Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST
  • facebook
  • linkedin
  • twitter

Global InfoSec Awards 2024 – Categories

GLOBALLY RECOGNIZED, HIGHLY COVETED:

RISE ABOVE THE NOISE!

Winners to be Announced during RSA Conference 2024

Access Control
Account Takeover Protection
Advanced Persistent Threat (APT) Detection and Response
Adversarial ML Threat Mitigation
Agriculture Cybersecurity
AI Platform for Cybersecurity Strategy Analytics
Anti-malware
Anti-phishing
Anti-spam
Anti-virus
Anti-vishing
API Security
Application Security
Application Security Posture Management
Application Security Posture Management Expert
Artificial Intelligence and Machine Learning
A.I. – Security Co-Pilot
Attack Surface Management
Authentication (Multi, Single or Two-Factor)
Authorization for Cloud Security
Automated Detection Engineering
Autonomous Vehicle Security
Biometrics
Blockchain Security
Bot Management
Breach & Attack Simulation
Breach Incident Response
Bring Your Own Device (BYOD)
Browser Isolation
Browser Security
BEC Detection
Central Log Management
Certificate Lifecycle Management
Chief Executive Officer
Chief Information Officer
Chief Information Security Officer
Chief Product Officer
Chief Product Officer – Cybersecurity Startup
Chief Risk Officer
Chief Security Officer
Chief Technology Officer
Client-Side Protection
Cloud Access Security Broker (CASB)
Cloud Backup
Cloud Infrastructure Entitlement Management (CIEM)
Cloud Obfuscation
Cloud Native Security
Cloud Native Application Protection Platform (CNAPP)
Cloud Security
Cloud Security Automation
Cloud Security Monitoring
Cloud Security Posture Management (CSPM)
Cloud Security Remediation
Cloud Threat Detection Investigation & Response (TDIR)
Cloud Workload Protection
Code Variant Analysis
Compliance
Compliance Automation
Computer Forensics
Configuration Risk Intelligence
Consent & Preference Management
Container Security
Content Management and Filtering
Content Disarm and Reconstruction (CDR)
Continuous Compromise Assessment
Continuous Controls Monitoring Platform
Continuous Detection Posture Management (CDPM)
Continuous Improvement and Optimization Expert
Continuous Threat Exposure Management (CTEM)
Credential Service Provider
Critical Infrastructure Protection
Crypto Security
Cyber Defense Planning and Optimization (CDPO)
Cyber Defense Readiness Platform
Cybersecurity Analytics
Cybersecurity Artificial Intelligence
Cybersecurity awareness
Cybersecurity-as-a-Service (CaaS)
Cybersecurity Behavior Change
Cybersecurity Blog
Cybersecurity Blockchain
Cybersecurity Book
Cybersecurity Content
Cybersecurity Corporate Communications Team
Cybersecurity Developer
Cybersecurity Discovery
Cyber Exposure Management
Cyber Insurance
Cyber InsureTech
Cybersecurity Company
Cybersecurity Internet of Things (IoT)
Cybersecurity Education – for Small Businesses (SMBs)
Cybersecurity Education – for Enterprises
Cybersecurity Education – for Governments
Cybersecurity Healthcare Practices
Cybersecurity Research
Cyber Resilience
Cybersecurity Resilience Services
Cyber Risk Quantification
Cybersecurity Bachelors Program
Cybersecurity Master’s Program
Cybersecurity Performance Management
Cybersecurity Professional
Cybersecurity Startup
Cybersecurity Service Provider
Cybersecurity Service Provider Auditor
Cybersecurity Services
Cybersecurity Training
Cybersecurity Training Videos
Cybersecurity Visionary
Cyberstorage
Data Security
Data Governance
Data Center Security
Data-Centric Security
Data Recovery
Data Loss Prevention (DLP)
Data Security Platform
Data Security Posture Management (DSPM)
Database Security, Data Leakage-Protection/ Extrusion Prevention
Deception Based Security
Deep Sea Phishing – Next Gen Email Security
DevSecOps
Defensive Cyberspace Operations Team
Digital Executive Protection
Digital Footprint Security
Digital Rights Management
Digital Risk Protection
Digital Trust
Distributed Digital Identity Platform
DNS Security
Drone Cybersecurity
Edge Native Security
Email Security and Management
Embedded Security
Email Fraud Defense
Encryption
Encryption Expert
Encrypted Hardware
Endpoint Security
Enterprise Mobile Threat Defense
Enterprise Security
ERP Data Security
ERP Risk Mitigation
ERP Security
Exposure Management
Extended Detection and Response (XDR)
FERC/NERC CIP Compliance
File Repair Software
Firewall
Firmware
Forensics
Fraud Prevention
Go-to-market Agency for Cyber Security Startups
Governance, Risk and Compliance (GRC)
Hardware Access Control
Head of Product – Cybersecurity Enterprise
Head of Product – Cybersecurity Startup
Healthcare IoT Security
Hybrid Work Security
ICS/SCADA Security
Identity Access Management
Identity & Access Management
Identity Data
Identity Management
Identity Orchestration
Identity Protection
Identity Security
Identity Verification
Incident Response
Industrial Cybersecurity
InfoSec Startup
Insider Threat Detection
Insider Threat Prevention
Intelligence Powered Cybersecurity
Internet Filtering
Internet Intelligence
Internet Safety
Internet of Things (IoT) Security
Intrusion Detection System (IDS)
Intrusion Prevention Systems (IPS)
IT Vendor Risk Management (ITVRM)
Low-code/no-code Security
Machine Identity Management
Machine Learning Security Operations (MLSecOps)
Mainframe Security
Malware Analysis
Managed Cyber Risk Reduction (MCRR)
Managed Security Service Provider (MSSP)
Managed Services
Managed Detection and Response (MDR)
Managed Detection and Response (MDR) Service Provider
Managed Secure DataOps Provider (MSDP)
Managed XDR Security (MXDR)
Maritime Cybersecurity
Messaging Security
MFA Solution
Micro-segmentation
Microservices Security Expert
Microsoft Security Professional Services
Mobile App Security
Mobile Device Security
Mobile Endpoint Security
Modular Cybersecurity
Multi-factor Authentication
Multi Solutions Platform
Network Access Control (NAC)
Network Detection and Response
Network Security and Management
Network Security Services
Next Generation Firewall
Next Generation Security Information and Event Management (NGSIEM)
Open Source Security
OT Security
OT Asset Visibility
Offensive Security
Managed OT Security (MOTS)
Passwordless Authentication
Patch and Configuration Management
Patch intelligence
Penetration Testing
Phishing-Resistant MFA
Phoneless, Tokenless, Passwordless Authentication Solution
PKI-as-a-Service
Platform Engineering
Policy Management
PR firm for Infosec Companies
Privacy Enhancing Technology
Privacy Expert
Privacy Management
Privacy Management Software
Privacy Management Hardware
PAM for Cloud Infrastructure
Privileged Access Management (PAM)
Privileged Account Security
Product Security Expert
Professional Cybersecurity Services
Professional Services for Microsoft Defender Platform
Protective DNS
Post Quantum Encryption
Quantum Computing
Quantum Encryption
Quantum Networking
Quantum Resilient Encryption
Railway Cybersecurity
Ransomless Ransomware Protection
Ransomware Protection of SaaS Data
Ransomware Recovery
Ransomware Restoration
Ransomware Data Security Solution
Remote Work Security
Reputation Management
Risk-based Vulnerability Management
Risk Management
RFID Protection Card
SaaS
SaaS/Cloud Security
Secure AI
Secure Access Service Edge
Secure Badge Tap Authentication
SecOps-As-A-Service
Secure Coding: Auditing
Secure Coding: Connectors
Secure Coding: Developer Upskilling
Secure Coding: Tools
Secure Coding: Wrappers
Secure Communications
Security Consulting
Secure Web Gateway (SWG)
Security
Security Awarenesss Training
Security Automation
Security Abstraction
Security Administration
Security Expert
Security Company
Security Hardware
Security Information Event Management (SIEM)
Security Investigation Platform
Security Investor
Security Orchestration, Automation & Response (SOAR)
Security Project
Security Ratings
Security Rating Service
Secure SaaS Backups
Security Software
Security Team
Security Training
Security Validation
Security Venture Capital Firm
Secrets Management
Segregation of Duties (SOD)
Self-protecting Data Security
Service Account Protection
Smart City Cybersecurity
SMB Cybersecurity
SMB MSSP
SOC-as-a-Service
Social Media, Web Filtering, and Content Security
Software Composition Analysis
Software Development Lifecycle Security
Software Supply Chain Security
Storage and Archiving
Strategic Cyber Defense Plan Platform
Telecoms Fraud Protection
Threat Detection, Incident Response, Hunting and Triage Platform
Threat Exposure Management
Threat Intelligence
Threat Modeling
Third Party Cyber Risk
Third Party Cyber Risk Management (TPCRM)
Third Party Risk
Third Party Risk Management (TPRM)
Threat Actor Mapping Infrastructure
Transportation Cybersecurity
Unified Data Controls
Unified Threat Management (UTM)
Unlimited Encrypted Data Sharing
User Behavior Analytics
vCISO Program
Virtual Directory Services
Virtual Security Assistant
VPN
Vulnerability Assessment, Remediation and Management
Vulnerability Intelligence
Vulnerability Management
Vulnerability Management as a Service
Vulnerability Remediation Automation
Vendor Security Assessment Platform (VSAP)
Web Application Security
Wireless, Mobile, or Portable Device Security
Women in Cybersecurity
XDR – Extended Detection and Response
Zero Trust
Zero Day Malware Detection and Analysis
Zero Trust Application Protection
Zero Trust BYOD
Zero Trust Platform

Missing your category?  Let us know and we’ll have our judges review and respond quickly..

The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the people/products/services which have been submitted.

LATE ENTRIES ALLOWED – HOWEVER THEY MAY NOT MAKE IT INTO THE RSA CONFERENCE ANNUAL EDITION OF CYBER DEFENSE MAGAZINE, IF CHOSEN AS A WINNER. LATE ENTRY WINNERS WILL RECEIVE ALL OTHER BENEFITS.

Click a payment link below (keep this browser window open, to pay in another window and continue filling out the nomination form.  This will open a new browser tab window):

         

Optionally, take advantage of our deeply discounted awards entry with co-marketing packages:

                       

THE FOLLOWING BUTTONS GO LIVE AT 9:00AM PST ON May 6, 2024

Sample winners from prior years on our virtual red carpet:

 

 

 

 

 

 

 

 

 

 

 

…and some show floor very happy winners from prior RSA Conferences:


 

Will you be next?