Global InfoSec Awards for 2021 – Categories

RISE ABOVE THE NOISE!

If your category is not listed, you can create it (subject to judging approval):

Access Control
Advanced Persistent Threat (APT) Detection and Response
Anti-malware
Anti-phishing
Anti-spam
Anti-virus
Application Security
Artificial Intelligence and Machine Learning
Attack Surface Management
Authentication  (Multi, Single or Two-Factor)
Authorization for Cloud Security
Biometrics
Blockchain Security
Breach & Attack Simulation
Bring Your Own Device (BYOD)
Chief Executive Officer of the Year
Chief Information Security Officer of the Year
Chief Risk Officer of the Year
Chief Security Officer of the Year
Chief Technology Officer of the Year
Cloud Infrastructure Entitlement Management (CIEM)
Cloud Security
Cloud Workload Protection
Code Variant Analysis
Compliance
Consent & Preference Management
Container Security
Content Management and Filtering
Continuous Controls Monitoring Platform
Critical Infrastructure Protection
Crypto Security
Cybersecurity Analytics
Cybersecurity Artificial Intelligence
Cybersecurity Blockchain
Cybersecurity Book
Cybersecurity Developer
Cybersecurity Discovery
Cyber Insurance
Cybersecurity Internet of Things (IoT)
Cybersecurity Education – for Small Businesses (SMBs)
Cybersecurity Education – for Enterprises
Cybersecurity Education – for Governments
Cybersecurity Healthcare Practices
Cybersecurity Research
Cybersecurity Bachelors Program
Cybersecurity Masters Program
Cybersecurity Startup of the Year
Cybersecurity Training
Privacy Expert of the Year
Data Security
Data Center Security
Data Loss Prevention (DLP)
Database Security, Data Leakage-Protection/ Extrusion Prevention
Deception Based Security
Deep Sea Phishing – Next Gen Email Security
DevSecOps
Digital Footprint Security
Digital Rights Management
Drone Cybersecurity
Email Security and Management
Embedded Security
Encryption
Encryption Expert of the Year
Endpoint Security
Enterprise Mobile Threat Defense
Enterprise Security
ERP Security
Extended Detection and Response (XDR)
FERC/NERC CIP Compliance
Firewall
Forensics
Fraud Prevention
Go-to-market Agency for Cyber Security Startups
Healthcare IoT Security
ICS/SCADA Security
Identity & Access Management
Identity Management
Identity Verification
Incident Response
Industrial Cybersecurity
InfoSec Startup of the Year
Insider Threat Detection
Insider Threat Prevention
Internet Filtering
Internet Safety
Internet of Things (IoT) Security
Intrusion Detection System (IDS)
Intrusion Prevention Systems (IPS)
IT Vendor Risk Management (ITVRM)
Malware Analysis
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Managed Detection and Response (MDR) Service Provider
Messaging Security
Micro-segmentation
Mobile Endpoint Security
Multi-factor Authentication
Network Access Control (NAC)
Network Security and Management
Open Source Security
Passwordless Authentication
Patch and Configuration Management
PKI-as-a-Service
Policy Management
PR firm for Infosec Companies
Privacy Expert of the Year
Privacy Management
Privacy Management Software
Privacy Management Hardware
Privileged Account Security
Railway Cybersecurity
Risk Management
SaaS
SaaS/Cloud Security
Security
Security Abstraction
Security Expert of the Year
Security Company of the Year
Security Hardware
Security Information Event Management (SIEM)
Security Investigation Platform
Security Project of the Year
Security Ratings
Security Software
Security Team of the Year
Security Training
Secrets Management
Segregation of Duties (SOD)
Self-protecting Data Security
Smart City Cybersecurity
SMB Cybersecurity
SMB MSSP
SOC-as-a-Service
Social Media, Web Filtering, and Content Security
Software Composition Analysis
Software Development Lifecycle Security
Storage and Archiving
Telecoms Fraud Protection
Threat Intelligence
Threat Modeling
Third Party Risk Management (TPRM)
Transportation Cybersecurity
Unified Threat Management (UTM)
User Behavior Analytics
VPN
Vulnerability Assessment, Remediation and Management
Vulnerability Intelligence
Vulnerability Management
Vendor Security Assessment Platform (VSAP)
Web Application Security
Wireless, Mobile, or Portable Device Security
Women in Cybersecurity
XDR – Extended Detection and Response

APPLY NOW

The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the products/services which have been submitted.


 INTERESTED IN SPONSORING THIS PAGE?  SEND US AN EMAIL HERE.