RISE ABOVE THE NOISE!
Access Control |
Account Takeover Protection |
Advanced Persistent Threat (APT) Detection and Response |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Application Security |
Artificial Intelligence and Machine Learning |
Attack Surface Management |
Authentication (Multi, Single or Two-Factor) |
Authorization for Cloud Security |
Automated Detection Engineering |
Biometrics |
Blockchain Security |
Breach & Attack Simulation |
Bring Your Own Device (BYOD) |
Browser Isolation |
Central Log Management |
Chief Executive Officer of the Year |
Chief Information Security Officer of the Year |
Chief Risk Officer of the Year |
Chief Security Officer of the Year |
Chief Technology Officer of the Year |
Cloud Access Security Broker (CASB) |
Cloud Backup |
Cloud Infrastructure Entitlement Management (CIEM) |
Cloud Security |
Cloud Workload Protection |
Code Variant Analysis |
Compliance |
Computer Forensics |
Consent & Preference Management |
Container Security |
Content Management and Filtering |
Continuous Controls Monitoring Platform |
Critical Infrastructure Protection |
Crypto Security |
Cybersecurity Analytics |
Cybersecurity Artificial Intelligence |
Cybersecurity-as-a-Service (CaaS) |
Cybersecurity Blockchain |
Cybersecurity Book |
Cybersecurity Developer |
Cybersecurity Discovery |
Cyber Insurance |
Cybersecurity Internet of Things (IoT) |
Cybersecurity Education – for Small Businesses (SMBs) |
Cybersecurity Education – for Enterprises |
Cybersecurity Education – for Governments |
Cybersecurity Healthcare Practices |
Cybersecurity Research |
Cybersecurity Bachelors Program |
Cybersecurity Masters Program |
Cybersecurity Startup of the Year |
Cybersecurity Training |
Privacy Expert of the Year |
Data Security |
Data Governance |
Data Center Security |
Data Recovery |
Data Loss Prevention (DLP) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
DevSecOps |
Digital Executive Protection |
Digital Footprint Security |
Digital Rights Management |
Drone Cybersecurity |
Email Security and Management |
Embedded Security |
Email Fraud Defense |
Encryption |
Encryption Expert of the Year |
Encrypted Hardware |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Data Security |
ERP Risk Mitigation |
ERP Security |
Extended Detection and Response (XDR) |
FERC/NERC CIP Compliance |
File Repair Software |
Firewall |
Forensics |
Fraud Prevention |
Go-to-market Agency for Cyber Security Startups |
Governance, Risk and Compliance (GRC) |
Healthcare IoT Security |
ICS/SCADA Security |
Identity Access Management |
Identity & Access Management |
Identity Management |
Identity Verification |
Incident Response |
Industrial Cybersecurity |
InfoSec Startup of the Year |
Insider Threat Detection |
Insider Threat Prevention |
Internet Filtering |
Internet Safety |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Mainframe Security |
Malware Analysis |
Managed Security Service Provider (MSSP) |
Managed Detection and Response (MDR) |
Managed Detection and Response (MDR) Service Provider |
Messaging Security |
Micro-segmentation |
Mobile Endpoint Security |
Multi-factor Authentication |
Network Access Control (NAC) |
Network Security and Management |
Next Generation Firewall |
Open Source Security |
Passwordless Authentication |
Patch and Configuration Management |
Penetration Testing |
PKI-as-a-Service |
Policy Management |
PR firm for Infosec Companies |
Privacy Expert of the Year |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
PAM for Cloud Infrastructure |
Privileged Access Management (PAM) |
Privileged Account Security |
Railway Cybersecurity |
Ransomless Ransomware Protection |
Ransomware Protection of SaaS Data |
Risk-based Vulnerability Management |
Risk Management |
RFID Protection Card |
SaaS |
SaaS/Cloud Security |
SecOps-As-A-Service |
Secure Coding: Auditing |
Secure Coding: Connectors |
Secure Coding: Developer Upskilling |
Secure Coding: Tools |
Secure Coding: Wrappers |
Secure Communications |
Security |
Security Awarenesss Training |
Security Abstraction |
Security Administration |
Security Expert of the Year |
Security Company of the Year |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Project of the Year |
Security Ratings |
Security Rating Service |
Secure SaaS Backups |
Security Software |
Security Team of the Year |
Security Training |
Secrets Management |
Segregation of Duties (SOD) |
Self-protecting Data Security |
Smart City Cybersecurity |
SMB Cybersecurity |
SMB MSSP |
SOC-as-a-Service |
Social Media, Web Filtering, and Content Security |
Software Composition Analysis |
Software Development Lifecycle Security |
Storage and Archiving |
Telecoms Fraud Protection |
Telecom Network Security |
Threat Intelligence |
Threat Modeling |
Third Party Cyber Risk |
Third Party Cyber Risk Management (TPCRM) |
Third Party Risk |
Third Party Risk Management (TPRM) |
Transportation Cybersecurity |
Unified Threat Management (UTM) |
User Behavior Analytics |
VPN |
Vulnerability Assessment, Remediation and Management |
Vulnerability Intelligence |
Vulnerability Management |
Vulnerability Management as a Service |
Vendor Security Assessment Platform (VSAP) |
Web Application Security |
Wireless, Mobile, or Portable Device Security |
Women in Cybersecurity |
XDR – Extended Detection and Response |
The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the products/services which have been submitted.
INTERESTED IN SPONSORING THIS PAGE? SEND US AN EMAIL HERE.