws and regulations, identifying threats to agency assets and resources, and evaluating methodologies and alternatives for risk mitigation. He has also overseen the proactive prevention, detection, and response to computer security incidents targeting government enterprise information technology assets and data. Before Mr. Stoner began his civil service career, he provided management and technology consulting services to federal government agencies in the areas of information assurance and cybersecurity. Mr. Stoner has experience in a number of security disciplines with a concentration in incident response, risk analysis, security engineering, and security policy development and compliance. He holds a bachelor’s degree in Computer Science from Ohio Northern University and a master’s degree in Information and Telecommunication Systems from Johns Hopkins University.

  • Americas ISLA® Sponsorship Opportunities Americas ISLA® Sponsorship Opportunities

    Platinum Sponsor: $8,500 (limit 1)

    • Company logo, description and link on ISLA website
    • One table positioned front and center or option to sit executives at winner / finalist tables (8 seats)
    • Two corporate executives seated at Gala VIP table
    • Verbal recognition from podium by Master of Ceremonies
    • Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
    • Company logo on reception signage
    • Company logo in PowerPoint presentation at awards ceremony
    • Opportunity for a corporate executive to briefly address attendees before the ceremony begins
    • Opportunity to supply each seat with a token corporate gift

    Gold Sponsor: $6,500 (limit 2)

    • Company logo, description and link on ISLA website
    • One table positioned in prime location (8 seats)
    • Verbal recognition from podium by Master of Ceremonies
    • Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
    • Company logo on reception signage

    Silver Sponsor: $4,000 (limit 3)

    • Company logo, description and link on ISLA website
    • Half-table at Ceremony (4 seats)
    • Verbal recognition from podium by Master of Ceremonies

 

Asia-Pacific ISLA 

The (ISC)² Asia-Pacific Information Security Leadership Achievements (Asia-Pacific ISLA™) program is held annually by (ISC)² in cooperation with the (ISC)² Asia-Pacific Advisory Council to recognize outstanding leadership and achievements in workforce improvement and foster public awareness of cyber, information, software and infrastructure security professionals, educators and management throughout the Asia-Pacific region.

The (ISC)² 11th Asia-Pacific ISLA award presentation gala dinner will be held at Sheraton Hong Kong Hotel in Hong Kong on the evening of July 3, 2017. The Gala will be by invitations only: invitations will be extended to award honorees and their guests, judges of Asia-Pacific ISLA, member of the Asia-Pacific Advisory Council, the (ISC)² Board of Directors, VIPs and guests from local and regional government agencies and other influential members of the security profession.

  • Nomination Categories Nomination Categories
    • Information Security Educator
      An individual who has significantly contributed to the enhancement of education on cyber/ information/software/ infrastructure security for the workforce (examples include: Full-time Teaching Staff/Lecturer/Professor/Dean in tertiary education on the subject of cyber, information, software or infrastructure security at the department of Information Assurance/ Computer Science/ Cyber Security/ Electronic Engineering/ Information & Communication Technology/ Information Technology/ Information Management or any faculty that is related to cyber, information, software or infrastructure security). Candidates in this category typically should have at least 10 years of full-time teaching experience, 7 of which are related to cyber/ information/ software/ infrastructure security. Research experience in any cyber/ information/ software/ infrastructure security topic is required, at least 10 years of postdoctoral experience is preferred.
    • Senior Information Security Professionals
      An individual who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (examples include: CSO, CISO, information security director, designer, architect or manager with significant security project lead responsibilities). Candidates in this category typically should have at least 10 years of work experience, 7 of which are directly related to cyber/ information/ software/ infrastructure security.
    • Managerial Professional for an Information Security Project
      An individual with managerial position who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (candidates who are not cyber/ information/ software/ infrastructure security practitioner but involve in professional work for management of security project examples include: CEO, CIO, CFO, program/project manager, etc.). Candidates in this category typically should have at least 10 years of work experience and occupy a senior management level position within their organization.
    • Information Security Practitioner
      An individual who has distinguished him/herself for implementing and/or managing the implementation of a component of a cyber/ information/ software /infrastructure security program (examples include: an executive or officer managing a security awareness and training program, conducting difficult, complex security executions and evaluations, etc.). Candidates in this category typically should have at least 6 years of work experience, 3 of which are directly related to cyber/ information/ software/ infrastructure security.
  • Judging Criteria for Honoree, Showcased Projects & Special Recognition Judging Criteria for Honoree, Showcased Projects & Special Recognition

    (ISC)² will honor all candidates who have attained the requirements set by the nomination review committee as 'Honoree'. Amongst all the Honorees, (ISC)² will highlight an initiative, program or project conducted by at least one Honoree from each of the categories. The criteria for showcasing these initiatives are:

    • Impact: The impact the initiative, program; or project had on the organization and/or community
    • Implementation: How the initiative, program; or project leveraged people, processes, and technology for successful implementation
    • Innovation: Innovative approaches to overcoming obstacles or how the initiative, program, or project built a foundation for workforce improvement in the future
    • Dedication: Distinctive achievement to the workforce or industry that was outside one's regular job responsibility
    • Research: Outstanding research experience or outcome on any cyber, information, software or infrastructure security topic

    Special Recognition - Community Service Star

    In an effort to bolster public awareness of information security throughout the region, Asia-Pacific ISLA will recognize an honoree's project which has significantly contributed to building or broadening security awareness within their community or beyond within the last 12 months.

    Close of Nomination for 2017, April 3, 2017. Questions? Email ISLA@isc2.org

  • FAQs FAQs
    Q:

    Why has (ISC)² created the Information Security Leadership Achievements (ISLA) program in Asia-Pacific? Is it just for the benefit of (ISC)² certifications?

    A:

    People are the key to a secure organization. Since its inception in 2007, the Asia-Pacific ISLA program has been created to recognize all cyber, information, software, infrastructure security professionals or educators or management professionals’ outstanding efforts in the field with particular focus on workforce improvement. While nominees may hold one of our credentials, the program is designed to raise awareness of the many successes and achievements of professionals in this industry, regardless of their certification status.

     

    Q:

    Is ISLA sponsored by any commercial organizations?

    A:

    (ISC)² is currently seeking ISLA sponsorship from organizations who want to join in the mission of creating awareness for the outstanding work of cyber/ information/ software/ infrastructure security professionals in the Asia-Pacific region.

     

    Q:

    Are professionals who hold either a non- (ISC)² certification or no certification at all eligible for ISLA?

    A:

    Yes. Asia-Pacific ISLA is open to all cyber/ information/ software/ infrastructure security professionals or educators or management who meet the criteria and is independent of certification.

     

    Q:

    Can I nominate myself?

    A:

    No. A supervisor, employee, mentor, peer or colleague that is aware of the nominee’s successes and achievements must submit the nomination. The ISLA Nomination Review Committee will evaluate all submissions based on the feedback from the nominator and other input that is included in the nomination form.

     

    Q:

    Can I nominate a member of the Nomination Review Committee or the (ISC)² Asia-Pacific Advisory Board (APAC)?

    A:

    Yes. You can nominate a member of the Nomination Review Committee or (ISC)² APAC. However, once a member of the Nomination Review Committee accepts the nomination, they will need to excuse themselves from the Committee.

     

    Q:

    Does Asia-Pacific ISLA recognize individuals only? Can the project that the person involved will be recognized?

    A:

    The purpose of Asia-Pacific ISLA is to recognize qualified nominees for their individual accomplishments. In addition, with the permission of the nominees and nominator, Asia-Pacific ISLA will mention the project that he or she works for. (ISC)² will also showcase several projects, at least one from each category, by ISLA nominees during the ISLA Ceremony.

     

    Q:

    Is there a limit to the number of nominees who will be recognized this year?

    A:

    No. All nominees who meet the qualification criteria will be recognized.

     

    Q:

    If the person I nominate is not aware of the nomination, can he/she decline the recognition?

    A:

    Both the nominee and the nominator should agree with the content on the nomination form. However, the nominee can choose not to participate at any stage during the process.

     

    Q:

    I am planning to nominate someone, but I am not sure if the company wants the project to be mentioned (as it is company confidential information). Will (ISC)² accept a nomination form without the project's details?

    A:

    No. If the nominee does not want some of the information on the application known, the nominator may indicate which parts of the application should be kept confidential. Further, the information will only be used to judge against criteria and will not be distributed outside of the committee or announced publicly without express consent of the company and the nominee. The members of the Nomination Review Committee are members of (ISC)²’s Asia-Pacific Advisory Council or previous Asia-Pacific ISLA Honorees and must abide by (ISC)²’s non-disclosure policy. In addition, (ISC)² has a strict privacy policy and will respect all requests for confidentiality.

     

    Q:

    Can I submit the application form in a language other than English?

    A:

    No. All submissions should be in English. For supporting document and any material submitted that is not in English will not be considered. Please also provide a brief description of the document in English if only local language supporting document is available.

     

    Q:

    How does the review process work? Do I need to meet with the Nomination Review Committee in person? Do I need to provide follow-up information to the Committee?

    A:

    All the completed nomination forms are sent to the Nomination Review Committee in advance of the review session. The committee members will spend several hours reviewing the applications individually. A group discussion will be held to review each of the applications in all program categories. At the review session, the committee will determine whether a nominee meets the qualification criteria and select the at least one individual from each category whose project initiatives will be showcased at the Asia-Pacific ISLA Ceremony. It is not necessary to interview the nominees in person. For certain circumstances, if the committee has a specific question, a representative from (ISC)² will contact the nominee. All nominees who meet the criteria will be honored at the Asia-Pacific ISLA Ceremony.

     

    Q:

    Will the marking scheme the Nomination Review Committee uses be made public? Will (ISC)² share the final scores with the nominees?

    A:

    The results of the committee’s sessions are kept confidential and will not be shared with anyone other the (ISC)² ISLA Program Committee and the Nomination Review Committee.

     

    Q:

    When will the results be announced?

    A:

    After the review process, all qualified nominees will be notified by (ISC)² of the recognition results. Nominees whose project initiative is chosen to be showcased will be invited to participate in an email interview for publicity purpose.

     

    Q:

    When/Where is the ISLA Ceremony being held?

    A:

    This information will be announced later in March 2016 when nomination starts.

     

    Q:

    If I qualify for Asia-Pacific ISLA and I am invited to the ISLA Ceremony, who will pay for my travel and lodging expenses? Can I get a complimentary seat at the (ISC)² Security Congress APAC? What if I cannot attend the ceremony?

    A:

    All qualified nominees (Honorees) will be invited to attend the Asia-Pacific ISLA gala dinner and award presentations ceremony. Each nominee is responsible for their own travel and lodging to the Asia-Pacific ISLA Ceremony. Fees for the (ISC)² Security Congress APAC and the Asia-Pacific ISLA Ceremony will be waived for all invited nominees.

    Nominees who cannot attend the ISLA Ceremony will still be recognized. (ISC)² requests that a nominee who cannot attend send a representative to attend on their behalf. If a representative is sent, the ISLA program will be complimentary. If the nominee’s representative wants to attend the (ISC)² Security Congress, they will be responsible for paying the discounted conference fees

     

    Q:

    Can I be nominated for ISLA again next year if I win this year?

    A:

    A nominee can participate in the award program each year if they qualify. If a nominee was showcased this year, the Nomination Review Committee would like them to consider serving on the Nomination Review Committee for in the future. If they agree to serve on the committee, they will not be eligible to participate as a nominee during that year.

     

  • 2017 (ISC)² Asia-Pacific ISLA Showcased Honorees 2017 (ISC)² Asia-Pacific ISLA Showcased Honorees

    Information Security Educator Category


    Community Service Star special recognition Dr. Do Young Kim Dr. Do Young Kim
    Professor
    KwangWoon University
    Korea

    Showcased Honoree in the category of Information Security Educator and Community Service Star Awardee

    Showcased Project: Establishment of the First Government Approved Cyber Forensic Professional Association (CFPA)


    Managerial Professional for an Information Security Project Category


    Yoshiyuki Kuwahara Yoshiyuki Kuwahara, CISSP
    Chief of Information Strategy
    Hiroshima Prefectural Government
    Japan

    Showcased Project: Hiroshima Security Cloud Implementation


    Information Security Practitioner Category


    Lan-Fen Lin Lan-Fen Lin, MBA, ISO27001 LAC
    Head, Information Security Department
    104 Corp
    Taiwan

    Showcased Project: AES Encryption/ Decryption Algorithm Project


    Senior Information Security Professional Category


    Dr. Xiapu Luo Dr. Xiapu Luo
    Research Assistant Professor
    The Hong Kong Polytechnic University
    Hong Kong

    Showcased Project: Security Assessment of Android Apps


    Senior Information Security Professional Category


    Dr. Jungchan Na Dr. Jungchan Na
    Managing Director
    Electronics and Telecommunications Research Institute
    Korea

    Showcased Project: Information Security Expert to Implement Secure Industrial IoT


    Senior Information Security Professional Category


    Katsuhiko Nakanishi Katsuhiko Nakanishi, CISSP
    Manager of Public Safety Business Promotion Office, Tokyo Olympics and Paralympics Promotion Division
    NEC Corporation
    Japan

    Showcased Project: Contribution of Cyber Security Human Resource Development for Tokyo2020 Olympic and Paralympic Games.


