GLOBALLY RECOGNIZED, HIGHLY COVETED:
RISE ABOVE THE NOISE!
Winners to be Announced during RSA Conference 2025
Access Control |
Account Takeover Protection |
Advanced Persistent Threat (APT) Detection and Response |
Adversarial ML Threat Mitigation |
Agriculture Cybersecurity |
AI Platform for Cybersecurity Strategy Analytics |
AI/ML for Cyber Resilience |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Anti-vishing |
API Security |
Application Security |
Application Security Posture Management |
Application Security Posture Management Expert |
Artificial Intelligence and Machine Learning |
A.I. – Security Co-Pilot |
Attack Surface Management |
Authentication (Multi, Single or Two-Factor) |
Authorization for Cloud Security |
Automated Detection Engineering |
Autonomous Vehicle Security |
Biometrics |
Blockchain Security |
Bot Management |
Breach & Attack Simulation |
Breach Incident Response |
Bring Your Own Device (BYOD) |
Browser Isolation |
Browser Security |
BEC Detection |
Central Log Management |
Certificate Lifecycle Management |
Chief Executive Officer |
Chief Information Officer |
Chief Information Security Officer |
Chief Product Officer |
Chief Product Officer – Cybersecurity Startup |
Chief Risk Officer |
Chief Security Officer |
Chief Technology Officer |
Client-Side Protection |
Cloud Access Security Broker (CASB) |
Cloud Backup |
Cloud Infrastructure Entitlement Management (CIEM) |
Cloud Obfuscation |
Cloud Native Security |
Cloud Native Application Protection Platform (CNAPP) |
Cloud Security |
Cloud Security Automation |
Cloud Security Monitoring |
Cloud Security Posture Management (CSPM) |
Cloud Security Remediation |
Cloud Threat Detection Investigation & Response (TDIR) |
Cloud Workload Protection |
Code Variant Analysis |
Compliance |
Compliance Automation |
Comprehensive Device Security |
Computer Forensics |
Configuration Risk Intelligence |
Consent & Preference Management |
Container Security |
Content Management and Filtering |
Content Disarm and Reconstruction (CDR) |
Continuous Compromise Assessment |
Continuous Controls Monitoring Platform |
Continuous Detection Posture Management (CDPM) |
Continuous Improvement and Optimization Expert |
Continuous Threat Exposure Management (CTEM) |
Credential Service Provider |
Critical Infrastructure Protection |
Crypto Security |
Cyber Defense Planning and Optimization (CDPO) |
Cyber Defense Readiness Platform |
Cybersecurity Analytics |
Cybersecurity Artificial Intelligence |
Cybersecurity awareness |
Cybersecurity-as-a-Service (CaaS) |
Cybersecurity Behavior Change |
Cybersecurity Blog |
Cybersecurity Blockchain |
Cybersecurity Book |
Cybersecurity Content |
Cybersecurity Corporate Communications Team |
Cybersecurity Developer |
Cybersecurity Discovery |
Cyber Exposure Management |
Cyber Insurance |
Cyber InsureTech |
Cybersecurity Company |
Cybersecurity Internet of Things (IoT) |
Cybersecurity Education – for Small Businesses (SMBs) |
Cybersecurity Education – for Enterprises |
Cybersecurity Education – for Governments |
Cybersecurity Healthcare Practices |
Cybersecurity Research |
Cyber Resilience |
Cybersecurity Resilience Services |
Cyber Risk Quantification |
Cybersecurity Bachelors Program |
Cybersecurity Master’s Program |
Cybersecurity Performance Management |
Cybersecurity Professional |
Cybersecurity Startup |
Cybersecurity Service Provider |
Cybersecurity Service Provider Auditor |
Cybersecurity Services |
Cybersecurity Training |
Cybersecurity Training Videos |
Cybersecurity Visionary |
Cyberstorage |
Data Security |
Data Governance |
Data Center Security |
Data-Centric Security |
Data Fabric |
Data Recovery |
Data Loss Prevention (DLP) |
Data Security Platform |
Data Security Posture Management (DSPM) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
DDoS Protection Solution |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
DevSecOps |
Defensive Cyberspace Operations Team |
Digital Executive Protection |
Digital Footprint Security |
Digital Rights Management |
Digital Risk Protection |
Digital Trust |
Distributed Digital Identity Platform |
DNS Security |
Drone Cybersecurity |
Edge Native Security |
Email Security and Management |
Embedded Security |
Email Fraud Defense |
Encryption |
Encryption Expert |
Encrypted Hardware |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Data Security |
ERP Risk Mitigation |
ERP Security |
Exposure Management |
Extended Detection and Response (XDR) |
FERC/NERC CIP Compliance |
File Repair Software |
Firewall |
Firmware |
Forensics |
Fraud Prevention |
Go-to-market Agency for Cyber Security Startups |
Governance, Risk and Compliance (GRC) |
Hardware Access Control |
Head of Product – Cybersecurity Enterprise |
Head of Product – Cybersecurity Startup |
Healthcare IoT Security |
Hybrid Work Security |
ICS/SCADA Security |
Identity Access Management |
Identity & Access Management |
Identity Data |
Identity Management |
Identity Orchestration |
Identity Protection |
Identity Security |
Identity Verification |
Incident Response |
Industrial Cybersecurity |
InfoSec Startup |
Insider Threat Detection |
Insider Threat Prevention |
Integrity/Trust & Safety |
Intelligence Powered Cybersecurity |
Internet Filtering |
Internet Intelligence |
Internet Safety |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Low-code/no-code Security |
Machine Identity Management |
Machine Learning Security Operations (MLSecOps) |
Mainframe Security |
Malware Analysis |
Managed Cyber Risk Reduction (MCRR) |
Managed Security Service Provider (MSSP) |
Managed Services |
Managed Detection and Response (MDR) |
Managed Detection and Response (MDR) Service Provider |
Managed Secure DataOps Provider (MSDP) |
Managed XDR Security (MXDR) |
Maritime Cybersecurity |
Messaging Security |
MFA Solution |
Micro-segmentation |
Microservices Security Expert |
Microsoft Security Professional Services |
Mobile App Security |
Mobile Device Security |
Mobile Endpoint Security |
Modular Cybersecurity |
Multi-factor Authentication |
Multi Solutions Platform |
Network Access Control (NAC) |
Network Detection and Response |
Network Security and Management |
Network Security Services |
Next Generation Firewall |
Next Generation Security Information and Event Management (NGSIEM) |
Open Source Security |
OT Security |
OT Asset Visibility |
Offensive Security |
Managed OT Security (MOTS) |
Passwordless Authentication |
Patch and Configuration Management |
Patch intelligence |
Penetration Testing |
Phishing-Resistant MFA |
Phoneless, Tokenless, Passwordless Authentication Solution |
PKI-as-a-Service |
Platform Engineering |
Policy Management |
PR firm for Infosec Companies |
Privacy Enhancing Technology |
Privacy Expert |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
PAM for Cloud Infrastructure |
Privileged Access Management (PAM) |
Privileged Account Security |
Product Security Expert |
Professional Cybersecurity Services |
Professional Services for Microsoft Defender Platform |
Protective DNS |
Post Quantum Encryption |
Quantum Computing |
Quantum Encryption |
Quantum Networking |
Quantum Resilient Encryption |
Railway Cybersecurity |
Ransomless Ransomware Protection |
Ransomware Protection of SaaS Data |
Ransomware Recovery |
Ransomware Restoration |
Ransomware Data Security Solution |
Remote Work Security |
Reputation Management |
Risk-based Vulnerability Management |
Risk Management |
RFID Protection Card |
SaaS |
SaaS/Cloud Security |
Secure AI |
Secure Access Service Edge |
Secure Badge Tap Authentication |
SecOps-As-A-Service |
Secure Coding: Auditing |
Secure Coding: Connectors |
Secure Coding: Developer Upskilling |
Secure Coding: Tools |
Secure Coding: Wrappers |
Secure Communications |
Security Consulting |
Secure Web Gateway (SWG) |
Security and Governance for AI Systems |
Security |
Security Awarenesss Training |
Security Automation |
Security Abstraction |
Security Administration |
Security Expert |
Security Company |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Investor |
Security Orchestration, Automation & Response (SOAR) |
Security Project |
Security Ratings |
Security Rating Service |
Secure SaaS Backups |
Security Service Delivery Platform (SSDP) |
Security Software |
Security Team |
Security Training |
Security Validation |
Security Venture Capital Firm |
Secrets Management |
Segregation of Duties (SOD) |
Self-protecting Data Security |
Service Account Protection |
Smart City Cybersecurity |
SMB Cybersecurity |
SMB MSSP |
SOC-as-a-Service |
Social Media, Web Filtering, and Content Security |
Software Composition Analysis |
Software Development Lifecycle Security |
Software Supply Chain Security |
Storage and Archiving |
Strategic Cyber Defense Plan Platform |
Telecoms Fraud Protection |
Threat Detection, Incident Response, Hunting and Triage Platform |
Threat Exposure Management |
Threat Intelligence |
Threat Modeling |
Third Party Cyber Risk |
Third Party Cyber Risk Management (TPCRM) |
Third Party Risk |
Third Party Risk Management (TPRM) |
Threat Actor Mapping Infrastructure |
Transportation Cybersecurity |
Unified Data Controls |
Unified Threat Management (UTM) |
Unlimited Encrypted Data Sharing |
User Behavior Analytics |
vCISO Program |
Virtual Directory Services |
Virtual Security Assistant |
Virtual Security Operations Center |
VPN |
Vulnerability Assessment, Remediation and Management |
Vulnerability Intelligence |
Vulnerability Management |
Vulnerability Management as a Service |
Vulnerability Remediation Automation |
Vendor Security Assessment Platform (VSAP) |
Web Application Security |
Wireless, Mobile, or Portable Device Security |
Women in Cybersecurity |
XDR – Extended Detection and Response |
Zero Trust |
Zero Day Malware Detection and Analysis |
Zero Trust Application Protection |
Zero Trust BYOD |
Zero Trust Platform |
Missing your category? Let us know and we’ll have our judges review and respond quickly..
The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the people/products/services which have been submitted.
LATE ENTRIES ALLOWED – HOWEVER THEY MAY NOT MAKE IT INTO THE RSA CONFERENCE ANNUAL EDITION OF CYBER DEFENSE MAGAZINE, IF CHOSEN AS A WINNER. LATE ENTRY WINNERS WILL RECEIVE ALL OTHER BENEFITS.
Click a payment link below (keep this browser window open, to pay in another window and continue filling out the nomination form. This will open a new browser tab window):
Optionally, take advantage of our deeply discounted awards entry with co-marketing packages:
THE FOLLOWING BUTTONS GO LIVE AT 8:00AM PST ON April 28, 2025
Sample winners from prior years on our red carpet: