Applications for the Calamity Scholarship are currently being invited. Eligible candidates should be currently attending an accredited Australian University and studying at any level of degree. The winning students will receive benefit of AUD $1, 500. To apply, students are required to submit their essay and other materials by 30th April, 2016.
The security industry is changing. Rapid technology development and new consumer expectations are leading the way. As we approach the new frontier, Calamity, Australia’s highest-graded security provider, wants to see how tomorrow’s innovators are thinking about risk. Love innovation? Love technology? Interested in security? Keep reading to discover how Calamity could help you with your studies.
- AUD $1, 500 grant for you to use for genuine education purposes
- A certificate you can publish on your LinkedIn, CV or personal portfolio
Level and Area of Studies
Undergraduate, Masters, Doctorate or Post-Graduate Diplomas in any field.
Place of Study
At an accredited university in Australia.
Eligibility and Criteria
- You are enrolled full time in an accredited tertiary education institution
- You are currently studying at any level, including Undergraduate, Masters, Doctorate or Post-Graduate Diplomas
- You are able to supply proof of your attendance to an accredited Australian education institution
There is no nationality restriction.
The application process requires you to send a 1000-word response to one of the two questions below and you will be eligible for consideration. Responses are judged on the quality of your work and how innovative you can be. The questions:
- It is said, “The security of any system is only as strong as its weakest link.” What are the ‘weakest links’ in the security of a specific industry (e.g. retail, hospitality, health care, legal) and what practical steps can be taken to resolve them?
- What do you perceive as the ‘next big thing’ in electronic, IT or physical security, and how does this technology or its implementation relate to time-tested and longstanding security principles, methods or practices?
30th April, 2016