Awards and Designations
People, policies, and processes are the keys to protecting or securing information assets. (ISC)² offers several awards to recognize the people that make a difference in this ever evolving industry, honoring their tireless efforts and standards of excellence.
- (ISC)² Harold F. Tipton Award
- James R. Wade Service Award
- F. Lynn McNulty Tribute Award
- The (ISC)² President's Award
- ISLA Americas
- ISLA Asia-Pacific
- ISLA EMEA
- ISLA Government
- Fellow of (ISC)²
(ISC)² Harold F. Tipton Lifetime Achievement AwardThe Harold F. Tipton Lifetime Achievement Award is awarded by the (ISC)² Board of Directors as the highest tribute bestowed in the information security industry. Named after Harold F. Tipton, CISSP, known as the “George Washington of information security,” the award is to honor his memory and tradition of passionately promoting and enhancing the information security and the information security profession. This award therefore recognizes member(s) for his or her lifelong contributions to the advancement of information security and the information security profession by serving, over the long term, with excellence and distinction.
(ISC)² certification is required to be eligible; the recipient must have demonstrated sustained excellence throughout their entire information systems security career.
- Candidates must be members in good standing , or a Fellow of (ISC)².
- Any (ISC)² member can be nominated by either the members in good standing or by the Board Awards Committee.
- The Awards Committee selects the recipients and puts forth a motion to the board for approval at the Q3 board meeting each year.
- The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the
- Awards Committee Nominations should be submitted to email@example.com.
Professor Howard Schmidt – the award was presented by Wim Remes, Board Chairman in Orlando at the Q1 Board of Directors Dinner on 14 January 2017
- 2015 Dr. Frederick Piper
- 2013 Dr. Eugene Spafford
- 2012 Prof. Hiroshi Yasuda, Dr.E, CISSP
- 2011 John O'Leary, CISSP
- 2010 Lt. Col. Husin bin Jazri (Retired), CISSP
- 2009 Sandra M. Lambert. CISSP-ISSMP
- 2008 The late James R. Wade, CISSP-ISSAP, ISSMP
- 2007 Dr. Jae Woo Lee, CISSP 2006 William H. Murray, CISSP
- 2005 Dr. Willis H. Ware
- 2004 Dr. Dorothy Denning, Fellow of (ISC)²
- 2003 Donn B. Parker
- 2002 Micki S. (Krause) Nozaki, CISSP
- 2001 Harold F. Tipton, CISSP and Prof. Corey Schou, Ph.D., CSSLP, Fellow of (ISC)²
James R. Wade Service Award
The James R. Wade (ISC)² Service Award is awarded by the Board to acknowledge the involvement of those volunteers who merit special distinction for their sustained and valuable service to (ISC)². James R. Wade was an esteemed, long-time contributor to (ISC)², and it is our privilege to honor his memory with this award.
The award is given out to one person annually. (ISC)² certification is not required to be eligible; the recipient is a volunteer who has made a significant contribution to (ISC)².
- Any (ISC)² volunteer can be nominated by either the members or by the Board Awards Committee.
- The Awards Committee selects the recipients and puts forth a motion to the board for approval at the summer board meeting each year.
- The finalist selection is by majority vote of the board, and the award is presented at an appropriate time and place, as specified by the Awards Committee.
- Awards Committee Nominations should be submitted to firstname.lastname@example.org.
Professor Daniel Ryan – the award was presented by Wim Remes, Board Chairman, in Orlando at the Q1 Board of Directors Dinner on 14 January 2017
- 2015 Dr. Peter Berlich
- 2014 Meng Chow Kang, CISSP, CCSP
- 2013 Diana-Lynn Contesti CISSP-ISSAP, ISSMP, SSCP, CSSLP
- 2012 Rick Koenig, CISSP
- 2011 Warren Pearce, CISSP
- 2010 Richard Nealon, CISSP, SSCP
- 2009 Benjamin H. Gaddy, Jr., CISSP, SSCP
- 2008 Randolph N. Sanovic, CISSP-ISSAP, ISSMP
F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award
The (ISC)² F. Lynn McNulty Tribute U.S. Government Information Security Leadership Award recognizes a member of the U.S. federal information security community who upholds McNulty's legacy as a visionary and innovator through outstanding service and commitment.
"Lynn McNulty made a significant mark in his efforts to achieve the ambitious goal of building a professional government information security workforce and to strengthen the security posture of the country's information resources and infrastructure," says W. Hord Tipton, CISSP-ISSEP, CAP, CISA, executive director of (ISC)2. "One of Lynn's very tangible legacies was the GISLA program that he championed and which has since become one of the most coveted recognition programs for federal cybersecurity professionals today."
McNulty was a true pioneer in government information security circles, having served in a number of critical and high-profile capacities, including as associate director for computer security at the National Institute of Standards and Technology, as the first information systems security director at the U.S. State Department and as director of government affairs for RSA.
Known for his dedication to professionalizing the government workforce and often referred to by those within the community as the "pioneer" of government information security, Lynn had a tremendous impact on the entire industry. He passed away at the age of 73 on June 4, 2012.
In recognition of all of his contributions, (ISC)² created the F. Lynn McNulty Tribute GISLA. Members of the (ISC)² U.S. Government Advisory Board hand-select a recipient for the Tribute Award annually.
McNulty spent his post-government career working in key roles within (ISC)² including as a member of the (ISC)² Board of Directors, (ISC)² director of government affairs and founding co-chair of the (ISC)² U.S. Government Advisory Board for Cyber Security. His achievements were recognized with various designations, such as the exclusive Fellow of (ISC)², the ISSA Hall of Fame Award, the Cyber Security Hall of Fame, the Fed 100 Award, and as one of Federal Computer Week's top 25 federal IT influencers.
In June 2012, McNulty was recognized posthumously with one of the industry's top honors, the RSA Lifetime Achievement Award.
Brig. Gen. (ret.) Gregory Touhill, CISSP
Former Federal Chief Information Security Officer.
2016 Richard A. Hale
Richard Hale is the Deputy CIO for Cyber Security, Department of Defense. In this position he acts as the department’s Chief Information Security Officer. Mr. Hale is responsible for ensuring the department has a well defined and well executed cyber security program, and is responsible for coordinating cyber security standards, policies and procedures with other federal agencies, coalition partners and industry.
2015 Hord Tipton
W. Hord Tipton, CISSP, former executive director, (ISC)², was the first government CIO to obtain a CISSP, helping to bring high-profile attention to the need for a more professionalized information security workforce. Hord has been instrumental in fostering the security education and certification of hundreds of thousands of individuals worldwide. He has dedicated his life to the advancement of the information security profession in the U.S. government and beyond, and is considered one of the most influential people in security
2014 Roberta "Bobbie" Stempfley
Ms. Stempfley came to DHS in 2010 to serve as the director for the National Cyber Security Division (NCSD), and she was later selected to serve as the deputy assistant secretary for Cybersecurity and Communications (CS&C). Thanks to her vision and tenacity, the CS&C - now comprised of five divisions -- leads interagency and public-private initiatives that enable all to better secure their parts of cyber space.
2013 Dr. Ronald "Ron" Ross
Dr. Ross, senior fellow at the National Institute of Standards and technology (NIST), played a key role in establishing cyber security requirements for federal agencies for decades. By honoring Ron with this designation, we are ensuring that Lynn's legacy of influence and commitment to government information security is recognized for years to come.
The (ISC)² President's Award
The (ISC)² President’s Award recognizes volunteers who have made a significant impact on and/or contribution to (ISC)² through their dedicated volunteer efforts throughout the past year. Multiple recipients are chosen annually for each region at the sole discretion of (ISC)²’s CEO.
Pete Gouldmann, CISSP
Enterprise Risk Officer - Cyber, U.S. Department of State
Presented at the ISLA Government awards.Glenn Leifheit, CISSP, CSSLP
Senior Security Service Architect, Microsoft
Presented at the ISLA Americas awards.Bart Lauwers, CISSP
Strategic Technologist for Information Security, Artificial Intelligence, and IT, SignaCert
Presented at the ISLA Americas awards.
- Sandy Bacik, CISSP
- Peter Berlich, CISSP
- Neil Breden, CISSP
- Devon Bryan, CISSP
- Edmund Chua, CISSP, CSSLP
- David Church, CISSP
- Diana-Lynn Contesti, CISSP
- Frank Dey, CISSP
- James Doyle, CISSP
- Peter Drabwell, CISSP
- Art Friedman, CISSP
- Simone Gauthier
- Jakob Frydendal Gercke, CISSP
- Adam Gordon, CISSP-ISSAP, ISSMP, SSCP
- Kevin Gourlay, CISSP
- Richard Harrison, CISSP
- Scott Hayden, CISSP
- Stephen Hernandez, CISSP, CAP, SSCP, CSSLP
- Chuan-Wei Hoo, CISSP
- S.C. Leung, CISSP
- Sujit Christy, CISSP
- Eric A. Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CCSP
- Steve Hindle, CISSP
- Prinya Hom-Anek, CISSP
- Sung Jae, Joo
- Randy Johnson, CISSP
- Robert Johnston, CISSP
- Hye Jung, Yang (Ms)
- Meng Chow Kang, CISSP
- Gurdeep Kaur, CISSP
- Ang Hock Kheng
- David Krehnke, CISSP
- Simon Philip Lamb, CISSP
- Richard Lane, CISSP
- Howard Lau, CISSP
- Jae-Woo Lee - Honorary CISSP
- Richard Nealon, CISSP
- Anthony Lim, CSSLP
- Eamonn McCoy, CISSP
- James McQuiggan, CISSP
- James Molini, CISSP, CSSLP
- Henry Ng, CISSP-ISSAP
- Stanley M. Ng, CISSP
- Tae Soon Park
- Matthew Parker, CISSP
- Manoranjan Paul, CISSP, CSSLP
- Warren Pearce, CISSP
- Wasantha Perera, CISSP
- Ralph Poore, CISSP
- Rainer Rehm, CISSP
- Martin Reynolds, CISSP
- Brian Shorten, CISSP
- Chester Soong, CISSP
- Richard Starnes, CISSP
- Tony Vargas, CISSP-ISSAP, CSSLP
- Yi Wan Suck
- Freddy Tan, CISSP
- Dan Waddell, CISSP, CAP
- Tim Wilson, CISSP
- Dr. Duan Hai Xin, CISSP
- Jong Youn, Kim
ISLA Americas®The call for nominations for the eighth annual (ISC)² Information Security Leadership Awards (ISLA) Americas Program will open in May 2018. Held annually by (ISC)² in cooperation with the North and Latin American Advisory Councils, the ISLA Americas Program recognizes information security and management professionals throughout the private and public sectors in North, Central and South America, with the exception of the U.S. federal government (recognized through the ISLA Government Program), for their outstanding leadership and achievements in workforce improvement.
- Senior Information Security Professional (examples include: CSO, CISO, information security manager or senior security manager with significant information security management responsibilities) who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
- Information Security Practitioner who has distinguished themselves for implementing and/or managing the implementation of a component of a security program (examples include: managing a security awareness and training program and, conducting difficult, complex security evaluations) Candidates in this category typically should have at least three years of work experience directly related to information security.
- Up-and-Coming Information Security Professional who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational work (e.g., university research project, implemented emerging technology, or outstanding work in security operations).
- Community Awareness - A project, initiative or program represented by information or non-information security personnel who have significantly contributed to building or broadening security awareness in the local or information security community within the last 12 months.
Submissions must align with the category for which they are nominated and are judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the ISLA Americas Judges Committee to confirm the accuracy of the information provided.
The awards luncheon is open to the All Access Pass at Security Congress with roughly 2,000 attendees. It takes place on Tuesday, October 9th as a plated luncheon at the New Orleans Marriott.
If you are interested in sponsoring, please see our Sponsorship Opportunities.
Christopher Greco, CISSP - United States
Silver Hats Founder
Senior Consultant/Trainer; GRECTECHInformation Security Practitioner
Oscar Monge, CISSP - Costa Rica
Securing Company Assets
Cloud Security Engineer; Intel CorporationSenior Information Security Professional
Jorge Mario Ochoa, CISSP - Guatemala
Information Security Culture
Information Security Officer; Millicom International Cellular (Tigo)Senior Information Security Professional
Mansur Hasib, CISSP - United States
Cybersecurity Technology Degree Program
Program Chair, Cybersecurity Technology, The Graduate School; University of Maryland University College (UMUC)
Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, SSCP, CSSLP
Diana-Lynn Contesti is currently an independent contractor focusing on Security Architecture and Critical Infrastructure and has over thirty years of computer security experience. Previously, Ms. Contesti was the CISO for a Fortune 500 company. Ms. Contesti is the co-author of the first edition of the SSCP Study Guide and has done security presentations globally. She served on the (ISC)² Board of Directors and during her tenure, she held various positions including Chairperson of the (ISC)² Board of Directors, Treasurer, Secretary and lead a number of committees. Ms. Contesti played a key role in the implementation of the Women's Scholarship. In January 2017, Ms. Contesti was named to the Fifty Top Women in Internet Security. She holds multiple certifications including the CISSP, ISSAP, ISSMP, SSCP and CSSLP.
Daniel Diniz, CISSP, IRCA ISO 27.001
Daniel Diniz is currently responsible for Information Security & Privacy Management at a Fortune 500 Company in the Healthcare Market. Daniel’s responsibilities include all aspects of Information Security Management, Privacy, Information Risk Management and Incident Management disciplines. With 19 years of experience in IT and the last 16 years focused on Information Security and disciplines of internal control, Daniel has worked for Sao Paulo State Government’s tax agency and in some of the largest national and multinational companies in industries such as telecom, internet providers, IT professional services, travel, civil engineering and financial services. Daniel is CISSP certified since 2008 and IRCA ISO 27.001 Lead Auditor certified. He holds a Bachelor’s degree in Information Systems and an MBA in Information Security Management from University of Sao Paulo (USP). He's a member of (ISC)² Latin American Advisory Council (LAAC) since its creation in 2011 and has served as the Brazil Lead Volunteer in 2012 for Safe and Secure Online Program aiming to bring the initiative to Brazilian Schools. He served at the (ISC)² Foundation Committee in 2012 and now serves at Board Trustee for Center for Cyber Safety and Education since 2016.
Jefferson Gutierrez, CFC, CISA, CISM, CISSP
Jefferson is a Director in the Mexico office of KPMG’s Advisory Forensics practice.
With over more than 18 years of professional experience, he leads technical-related investigations where Digital Forensics, e-Discovery, Cyber Investigations / Cyber Incident Response and Forensic Data & Analytics techniques are used for fraud, corruption, money laundry and violation of regulatory compliance prevention, detection and reaction.
Jefferson is knowledgeable on Data Privacy regulations across Latin America and member of the Latin American Advisory Board for (ISC)².
Jefferson has managed electronic investigations through digital evidence recovery and forensic data analysis; he has also overseen and conducted forensic examinations of computer systems for the collection, preservation and admissibility of electronic evidence in support of FCPA, cybercrime and fraud investigations.
Jefferson has provided services for companies located in Mexico, Colombia, Venezuela, Panama, Guatemala, Honduras, Nicaragua, Peru, Ecuador, Costa Rica, Uruguay, United States, Canada and Greece.
Gurdeep Kaur is an accomplished information security professional with more than 20 years of experience in IT and 12 years of core experience in enterprise IT security management in financial sector. She served as the Founder-President of the (ISC)² New Jersey Chapter from 2012 to 2015. She is also the member of (ISC)² North American Advisory Council, and CSA Global Enterprise Advisory Board. She received a Bachelor’s degree in Electrical Engineering from Delhi College of Engineering in New Delhi, India. She holds multiple certifications including CISSP, CISA, CCSK and ITIL.
Gurdeep has led and participated in panel discussions focused on technical as well as diversity issues. She firmly believes that it takes a village to secure the village.
Glenn Leifheit is a Senior Security Engineering Program Manager within the Microsoft Information Security and Risk Management (ISRM) organization where he currently leads large cross-company security initiatives. Glenn has over 22 years of experience in technology including software, financial and healthcare industries. Prior to his current role, Glenn worked at FICO and was responsible for the build-out of the FICO’s Application Security and PCI programs. Glenn's experience covers providing C-level security guidance, acting as a cross-team business security liaison, driving static code analysis across the enterprise, leading application security and PCI programs, as well as architecture and design of large scale applications and associated infrastructure. Glenn is an advocate for building a strong technology community; he co-founded TechMasters, a Toastmasters club designed to build technical speaker skills within the Toastmasters framework. His passion is connecting technologists with the soft skills they need: public speaking, giving and receiving feedback and asking more informed questions. Glenn is also a past member of the (ISC)² Application Security Advisory Council (ASAC).
James R. McQuiggan, CISSP
James R. McQuiggan is a Product & Solutions Security Officer for the Siemens Gamesa Renewable Energy company providing strategy and policies for its SCADA products including Incident Handling, Vulnerability Management, and regulatory best practices. With over 16 years working at Siemens, James has supported the multiple corporate divisions groups on NERC CIP regulations, information security awareness and training and other InfoSec topics.
James has been an (ISC)² member since 2008 and has been a volunteer of the Safe and Secure Online Program for the Center for Cyber Education & Safety since 2010. In 2015, he was the finalist for the (ISC)² Community Awareness award in 2016 he received the (ISC)² President’s Award. He is a proud member of the North American Advisory Council (NAAC). Within the Central Florida community, he has been President of the Central Florida ISSA chapter and is now the President of the Central Florida (ISC)² chapter. James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.
Marie Olson is the Deputy Chief Privacy Officer for The Boeing Company. Prior to being selected to build the Global Privacy Team for Boeing, Marie was a Sr. Manager in Information Security responsible for Computing & Information Security Policy and Compliance Management. Marie has been with Boeing for 30 years, during which time she has managed a variety of other functions including Government Programs Security Support, Security Quality Assurance, and Vulnerability Assessments.
Marie is nationally recognized for her expertise in global regulatory compliance issues, technical and business process safeguarding strategies, and meeting the challenges of balancing enterprise privacy and security issues with business realities. She has presented on a variety of privacy and security topics at industry events and with various organizations and government agencies. Marie holds a Master of Science degree in computer science from Pacific Lutheran University and a Bachelor of Arts degree in mathematics from the University of Washington. She is a Certified Information Privacy Professional (CIPP/US) and a Certified Information Privacy Manager (CIPM). She also holds two internationally-recognized security certifications: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM). Marie is also currently serving on the International Information Systems Security Certification Consortium (ISC)² Advisory Board of the Americas and is also the Chairperson of the Privacy Special Interest Group for the Information Security Forum (ISF).
Randolph (Randy) N. Sanovic, CISSP-ISSAP, ISSMP
Randy was an Industrial Engineer for the Youngstown Steel Co., a Sales Engineer for GATX, the Manager of Computer Security Planning for Mobil Corporation, and the Director of Information Systems Security for United Healthcare. In 1997 Randy became General Director, Information Security for General Motors Corporation responsible for GM’s information security strategy, programs, plans, and global information security posture. He holds several IT-Security Certifications and has traveled internationally for over forty-five years.
Some of Randy’s other professional affiliations include: being a member of the Board of Directors of the International Information Systems Security Certification Consortium (ISC)² from1989 to 2008; (ISC)²’s Treasurer; Chairman of (ISC)²’s Board of Directors; and a four-year member of the National Computer Systems Security & Privacy Advisory Board. Randy is also a presenter of the IT Security Safe & Secure Program for children in the schools.
Randy has presented at major national and international IT-Security conferences, and is a published author, and publishes articles on IT-Security. Randy continues to do both IT-Security Assurance pro bono, and consulting services through his company, RNS Consulting.
Randy also serves as the Marketing Director for a Global IT Educational Foundation, a member of SC Magazine’s Editorial Board, and a judge for IT-Security Awards for SC Magazine. His educational background includes a B.B.A., and an M.B.A in Finance.
Mr. Stoner’s expertise is in executing enterprise security programs, establishing and implementing security standards and procedures, ensuring compliance with federal laws and regulations, identifying threats to agency assets and resources, and evaluating methodologies and alternatives for risk mitigation. He has also overseen the proactive prevention, detection, and response to computer security incidents targeting government enterprise information technology assets and data. Before Mr. Stoner began his civil service career, he provided management and technology consulting services to federal government agencies in the areas of information assurance and cybersecurity. Mr. Stoner has experience in a number of security disciplines with a concentration in incident response, risk analysis, security engineering, and security policy development and compliance. He holds a bachelor’s degree in Computer Science from Ohio Northern University and a master’s degree in Information and Telecommunication Systems from Johns Hopkins University.
Platinum Sponsor: $8,500 (limit 1)
- Company logo, description and link on ISLA website
- One table positioned front and center or option to sit executives at winner / finalist tables (8 seats)
- Two corporate executives seated at Gala VIP table
- Verbal recognition from podium by Master of Ceremonies
- Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
- Company logo on reception signage
- Company logo in PowerPoint presentation at awards ceremony
- Opportunity for a corporate executive to briefly address attendees before the ceremony begins
- Opportunity to supply each seat with a token corporate gift
Gold Sponsor: $6,500 (limit 2)
- Company logo, description and link on ISLA website
- One table positioned in prime location (8 seats)
- Verbal recognition from podium by Master of Ceremonies
- Company logo included in email promotions, news releases, media advisories, print advertisements, etc.
- Company logo on reception signage
Silver Sponsor: $4,000 (limit 3)
- Company logo, description and link on ISLA website
- Half-table at Ceremony (4 seats)
- Verbal recognition from podium by Master of Ceremonies
The (ISC)² Asia-Pacific Information Security Leadership Achievements (ISLA®) program is held annually by (ISC)² in cooperation with the (ISC)² Asia-Pacific Advisory Council to recognize outstanding leadership and achievements in workforce improvement and foster public awareness of cyber, information, software and infrastructure security professionals, educators and management throughout the Asia-Pacific region.
The (ISC)² 12th ISLA Asia-Pacific award presentation gala dinner will be held at Conrad Hong Kong on the evening of July 9, 2018. The Gala will be by invitations only: invitations will be extended to award honorees and their guests, judges of ISLA Asia-Pacific, members of the Asia-Pacific Advisory Council, the (ISC)² Board of Directors, VIPs and guests from local and regional government agencies and other influential members of the security profession.
