Late Entry Rate extended until 10/20/2024
GLOBALLY RECOGNIZED, HIGHLY COVETED:
RISE ABOVE THE NOISE!
Winners to be Announced during our annual CISO Conference 2024
The Black Unicorn awards program is now part of the Top InfoSec Innovator awards program. With your paid entry into the Top InfoSec Innovator awards program, you will automatically be entered into the Black Unicorn awards program at no extra cost. Judges will independently determine Black Unicorns for 2024 from Top InfoSec Innovator entries based on their current status in the marketplace without any need for the innovator to fill out any additional forms or provide executive summaries.
Access Control |
Account Takeover Protection |
Advanced Persistent Threat (APT) Detection and Response |
Adversarial ML Threat Mitigation |
Agriculture Cybersecurity |
AI Platform for Cybersecurity Strategy Analytics |
AI/ML for Cyber Resilience |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Anti-vishing |
API Security |
Application Security |
Application Security Posture Management |
Application Security Posture Management Expert |
Artificial Intelligence and Machine Learning |
A.I. – Security Co-Pilot |
Attack Surface Management |
Authentication (Multi, Single or Two-Factor) |
Authorization for Cloud Security |
Automated Detection Engineering |
Autonomous Vehicle Security |
Biometrics |
Blockchain Security |
Bot Management |
Breach & Attack Simulation |
Breach Incident Response |
Bring Your Own Device (BYOD) |
Browser Isolation |
Browser Security |
BEC Detection |
Central Log Management |
Certificate Lifecycle Management |
Chief Executive Officer |
Chief Information Officer |
Chief Information Security Officer |
Chief Product Officer |
Chief Product Officer – Cybersecurity Startup |
Chief Risk Officer |
Chief Security Officer |
Chief Technology Officer |
Client-Side Protection |
Cloud Access Security Broker (CASB) |
Cloud Backup |
Cloud Infrastructure Entitlement Management (CIEM) |
Cloud Obfuscation |
Cloud Native Security |
Cloud Native Application Protection Platform (CNAPP) |
Cloud Security |
Cloud Security Automation |
Cloud Security Monitoring |
Cloud Security Posture Management (CSPM) |
Cloud Security Remediation |
Cloud Threat Detection Investigation & Response (TDIR) |
Cloud Workload Protection |
Code Variant Analysis |
Compliance |
Compliance Automation |
Comprehensive Device Security |
Computer Forensics |
Configuration Risk Intelligence |
Consent & Preference Management |
Container Security |
Content Management and Filtering |
Content Disarm and Reconstruction (CDR) |
Continuous Compromise Assessment |
Continuous Controls Monitoring Platform |
Continuous Detection Posture Management (CDPM) |
Continuous Improvement and Optimization Expert |
Continuous Threat Exposure Management (CTEM) |
Credential Service Provider |
Critical Infrastructure Protection |
Crypto Security |
Cyber Defense Planning and Optimization (CDPO) |
Cyber Defense Readiness Platform |
Cybersecurity Analytics |
Cybersecurity Artificial Intelligence |
Cybersecurity awareness |
Cybersecurity-as-a-Service (CaaS) |
Cybersecurity Behavior Change |
Cybersecurity Blog |
Cybersecurity Blockchain |
Cybersecurity Book |
Cybersecurity Content |
Cybersecurity Corporate Communications Team |
Cybersecurity Developer |
Cybersecurity Discovery |
Cyber Exposure Management |
Cyber Insurance |
Cyber InsureTech |
Cybersecurity Company |
Cybersecurity Internet of Things (IoT) |
Cybersecurity Education – for Small Businesses (SMBs) |
Cybersecurity Education – for Enterprises |
Cybersecurity Education – for Governments |
Cybersecurity Healthcare Practices |
Cybersecurity Research |
Cyber Resilience |
Cybersecurity Resilience Services |
Cyber Risk Quantification |
Cybersecurity Bachelors Program |
Cybersecurity Master’s Program |
Cybersecurity Performance Management |
Cybersecurity Professional |
Cybersecurity Startup |
Cybersecurity Service Provider |
Cybersecurity Service Provider Auditor |
Cybersecurity Services |
Cybersecurity Training |
Cybersecurity Training Videos |
Cybersecurity Visionary |
Cyberstorage |
Data Security |
Data Governance |
Data Center Security |
Data-Centric Security |
Data Fabric |
Data Recovery |
Data Loss Prevention (DLP) |
Data Security Platform |
Data Security Posture Management (DSPM) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
DDoS Protection Solution |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
DevSecOps |
Defensive Cyberspace Operations Team |
Digital Executive Protection |
Digital Footprint Security |
Digital Rights Management |
Digital Risk Protection |
Digital Trust |
Distributed Digital Identity Platform |
DNS Security |
Drone Cybersecurity |
Edge Native Security |
Email Security and Management |
Embedded Security |
Email Fraud Defense |
Encryption |
Encryption Expert |
Encrypted Hardware |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Data Security |
ERP Risk Mitigation |
ERP Security |
Exposure Management |
Extended Detection and Response (XDR) |
FERC/NERC CIP Compliance |
File Repair Software |
Firewall |
Firmware |
Forensics |
Fraud Prevention |
Go-to-market Agency for Cyber Security Startups |
Governance, Risk and Compliance (GRC) |
Hardware Access Control |
Head of Product – Cybersecurity Enterprise |
Head of Product – Cybersecurity Startup |
