Start your nomination by selecting a category below. Click any group to expand and view the award categories inside.
Don’t see your category? Click here to suggest one.
- > Access Control
- > Advanced Persistent Threat Protection (APT)
- > Agentic AI Governance
- > Agentic AI Platform
- > Agentic AI Security
- > AI Agent Identity Security
- > AI Cybersecurity Governance
- > AI-Powered Vulnerability Management
- > AI Data Security & Governance
- > AI Model Security
- > AI SecOps
- > AI Security Solution
- > Anti Malware
- > Anti Phishing
- > Anti-Piracy
- > Anti Virus
- > API Abuse Prevention
- > API Security
- > Application Security
- > Artificial Intelligence Security
- > Attack Surface Management
- > Automated Investigation and Response
- > Automotive Security (IoT)
- > Best Cybersecurity Book
- > Best Cybersecurity Podcast
- > Best Cybersecurity User Experience
- > Best Non-Human Identity Management Solution
- > CJIS Security Compliance
- > Client-Side Protection
- > Biometrics
- > Bot Defense
- > Breach and Attack Simulation
- > Breach Protection
- > Browser Isolation
- > Business Continuity / Disaster Recovery (BCDR)
- > Central Log Management
- > Certificate Lifecycle Management
- > Change Management
- > Cloud Access Security Broker (CASB)
- > Cloud-Native Firewall (CNF)
- > Cloud Privileged Access Management
- > Cloud Security
- > Cloud Security Posture Management (CSPM)
- > Cloud Identity Management
- > Cloud Infrastructure Entitlements Management (CIEM)
- > Cloud Infrastructure Security
- > Cloud Security Automation
- > Cloud Security Operations
- > Cloud Workload Protection
- > Compliance Program Management
- > Compliance Solution
- > Compromised Credential Protection
- > Content Disarm and Reconstruction (CDR)
- > Continuous Controls Monitoring
- > Continuous Detection Posture Management (CDPM)
- > Continuous Threat Exposure Management (CTEM)
- > Critical Infrastructure Security
- > Cyber Asset Management
- > Cyber Defense Services
- > Cyber Exposure Management
- > Cyber Readiness and Validation
- > Cyber Resilience
- > Cyber Resilience Services
- > Cyber Risk Quantification Management
- > Cyber Skilling
- > Cybersecurity-as-a-Service (CSaaS)
- > Cybersecurity Assessment
- > Cybersecurity Blog
- > Cybersecurity Performance Management
- > Cybersecurity Posture Management
- > Cybersecurity Professional Association
- > Cybersecurity Program Management
- > Cybersecurity Research
- > Cybersecurity Training
- > Dark Web Monitoring
- > Data Classification
- > Data Governance
- > Data Leakage Prevention (DLP)
- > Data Security
- > Data Security Platform
- > Data Security Posture Management (DSPM)
- > DDoS Protection
- > DevSecOps
- > Digital Certificates
- > Digital Document Security
- > Digital Rights Management (DRM)
- > DNS Security
- > Email Security
- > Embedded Security
- > Encryption
- > Endpoint Detection and Response
- > Endpoint Security
- > ERP Cybersecurity
- > Excellence in Cybersecurity Innovation
- > Extended Detection and Response (XDR)
- > Exposure Assessment Platform
- > Firewall
- > Firmware Security
- > Forensics
- > Fraud Prevention
- > GDPR Compliance
- > Hardware-Isolated Secure Workspace Platform
- > Human Risk Management
- > ICS / SCADA Security
- > Identity and Access Management
- > Identity Threat Detection and Response (ITDR)
- > Incident Response
- > Insider Risk Management
- > Internet of Things Security (IoT)
- > Intrusion Detection & Prevention
- > ISPM (Identity Security Posture Management)
- > Machine Identity Security
- > Machine Learning
- > Managed Detection and Response (MDR)
- > Managed SASE
- > Managed Security Service
- > Messaging Security
- > Micro-Segmentation
- > Mobile Application Security
- > Mobile Device Management (MDM)
- > Mobile Security
- > Multi-Factor Authentication
- > Network Access Control (NAC)
- > Network and System Admin Training
- > Network Detection and Response
- > Network Security
- > Network Security Policy Management (NSPM)
- > Network Traffic Analysis
- > Next Generation Firewall (NGFW)
- > NHI Security
- > Open Source Security
- > OT Security
- > OT Cyber Risk Management
- > Passwordless Authentication
- > Patch and Configuration Management
- > Payment Security
- > Pentest as a Service (PtaaS)
- > Phishing Detection and Response (PDR)
