GLOBALLY RECOGNIZED, HIGHLY COVETED:
RISE ABOVE THE NOISE!
Winners to be Announced during our annual CISO Conference 2023
The Black Unicorn awards program is now part of the Top InfoSec Innovator awards program. Judges will independently determine Black Unicorns for 2023 from Top InfoSec Innovator entries based on their current status in the marketplace without any need for the innovator to fill out any additional forms or provide executive summaries.
Access Control |
Account Takeover Protection |
Advanced Persistent Threat (APT) Detection and Response |
Adversarial ML Threat Mitigation |
AI Platform for Cybersecurity Strategy Analytics |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Anti-vishing |
API Security |
Application Security |
Application Security Posture Management Expert |
Artificial Intelligence and Machine Learning |
A.I. – Security Co-Pilot |
Attack Surface Management |
Authentication (Multi, Single or Two-Factor) |
Authorization for Cloud Security |
Automated Detection Engineering |
Autonomous Vehicle Security |
Biometrics |
Blockchain Security |
Bot Management |
Breach & Attack Simulation |
Bring Your Own Device (BYOD) |
Browser Isolation |
Browser Security |
Central Log Management |
Certificate Lifecycle Management |
Chief Executive Officer |
Chief Information Officer |
Chief Information Security Officer |
Chief Product Officer |
Chief Product Officer – Cybersecurity Startup |
Chief Risk Officer |
Chief Security Officer |
Chief Technology Officer |
Cloud Access Security Broker (CASB) |
Cloud Backup |
Cloud Infrastructure Entitlement Management (CIEM) |
Cloud Obfuscation |
Cloud Native Security |
Cloud Native Application Protection Platform (CNAPP) |
Cloud Security |
Cloud Security Automation |
Cloud Security Monitoring |
Cloud Security Posture Management (CSPM) |
Cloud Threat Detection Investigation & Response (TDIR) |
Cloud Workload Protection |
Code Variant Analysis |
Compliance |
Compliance Automation |
Computer Forensics |
Configuration Risk Intelligence |
Consent & Preference Management |
Container Security |
Content Management and Filtering |
Content Disarm and Reconstruction (CDR) |
Continuous Compromise Assessment |
Continuous Controls Monitoring Platform |
Continuous Detection Posture Management (CDPM) |
Continuous Improvement and Optimization Expert |
Continuous Threat Exposure Management (CTEM) |
Credential Service Provider |
Critical Infrastructure Protection |
Crypto Security |
Cyber Defense Readiness Platform |
Cybersecurity Analytics |
Cybersecurity Artificial Intelligence |
Cybersecurity awareness |
Cybersecurity-as-a-Service (CaaS) |
Cybersecurity Behavior Change |
Cybersecurity Blog |
Cybersecurity Blockchain |
Cybersecurity Book |
Cybersecurity Content |
Cybersecurity Developer |
Cybersecurity Discovery |
Cyber Insurance |
Cyber InsureTech |
Cybersecurity Company |
Cybersecurity Internet of Things (IoT) |
Cybersecurity Education – for Small Businesses (SMBs) |
Cybersecurity Education – for Enterprises |
Cybersecurity Education – for Governments |
Cybersecurity Healthcare Practices |
Cybersecurity Research |
Cyber Resilience |
Cybersecurity Bachelors Program |
Cybersecurity Master’s Program |
Cybersecurity Performance Management |
Cybersecurity Startup |
Cybersecurity Service Provider |
Cybersecurity Service Provider Auditor |
Cybersecurity Services |
Cybersecurity Training |
Cybersecurity Training Videos |
Cybersecurity Visionary |
Privacy Expert |
Data Security |
Data Governance |
Data Center Security |
Data Recovery |
Data Loss Prevention (DLP) |
Data Security Platform |
Data Security Posture Management (DSPM) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
DevSecOps |
Defensive Cyberspace Operations Team |
Digital Executive Protection |
Digital Footprint Security |
Digital Rights Management |
Digital Risk Protection |
Distributed Digital Identity Platform |
DNS Security |
Drone Cybersecurity |
Edge Native Security |
Email Security and Management |
Embedded Security |
Email Fraud Defense |
Encryption |
Encryption Expert |
Encrypted Hardware |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Data Security |
ERP Risk Mitigation |
ERP Security |
Extended Detection and Response (XDR) |
FERC/NERC CIP Compliance |
File Repair Software |
Firewall |
Firmware |
Forensics |
Fraud Prevention |
Go-to-market Agency for Cyber Security Startups |
Governance, Risk and Compliance (GRC) |
Hardware Access Control |
Head of Product – Cybersecurity Enterprise |