Healthcare IoT Security |
Hybrid Work Security |
ICS/SCADA Security |
Identity Access Management |
Identity & Access Management |
Identity Data |
Identity Management |
Identity Orchestration |
Identity Protection |
Identity Security |
Identity Verification |
Incident Response |
Industrial Cybersecurity |
InfoSec Startup |
Insider Threat Detection |
Insider Threat Prevention |
Integrity/Trust & Safety |
Intelligence Powered Cybersecurity |
Internet Filtering |
Internet Intelligence |
Internet Safety |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Low-code/no-code Security |
Machine Identity Management |
Machine Learning Security Operations (MLSecOps) |
Mainframe Security |
Malware Analysis |
Managed Cyber Risk Reduction (MCRR) |
Managed Security Service Provider (MSSP) |
Managed Services |
Managed Detection and Response (MDR) |
Managed Detection and Response (MDR) Service Provider |
Managed Secure DataOps Provider (MSDP) |
Managed XDR Security (MXDR) |
Maritime Cybersecurity |
Messaging Security |
MFA Solution |
Micro-segmentation |
Microservices Security Expert |
Microsoft Security Professional Services |
Mobile App Security |
Mobile Device Security |
Mobile Endpoint Security |
Modular Cybersecurity |
Multi-factor Authentication |
Multi Solutions Platform |
Network Access Control (NAC) |
Network Detection and Response |
Network Security and Management |
Network Security Services |
Next Generation Firewall |
Next Generation Security Information and Event Management (NGSIEM) |
Open Source Security |
OT Security |
OT Asset Visibility |
Offensive Security |
Managed OT Security (MOTS) |
Passwordless Authentication |
Patch and Configuration Management |
Patch intelligence |
Penetration Testing |
Phishing-Resistant MFA |
Phoneless, Tokenless, Passwordless Authentication Solution |
PKI-as-a-Service |
Platform Engineering |
Policy Management |
PR firm for Infosec Companies |
Privacy Enhancing Technology |
Privacy Expert |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
PAM for Cloud Infrastructure |
Privileged Access Management (PAM) |
Privileged Account Security |
Product Security Expert |
Professional Cybersecurity Services |
Professional Services for Microsoft Defender Platform |
Protective DNS |
Post Quantum Encryption |
Quantum Computing |
Quantum Encryption |
Quantum Networking |
Quantum Resilient Encryption |
Railway Cybersecurity |
Ransomless Ransomware Protection |
Ransomware Protection of SaaS Data |
Ransomware Recovery |
Ransomware Restoration |
Ransomware Data Security Solution |
Remote Work Security |
Reputation Management |
Risk-based Vulnerability Management |
Risk Management |
RFID Protection Card |
SaaS |
SaaS/Cloud Security |
Secure AI |
Secure Access Service Edge |
Secure Badge Tap Authentication |
SecOps-As-A-Service |
Secure Coding: Auditing |
Secure Coding: Connectors |
Secure Coding: Developer Upskilling |
Secure Coding: Tools |
Secure Coding: Wrappers |
Secure Communications |
Security Consulting |
Secure Web Gateway (SWG) |
Security and Governance for AI Systems |
Security |
Security Awarenesss Training |
Security Automation |
Security Abstraction |
Security Administration |
Security Expert |
Security Company |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Investor |
Security Orchestration, Automation & Response (SOAR) |
Security Project |
Security Ratings |
Security Rating Service |
Secure SaaS Backups |
Security Service Delivery Platform (SSDP) |
Security Software |
Security Team |
Security Training |
Security Validation |
Security Venture Capital Firm |
Secrets Management |
Segregation of Duties (SOD) |
Self-protecting Data Security |
Service Account Protection |
Smart City Cybersecurity |
SMB Cybersecurity |
SMB MSSP |
SOC-as-a-Service |
Social Media, Web Filtering, and Content Security |
Software Composition Analysis |
Software Development Lifecycle Security |
Software Supply Chain Security |
Storage and Archiving |
Strategic Cyber Defense Plan Platform |
Telecoms Fraud Protection |
Threat Detection, Incident Response, Hunting and Triage Platform |
Threat Exposure Management |
Threat Intelligence |
Threat Modeling |
Third Party Cyber Risk |
Third Party Cyber Risk Management (TPCRM) |
Third Party Risk |
Third Party Risk Management (TPRM) |
Threat Actor Mapping Infrastructure |
Transportation Cybersecurity |
Unified Data Controls |
Unified Threat Management (UTM) |
Unlimited Encrypted Data Sharing |
User Behavior Analytics |
vCISO Program |
Virtual Directory Services |
Virtual Security Assistant |
Virtual Security Operations Center |
VPN |
Vulnerability Assessment, Remediation and Management |
Vulnerability Intelligence |
Vulnerability Management |
Vulnerability Management as a Service |
Vulnerability Remediation Automation |
Vendor Security Assessment Platform (VSAP) |
Web Application Security |
Wireless, Mobile, or Portable Device Security |
Women in Cybersecurity |
XDR – Extended Detection and Response |
Zero Trust |
Zero Day Malware Detection and Analysis |
Zero Trust Application Protection |
Zero Trust BYOD |
Zero Trust Platform |
Missing your category? Let us know and we’ll have our judges review and respond quickly..
The Judging Panel: CISSP, FMDHS, CEH, certified security professionals who will be voting based on their independent reviews of the people/products/services which have been submitted.