    Prof. Pauline C. Reich Prof. Pauline C. Reich
    Professor and Founder/Director
    Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute, Waseda University School of Law
    Japan


    Dr. Hidehiko Tanaka Dr. Hidehiko Tanaka, Life Fellow of IEEE
    Professor Emeritus
    The University of Tokyo
    Japan


    Jae-hwan Baek Jae-hwan BaekCISSP, ENCE, CCFP(사이버포렌식조사전문가)
    Information Security Specialist
    Ministry of Culture, Sports and Tourism, Republic of Korea (Information Security team)
    Korea


    Hoi Kit Martin Chan Hoi Kit Martin Chan
    Program Director
    (ISC)2 Hong Kong Chapter
    Hong Kong


    SangMyung Simon Choi SangMyung Simon Choi
    Director
    Hauri, Inc.
    Korea


    Wei Gu Wei Gu, CISSP, CCSP, CISM
    AsiaPacific Information Security Team Leader
    AstraZeneca
    China


    Po Lun Ho Po Lun Ho, OSCP, SANS GWAPT, SANS DFIR
    Researcher
    VXRL
    Hong Kong


    Dr. Chih-Hung Hsieh Dr. Chih-Hung Hsieh
    R&D Manager
    CyberTrust Technology Institute, Institute for Information Industry
    Taiwan


    Thanongsak Kijronee Thanongsak Kijronee
    Assistant Manager
    Provincial Electricity Authority (PEA)
    Thailand


    Chia-Yi Wang Chia-Yi Wang
    Section Head
    National Center for Cyber Security Technology (Taiwan National Computer Emergency Response Team)
    Taiwan


    Dr. Joongsup Choi Dr. Joongsup Choi
    CISO/ Head of Information Security Department
    NEOWIZ
    Korea


    Dr. Ricci S. C. Ieong Dr. Ricci S. C. Ieong, CISSP, CCFP-US, CCSP
    Principal Consultant
    eWalker Consulting (HK) Ltd
    Hong Kong


    Kwok Wai Kin Ip Kwok Wai Kin Ip, CISSP, CISM, CISA
    Manager, Risk Advisory
    Deloitte China
    Hong Kong


    Sarah Taylor Sarah Taylor
    Strategic Management & Quality Manager
    CyberSecurity Malaysia
    Malaysia


    Sen Ueno Sen Ueno
    President
    Tricorder Co. Ltd.
    Japan


    Dr. Yu-Chih Wei Dr. Yu-Chih Wei, CISSP, CISM, CISA
    Researcher
    Chunghwa Telecom Co., Ltd.
    Taiwan


    Xin Xu Xin Xu
    CEO/ President
    Beijing secPoint Technology Co., Ltd
    China


    Daisuke Yogi Daisuke Yogi, CISSP
    Senior Manager Business Promotion Department
    NRI SecureTechnologies, Ltd
    Japan

  • 2017 Nomination Review Committee 2017 Nomination Review Committee
    Dr Jae-Woo Lee

    Dr Jae-Woo Lee, Fellow of (ISC)², CISA, CISM (South Korea)
    Chair Professor Graduate School of International Affairs and Information, Dongguk University 

    Dr. Jae Woo Lee is Chair Professor at Dongguk University, and president of the Cyber Forensic Professional Association Korea. He is also chairperson of the (ISC)² APAC and Advisory Board of CISO Association in Seoul. Following his retirement from his position as a major general in the Korean Air Force, Dr Lee pursued his career in the information security profession. He was the first president of the Korean Information Security Agency and an organizer of the Korean National Computerization Agency. He holds a Master of Science degree in systems management from the University of Southern California, U.S.A. and a doctorate degree from Konkuk University in Korea.less
    Kamlseh Bajaj

    Dr. Kamlesh Bajaj, Ph D (India)
    Mentor Professor, NIIT University

    Dr. Kamlesh Bajaj holds a Ph.D. (Physics) from McMaster University, Canada; and a Masters degree in Physics from the University of Delhi. He is a Fellow of the National Academy of Sciences (FNASc), and a Fellow of the Institution of Electronics Engineers (FIETE). He is also a Distinguished Fellow, EastWest Institute, New York. Dr. Bajaj was the Founder CEO of Data Security Council of India – an industry initiative - in cyber security and data privacy. At DSCI, Dr. Bajaj guided the development of best practices Frameworks for data security and privacy protection. He has served on various Government Committees on cyber security, privacy and ICT, and contributed to the activities of global bodies like OECD and EWI. He was also the Founder Director of the Indian Computer Emergency Response Team (CERT-In); he directed the cyber security initiatives in the government. He has published and lectured extensively on the IT Act 2000, cyber security and cyber crimes, privacy and data protection, Internet governance, e-commerce, digital signatures, in national and international journals and conferences. He has authored two books, and co-authored two books. Dr Bajaj also helped set up the techno-legal infrastructure for PKI in the country. He also served as Global Head, Information Risk Management Consulting Practice, Tata Consultancy Services.
    Prinya Hom-anek

    Prinya Hom-anek, CISSP, CSSLP, SSCP, SANS GIAC GCFW, CGEIT, CRISC, CISA, CISM (Thailand)
    President & Founder, ACIS Professional Center

    Mr. Prinya Hom-anek has over 20 years of experience in IT and information security, network and data communications, Internet and network security, information security, fraud and forensic investigation, penetration testing, ISMS, and generic information security consulting in both the public and private sectors. He is recognized as one of Asia-Pacific's leading information security professionals. Mr. Hom-anek founded and serves as the president for the most successful information security training, consulting, and managed security services provider in Thailand - "ACIS Professional Center" or "ACIS". He is also a senior IT and information security consultant for Thailand's government departments and agencies, including the Revenue Department, Ministry of Finance, Department of Special Investigation, Ministry of Justice, National Intelligence Agency, Bank of Thailand and several major banks in Thailand, Metropolitan Waterworks Authority, the Government Pension Fund, National Electronics and Computer Technology Center (NECTEC), and Software Park Thailand, National Science and Technology Development Agency (NSTDA). He currently serves as a senior committee member on various boards, including the (ISC)² Asian Advisory Board, the ISACA Thailand committee, and as secretary of the Thailand Information Security Association (TISA) committee. He has published over 130 information security articles in magazines and newspapers such as eEnterprise, eLeader, Telecom Journal, Thairath, DailyNews, The Nation, and Bangkok Post. He is frequently invited to appear on TV and radio programs and is a visiting lecturer at a number of universities and colleges within Thailand.
    Haruto Kitano

    Haruto Kitano, CISSP, JGISP (Japan)
    Senior Manager, Deliotte Tohmatsu Risk Services Co, Ltd.

    Dr. Haruto Kitano is currently senior manager and consultant for Deloitte Tohmatsu Risk Services Co., Ltd. His consulting is focused on security and risk management governance, database security, identity management, regulatory compliance, and privacy. He is currently a committee member of the Database Security Consortium in Japan and a member of (ISC)² Asia-Pacific Advisory Council. Dr. Kitano has been a vocal professional within the IT security industry in Japan and previously worked as a Telecom and internet networking engineer for 10 years, and at Oracle for 11 years specializing in Database Security and Identity Management. He earned his Master of Informatics from the Institute of Information Security (IISEC), the first Japanese graduate school specializing in information security, where he is researched security management and information protection against internal threat.
    Dr Melvyn Kuan

    Dr. Melvyn Kuan (Singapore)
    Assistant Director (Ecosystem Development), Cyber Security Agency of Singapore

    Dr. Melvyn Kuan is currently Assistant Director (Ecosystem Development) at the Cyber Security Agency of Singapore (CSA) where he is responsible for professional workforce development planning and programmes. Prior to the CSA, he was Head of Strategy and Digital Economy at the National Research Foundation where he was responsible for the priority setting of research areas and capability development and the development of the Services and Digital Economy R&D strategy. Dr Kuan has also served in various capacities in the former Infocomm Development Authority (IDA) such as the Technology and Planning Group and the Smart Cities Programme Office. Before joining the former IDA, he was pursuing his PhD and was a Teaching Assistant at the Department of Information Systems, National University of Singapore. His work has been published in journals such as Information & Management and Behaviour and Information Technology and; leading Information Systems conferences such as International Conference on Information Systems (ICIS), European Conference on Information Systems (ECIS) and Pacific Asia Conference on Information Systems (PACIS).
    SC LEung

    SC Leung, CISSP, CISA, CBCP (Hong Kong)
    Senior Consultant, Hong Kong Computer Emergency Response Team Coordination Centre

    Mr. SC Leung is currently the Senior Consultant of the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), supervising the security incident response team and coordinating with local and overseas parties. He has over 20 years of working experience serving banking, Internet solution provider, telecommunication and the consultancy industries. SC Leung holds several information security designations including CISSP, CISA and CBCP. He is a frequent speaker in promoting information security awareness. He had been invited to speak for Hong Kong Monetary Authority, Hong Kong Police Force, Government departments, enterprises, schools and local non-governmental organizations, while he had also spoken in overseas conferences of the (ISC)², APECTEL, CNCERT/CC of China and National University of Singapore. He was given by (ISC)² the President’s Award in 2013 and the Asia-Pacific Information Security Leadership Achievement honouree in 2007 for his voluntary work and product neutral security awareness education to the public. He was the founding member of the Internet Society, Cloud Security Alliance Hong Kong and Macau Chapter and the Professional Information Security Association and had held key positions in these organizations.
    Dr Ching-Hao Mao

    Dr. Ching-Hao Mao (Taiwan)
    Section Manager on Cyber Trust Technology Institute (CTTI) under Institute for Information Industry (III) of Taiwan

    Dr. Ching-Hao Mao is the Section Manager on Cyber Trust Technology Institute (CTTI) under Institute for Information Industry (III) of Taiwan, where he has been as the technical leader in data analytics and security intelligence. He has great knowledge about data science and 6 years of practical experience in cyber security. He is now leading a R&D team with 20 engineers and most of them are master degree above. Dr. Mao earned Ph. D. in the Department of Computer Science and Information Engineering at National Taiwan University of Science and Technology and as a member of the “intelligent System Lab”. In the past, he was a visiting scholar at Carnegie Mellon University and had collaborated with Prof. Tsuhan Chen (Cornell University) and Christos Faloutsos (Carnegie Mellon University). Dr. Mao joined the iCAST (international Collaboration for Advancing Security Technology) project from 2006 to 2008 and the TWISC (TaiWan Information Security Center) from 2005 to 2010 for joining the research of network security. His research interests are network security and data mining; more specifically, learning and inference in graphical model for causal relations of malicious network behavior. He is also interested in botnet related issues (i.e., Fast-flux, phishing and spam e-emails) and Web application security issues (i.e., Web mimicry attacks and obfuscated attacks). He has published over 30 international conference and journal papers. Dr. Mao has earned the following honors and awards: the Best Newcomer Award in III (2015), Excellent Paper Award in III (2012, 2012, 2014) Collage Outstanding Youth Award, National Taiwan University of Science and Technology, Taiwan, 2010 Best Student Paper Award, the 19th Cryptology and Information Security Conference, Taiwan, 2009 Scholarship of Graduate Research, Computer Society of the Republic of China, Taiwan, 2008. He is also the Showcased Honoree in the category of Information Security Practitioner of 2016 (ISC)² Asia-Pacific Information Security Leadership Achievement (ISLA) Program. Dr. Ching-Hao Mao has already got the following certifications: Oracle Certified Professional, Java EE 5 Web Component Developer (OCPJWCD, SCWCD), 2012 Certificate of Cloud Security Knowledge (CCSK), 2011 Capability Maturity Model Integration (CMMI) Introduction, 2008 Sun Certified Java Programmer (SCJP), 2001.
    Jill Slay

    Prof. Jill Slay, PhD, FACS, CP, MIEEE, Fellow of (ISC)², CISSP, CCFP (Australia)
    Professor, Director, Australian Centre for Cyber Security, University of New South Wales

    Professor Jill Slay is Director of the Australian Centre for Cyber Security at UNSW Canberra @ ADFA. With long-term funding allocated, this centre is developing critical mass in cross-disciplinary research and teaching in Cyber Security to serve the Australian Government and Defence Force and help strengthen the Digital Economy. She has established an international research reputation in cyber security and has worked in collaboration with many industrial partners. She was made a Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism. She was made a Fellow of the International Information Systems Security Certification Consortium for her service to the information security industry (and holds their CISSP and CCFP certifications). She has published one book and more than 92 refereed book chapters, journal articles or research papers in information assurance, critical infrastructure protection, security and forensic computing in the last 10 years. She has completed the supervision of 16 PhDs and has been awarded over AUD2 million in Australian Government Category 1 research income, including a Future Fellowship, and AUD 0.5 million in other grants.less
    Freddy Tan

    Freddy Tan, CISSP (Singapore)
    Director, Business Development, Enterprise Security, SingTel

    Freddy Tan is the Director Business Development, Singapore Telecoms (SingTel). His responsibilities include communicating SingTel's security strategy, identifying emerging security trends, and responding with appropriate security products and services. He is also responsible for cultivating relationships with the governments, industry associations and academia to foster a spirit of collaboration and mutual support in Asia. He was awarded the (ISC)² President's Award in 2003 in recognition of his volunteer work with (ISC)² and had served as Chairperson of the (ISC)² Board of Directors for 2012 and 2013 and co-chairperson of the (ISC)² Board of Directors for 2010 and 2012. He had also served as a member of (ISC)² Asia Advisory Board. In 2013, he was appointed as the APAC Strategy Advisor for Cloud Security Alliance (CSA). Freddy is also the President of Security & Governance Chapter, Singapore IT Federation (SiTF) and Vice President and founding member of the Singapore Association of Information Security Professionals (AISP). He also is a resource person for the UN-ESCAP Academy Training for ICT for Development (ICTD) Capacity-Building program where he has delivered an Information Security and Privacy module in Korea and Myanmar. He has over 25 years of experience in information security serving with the Singapore government and six with Microsoft. He has presented on security in Bangladesh, Brunei, Indonesia, Japan, Malaysia, Mongolia, Philippines, Singapore, Sri Lanka, South Korea, Taiwan, Thailand, United States and Vietnam and has also been called upon by media in Bangladesh, Malaysia, Singapore, South Korea, United States and Vietnam for his opinions regarding cybersecurity.
    Wansuck yi

