SEC Awards Three Collegiate Scholarships for 2024-2025

The Security Executive Council has awarded three $2,500 scholarships to students of excellence at its partner academic institutions, which are recognized for their outstanding programs in security, risk, and intelligence.

Congratulations to the winners of the 2024-2025 Security Executive Council Scholarships:

Paige Bell (senior) Major: Cybersecurity; Mercyhurst University

Jon Lester (junior) Major: Cybersecurity; Kennesaw State University’s Center for Cybersecurity Education

Eric Locke (senior) Major: Risk Management & Insurance, Supply Chain & Operations with a concentration in Data Analytics; University of South Carolina’s Darla Moore College of Business

The SEC launched its scholarship program in 2022 to encourage and support excellence in the next generation of security leaders. Each scholarship is awarded after consideration by the SEC Scholarship Committee, which is made up of SEC staff, successful former and current security practitioners, and faculty from the participating universities.

"We are honored to see our students recognized through this scholarship opportunity, which highlights exceptional performance in cybersecurity and risk management programs. Such opportunities are pivotal in shaping students’ career paths, and we deeply appreciate the SEC's support," said Michael Whitman, Director of the Center for Cybersecurity Education at KSU.

"I can think of no one else who works as hard as Paige,” said Brian Fuller, Executive Director of the Center for Intelligence Research, Analysis, and Training (CIRAT) at Mercyhurst University. “Her dedication to her studies and professional growth is second to none. Having Paige represent Mercyhurst University in being awarded the SEC Collegiate Scholarship is genuinely fitting, as she embodies what the University stands for. Thank you, SEC, for providing another deserving student with this honor and our continued partnership!"

Greg Niehaus, Professor of Finance and Insurance at the University of South Carolina, said, “The Darla Moore School of Business and its Risk Management and Insurance program greatly appreciates the support of the SEC in sponsoring a scholarship for one of our outstanding students. For the second year in a row, the scholarship was awarded to Eric Locke. Eric spent the past summer as a risk analyst intern at BNP Paribus in New York City and will be graduating in December.”

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3