Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Security Scholar Program to Debut at RSA® Conference 2016

February 8, 2016

RSA® Conference announces the RSA Conference Security Scholar program – a new initiative sponsored by RSA to connect the brightest up-and-coming cybersecurity students to leading experts, peers and conference attendees during this year's conference.

"Currently, there is a great need in the market for cyber professionals. The industry is seeing a dramatic rise in job openings juxtaposed with a lack of incoming talent,” said Sandra Toms, vice president and curator for RSA Conference. “We created the Security Scholars program to directly address this issue by sparking an interest in the cybersecurity industry with future thought leaders. This initiative presents an exciting opportunity to connect a wide variety of students to cybersecurity professionals, ultimately allowing students to develop a clearer understanding of how their skill set can help them pursue a career in cybersecurity.”

For its inaugural year, RSAC identified leading private and public universities across the country and asked them to select three of their top scholars to represent their university at the conference. Universities were purposely selected to represent different information security specialties ranging from policy to cryptography to digital forensics and sent students to work in the private, public and academic sectors. Scholars chosen cover a variety of majors and industries, emphasizing the need of security experts in a wide range of fields.

"At the Center for Long-Term Cybersecurity at UC Berkeley, we recognize the importance of building stronger relationships between the academy and industry, said Betsy Cooper, executive director for the Center. “We are pleased to serve as partners in the inaugural RSA Conference Security Scholar Program in order to give our students exposure to top-level industry officials and their interests, as well as to give those officials better insight into the amazing work our students are doing at Berkeley.”

Attending students begin their conference experience with a team-building activity and welcome reception on the Expo floor, where they meet and mingle with top corporate security companies in attendance. The following day, scholars enjoy reserved seating at the opening keynote, listen to industry luminaries discuss industry trends and participate in Learning Labs, where they can gain a deeper understanding of security culture through various hands-on exercises.

Conference attendees have the opportunity to meet the scholars during the RSAC Security Scholar Poster Exhibition in the Viewing Point on Wednesday, March 2 from 5-6 p.m. where scholars demo and discuss their work while connecting with industry leaders.

Participating universities include:
• Carnegie Mellon University
• Massachusetts Institute of Technology
• Mississippi State University
• New York University
• Purdue University
• Pennsylvania State University, College of Information Science and Technology
• Stanford University, Stanford Cyber Initiative
• University of California, Berkeley, Center for Long-Term Cybersecurity
• University of Texas at San Antonio
• University of Washington Bothell, Cyber Security Engineering

http://www.rsaconference.com/about/rsac-security-scholar.
 

KEYWORDS: cyber security RSA

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Collective Intelligence: Turning Big Data into Action @ RSA 2016

    RSA 2016: It's Time to Turn Big Data into Action

    See More
  • Fault Tolerant Rack Mount to Debut at ASIS 2007

    See More
  • RSA 2020

    RSA Conference 2021 Moves to May

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing