Start your nomination by selecting a category below. Click any group to expand and view the award categories inside.
Don’t see your category? Click here to suggest one.
- > Access Control
- > Advanced Persistent Threat Protection (APT)
- > AI-Powered Vulnerability Management
- > AI SecOps
- > AI Security Solution
- > Anti-Fraud and Compliance for Mobile Payments
- > Anti Malware
- > Anti Phishing
- > Anti-Piracy
- > Anti Virus
- > Anti-Vishing
- > API Abuse Prevention
- > API Security
- > Application Security
- > Application-Aware Workload Protection
- > Artificial Intelligence Security
- > Attack Surface Management
- > Authorization and Data Governance
- > Automated Investigation and Response
- > Automotive Security (IoT)
- > Autonomous Penetration Testing
- > AWS Cloud Security
- > Azure Cloud Security
- > Balanced Development Automation
- > Best Artificial Intelligence (AI) Threat Detection
- > Best Cloud Runtime Security Solution
- > Best Cloud Security Certification
- > Best Cybersecurity Book
- > Best Cybersecurity Certification
- > Best Cybersecurity Certification Training
- > Best Cybersecurity Podcast
- > Best Cybersecurity SOC Monitoring
- > Best Cybersecurity User Experience
- > Best Free Cybersecurity Tool
- > Best GRC Certification Program
- > Best In Multi-Cloud Data Activity Service
- > Best Integrated Authentication
- > Best Integrated Security Platform
- > Best New Compliance Solution
- > Best Non-Human Identity Management Solution
- > Best Packet Capture Platform
- > Best Passwordless Solution
- > Best RDK Video Accelerator Solution and Certification
- > Best Secure Mobile Hardware Platform
- > Biometrics
- > Blockchain Security
- > Board Management Software
- > Bot Defense
- > Breach and Attack Simulation
- > Breach Notification
- > Breach Protection
- > Bring Your Own Device (BYOD)
- > Browser Isolation
- > Business Continuity / Disaster Recovery (BCDR)
- > Case Management
- > CCPA Compliance
- > Central Log Management
- > Certificate Lifecycle Management
- > Certificate-Based Authentication
- > Change Detection
- > Change Management
- > Client-Side Security
- > Cloud Access Security Broker (CASB)
- > Cloud File Analysis
- > Cloud Native Data Security
- > Cloud-Native Firewall (CNF)
- > Cloud Privileged Access Management
- > Cloud Security
- > Cloud Identity Governance
- > Cloud Identity Management
- > Cloud Infrastructure Entitlements Management (CIEM)
- > Cloud Infrastructure Security
- > Cloud Key Lifecycle Management
- > Cloud Security Automation
- > Cloud Security Operations
- > Cloud Workload Protection
- > CMMC Compliance
- > Communication Fraud Protection
- > Communication Risks
- > Compliance Program Management
- > Compliance Solution
- > Consumer Privacy Protection
- > Content Disarm and Reconstruction (CDR)
- > Continuous Controls Monitoring
- > Continuous Detection Posture Management (CDPM)
- > Continuous Improvement and Optimization
- > Continuous Penetration Testing
- > Continuous Security Validation
- > Continuous Threat Exposure Management (CTEM)
- > Critical Infrastructure Security
- > Cyber Asset Management
- > Cyber Defense Planning and Optimization (CDPO)
- > Cyber Defense Services
- > Cyber Exposure Management
- > Cyber Portfolio Management
- > Cyber Resilience Services
- > Cyber Risk Quantification Management
- > Cyber Skilling
- > Cyber Threat Intelligence
- > Cybersecurity-as-a-Service (CSaaS)
- > Cybersecurity Assessment
- > Cybersecurity Audit
- > Cybersecurity Blog
- > Cybersecurity for Connected Home
- > Cybersecurity Learning Management System
- > Cybersecurity News
- > Cybersecurity Performance Management
- > Cybersecurity Posture
- > Cybersecurity Product of the Year
- > Cybersecurity Professional Association
- > Cybersecurity Program Management
- > Cybersecurity Research
- > Cybersecurity Talent Screening
- > Cybersecurity Training
- > Cyberstorage
- > Dark Web Monitoring
- > Data-centric Security
- > Data Classification
- > Data Cloud Security
- > Data Governance
- > Data Leakage Prevention (DLP)
- > Data Retention
- > Data Security
- > Data Security Platform
- > Data Security Posture Management (DSPM)
- > Database Security
- > DDoS Protection
- > Deception Technology
- > DevOps Mobile Security Tool
- > DevSecOps
- > Digital Certificates
- > Digital Document Security
- > Digital Footprint Management
- > Digital Rights Management (DRM)
- > Digital Risk Protection
- > DNS Security
- > eDiscovery
- > Email Security
- > Embedded Security
- > Employee Privacy Protection
- > Encryption
- > Endpoint Detection and Response
- > Endpoint Security
- > Endpoint Security Analytics
- > ERP Cybersecurity
- > Excellence in Cybersecurity Innovation
- > Executive Privacy Protection
- > Extended Detection and Response (XDR)
- > Exposure Assessment Platform
- > Firewall
- > Firmware Security
- > Forensics
- > Fraud Prevention
- > Fraud Protection
- > Free Patch Management Tool
- > GDPR Compliance
- > Google Cloud Security
- > Hardware Access Control
- > Human Risk Management
- > Hybrid Active Directory Protection
- > Hybrid Cloud Security
- > ICS / SCADA Security
- > Identity and Access Governance
- > Identity and Access Management
- > Identity Proofing and Corroboration
- > Identity Theft Resolution Service
- > Identity Threat Detection and Response (ITDR)
- > Incident Response
- > Information Archiving
- > Insider Threat Solution
- > Integrated Risk Management
- > Intelligence Powered Cybersecurity
- > Internet Connectivity with Embedded Security
- > Internet of Things Security (IoT)
- > Intrusion Detection & Prevention
- > ISPM (Identity Security Posture Management)
- > Just-in-Time Administration
- > Leading CyberFusion Solution
- > Level 0 OT Detection
- > Machine Learning
- > Magecart Protection
- > Managed Detection and Response (MDR)
- > Managed SASE
- > Managed Security Service
- > Memory Protection
- > Messaging Security
- > Micro-Segmentation
- > Mobile Application Security
- > Mobile Application Security Testing
- > Mobile Bot Defense
- > Mobile Device Access Management
- > Mobile Device Management (MDM)
- > Mobile Geo Compliance
- > Mobile Payment Security
- > Mobile Risk AI Platform
- > Mobile Security
- > Mobile Security Automation
- > Mobile Security Diagnostics
- > Mobile Security Platform
- > Mobile Social Engineering Defense
- > Mobile Threat Defense
- > Mobile XDR
- > Modular Cybersecurity
- > Multi-Factor Authentication
- > Network Access Control (NAC)
- > Network and System Admin Training
- > Network Detection and Response
- > Network Security
- > Network Security Policy Management (NSPM)
- > Network Traffic Analysis
- > Next Generation Firewall (NGFW)
- > Open Source Security
- > Optical Document Security
- > OT Cyber Risk Management
- > OT Security
- > Patch and Configuration Management
- > Payment Security
- > Pentest as a Service (PtaaS)
- > Phishing Detection and Response (PDR)
- > Phishing-Resistant MFA
- > Policy and User Management
- > Post Quantum Authentication
- > Post Quantum Crypto
- > Post Quantum General Data Protection
- > Post Quantum Network Data Protection
- > Post Quantum Privacy Data Filter
- > Post Quantum Privileged Access Management
- > Quantum Key Distribution
- > Privacy
- > Privacy Enhancing Technology
- > Privileged Access Management
- > Privileged Access Workstations
- > Product Security Platform
- > Ransomware Protection
- > Ransomware Recovery
- > Red Teaming
- > Remote Monitoring and Management (RMM)
- > Remote Wipe
- > Risk-Based Vulnerability Management
- > Risk Management
- > Runtime Application Protection
- > Runtime Application Self-Protection
- > SaaS Security Posture Management (SSPM)
- > SBOM Management
- > SDLC Security
- > SDN / NFV Security
- > Secure Access
- > Secure Access Service Edge (SASE)
- > Secure Data Erasure
- > Secure File Transfer
- > Secure Mobile Device
- > Security Analytics
- > Security Automation
- > Security Awareness Program
- > Secure Collaboration Platform
- > Security Education
- > Security Education Platform
- > Security Information and Event Management (SIEM)
- > Security Investigation
- > Security Log Analysis
- > Security Management
- > Security Management and Operations
- > Security Monitoring
- > Security Operations
- > Security Operations Center (SOC)
- > Security Orchestration, Automation & Response (SOAR)
- > Security Platform
- > Security Posture
- > Security Virtual Assistant
- > Secure Remote Access
- > Serverless Security
- > Session Monitoring and Recording
- > Single Sign-On (SSO)
- > SOC Automation Solution
- > Social Media Security
- > Software Composition Analysis (SCA)
- > Software Supply Chain Security
- > Storage and Archiving
- > Third Party Risk Management (TPRM)
- > Third-Party Security Risk Management
- > Threat Detection and Response
- > Threat Hunting
- > Threat Intelligence
- > Threat Modeling
- > Trusted User Experience
- > Unified HSM and Key Management
- > Unified Threat Management (UTM)
- > Unstructured Data Security
- > User and Entity Behavior Analytics (UEBA)
- > Vendor Risk Management
- > Virtual CISO
- > Virtual Private Network (VPN)
- > Vulnerability Exposure Management
- > Vulnerability Management
- > Web Application Security
- > Web Content Filtering
- > Website Security
- > Wireless Security
- > Workload Identity
- > Zero Day Exploit Detection
- > Zero Trust Security
- > Best Cybersecurity Company
- > Best Cybersecurity Compliance Company
- > Best Cybersecurity Education Provider
- > Best Cybersecurity Marketing Agency
- > Best Cybersecurity Solutions Consolidator
- > Best Cybersecurity Startup
- > Best Cybersecurity Conference
- > Best Data Security Company
- > Best Device Risk Intelligence Company
- > Best Fraud Protection Company
- > Best Managed Security Service Provider (MSSP)
- > Best Mobile App Defense Company
- > Best Network Monitoring Solution Provider
- > Biggest Cybersecurity Brand Growth
- > Cybersecurity PR Agency of the Year
- > Cybersecurity Compliance Service Provider of the Year
- > Cybersecurity Service Provider of the Year
- > Defensive Cyberspace Operations Service Provider
- > Fastest Growing Cybersecurity Company
- > Innovative OT Security Provider
- > Most Innovative Cybersecurity Company
- > MSSP of the Year
- > vCISO Service Provider of the Year
- > Automotive
- > Best Cybersecurity Industry Solution
- > Best Maritime Cybersecurity
- > Brand Protection and Darkweb Monitoring Provider of the Year
- > Construction
- > Critical Infrastructure
- > Cyber Insurance
- > Energy
- > Financial Services
- > Government
- > Healthcare
- > Hospitality
- > Internet of Medical Things (IoMT)
- > Manufacturing
- > Modern Banking Cybersecurity Solution
- > National Cyber Defense
- > Pharmaceuticals & Biotech
- > Professional Services
- > Retail
- > Security Risk Management for Healthcare
- > Software
- > Software & Internet
- > Supply Chain Security for Healthcare
- > Technology
- > Vulnerability Management for Healthcare
- > AI Security Innovator of the Year
- > Best Cybersecurity Awareness Program
- > Best Cybersecurity Strategy
- > Best Risk and Compliance Program
- > Chief Executive Officer of the Year (CEO)
- > Chief Information Security Officer of the Year (CISO)
- > Chief Technology Officer of the Year (CTO)
- > Continuous Improvement and Optimization Expert of the Year
- > CSO Team of the Year
- > Cybersecurity and Privacy Management Excellence
- > Cybersecurity Application Security Leader of the Year
- > Cybersecurity Architect of the Year
- > Cybersecurity Audit Professional of the Year
- > Cybersecurity Audit Team of the Year
- > Cybersecurity Blogger of the Year
- > Cybersecurity Compliance & Assurance Professional of the Year
- > Cybersecurity Compliance Service Provider of the Year
- > Cybersecurity Consultant of the Year
- > Cybersecurity Educator of the Year
- > Cybersecurity Entrepreneur of the Year
- > Cybersecurity Executive of the Year
- > Cybersecurity Innovator of the Year
- > Cybersecurity Instructor Team of the Year
- > Cybersecurity Journalist of the Year
- > Cybersecurity Marketer of the Year
- > Cybersecurity PR Professional of the Year
- > Cybersecurity Product Leader of the Year
- > Cybersecurity Professional in Financial Services
- > Cybersecurity Professional in Healthcare
- > Cybersecurity Professional of the Year
- > Cybersecurity Project of the Year
- > Cybersecurity Recruiter of the Year
- > Cybersecurity Risk Management Professional
- > Cybersecurity Service Provider Auditor of the Year
- > Cybersecurity Strategist of the Year
- > Cybersecurity Team of the Year
- > Cybersecurity Vulnerability Management Professional of the Year
- > Cybersecurity Woman of the Year
- > Defensive Cyberspace Operations Team of the Year
- > Global Cybersecurity Advocate
- > Global Cybersecurity Visionary
- > Junior Cybersecurity Professional of the Year
- > Pentest Team of the Year
- > SOC Team of the Year
- > Threat Intelligence Team of the Year