    Wansuck Yi, CISSP (Korea)
    Director, Infrastructure Protection Division, Korea Internet & Security Agency

    Wan S. Yi is a director, Infrastructure Protection Division in Korea Internet and Security Agency (KISA). He received BS degree in Computer Science from Virginia Polytechnic Institute and State University in US. He also received MS degree in information security from Dongguk University and Ph.D. in computer engineering from SungKyunKwan University in Korea. Since 2014, he is an adjunct professor at SungKyunKwan University. He served in a variety of important career building assignments including Director of IT Security Planning Team, IT Security Evaluation Team, IT Service Security Team and CIP Team. Finally, he served as the VP of Internet Incident Prevention Division and International Cooperation Group. Before joining KISA, he worked for Hyundai Information Technology, LTD. During his military service, he was an Aide de Camp for Deputy Commander in Chief, ROK/US Combined Forces Command. He retired from service in 1994 as a Korean Air Force lieutenant. His award includes two ROK/US CFC DCINC Awards (1993, 1994), US Army Achievement medal (1993) and commendation Medal (1993), National Intelligence Service Award (2000), ISC² ISLA (2008), ISC² Presidential Award (2008), Minister of Public Affairs and Security Award (2009), and ROK President Award (2012).
  • Sponsorship Opportunities Sponsorship Opportunities

    Platinum Sponsor: $8,500 (limit 1)

    •  Company logo, description and link on ISLA website 
    •  One table positioned front and center or option to sit executives at winner / finalist tables (8 seats) 
    •  Two corporate executives seated at Gala VIP table 
    •  Verbal recognition from podium by Master of Ceremonies 
    •  2 page spread, 4-color advertisement in the Gala program book 
    •  Company logo included in email promotions, news releases, media advisories, print advertisements, etc. 
    •  Company logo on reception signage 
    •  Company logo on all Gala name badges 
    •  Company logo in PowerPoint presentation at awards ceremony 
    •  Opportunity for a corporate executive to briefly address attendees before the ceremony begins 
    •  Opportunity to supply each seat with a token corporate gift 

    Gold Sponsor: $6,500 (limit 2)  

    • Company logo, description and link on ISLA website
    • One table positioned in prime location (8 seats)
    • Verbal recognition from podium by Master of Ceremonies
    • Full-page, 4-color advertisement in the Gala program book
    • Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
    • Company logo on reception signage

    Silver Sponsor: $4,000 (limit 3)

    • Company logo, description and link on ISLA website
    • Half-table at Gala Dinner Ceremony (4 seats)
    • Verbal recognition from podium by Master of Ceremonies
    • Half-page, 4-color advertisement in the Gala program book

    For sponsorship opportunities, please contact Clayton Jones at +852.8226.7798, fax at +852.8226.7723 or cjones@isc2.org .

(ISC)² EMEA ISLA

Honoring the Information Security Workforce in the EMEA

After 11 consecutive years of success in the Americas and Asia Pacific, the Information Security Leadership Awards (ISLA) are coming to the EMEA!

The (ISC)² EMEA ISLA Awards are a unique opportunity for you to nominate fellow information security and management professionals that go the extra mile to enhance security throughout the private and public sectors across Europe, the Middle East and Africa. Your nominee could be a well-known figure, a stand out leader or equally, an unsung hero working tirelessly in the background.

These are the only awards that give the professional cybersecurity community — including our vast and vibrant membership of over 20,000 across the region — a credible opportunity to recognize peers and provide notable exposure from the world’s largest nonprofit membership organization in our field.

Why not show your appreciation for achievement that has impressed you as we shine a spotlight on and celebrate the tremendous amount of talent in this region.

  • Award Categories Award Categories

    Keep an eye out for remarkable projects and initiatives! 

    You will have a key role as you will be responsible for nominating the Information Security professionals who have distinguished themselves under specific projects, programmes and initiatives, over the region in the 4 following categories:

    • Senior Information Security Professional – someone who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
    • Information Security Practitioner – an individual who has distinguished themselves for implementing and/or managing the implementation of a component of a security program. Candidates in this category typically should have at least three years of work experience directly related to information security.
    • Up-and-Coming Information Security Professional – a person who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational.
    • Woman Information Security Professional - a female who through her work and commitment, has contributed to women’s representation in the profession and raised awareness to encourage vocations among women. Candidates in this category typically should have at least three years of work experience directly related to information security.

    Submissions must align with the category for which they are nominated and will be judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the EMEA ISLA Judges Committee to confirm the accuracy of the information provided.

  • Nomination Nomination

    Nomination open on the 12th June and close on the 12th July. You can make your submission via (ISC)² Global Awards Program nomination portal.

    Nominations are open to, members and non-members from the EMEA region (barring (ISC)² staff and the judging panel) and it is free to put someone forward. Nominators can come from anywhere, they do not have to be from the EMEA region.

    Submissions will be judged by members of the Europe, Middle East and Africa Advisory Council (EAC).

    For further information about nominations, please contact us.

  • Judging Committee Judging Committee

    Yves Le Roux, CISSP, CISM
    Yves Le Roux is the Co-chair of the (ISC)² EMEA Advisory Council

    Previously he undertook network security leadership roles at a variety of organisations including the Rothschild Group, CA Technologies and the French Ministry of Industry. Yves has also co-authored three books on security, and lectures at ISEP (Paris Graduate Engineering School).

    Yves Le Roux on LinkedIn.

     

    Dr. Yiannis Pavlosoglou, PhD, CISSP
    Yiannis Pavlosoglou is the Strategic Change Manager for Operational Resilience at global financial services firm UBS. He is also Co-chair of the (ISC)² EMEA Advisory Council and has held the chair of the Global Industry Committee for the Open Web Application Security Project (OWASP) and led a number of projects within that space.

    Yiannis Pavlosoglou on LinkedIn.

     

    Tom Gamali, CISSP, CISA 

     Tom Gamali heads up the Group Technology Risk and Business Continuity Management function for Kuwait Finance House (KFH) and an executive member of the US OSAC (Overseas Security Advisory Committee) for the US Embassy in Kuwait.

    Tom Gamali on Linkedin.

     

    Rainer Rehm, CISSP, CISM

    Rainer Rehm is a Security Architect at MAN, one of the founding members of The (ISC)² Chapter Germany and a member of the Alliance for Cybersecurity. He is also an official (ISC)² instructor and regularly contributes to the development and maintenance of the (ISC)² CBK.

    Rainer Rehm on LinkedIn.

     

    Sofiane Chafai, CISSP

     Sofiane Chafai is an Information Security expert with over 15 years’ experience in managing ICT and security projects, system implementation, security programmes and business continuity management for large international companies in Middle East and North Africa. Currently, he is the Managing Director of MFC Advisory, Sofiane is an (ISC)² and ISACA active member who contributed to numerous magazines and spoken at international conferences.

    Sofiane Chafai on LinkedIn.

     

    Paco Hope, CISSP, CSSLP

    Principal Consultant at Cigital, Paco Hope is a recognised expert in the field of software security. He has worked with many of the world’s leading organisations to help them create secure software. He is the author of two security books, a frequent conference speaker and a regular online author.

    Paco Hope on LinkedIn.

  • Award Ceremony Award Ceremony

    Hosted at the (ISC)² Secure Summit UK in London in December, shortlisted nominees from outside the host country will be sponsored to attend the evening ceremony. The awards will also be the perfect occasion for our community to come together and network as they celebrate the accomplishments of our friends and colleagues. The winners will join an elite global community of Americas ISLA and APAC ISLA award winners, recognised by the world’s largest information security membership organisation. 

    See last year's Americas ISLA winners.

    Discover APAC ISLA's showcased projects and honorees.

    Follow (ISC)² to keep up-to-date with the latest EMEA ISLA News, follow on LinkedIn, Facebook, and Twitter.

    #EMEAISLA17

U.S. GISLA®

 

Recognizing Federal Information Security Leaders 

This program recognizes the ongoing commitment of individuals whose initiatives, processes and projects have led to significant improvements in the security posture of a department, agency or the entire federal government. The nomination period is now open for the (ISC)² U.S. Government Information Security Leadership Awards (GISLAs).

  • Congratulations to the 2017 U.S. GISLA Award Recipients Congratulations to the 2017 U.S. GISLA Award Recipients

    Congratulations to the 2017 President’s Award Recipient

    Pete Gouldmann, Enterprise Risk Officer -Cyber, U.S. Department of State

    Congratulations to the 2017 U.S. GISLA Award Recipients

    Technology Improvement – Individual Category:

    Daniel Holmes, Senior Information Technician Operations Engineer, US Army

    Process/Policy Improvement – Individual Category:

    Matt Shabat, Director of Performance Management, Department of Homeland Security (DHS)

    Workforce Improvement – Individual Category:

    Barbara Smith, Information Security Director, Pacific District, Department of Veterans Affairs

    Up-and-Coming Information Security Professional – Individual Category:

    Michael Rocha, IT specialist, DHS

    Community Awareness – Team Category:

    Hemant Baidwan, Branch Chief, Executive Business Management, DHS

    Most Valuable Industry Partner (MVIP) – Team Category:

    Parham Eftekhari and James Scott, Co-founders and Senior Fellows, Institute for Critical Infrastructure Technology

    F. Lynn McNulty Tribute Award:

    Brig. Gen. (ret.) Gregory Touhill, CISSP, former Federal Chief Information Security Officer

  • Award Categories Award Categories

    Individual Awards

    • Up-and-Coming Information Security Professional -­ This award goes to a new, rising star in the U.S. federal, state or local government information security field. The project, improvement or initiative they represent should relate to their current position or educational work (e.g., research project, implemented emerging technology or outstanding work in security operations). The individual may not have more than 3 years of experience in the information security field and must be a current government employee (not a contractor/consultant).
    • Workforce Improvement ­- A U.S. federal, state or local government information security manager (examples include CISO, deputy CISO, information security manager, program manager, etc.) whose leadership role supporting an initiative, program or project has significantly contributed to the advancement of the government¹s information security workforce on government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
    • Technology Improvement ­- A U.S. federal, state or local government information security or information technology manager (examples include CIO, CISO, CTO, program/project manager, etc.) whose leadership role supporting a security technology initiative, program or project (e.g., cloud migration, information sharing, breach response/recovery, etc.) significantly contributed to the advancement of the government¹s information security technology on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
    • Process/Policy Improvement ­- A U.S. federal, state or local government manager (examples include CIO, CFO, program/project manager, etc.) whose leadership role supporting a security policy/process initiative, program or project significantly contributed to the advancement of the government's information security policy/process (e.g., training, incident response, risk management, etc.) on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).

     

    Team Awards

    A winning team will be recognized for its efforts on projects in each of the following categories. All team members will be recognized, with one award given to the team:

    • Most Valuable Industry Partner (MVIP) ­- A U.S. federal, state or local contractor or consultant team (currently supporting a government contract) whose project or initiative has significantly contributed to the advancement of information security in the areas of information security workforce, policy, process or technology. The project must have been implemented within the last 12 months. Nominations will be verified by the government agency supervisor for the nominated initiative.
    • Community Awareness - A U.S. federal, state or local information security team whose project has significantly contributed to building or broadening security awareness in the local community within the last 12 months (not a contractor/consultant).

    GISLA Gala Photo

    (ISC)² U.S. GISLA 2015 - Samuel Maroon

  • 2017 GISLA® Judges 2017 GISLA® Judges

    USGAC Member Judges

    Dan Waddell Dan Waddell, CISSP, CAP, PMP, (ISC)² Managing Director, North America Region, Director of U.S. Government Affairs and Chair of (ISC)² U.S Government Advisory Council

    Mr. Waddell is responsible for managing operations in the North America Region, which primarily focuses on supporting our U.S. and Canadian members, customers and strategic partners. He also leads all U.S. Government Affairs activities and is the primary (ISC)² official responsible for interacting with public sector entities (i.e. federal, state and local governments); major corporations; universities and other higher education institutions; and professionalization organizations throughout the U.S. Mr. Waddell serves as the principal point of contact for various trade associations; public interest groups and other entities focused on information security and information security workforce issues. He has over 20 years of experience in information technology, information assurance, and cybersecurity, with over 15 of those years in management. Mr. Waddell has been a featured guest speaker on cybersecurity issues on both TV and radio shows such as “NBC News4 Midday”, “Government Matters” and “Federal News Radio”, in addition to several cybersecurity conferences across the United States. He is currently a Fellow at the Institute of Critical Infrastructure Technology (ICIT), a non-partisan think-tank based in Washington, D.C. that acts as a conduit between the legislative community, technology providers and federal agencies. Mr. Waddell also chairs both the (ISC)² U.S Government Advisory Council and the U.S. Government Executive Writers Bureau, and received the (ISC)² President’s Award in 2013.


    Leo Scanion Leo F. Scanlon, CISSP, Deputy CISO, U.S. Department of Health and Human Services/HHS Senior Cybersecurity Advisor for the Healthcare Sector and Co-Chair of the (ISC)² U.S Government Advisory Council

    Mr. Scanlon is the Deputy CISO, U.S. Department of Health and HumanServices, and is the agency Senior Cybersecurity Advisor for the HealthcareSector. Prior to joining HHS, Mr. Scanlon was director of IT security staffand CISO for the U.S. National Archives and Records administration (NARA).In addition to Mr. Scanlon¹s CISO duties, he served as a NARA observer tothe Committee on National Security Systems and participated in theComprehensive National Cybersecurity Initiative (CNCI) Working Group, theInformation Security Identity Management Committee (ISIMC) of the CIOCouncil and the Cloud Computing and Configuration Management Working Groupsubcommittees of the ISIMC.

