The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members regularly include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government.


ISSA Metro Atlanta Chapter Scholarships

To be eligible for an ISSA Metro Atlanta Chapter scholarship a student must be pursuing a career in computer science with a focus on information security or privacy. The applicant must fulfill the eligibility requirements as established by the ISSA Educational Foundation (ISSAEF) Scholarship Committee and the ISSA Metro Atlanta Chapter. 

Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.

General Guidelines:

  • Recipient will be enrolled in an academic program that demonstrates an interest in Information Security but need not be an ISSA member.

  • Enrolled in a college or university program related to Information Security as of the semester/quarter in which the award is received (Fall Term). Below are the eligible Colleges and Universities in the Metro Atlanta, Georgia area: 

    • Gwinnett Technical College                

    • Kennesaw State University                     

    • Georgia State University                      

  • Recipient must be enrolled in an accredited college or university that is authorized to confer degrees at or above the baccalaureate level except as designated by a Chapter scholarship.

  • Checks for the approved scholarship recipients are made payable to the educational institution the recipient will attend.

Scholarship Eligibility Criteria is as Follows:

  • Academic Excellence: Applicants must have a cumulative GPA of 2.5 or higher for undergraduate (on a 4.0 scale). Please attach an unofficial transcript from the current or most recent institution.

  • Work Experience: Security-related work experience and/or completed security coursework.

  • Community Service: Volunteer work in the cybersecurity, information technology field, or other relevant areas.

  • Extracurricular Activities: Activities relating to information security, such as volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.

  • Personal Statement: A short narrative describing the applicant’s background, chosen academic program, interests, and goals in the information security field.

  • Relevant Certifications/Clubs: List memberships in cybersecurity or information technology professional organizations, certifications, or relevant student clubs.

  • Chapter Scholarships: Must be attending a Chapter designated institution.

  • Letters of Recommendation:  At least one letter of recommendation (two preferred). Must be from a faculty member, a cybersecurity professional, or an individual working in the cybersecurity profession that is familiar with your academic work, cybersecurity interests, or experience in cybersecurity. The letter should include:

    • Their name, title, organization, contact information, and the name of the applicant.

    • Outline their position and how they know you.  Share what characteristics you display in the classroom or workplace, any knowledge of your interest or goals relating to cybersecurity, and the potential for your success in this field.

Recipient Responsibilities

  • Each scholarship recipient must be intending to pursue a career in the field of cybersecurity.

  • Recipients are encouraged to consider drafting an article for publication in the ISSA Journal, although this is not a requirement. The Foundation will assist in this effort if desired.

Please apply here:

A PDF version of the application can be found here