Global InfoSec Awards for 2022 – Categories



Access Control
Account Takeover Protection
Advanced Persistent Threat (APT) Detection and Response
Adversarial ML Threat Mitigation
Application Security
Application Security Posture Management Expert
Artificial Intelligence and Machine Learning
Attack Surface Management
Authentication (Multi, Single or Two-Factor)
Authorization for Cloud Security
Automated Detection Engineering
Autonomous Vehicle Security
Blockchain Security
Breach & Attack Simulation
Bring Your Own Device (BYOD)
Browser Isolation
Central Log Management
Chief Executive Officer of the Year
Chief Information Officer of the Year
Chief Information Security Officer of the Year
Chief Product Officer of the Year
Chief Product Officer of the Year – Cybersecurity Startup
Chief Risk Officer of the Year
Chief Security Officer of the Year
Chief Technology Officer of the Year
Cloud Access Security Broker (CASB)
Cloud Backup
Cloud Infrastructure Entitlement Management (CIEM)
Cloud Obfuscation
Cloud Native Security
Cloud Security
Cloud Security Automation
Cloud Security Monitoring
Cloud Security Posture Management (CSPM)
Cloud Workload Protection
Code Variant Analysis
Compliance Automation
Computer Forensics
Consent & Preference Management
Container Security
Content Management and Filtering
Content Disarm and Reconstruction (CDR)
Continuous Compromise Assessment
Continuous Controls Monitoring Platform
Continuous Improvement and Optimization Expert of the Year
Critical Infrastructure Protection
Crypto Security
Cybersecurity Analytics
Cybersecurity Artificial Intelligence
Cybersecurity awareness
Cybersecurity-as-a-Service (CaaS)
Cybersecurity Blockchain
Cybersecurity Book
Cybersecurity Content
Cybersecurity Developer
Cybersecurity Discovery
Cyber Insurance
Cybersecurity Internet of Things (IoT)
Cybersecurity Education – for Small Businesses (SMBs)
Cybersecurity Education – for Enterprises
Cybersecurity Education – for Governments
Cybersecurity Healthcare Practices
Cybersecurity Research
Cybersecurity Bachelors Program
Cybersecurity Master’s Program
Cybersecurity Startup of the Year
Cybersecurity Service Provider of the Year
Cybersecurity Service Provider Auditor of the Year
Cybersecurity Services
Cybersecurity Training
Cybersecurity Training Videos
Cybersecurity Visionary
Privacy Expert of the Year
Data Security
Data Governance
Data Center Security
Data Recovery
Data Loss Prevention (DLP)
Database Security, Data Leakage-Protection/ Extrusion Prevention
Deception Based Security
Deep Sea Phishing – Next Gen Email Security
Defensive Cyberspace Operations Team of the Year
Digital Executive Protection
Digital Footprint Security
Digital Rights Management
Digital Risk Protection
Drone Cybersecurity
Email Security and Management
Embedded Security
Email Fraud Defense
Encryption Expert of the Year
Encrypted Hardware
Endpoint Security
Enterprise Mobile Threat Defense
Enterprise Security
ERP Data Security
ERP Risk Mitigation
ERP Security
Extended Detection and Response (XDR)
FERC/NERC CIP Compliance
File Repair Software
Fraud Prevention
Go-to-market Agency for Cyber Security Startups
Governance, Risk and Compliance (GRC)
Hardware Access Control
Healthcare IoT Security
ICS/SCADA Security
Identity Access Management
Identity & Access Management
Identity Data
Identity Management
Identity Orchestration
Identity Protection
Identity Security
Identity Verification
Incident Response
Industrial Cybersecurity
InfoSec Startup of the Year
Insider Threat Detection
Insider Threat Prevention
Internet Filtering
Internet Safety
Internet of Things (IoT) Security
Intrusion Detection System (IDS)
Intrusion Prevention Systems (IPS)
IT Vendor Risk Management (ITVRM)
Low-code/no-code Security
Mainframe Security
Malware Analysis
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Managed Detection and Response (MDR) Service Provider
Messaging Security
Microservices Security Expert
Mobile App Security
Mobile Device Security
Mobile Endpoint Security
Multi-factor Authentication
Multi Solutions Platform
Network Access Control (NAC)
Network Detection and Response
Network Security and Management
Network Security Services
Next Generation Firewall
Open Source Security
OT Security (Operational Technology Security)
Passwordless Authentication
Patch and Configuration Management
Penetration Testing
Policy Management
PR firm for Infosec Companies
Privacy Expert of the Year
Privacy Management
Privacy Management Software
Privacy Management Hardware
PAM for Cloud Infrastructure
Privileged Access Management (PAM)
Privileged Account Security
Product Security Expert
Professional Cybersecurity Services of the Year
Railway Cybersecurity
Ransomless Ransomware Protection
Ransomware Protection of SaaS Data
Ransomware Data Security Solution
Risk-based Vulnerability Management
Risk Management
RFID Protection Card
SaaS/Cloud Security
Secure Coding: Auditing
Secure Coding: Connectors
Secure Coding: Developer Upskilling
Secure Coding: Tools
Secure Coding: Wrappers
Secure Communications
Security Awarenesss Training
Security Abstraction
Security Administration
Security Expert of the Year
Security Company of the Year
Security Hardware
Security Information Event Management (SIEM)
Security Investigation Platform
Security Orchestration, Automation & Response (SOAR)
Security Project of the Year
Security Ratings
Security Rating Service
Secure SaaS Backups
Security Software
Security Team of the Year
Security Training
Secrets Management
Segregation of Duties (SOD)
Self-protecting Data Security
Smart City Cybersecurity
SMB Cybersecurity
Social Media, Web Filtering, and Content Security
Software Composition Analysis
Software Development Lifecycle Security
Software Supply Chain Security
Storage and Archiving
Telecoms Fraud Protection
Threat Detection, Incident Response, Hunting and Triage Platform
Threat Intelligence
Threat Modeling
Third Party Cyber Risk
Third Party Cyber Risk Management (TPCRM)
Third Party Risk
Third Party Risk Management (TPRM)
Transportation Cybersecurity
Unified Threat Management (UTM)
Unlimited Encrypted Data Sharing
User Behavior Analytics
Virtual Directory Services
Vulnerability Assessment, Remediation and Management
Vulnerability Intelligence
Vulnerability Management
Vulnerability Management as a Service
Vendor Security Assessment Platform (VSAP)
Web Application Security
Wireless, Mobile, or Portable Device Security
Women in Cybersecurity
XDR – Extended Detection and Response
Zero Trust
Zero Day Malware Detection and Analysis
Zero Trust Application Protection

Missing your category?  Let us know and we’ll have our judges review and respond quickly..

The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the products/services which have been submitted.

Sample winners from last year on our virtual red carpet:












…and some show floor very happy winners from prior RSA Conferences:

Will you be next?