To nominate a candidate for the ISLA Asia-Pacific, please go to the Nomination Portal and complete the submission form.
- Information Security Educator
An individual who has significantly contributed to the enhancement of education on cyber/ information/software/ infrastructure security for the workforce (examples include: Full-time Teaching Staff/Lecturer/Professor/Dean in tertiary education on the subject of cyber, information, software or infrastructure security at the department of Information Assurance/ Computer Science/ Cyber Security/ Electronic Engineering/ Information & Communication Technology/ Information Technology/ Information Management or any faculty that is related to cyber, information, software or infrastructure security). Candidates in this category typically should have at least 10 years of full-time teaching experience, 7 of which are related to cyber/ information/ software/ infrastructure security. Research experience in any cyber/ information/ software/ infrastructure security topic is required, at least 10 years of postdoctoral experience is preferred.
- Senior Information Security Professionals
An individual who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (examples include: CSO, CISO, information security director, designer, architect or manager with significant security project lead responsibilities). Candidates in this category typically should have at least 10 years of work experience, 7 of which are directly related to cyber/ information/ software/ infrastructure security.
- Managerial Professional for an Information Security Project
An individual with managerial position who has significantly contributed to the enhancement of the cyber/ information/ software/ infrastructure security workforce by demonstrating a leadership role in any security workforce improvement initiative, program or project (candidates who are not cyber/ information/ software/ infrastructure security practitioner but involve in professional work for management of security project examples include: CEO, CIO, CFO, program/project manager, etc.). Candidates in this category typically should have at least 10 years of work experience and occupy a senior management level position within their organization.
- Information Security Practitioner
An individual who has distinguished him/herself for implementing and/or managing the implementation of a component of a cyber/ information/ software /infrastructure security program (examples include: an executive or officer managing a security awareness and training program, conducting difficult, complex security executions and evaluations, etc.). Candidates in this category typically should have at least 6 years of work experience, 3 of which are directly related to cyber/ information/ software/ infrastructure security.
- Information Security Educator
(ISC)² will honor all candidates who have attained the requirements set by the nomination review committee as 'Honoree'. Amongst all the Honorees, (ISC)² will highlight an initiative, program or project conducted by at least one Honoree from each of the categories. The criteria for showcasing these initiatives are:
- Impact: The impact the initiative, program; or project had on the organization and/or community
- Implementation: How the initiative, program; or project leveraged people, processes, and technology for successful implementation
- Innovation: Innovative approaches to overcoming obstacles or how the initiative, program, or project built a foundation for workforce improvement in the future
- Dedication: Distinctive achievement to the workforce or industry that was outside one's regular job responsibility
- Research: Outstanding research experience or outcome on any cyber, information, software or infrastructure security topic
Special Recognition - Community Service Star
In an effort to bolster public awareness of information security throughout the region, ISLA Asia-Pacific will recognize an honoree's project which has significantly contributed to building or broadening security awareness within their community or beyond within the last 12 months.
For enquiries, please email the ISLA Asia-Pacific team at email@example.com or call 852.5808.5352.
Close of Nomination for 2018, April 3, 2018. Questions? Email firstname.lastname@example.org
Why has (ISC)² created the Information Security Leadership Achievements (ISLA) program in Asia-Pacific? Is it just for the benefit of (ISC)² certifications?A:
People are the key to a secure organization. Since its inception in 2007, the ISLA Asia-Pacific program has been created to recognize all cyber, information, software, infrastructure security professionals or educators or management professionals' outstanding efforts in the field with particular focus on workforce improvement. While nominees may hold one of our certifications, the program is designed to raise awareness of the many successes and achievements of professionals in this industry, regardless of their certification status.Q:
Is ISLA sponsored by any commercial organizations?A:
(ISC)² is currently seeking ISLA sponsorship from organizations who want to join in the mission of creating awareness for the outstanding work of cyber/ information/ software/ infrastructure security professionals in the Asia-Pacific region. For more details, please contact email@example.comQ:
Are professionals who hold either a non- (ISC)² certification or no certification at all eligible for ISLA Asia Pacific?A:
Yes. ISLA Asia-Pacific is open to all cyber/ information/ software/ infrastructure security professionals or educators or management who meet the criteria and is independent of certification.Q:
Can I nominate myself?A:
No. A supervisor, employee, mentor, peer or colleague that is aware of the nominee's successes and achievements must submit the nomination. The ISLA Asia Pacific Nomination Review Committee will evaluate all submissions based on the feedback from the nominator and other input that is included in the submission.Q:
Can I nominate a member of the Nomination Review Committee or the (ISC)² Asia-Pacific Advisory Board (APAC)?A:
Yes. You can nominate a member of the Nomination Review Committee or (ISC)² APAC. However, once a member of the Nomination Review Committee accepts the nomination, they will need to excuse themselves from the Committee.Q:
Does ISLA Asia-Pacific recognize individuals only? Can the project that the person involved will be recognized?A:
The purpose of ISLA Asia-Pacific is to recognize qualified nominees for their individual accomplishments. In addition, with the permission of the nominees and nominator, ISLA Asia-Pacific will mention the project that he or she works for. (ISC)² will also showcase several projects, at least one from each category, by ISLA Asia-Pacific nominees during the ISLA Asia-Pacific Ceremony.Q:
Is there a limit to the number of nominees who will be recognized this year?A:
No. All nominees who meet the qualification criteria will be recognized.Q:
If the person I nominate is not aware of the nomination, can he/she decline the recognition?A:
The nominee can choose not to participate at any stage during the process.Q:
I am planning to nominate someone, but I am not sure if the company wants the project to be mentioned (as it is company confidential information). Will (ISC)² accept a nomination form without the project's details?A:
Can I submit the application form in a language other than English?A:
No. All submissions should be in English. Please provide a brief description of supporting document and any material submitted in English if only local language is available, otherwise the supporting document or the material submitted not in English would not be considered.Q:
How does the review process work? Do I need to meet with the Nomination Review Committee in person? Do I need to provide follow-up information to the Committee?A:
All the completed nomination forms are sent to the Nomination Review Committee during the review session. The committee members will review the applications individually. A group discussion will be held to review each of the applications in all program categories. At the review session, the committee will determine whether a nominee meets the qualification criteria and select the at least one individual from each category whose project initiative will be showcased at the ISLA Asia-Pacific Ceremony. It is not necessary to interview the nominees in person. For certain circumstances, if the committee has a specific question, a representative from (ISC)² will contact the nominee. All nominees who meet the criteria will be honored at the ISLA Asia-Pacific Ceremony.Q:
Will the marking scheme the Nomination Review Committee uses be made public? Will (ISC)² share the final scores with the nominees?A:
The results of the committee's review session are kept confidential and will not be shared with anyone other than the (ISC)² ISLA Program Committee and the Nomination Review Committee.Q:
When will the results be announced?A:
After the review session, all qualified nominees will be notified by (ISC)² of the recognition results individually in early June 2018. The official press release would be announced in June 2018.Q:
When/Where is the ISLA Asia-Pacific Ceremony being held?A:
The (ISC)² 12th ISLA Asia-Pacific award presentation gala dinner will be held at Conrad Hong Kong on the evening of July 9, 2018. The Gala will be by invitations only: invitations will be extended to award honorees and their guests, judges of ISLA Asia-Pacific, members of the Asia-Pacific Advisory Council, the (ISC)² Board of Directors, VIPs and guests from local and regional government agencies and other influential members of the security profession.Q:
If I qualify for ISLA Asia-Pacific and I am invited to the ISLA Asia-Pacific Ceremony, who will pay for my travel and lodging expenses? Can I get a complimentary seat at the (ISC)² Security Congress APAC? What if I cannot attend the ceremony?A:
All qualified nominees (Honorees) will be invited to attend the ISLA Asia-Pacific gala dinner and award presentations ceremony. Each nominee is responsible for their own travel and lodging to the ISLA Asia-Pacific Ceremony. Fees for the (ISC)² Security Congress APAC and the ISLA Asia-Pacific Ceremony will be waived for all invited nominees.
Nominees who cannot attend the ISLA Asia-Pacific Ceremony will still be recognized. (ISC)² requests that an absent nominee send a representative to attend on their behalf. If a representative is sent, the ISLA Asia-Pacific program will be complimentary. If the nominee's representative wants to attend the (ISC)² Security Congress, they will be responsible for paying the discounted conference fees.Q:
Can I be nominated for ISLA Asia-Pacific again next year if I win this year?A:
A nominee can participate in the award program each year if they qualify. If a nominee was showcased this year, the Nomination Review Committee would like them to consider serving on the Nomination Review Committee in the future. If they agree to serve on the committee, they will not be eligible to participate as a nominee during that year.
Information Security Educator Category
Dr. Do Young Kim
Showcased Project: Establishment of the First Government Approved Cyber Forensic Professional Association (CFPA)
Managerial Professional for an Information Security Project Category
Yoshiyuki Kuwahara, CISSP
Chief of Information Strategy
Hiroshima Prefectural Government
Showcased Project: Hiroshima Security Cloud Implementation
Information Security Practitioner Category
Lan-Fen Lin, MBA, ISO27001 LAC
Head, Information Security Department
Showcased Project: AES Encryption/ Decryption Algorithm Project (for Eight Million Customers’ Privacy Information Protection)
Senior Information Security Professional Category
Dr. Xiapu Luo
Research Assistant Professor
The Hong Kong Polytechnic University
Showcased Project: Security Assessment of Android Apps
Senior Information Security Professional Category
Dr. Jungchan Na
Electronics and Telecommunications Research Institute
Showcased Project: Information Security Expert to Implement Secure Industrial IoT
Senior Information Security Professional Category
Katsuhiko Nakanishi, CISSP
Manager of Public Safety Business Promotion Office, Tokyo Olympics and Paralympics Promotion Division
Showcased Project: Contribution to the Cyber Security Human Resource Development for Tokyo2020 Olympic and Paralympic Games
Information Security Educator Category
Prof. Pauline C. Reich
Professor and Founder/Director
Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute, Waseda University School of Law
Dr. Hidehiko Tanaka, Life Fellow of IEEE
The University of Tokyo
Information Security Practitioner Category
Jae-hwan Baek, ENCE, CCFP(사이버포렌식조사전문가)
Information Security Specialist
Ministry of Culture, Sports and Tourism, Republic of Korea (Information Security team)
Hoi Kit Martin Chan
(ISC)² Hong Kong Chapter
SangMyung Simon Choi
Wei Gu, CISSP, CCSP, CISM
AsiaPacific Information Security Team Leader
Po Lun Ho, OSCP, SANS GWAPT, SANS DFIR
Dr. Chih-Hung Hsieh
CyberTrust Technology Institute, Institute for Information Industry
Provincial Electricity Authority (PEA)
National Center for Cyber Security Technology (Taiwan National Computer Emergency Response Team)
Senior Information Security Professional Category
Dr. Joongsup Choi
CISO/ Head of Information Security Department
Dr. Ricci S. C. Ieong, CISSP, CCFP-US, CCSP
eWalker Consulting (HK) Ltd
Kwok Wai Kin Ip, CISSP, CISM, CISA
Manager, Risk Advisory
Strategic Management & Quality Manager
Tricorder Co. Ltd.
Dr. Yu-Chih Wei, CISSP, CISM, CISA
Chunghwa Telecom Co., Ltd.
Beijing secPoint Technology Co., Ltd
Daisuke Yogi, CISSP
Senior Manager Business Promotion Department
NRI SecureTechnologies, Ltd
Dr Jae-Woo Lee, Fellow of (ISC)², CISA, CISM (South Korea)Dr. Jae Woo Lee is Chair Professor at Dongguk University, and president of the Cyber Forensic Professional Association Korea. He is also chairperson of the (ISC)² APAC and Advisory Board of CISO Association in Seoul. Following his retirement from his position as a major general in the Korean Air Force, Dr Lee pursued his career in the information security profession. He was the first president of the Korean Information Security Agency and an organizer of the Korean National Computerization Agency. He holds a Master of Science degree in systems management from the University of Southern California, U.S.A. and a doctorate degree from Konkuk University in Korea.
Chair Professor Graduate School of International Affairs and Information, Dongguk University
Dr. Kamlesh Bajaj, Ph D (India)Dr. Kamlesh Bajaj holds a Ph.D. (Physics) from McMaster University, Canada; and a Masters degree in Physics from the University of Delhi. He is a Fellow of the National Academy of Sciences (FNASc), and a Fellow of the Institution of Electronics Engineers (FIETE). He is also a Distinguished Fellow, EastWest Institute, New York. Dr. Bajaj was the Founder CEO of Data Security Council of India – an industry initiative - in cyber security and data privacy. At DSCI, Dr. Bajaj guided the development of best practices Frameworks for data security and privacy protection. He has served on various Government Committees on cyber security, privacy and ICT, and contributed to the activities of global bodies like OECD and EWI. He was also the Founder Director of the Indian Computer Emergency Response Team (CERT-In); he directed the cyber security initiatives in the government. He has published and lectured extensively on the IT Act 2000, cyber security and cyber crimes, privacy and data protection, Internet governance, e-commerce, digital signatures, in national and international journals and conferences. He has authored two books, and co-authored two books. Dr Bajaj also helped set up the techno-legal infrastructure for PKI in the country. He also served as Global Head, Information Risk Management Consulting Practice, Tata Consultancy Services.
Mentor Professor, NIIT University
Prinya Hom-anek, CISSP, CSSLP, SSCP, SANS GIAC GCFW, CGEIT, CRISC, CISA, CISM (Thailand)Mr. Prinya Hom-anek has over 20 years of experience in IT and information security, network and data communications, Internet and network security, information security, fraud and forensic investigation, penetration testing, ISMS, and generic information security consulting in both the public and private sectors. He is recognized as one of Asia-Pacific's leading information security professionals. Mr. Hom-anek founded and serves as the president for the most successful information security training, consulting, and managed security services provider in Thailand - "ACIS Professional Center" or "ACIS". He is also a senior IT and information security consultant for Thailand's government departments and agencies, including the Revenue Department, Ministry of Finance, Department of Special Investigation, Ministry of Justice, National Intelligence Agency, Bank of Thailand and several major banks in Thailand, Metropolitan Waterworks Authority, the Government Pension Fund, National Electronics and Computer Technology Center (NECTEC), and Software Park Thailand, National Science and Technology Development Agency (NSTDA). He currently serves as a senior committee member on various boards, including the (ISC)² Asian Advisory Board, the ISACA Thailand committee, and as secretary of the Thailand Information Security Association (TISA) committee. He has published over 130 information security articles in magazines and newspapers such as eEnterprise, eLeader, Telecom Journal, Thairath, DailyNews, The Nation, and Bangkok Post. He is frequently invited to appear on TV and radio programs and is a visiting lecturer at a number of universities and colleges within Thailand.
President & Founder, ACIS Professional Center
Haruto Kitano, CISSP, JGISP (Japan)Dr. Haruto Kitano is currently senior manager and consultant for Deloitte Tohmatsu Risk Services Co., Ltd. His consulting is focused on security and risk management governance, database security, identity management, regulatory compliance, and privacy. He is currently a committee member of the Database Security Consortium in Japan and a member of (ISC)² Asia-Pacific Advisory Council. Dr. Kitano has been a vocal professional within the IT security industry in Japan and previously worked as a Telecom and internet networking engineer for 10 years, and at Oracle for 11 years specializing in Database Security and Identity Management. He earned his Master of Informatics from the Institute of Information Security (IISEC), the first Japanese graduate school specializing in information security, where he is researched security management and information protection against internal threat.
Senior Manager, Deliotte Tohmatsu Risk Services Co, Ltd.
Dr. Melvyn Kuan (Singapore)Dr. Melvyn Kuan is currently Lead Consultant (Ecosystem Development) at the Cyber Security Agency of Singapore (CSA) where he is responsible for professional workforce development planning and programmes. Prior to the CSA, he was Head of Strategy and Digital Economy at the National Research Foundation where he was responsible for the priority setting of research areas and capability development and the development of the Services and Digital Economy R&D strategy. Dr. Kuan has also served in various capacities in the former Infocomm Development Authority (IDA) such as the Technology and Planning Group and the Smart Cities Programme Office. Before joining the former IDA, he was pursuing his PhD and was a Teaching Assistant at the Department of Information Systems, National University of Singapore. His work has been published in journals such as Information & Management and Behaviour and Information Technology and; leading Information Systems conferences such as International Conference on Information Systems (ICIS), European Conference on Information Systems (ECIS) and Pacific Asia Conference on Information Systems (PACIS).
Lead Consultant (Ecosystem Development), Cyber Security Agency of Singapore
SC Leung, CISSP, CISA, CBCP (Hong Kong)Mr. SC Leung is currently the Senior Consultant of the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), supervising the security incident response team and coordinating with local and overseas parties. He has over 20 years of working experience serving banking, Internet solution provider, telecommunication and the consultancy industries. SC Leung holds several information security designations including CISSP, CISA and CBCP. He is a frequent speaker in promoting information security awareness. He had been invited to speak for Hong Kong Monetary Authority, Hong Kong Police Force, Government departments, enterprises, schools and local non-governmental organizations, while he had also spoken in overseas conferences of the (ISC)², APECTEL, CNCERT/CC of China and National University of Singapore. He was given by (ISC)² the President’s Award in 2013 and the Asia-Pacific Information Security Leadership Achievement honouree in 2007 for his voluntary work and product neutral security awareness education to the public. He was the founding member of the Internet Society, Cloud Security Alliance Hong Kong and Macau Chapter and the Professional Information Security Association and had held key positions in these organizations.
Senior Consultant, Hong Kong Computer Emergency Response Team Coordination Centre
Dr. Ching-Hao Mao, CCSK, OCPJWCD, SCJP (Taiwan)Dr. Ching-Hao Mao is the Director, Cyber Security Technology Institute (CTTI), Institute for Information Industry (III) in Taiwan, where he has been the technical leader in data analytics and security intelligence. He has great knowledge about data science and six years of practical experience in cybersecurity. He is now leading a research and development team with 20 engineers and most of them have master's degrees or above qualifications. Dr. Mao earned his Ph.D. degree in the Department of Computer Science and Information Engineering at the National Taiwan University of Science and Technology and was a member of the Intelligent System Laboratory. He was a visiting scholar at Carnegie Mellon University and collaborated with Prof. Tsuhan Chen at Cornell University and Prof. Christos Faloutsos at Carnegie Mellon University. Dr. Mao joined the iCAST (International Collaboration for Advancing Security Technology) project from 2006 to 2008 and the Taiwan Information Security Center (TWISC) from 2005 to 2010 for the research of network security. His research interests are network security and data mining, more specifically, learning and inferring from a graphical model for causal relations of malicious network behaviors. He is also interested in botnet related issues, such as Fast-flux, phishing and spam emails, and web application security issues, such as web mimicry attacks and obfuscated attacks. He has published over 30 international conference and journal papers. Dr. Mao has earned the following honors and awards: the Best Newcomer Award by III in 2015, the Excellent Paper Award by III in 2012, and 2014; the College Outstanding Youth Award by the National Taiwan University of Science and Technology in 2010; the Best Student Paper Award by the 19th Cryptology and Information Security Conference in Taiwan in 2009; the Scholarship of Graduate Research by the Computer Society of the Republic of China, Taiwan in 2008. He was also the Showcased Honoree in the category of Information Security Practitioner of (ISC)² Asia-Pacific ISLA program in 2016. Dr. Mao has obtained the following certifications: Oracle Certified Professional, Java EE 5 Web Component Developer (OCPJWCD, SCWCD) in 2012, Certificate of Cloud Security Knowledge (CCSK) in 2011, Capability Maturity Model Integration (CMMI) Introduction in 2008 and Sun Certified Java Programmer (SCJP) in 2001.
Director, Cyber Security Technology Institute, Institute for Information Industry
Prof. Jill Slay, PhD, FACS, CP, MIEEE, Fellow of (ISC)², CISSP, CCFP (Australia)Professor Jill Slay is Optus Chair of Cyber Security at La Trobe University and Director of Cyber Resilience Initiatives for the Australian Computer Society. She has established an international research reputation in cyber security (particularly Digital Forensics) and has worked in collaboration with many industrial partners. She was made a Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism. She is a Fellow of ACS and a Fellow of the International Information Systems Security Certification Consortium, both for her service to the information security industry (and is MACS CP and holds CISSP and CCFP certifications). She has published one book and more than 120 refereed book chapters, journal articles or research papers in information assurance, critical infrastructure protection, security and forensic computing in the last 10 years. She has completed the supervision of 19 PhDs and many Masters and Honours theses and has been awarded over AUD 2 million in Australian Government Category 1 research income, including a Future Fellowship.
Optus Chair of Cyber Security, La Trobe University
Wansuck Yi, CISSP (Korea)Wan S. Yi is a director, Infrastructure Protection Division in Korea Internet and Security Agency (KISA). He received BS degree in Computer Science from Virginia Polytechnic Institute and State University in US. He also received MS degree in information security from Dongguk University and Ph.D. in computer engineering from SungKyunKwan University in Korea. Since 2014, he is an adjunct professor at SungKyunKwan University. He served in a variety of important career building assignments including Director of IT Security Planning Team, IT Security Evaluation Team, IT Service Security Team and CIP Team. Finally, he served as the VP of Internet Incident Prevention Division and International Cooperation Group. Before joining KISA, he worked for Hyundai Information Technology, LTD. During his military service, he was an Aide de Camp for Deputy Commander in Chief, ROK/US Combined Forces Command. He retired from service in 1994 as a Korean Air Force lieutenant. His award includes two ROK/US CFC DCINC Awards (1993, 1994), US Army Achievement medal (1993) and commendation Medal (1993), National Intelligence Service Award (2000), ISC² ISLA (2008), ISC² Presidential Award (2008), Minister of Public Affairs and Security Award (2009), and ROK President Award (2012).
Director, Infrastructure Protection Division, Korea Internet & Security Agency
Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE (Singapore)
Technical Advisor, Asia-Pacific, (ISC)²
Chief CyberSecurity Technology Officer, ST Electronics (Info-Security) Pte Ltd.