    Patrick Kelly Patrick J. Kelly, CISSP,
Lecturer, George Washington University

    Patrick J. Kelly is a Critical Infrastructure Policy Analyst at the Office of the Comptroller of the Currency. Prior to joining the OCC, Mr. Kelly was the Senior Official for Privacy and Information Security Branch Chief at the Office of Inspector General for the Department of Health and Human and served as an operations and payment systems analyst at the Board of Governors of the Federal Reserve System. Mr. Kelly is a Lecturer in the Department of Computer Science and a Senior Research Associate in the Cyber Security Policy and Research Institute at George Washington University. Additionally, he is a member of the (ISC)² U.S. Government Advisory Council for Cyber Security and is a contributing author for the (ISC)² HealthCare Information Security and Privacy Practitioners (HCISPP) certification guide. Mr. Kelly attended George Washington University where he was a recipient of the CyberCorps: Scholarship for Service through the National Science Foundation and earned a Masters of Public Policy.

    Chuck McGann

    Charles L. (Chuck) McGann, Jr., CISSP, CISM, IAM
    Independent Security Consultant

    Charles L. (Chuck) McGann, Jr., CISSP, CISM, IAM, is an Independent SecurityConsultant focusing on assisting senior management with reviews of existing security programs to assess the impact of growing needs and mandates of compliance and security controls. He is experienced in large scale incident response activity including incident response plan development, testing and implementation. He is the former Chief Cyber Strategist and Director for the Center for Innovation and Growth for Salient CRGT a government contractor providing IT and Security services to DoD, Army, USPS, VA, OPM among other agencies. In that role, McGann worked to leverage CRGT capabilities among the Federal Civilian agencies as well as review emerging vendors for possible partnerships for increasing agency support needs. McGann also served as the Corporate Information Security Officer for the United States Postal Service (USPS). In this capacity, he had the responsibility of securing an intranet that is one of the largest maintained by any organization in the world with over 145,000 workstations and more than 10,000 servers. The USPS infrastructure encompasses over 600 business applications that support all aspects of business operations as well as movement of the mail. In his 27 years with the Postal Service, McGann held numerous positions, entering as Manager, Information Systems for the Springfield, Massachusetts district, and later served as an acting postmaster, business systems analyst, business project leader, distributed systems security specialist and CIRT manager. McGann holds an MBA from Strayer University, a bachelor¹s degree from the University of Massachusetts, and two associate's degrees from Springfield Technical Community College.

    Michael Stoner Michael Stoner, CISSP, PMP, GSLC, Chief Information Security Officer, Civilian Agency

    Mr. Stoner’s expertise is in executing enterprise security programs, establishing and implementing security standards and procedures, ensuring compliance with federal laws and regulations, identifying threats to agency assets and resources, and evaluating methodologies and alternatives for risk mitigation. He has also overseen the proactive prevention, detection, and response to computer security incidents targeting government enterprise information technology assets and data. Before Mr. Stoner began his civil service career, he provided management and technology consulting services to federal government agencies in the areas of information assurance and security. Mr. Stoner has experience in a number of security disciplines with a concentration in incident response, risk analysis, security engineering, and security policy development and compliance. He holds a bachelor’s degree in Computer Science from Ohio Northern University and a master’s degree in Information and Telecommunication Systems from Johns Hopkins University.

    Non-USGAC Member Judges


    Tomas Millar Thomas R. Millar, Chief of Communications, United States Computer Emergency Readiness Team, National Cybersecurity & Communications Integration Center, U.S. Department of Homeland Security

    Mr. Thomas R. Millar serves as the United States Computer Emergency Readiness Team’s (US-CERT) Chief of Communications, a role which finds him at the intersection of outreach, awareness, standards development, and technical interoperability initiatives. In this role, Mr. Millar is focused on modernizing US-CERT's approaches to information sharing, knowledge exchange and coordination. Since joining US-CERT in 2007, he has played a significant role in US-CERT's response activities during major cyber events such as the Distributed Denial of Service (DDoS) attacks on Estonia in 2007, the outbreak of the Conficker worm, and the DDoS attacks on major U.S. Government and commercial Web sites in 2009. Mr. Millar has previously worked as a team lead for intrusion detection and analysis at the FBI’s Enterprise Security Operations Center. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force. Mr. Millar has a Master’s of Science in Engineering Management from the George Washington University.

    Sunn Tateja Sunny K. Tuteja, CISSP, CAP, CEH, Founder, President and CEO, AssurIT Consulting Group

    Mr. Sunny K. Tuteja is the Founder, President and CEO of AssurIT Consulting Group (ACG). He founded ACG in 2013 to fill a need for a highly capable, quality conscious and customer driven Cybersecurity consulting firm. He has over 10 years of experience working hand-in-hand with numerous commercial entities and agencies within the United States Federal Government in order to deliver top-notch service in a variety of functions. He has performed work at all levels – ranging from technical work at the Security Engineer level – all the way up to managing an entire security team of 30+ to strategize, implement and maintain an entire agency-wide Cybersecurity Program. Sunny now focuses on the strategic growth and day-to-day operations of ACG while still providing SME-level support as needed for his valued clients.

    Mr. Tuteja has held several roles during his career and supported many Government departments and their agencies, including: Department of Commerce (DOC), Department of Health and Human Services (HHS), National Gallery of Art (NGA), Department of Transportation (DOT), National Aeronautics and Space Administration (NASA), Department of Homeland Security (DHS), Department of Justice (DOJ), Broadcasting Board of Governors (BBG), Department of Treasury (DOT), United States Patent and Trademarks Office (USPTO), Federal Aviation Administration (FAA), United States Department of Agriculture (USDA), General Services Administration (GSA) and Maryland Department of Human Resources (MD DHR). Mr. Tuteja has also supported several large-scale, global commercial entities including Thomson Reuters and Infor. He led and participated in many Cybersecurity projects with these clients and left a lasting impression on every IT executive that he interfaced with. Mr. Tuteja has been told that he has a knack for listening to his clients’ needs and understanding exactly what they need the first time around – thus increasing efficiency and eliminating the need for iterative rework.

    Mr. Tuteja graduated from George Mason University earning a B.S. in IT with a concentration in Network Telecommunications & Information Security, as well as a minor in Business. He also holds a M.S. in Information Systems from the University of Miami, and a M.B.A. from the nationally-ranked Robert H. Smith School of Business at the University of Maryland, College Park. Mr. Tuteja also holds many industry standard certifications including: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certificate of Cloud Security Knowledge (CCSK), Security +, Network +, A +, Tenable Certified Nessus Auditor (TCNA), and Microsoft Certified Professional (MCP).

    Mr. Tuteja was also the recipient of the 2014 (ISC)² U.S. Government Information Security Leadership Award (GISLA). Now in its 14th year, the (ISC)² GISLA program has been recognizing the ongoing commitment of individuals whose initiatives in the areas of technology, process/policy or community awareness have led to significant improvements in the security posture of a department, agency, or the entire federal government.
  • Sponsorships Sponsorships

    GISLA sponsor packages are available for purchase in limited quantity. Secure your spot today!

