Access Control |
Advanced Persistent Threat (APT) Detection and Response |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Application Security |
Artificial Intelligence and Machine Learning |
Authentication (Multi, Single or Two-Factor) |
Biometrics |
Blockchain Security |
Breach & Attack Simulation |
Bring Your Own Device (BYOD) |
Chief Executive Officer of the Year |
Chief Information Security Officer of the Year |
Chief Risk Officer of the Year |
Chief Security Officer of the Year |
Chief Technology Officer of the Year |
Cloud Security |
Code Variant Analysis |
Compliance |
Consent & Preference Management |
Content Management and Filtering |
Critical Infrastructure Protection |
Crypto Security |
Cybersecurity Analytics |
Cybersecurity Artificial Intelligence |
Cybersecurity Blockchain |
Cybersecurity Developer |
Cybersecurity Internet of Things (IoT) |
Cybersecurity Book |
Cybersecurity Discovery |
Cybersecurity Research |
Cybersecurity Bachelors Program |
Cybersecurity Masters Program |
Cybersecurity Training |
Privacy Expert of the Year |
Data Center Security |
Data Loss Prevention (DLP) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
Digital Footprint Security |
Digital Rights Management |
Email Security and Management |
Embedded Security |
Encryption |
Encryption Expert of the Year |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Security |
FERC/NERC CIP Compliance |
Firewall |
Forensics |
Fraud Prevention |
ICS/SCADA Security |
Identity & Access Management |
Identity Management |
Incident Response |
InfoSec Startup of the Year |
Insider Threat Detection |
Insider Threat Prevention |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Malware Analysis |
Managed Security Service Provider (MSSP) |
Managed Detection and Response (MDR) |
Messaging Security |
Micro-segmentation |
Mobile Endpoint Security |
Multi-factor Authentication |
Network Access Control (NAC) |
Network Security and Management |
Open Source Security |
Patch and Configuration Management |
Policy Management |
PR firm for Infosec Companies |
Privacy Expert of the Year |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
Privileged Account Security |
Risk Management |
SaaS |
SaaS/Cloud Security |
Security |
Security Abstraction |
Security Expert of the Year |
Security Company of the Year |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Project of the Year |
Security Software |
Security Team of the Year |
Security Training |
Social Media, Web Filtering, and Content Security |
Software Development Lifecycle Security |
Storage and Archiving |
Telecoms Fraud Protection |
Threat Intelligence |
Threat Modeling |
Third Party Risk Management (TPRM) |
Unified Threat Management (UTM) |
User Behavior Analytics |
VPN |
Vulnerability Assessment, Remediation and Management |
Vendor Security Assessment Platform (VSAP) |
Vulnerability Management |
Web Application Security |
Wireless, Mobile, or Portable Device Security |
Women in Cybersecurity |
The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the products/services which have been submitted.
INTERESTED IN SPONSORING THIS PAGE? SEND US AN EMAIL HERE.