As technical advisor of (ISC)2 Asia-Pacific, Chuan-Wei Hoo provides strategic and technical advice to (ISC)² Asia-Pacific on security issues affecting the region and membership. Chuan-Wei has 25 years of IT experience, assuming various IT management roles in the financial and telecommunication sector regionally. He also serves as an adjunct lecturer with NTU, ISS-NUS and Temasek Polytechnic, and a guest lecturer with the Business Continuity Management Institute. He is currently the Chief CyberSecurity Technology Officer at ST Electronics Info-Security.
Andy Ho, CISSP, CISA, EnCE (Hong Kong)
President, (ISC)2 Hong Kong Chapter President
Senior Security Manager, IBM, Greater China
Commencing his career as a security analyst, Andy Ho spent more than 25 years of his time dedicated to the security profession and has worked throughout the Asia Pacific countries.
As a security professional, Andy has been responsible for performing and managing a wide range of security consulting, investigative tasks including risk and threat assessments, security surveys, security briefings, crisis management and emergency response planning program.
Andy is currently the corporate Senior Security Manager of IBM in Greater China. In this capacity, Andy has the regional responsibility to oversee corporate security investigations and IT forensic in the region.
For sponsorship opportunities, please contact Michaella Park at +852.2850.6951 or firstname.lastname@example.org.
(ISC)² ISLA EMEA
Honoring the Information Security Workforce in the EMEA
After 11 consecutive years of success in the Americas and Asia Pacific, the Information Security Leadership Awards (ISLA) are coming to the EMEA!
The (ISC)² ISLA EMEA Awards are a unique opportunity for you to nominate fellow information security and management professionals that go the extra mile to enhance security throughout the private and public sectors across Europe, the Middle East and Africa. Your nominee could be a well-known figure, a stand out leader or equally, an unsung hero working tirelessly in the background.
These are the only awards that give the professional cybersecurity community — including our vast and vibrant membership of over 20,000 across the region — a credible opportunity to recognize peers and provide notable exposure from the world’s largest nonprofit membership organization in our field.
Why not show your appreciation for achievement that has impressed you as we shine a spotlight on and celebrate the tremendous amount of talent in this region.
Keep an eye out for remarkable projects and initiatives!
You will have a key role as you will be responsible for nominating the Information Security professionals who have distinguished themselves under specific projects, programmes and initiatives, over the region in the 4 following categories:
- Senior Information Security Professional – someone who has significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Candidates in this category typically should have at least five years of work experience directly related to information security.
- Information Security Practitioner – an individual who has distinguished themselves for implementing and/or managing the implementation of a component of a security program. Candidates in this category typically should have at least three years of work experience directly related to information security.
- Up-and-Coming Information Security Professional – a person who is a new, rising star in the information security field. The project, improvement or initiative may not relate to leadership as with the other categories, but rather something that relates to their current position or educational.
- Woman Information Security Professional - a female who through her work and commitment, has contributed to women’s representation in the profession and raised awareness to encourage vocations among women. Candidates in this category typically should have at least three years of work experience directly related to information security.
Submissions must align with the category for which they are nominated and will be judged based upon completeness and accuracy of the information provided. Nominations are also judged based on the overall influence, effectiveness and success of the nominees' project, initiative or improvement. Nominators and/or supporting project members may be contacted by a member of the ISLA EMEA Judges Committee to confirm the accuracy of the information provided.
Senior Information Security Professional
Patrick Wheeler - Belgium
Increasing diversity in cybersecurity - through skills and community development and promoting career transitions for women.Information Security Practitioner
Peter O’Boyle, HCISPP – Ireland
Information Security Manager, Icon
Implementing of an Information Security Vendor risk programme.Woman Information Security Professional
Denise Murtagh-Dunne, CISSP – Ireland
Information Security Manager, PwC
Improving the information security community within PwC and promoting events to encourage more women into cybersecurity.Up-and-Coming Information Security Professional
Brencil Kaimba - Kenya
Security Consultant, Serianu Limited
Mentoring university and high school students across Kenya through the programme Cyber Security Training and Awareness for Young People in Kenya and the Cyber Immersion Programme.
Nomination open on the 12th June and close on the 12th July. You can make your submission via (ISC)² Global Awards Program nomination portal.
Nominations are open to, members and non-members from the EMEA region (barring (ISC)² staff and the judging panel) and it is free to put someone forward. Nominators can come from anywhere, they do not have to be from the EMEA region.
Submissions will be judged by members of the Europe, Middle East and Africa Advisory Council (EAC).
For further information about nominations, please contact us.
Yves Le Roux, CISSP, CISM
Yves Le Roux is the Co-chair of the (ISC)² EMEA Advisory Council
Previously he undertook network security leadership roles at a variety of organisations including the Rothschild Group, CA Technologies and the French Ministry of Industry. Yves has also co-authored three books on security, and lectures at ISEP (Paris Graduate Engineering School).
Yves Le Roux on LinkedIn.
Dr. Yiannis Pavlosoglou, PhD, CISSP
Yiannis Pavlosoglou is the Strategic Change Manager for Operational Resilience at global financial services firm UBS. He is also Co-chair of the (ISC)² EMEA Advisory Council and has held the chair of the Global Industry Committee for the Open Web Application Security Project (OWASP) and led a number of projects within that space.
Yiannis Pavlosoglou on LinkedIn.
Tom Gamali, CISSP, CISA
Tom Gamali heads up the Group Technology Risk and Business Continuity Management function for Kuwait Finance House (KFH) and an executive member of the US OSAC (Overseas Security Advisory Committee) for the US Embassy in Kuwait.
Tom Gamali on Linkedin.
Rainer Rehm, CISSP, CISM
Rainer Rehm is a Security Architect at MAN, one of the founding members of The (ISC)² Chapter Germany and a member of the Alliance for Cybersecurity. He is also an official (ISC)² instructor and regularly contributes to the development and maintenance of the (ISC)² CBK.
Rainer Rehm on LinkedIn.
Sofiane Chafai, CISSP
Sofiane Chafai is an Information Security expert with over 15 years’ experience in managing ICT and security projects, system implementation, security programmes and business continuity management for large international companies in Middle East and North Africa. Currently, he is the Managing Director of MFC Advisory, Sofiane is an (ISC)² and ISACA active member who contributed to numerous magazines and spoken at international conferences.
Sofiane Chafai on LinkedIn.
Paco Hope, CISSP, CSSLP
Principal Consultant at Cigital, Paco Hope is a recognised expert in the field of software security. He has worked with many of the world’s leading organisations to help them create secure software. He is the author of two security books, a frequent conference speaker and a regular online author.
Paco Hope on LinkedIn.
Hosted at the (ISC)² Secure Summit UK in London in December, shortlisted nominees from outside the host country will be sponsored to attend the evening ceremony. The awards will also be the perfect occasion for our community to come together and network as they celebrate the accomplishments of our friends and colleagues. The winners will join an elite global community of ISLA Americas and ISLA APAC award winners, recognised by the world’s largest information security membership organisation.
Recognizing Federal Information Security Leaders
This program recognizes the ongoing commitment of individuals whose initiatives, processes and projects have led to significant improvements in the security posture of a department, agency or the government (local, state, or federal). The nomination period is now closed for the (ISC)² Information Security Leadership Awards Government (formerly GISLA).
Workforce Improvement - Individual Category
Aung Htein, Administrator – Office of Information Systems and Technology, Employment and Training Administration, U.S. Department of Labor
Khalid Hasan, Senior OIG Manager for Information Technology, Office of Inspector General for the Board of Governors of the Federal Reserve System (Board) and the Consumer Financial Protection Bureau (CFPB)
Technology Improvement - Individual Category
Michael Sherwood, Director of Technology and Innovation, City of Las Vegas
Peter Le, CISSP, CCSP, Information Technology Specialist, the U.S. Department of Justice
Process/Policy Improvement - Individual Category
Glenn Hernandez, CISSP, Captain, U.S. Coast Guard (Retired), Chief Information Security Officer
Jothi Dugar, CISSP, HCISPP, Chief Information Security Officer, National Institutes of Health Clinical Center
Up-and-Coming Security Professional - Individual Category
Mark Bacharach, CISSP, Innovation Fellow, Environmental Protection Agency, Office of Environmental Information, Office of Information Security and Privacy
Matthew Boehlke, Associate IT Security Analyst, Kent State University
Community Awareness - Team Category
Eric Trias, CISSP, Commander, Air Force Space Command Cyberspace Support Squadron, Scott Air Force Base, Illinois
Matt Goodrich, JD, FedRAMP Director, Technology Transformation Service, US General Services Administration
Most Valuable Industry Partner (MVIP) - Team Category
Nicholas Andersen, CISSP, Vice President of Corporate Strategy, Invictus International Consulting
Tom Suder, Founder & President, Advanced Technology Academic Research Center (ATARC)
Learn more about the finalists here.
- Up-and-Coming Information Security Professional - This award goes to a new, rising star in the U.S. federal, state or local government information security field. The project, improvement or initiative they represent should relate to their current position or educational work (e.g., research project, implemented emerging technology or outstanding work in security operations). The individual may not have more than 3 years of experience in the information security field and must be a current government employee (not a contractor/consultant).
- Workforce Improvement - A U.S. federal, state or local government information security manager (examples include CISO, deputy CISO, information security manager, program manager, etc.) whose leadership role supporting an initiative, program or project has significantly contributed to the advancement of the government¹s information security workforce on government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
- Technology Improvement - A U.S. federal, state or local government information security or information technology manager (examples include CIO, CISO, CTO, program/project manager, etc.) whose leadership role supporting a security technology initiative, program or project (e.g., cloud migration, information sharing, breach response/recovery, etc.) significantly contributed to the advancement of the government¹s information security technology on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
- Process/Policy Improvement - A U.S. federal, state or local government manager (examples include CIO, CFO, program/project manager, etc.) whose leadership role supporting a security policy/process initiative, program or project significantly contributed to the advancement of the government's information security policy/process (e.g., training, incident response, risk management, etc.) on a government-wide or agency-specific basis within the last 12 months (not a contractor/consultant).
A winning team will be recognized for its efforts on projects in each of the following categories. All team members will be recognized, with one award given to the team:
- Most Valuable Industry Partner (MVIP) - A U.S. federal, state or local contractor or consultant team (currently supporting a government contract) whose project or initiative has significantly contributed to the advancement of information security in the areas of information security workforce, policy, process or technology. The project must have been implemented within the last 12 months. Nominations will be verified by the government agency supervisor for the nominated initiative.
- Community Awareness - A U.S. federal, state or local information security team whose project has significantly contributed to building or broadening security awareness in the local community within the last 12 months (not a contractor/consultant).
Devon Bryan, CISSP
Executive Vice President and Chief Information Security Officer
Federal Reserve System, National IT
Devon Bryan is Executive Vice President and Chief Information Security Officer for the Federal Reserve System. As CISO, Devon oversees information security, including incident response, for the enterprise, ensuring information security architecture, standards, policies and programs remain effective and efficient.
Devon came to the Federal Reserve from Fortune 500 human resources and payroll provider ADP, where he served as Global CISO. Devon led ADP’s information security strategy, collaborating across the company’s geographically dispersed business operations to ensure coordination, consensus, and effective execution across global operations. Prior to joining ADP, he served as the Deputy CISO for the Internal Revenue Service (IRS).
His information security career began in the U.S. Air Force, where he served as a Captain and Lead Network Security Engineer working on systems and programs to protect critical USAF applications, networks and data.
Devon received a Bachelor of Science in Applied Mathematics from South Dakota Technological University and a Master of Science, Computer Science from Colorado Technological University. He holds numerous industry cybersecurity certifications and regularly speaks at industry events and writes/publishes articles regularly in various industry publications.
Michael Stoner, CISSP
Chief Information Security Officer, Federal Government Civilian Agency
Michael’s expertise is in executing enterprise security programs, establishing and implementing security standards and procedures, ensuring compliance with federal laws and regulations, identifying threats to agency assets and resources, and evaluating methodologies and alternatives for risk mitigation. He has overseen the proactive prevention, detection, and response to computer security incidents targeting government enterprise information technology assets and data. Before Michael began his civil service career, he provided management and technology consulting services to federal government agencies in the areas of information assurance and cybersecurity. Michael has experience in a number of security disciplines with a concentration in incident response, risk analysis, security engineering, and security policy development and compliance. He holds a bachelor’s degree in Computer Science from Ohio Northern University and a master’s degree in Information and Telecommunication Systems from Johns Hopkins University.
Steven Hernandez, Vice Chair, CISSP, CAP, SSCP, CSSLP, HCISPP
Chief Information Security Officer
Director, Information Assurance Services
US Dept. Of Education
Steven Hernandez is an information assurance veteran serving the past twenty years in a variety of contexts and missions. He has worked on the front lines in operations centers and led research teams attempting to balance security, privacy and other mission considerations. He has experience in international manufacturing, healthcare, non-profits, and government at the federal, state, and local levels. Presently he is the Chief Information Security Officer and Director of Information Assurance Services at the U.S. Department of Education. Prior to his position at Education, he held a variety of roles at the Office of Inspector General, US Department of Education including CTO, CIO, CISO, Senior Official for Privacy and Chief Services Engineering Officer. Steven has volunteered and served (ISC)² for the better part of the past decade. He served on the Board of Directors, volunteered to write exams, served on the U.S. Government Advisory Board for Cybersecurity (GAB), judge for the Government Information Security Leadership Awards (ISLA Government) and contribute to its Executive Writers Bureau.
Thank you to our Sponsor
For sponsorship opportunities, please contact Lisa O'Connell at 781-460-2105 or email@example.com.
Fellow of (ISC)²
The Fellow of (ISC)² was established to honor and distinguish a select number of elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession.
Fellow of (ISC)²
Fellow of (ISC)² candidates must be nominated by a:
- A sitting or former (ISC)² board member
- A Fellow of (ISC)²
- An (ISC)² Harold F. Tipton Award recipient
- The sitting (ISC)² Board of Directors will make the final selection.
Fellows of (ISC)² are entitled to:
- A lifetime association with (ISC)² without fees or other maintenance requirements
- Receive (ISC)² Official Communications
- Access profile record on (ISC)²'s website to maintain contact information
- Nominate other Fellows
- Use of Fellow of (ISC)² designation
Fellow of (ISC)²
- Steven B. Lipner
- John McCumber
- Koji Nakao
- Prof. Edward J. Humphreys
- Mike Jacobs
- Frederick B. Cohen
- Roger R. Schell
- Dr. Ronald L. Rivest
- Dr. Jill Slay
- John "Jack" Holleran
- William J. Caelli
- Dorothy E. Denning
- Whitfield Diffie
- Jae-Woo Lee
- Joseph T. Lisi
- William Maconachy
- F. Lynn McNulty
- Peter G. Neumann
- Steve Orlowski
- Fred Piper
- Daniel J. Ryan
- Corey Schou
- Eugene H. Spafford