    Platinum Sponsor: $6,500  

    • Company logo, description and link on GISLA site
    • One table at the GISLA Dinner Ceremony (8 seats)
    • Verbal recognition from podium by Master of Ceremonies
    • Full-page, 4-color advertisement in the Gala program book
    • Company logo on reception signage
    • Will be asked to present an award to a winner (in the area of their choice)
    • Official table sponsor (4 tables)

    Gold Sponsor: $3,000  

    • Company logo, description and link on GISLA site
    • 4 seats at GISLA Dinner Ceremony
    • Verbal recognition from podium by Master of Ceremonies
    • Full-page, 4-color advertisement in the Gala program book
    • Table Sponsor (2 tables- This will include sponsored by table signage.)
    • Company logo on reception signage

    Silver Sponsor: $1,500 

    • Company logo, description and link on GISLA site
    • 2 seats at GISLA Dinner Ceremony
    • Verbal recognition from podium by Master of Ceremonies
    • Half-page, 4-color advertisement in the Gala program book
    *The packages below can be sold separately. 

    Exclusive Cocktail Hour Sponsor: $5,500 

    • 4 attendee passes to Cocktail Hour (Seats for GISLA Dinner Ceremony are not included. If interested, please see sponsorship packages above.)
    • Signature cocktail named after Sponsor
    • Special Acknowledgment on cocktail napkins
    • Logo and link on event information page and in all pre-show communications
    • Logo on Gala program book
    • Half-page, 4-color advertisement in the Gala program book
    • Verbal recognition from podium by Master of Ceremonies

    Exclusive Dessert Reception Sponsor $5,500

    • 4 attendee passes to Dessert Reception (Seats for GISLA Dinner Ceremony are not included. If interested, please see sponsorship packages above.)
    • Signature dessert named after Sponsor
    • Special Acknowledgment on dessert napkins
    • Logo and link on event information page and in all pre-show communications
    • Logo on Gala program book
    • Half-page, 4-color advertisement in the Gala program book
    • Verbal recognition from podium by Master of Ceremonies

    Giveaway Sponsor $1,000

    • Exclusive co-branded GISLA giveaways for each attendee (For example: Official GISLA Medallion, Wine Glass, etc.)
    • Logo and link on event information page and in all pre-show communications
    • Logo on Gala program book
    • Verbal recognition from podium by Master of Ceremonies 
    Email sponsorships@isc2.org to secure your sponsorship. For more detailed information download the Sponsor Media Kit.

    2016 Sponsors

    Platinum Sponsors:

    KGSS

    KPMG

    onapsis

    Gold Sponsors:

     Capella University

    Silver Sponsors:

     Ratheon

    2015 Sponsors

     Brainloop

    Brainloop Inc., the Secure Enterprise Information Company, is a market-leading provider of highly intuitive SaaS (Software-as-a-Service) solution enabling customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments. Brainloop Inc. enables next generation document security anytime, anywhere.

    Capella University

    Capella University is an accredited, online university offering Information Technology programs at the doctoral, master's, bachelor's, and certificate level. Capella is designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense (CAE IA/CD) by the National Security Agency and the U.S. Department of Homeland Security. Learn more: capella.edu/ISC2.

    Forgerock

    Access for citizens. Efficiency for governments.
    ForgeRock makes it possible for governments to provide simple, secure access to a wide range of digital public services. We make it easy to streamline applications, registrations, and transactions for citizens, while reducing government costs and expenditures.

    Guidance Software

    Guidance Software is recognized as the industry leader in digital investigative solutions. Our EnCase® product line empowers numerous government agencies to detect hidden security threats and anomalous insider activity, conduct automated and manual incident response, perform sensitive data discovery, securely erase errant data, and respond to compliance and discovery requests.

    www.guidancesoftware.com

    IBM

    KGSS

    KGSS’s mission is to design, implement and deliver holistic, world-class cybersecurity intelligence products, services and solutions. KGSS technology empowers advanced protection for the US government, its contractors and the US National Critical Infrastructure.

    KGSS was formed in response to Eugene Kaspersky’s drive to “save the world” by working with government, as well as other public and private entities, that are committed to achieving a safe, stable and secure cyber ecosystem.

    Spikes

    Spikes Security solves the #1 cyber-security threat facing businesses of all sizes — malware attacks that breach web browsers, infect endpoint devices, and compromise network security and sensitive data. Spikes Security offers AirGap, an innovative browser isolation system that protects businesses from browser-borne malware and enables employees to utilize the Web safely.

    Verisign

    Verisign, a global leader in domain names and Internet security, enables Internet navigation for many of the world’s most recognized domain names and provides protection for websites and enterprises around the world. Verisign ensures the security, stability and resiliency of key Internet infrastructure and services, including the .com and .net domains and two of the Internet’s root servers, as well as performs the root-zone maintainer functions for the core of the Internet’s Domain Name System (DNS). Verisign’s Network Intelligence and Availability services include intelligence-driven Distributed Denial of Service Protection, iDefense Security Intelligence and Managed DNS. To learn more about what it means to be Powered by Verisign, please visit VerisignInc.com.

  • U.S. GISLA Videos U.S. GISLA Videos

    Videos of Past Winners

    2015 U.S. GISLA Recipient
    Samuel Maroon - Wounded Warrior Cyber Academy
    2014 U.S. GISLA F. Lynn McNulty Tribute Recipient
    Roberta "Bobbie" Stempfly

Fellow of (ISC)²

The Fellow of (ISC)² was established to honor and distinguish a select number of elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession.

  • Qualifications Qualifications

    Fellow of (ISC)²

    Fellow of (ISC)² candidates must be nominated by a:

    •  A sitting or former (ISC)² board member
    • A Fellow of (ISC)²
    • An (ISC)² Harold F. Tipton Award recipient
    • The sitting (ISC)² Board of Directors will make the final selection.

    Fellows of (ISC)² are entitled to:

    •  A lifetime association with (ISC)² without fees or other maintenance requirements
    • Receive (ISC)² Official Communications
    • Access profile record on (ISC)²'s website to maintain contact information
    • Nominate other Fellows
    • Use of Fellow of (ISC)² designation
  • Past Recipients Past Recipients

    Fellow of (ISC)²

    • Koji Nakao
    • Prof. Edward J. Humphreys
    • Mike Jacobs
    • Frederick B. Cohen
    • Roger R. Schell
    • Dr. Ronald L. Rivest
    • Dr. Jill Slay
    • John "Jack" Holleran
    • William J. Caelli
    • Dorothy E. Denning
    • Whitfield Diffie
    • Jae-Woo Lee
    • Joseph T. Lisi
    • William Maconachy
    • F. Lynn McNulty
    • Peter G. Neumann
    • Steve Orlowski
    • Fred Piper
    • Daniel J. Ryan
    • Corey Schou
    • Eugene H. Spafford