Head of Product – Cybersecurity Startup |
Healthcare IoT Security |
Hybrid Work Security |
ICS/SCADA Security |
Identity Access Management |
Identity & Access Management |
Identity Data |
Identity Management |
Identity Orchestration |
Identity Protection |
Identity Security |
Identity Verification |
Incident Response |
Industrial Cybersecurity |
InfoSec Startup |
Insider Threat Detection |
Insider Threat Prevention |
Internet Filtering |
Internet Intelligence |
Internet Safety |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Low-code/no-code Security |
Machine Identity Management |
Mainframe Security |
Malware Analysis |
Managed Security Service Provider (MSSP) |
Managed Detection and Response (MDR) |
Managed Detection and Response (MDR) Service Provider |
Maritime Cybersecurity |
Messaging Security |
MFA Solution |
Micro-segmentation |
Microservices Security Expert |
Microsoft Security Professional Services |
Mobile App Security |
Mobile Device Security |
Mobile Endpoint Security |
Multi-factor Authentication |
Multi Solutions Platform |
Network Access Control (NAC) |
Network Detection and Response |
Network Security and Management |
Network Security Services |
Next Generation Firewall |
Open Source Security |
OT Security (Operational Technology Security) |
OT Asset Visibility |
Passwordless Authentication |
Patch and Configuration Management |
Patch intelligence |
Penetration Testing |
Phishing-Resistant MFA |
Phoneless, Tokenless, Passwordless Authentication Solution |
PKI-as-a-Service |
Policy Management |
PR firm for Infosec Companies |
Privacy Expert |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
PAM for Cloud Infrastructure |
Privileged Access Management (PAM) |
Privileged Account Security |
Product Security Expert |
Professional Cybersecurity Services |
Protective DNS |
Post Quantum Encryption |
Quantum Computing |
Quantum Encryption |
Quantum Resilient Encryption |
Railway Cybersecurity |
Ransomless Ransomware Protection |
Ransomware Protection of SaaS Data |
Ransomware Data Security Solution |
Remote Work Security |
Risk-based Vulnerability Management |
Risk Management |
RFID Protection Card |
SaaS |
SaaS/Cloud Security |
Secure Access Service Edge |
SecOps-As-A-Service |
Secure Coding: Auditing |
Secure Coding: Connectors |
Secure Coding: Developer Upskilling |
Secure Coding: Tools |
Secure Coding: Wrappers |
Secure Communications |
Security Consulting |
Secure Web Gateway (SWG) |
Security |
Security Awarenesss Training |
Security Abstraction |
Security Administration |
Security Expert |
Security Company |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Investor |
Security Orchestration, Automation & Response (SOAR) |
Security Project |
Security Ratings |
Security Rating Service |
Secure SaaS Backups |
Security Software |
Security Team |
Security Training |
Security Venture Capital Firm |
Secrets Management |
Segregation of Duties (SOD) |
Self-protecting Data Security |
Service Account Protection |
Smart City Cybersecurity |
SMB Cybersecurity |
SMB MSSP |
SOC-as-a-Service |
Social Media, Web Filtering, and Content Security |
Software Composition Analysis |
Software Development Lifecycle Security |
Software Supply Chain Security |
Storage and Archiving |
Strategic Cyber Defense Plan Platform |
Telecoms Fraud Protection |
Threat Detection, Incident Response, Hunting and Triage Platform |
Threat Exposure Management |
Threat Intelligence |
Threat Modeling |
Third Party Cyber Risk |
Third Party Cyber Risk Management (TPCRM) |
Third Party Risk |
Third Party Risk Management (TPRM) |
Threat Actor Mapping Infrastructure |
Transportation Cybersecurity |
Unified Data Controls |
Unified Threat Management (UTM) |
Unlimited Encrypted Data Sharing |
User Behavior Analytics |
Virtual Directory Services |
VPN |
Vulnerability Assessment, Remediation and Management |
Vulnerability Intelligence |
Vulnerability Management |
Vulnerability Management as a Service |
Vulnerability Remediation Automation |
Vendor Security Assessment Platform (VSAP) |
Web Application Security |
Wireless, Mobile, or Portable Device Security |
Women in Cybersecurity |
XDR – Extended Detection and Response |
Zero Trust |
Zero Day Malware Detection and Analysis |
Zero Trust Application Protection |
Zero Trust BYOD |
Zero Trust Platform |
Missing your category? Let us know and we’ll have our judges review and respond quickly..
The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the people/products/services which have been submitted.