Participants will explain why they prefer to study information security and how they estimate the value of their work. Speakers will also discuss how to efficiently attract new researchers (bounty programs, outsourcing, development of an IS department). They will try to describe an image of a future IS researcher.