- > Phishing-Resistant MFA
- > Policy and User Management
- > Post Quantum Authentication
- > Post Quantum Crypto
- > Post Quantum General Data Protection
- > Post Quantum Network Data Protection
- > Post Quantum Privileged Access Management
- > Quantum Key Distribution
- > Privacy
- > Privileged Access Management
- > Product Security Platform
- > Ransomware Protection
- > Ransomware Recovery
- > Remote Monitoring and Management (RMM)
- > Risk-Based Vulnerability Management
- > Risk Management
- > Runtime Application Self-Protection (RASP)
- > SaaS Security Posture Management (SSPM)
- > SBOM Management
- > SDLC Security
- > Secret and Credential Management
- > Secure Access
- > Secure Access Service Edge (SASE)
- > Secure Collaboration Platform
- > Secure Data Erasure
- > Secure File Transfer
- > Security Analytics
- > Security Automation
- > Security Awareness Program
- > Security Data Layer
- > Security Education
- > Security Information and Event Management (SIEM)
- > Security Investigation
- > Security Log Analysis
- > Security Management and Operations
- > Security Monitoring
- > Security Operations
- > Security Orchestration, Automation & Response (SOAR)
- > Security Platform
- > Secure Remote Access
- > Serverless Security
- > Session Monitoring and Recording
- > Single Sign-On (SSO)
- > SOC-as-a-Service
- > SOC Automation
- > Social Media Security
- > Software Supply Chain Security
- > Storage and Archiving
- > Third Party Risk Management (TPRM)
- > Threat Detection and Response
- > Threat Hunting
- > Threat Intelligence
- > Threat Modeling
- > Unified HSM and Key Management
- > Unified Threat Management (UTM)
- > Unstructured Data Security
- > User and Entity Behavior Analytics (UEBA)
- > Vendor Risk Management
- > Virtual CISO
- > Virtual Private Network (VPN)
- > Visual Data Security
- > Vulnerability Management
- > Web Application Security
- > Web Content Filtering
- > Website Security
- > Wireless Security
- > Zero Day Exploit Detection
- > Zero Trust Security
- > Best Cybersecurity Company
- > Best Cybersecurity Compliance Company
- > Best Cybersecurity Education Provider
- > Best Cybersecurity Marketing Agency
- > Best Cybersecurity Startup
- > Best Cybersecurity Conference
- > Best Data Security Company
- > Best Fraud Protection Company
- > Best Managed Security Service Provider (MSSP)
- > Best Network Monitoring Solution Provider
- > Cybersecurity PR Agency of the Year
- > Cybersecurity Compliance Service Provider of the Year
- > Cybersecurity Service Provider of the Year
- > Fastest Growing Cybersecurity Company
- > Most Innovative Cybersecurity Company
- > MSSP of the Year
- > Automotive
- > Best Cybersecurity Industry Solution
- > Brand Protection and Darkweb Monitoring Provider of the Year
- > Critical Infrastructure
- > Cyber Insurance
- > Energy
- > Financial Services
- > Government
- > Healthcare
- > Hospitality
- > Internet of Medical Things (IoMT)
- > Manufacturing
- > Modern Banking Cybersecurity Solution
- > National Cyber Defense
- > Pharmaceuticals & Biotech
- > Professional Services
- > Retail
- > Security Risk Management for Healthcare
- > Software
- > Technology
- > Vulnerability Management for Healthcare
- > AI Security Innovator of the Year
- > Best Cybersecurity Awareness Program
- > Best Cybersecurity Strategy
- > Best Risk and Compliance Program
- > Channel Executive of the Year
- > Chief Executive Officer of the Year (CEO)
- > Chief Information Security Officer of the Year (CISO)
- > Chief Technology Officer of the Year (CTO)
- > Continuous Improvement and Optimization Expert of the Year
- > Cybersecurity and Privacy Management Excellence
- > Cybersecurity Application Security Leader of the Year
- > Cybersecurity Architect of the Year
- > Cybersecurity Audit Professional of the Year
- > Cybersecurity Audit Team of the Year
- > Cybersecurity Blogger of the Year
- > Cybersecurity Compliance & Assurance Professional of the Year
- > Cybersecurity Compliance Service Provider of the Year
- > Cybersecurity Consultant of the Year
- > Cybersecurity Educator of the Year
- > Cybersecurity Entrepreneur of the Year
- > Cybersecurity Executive of the Year
- > Cybersecurity Innovator of the Year
- > Cybersecurity Instructor Team of the Year
- > Cybersecurity Journalist of the Year
- > Cybersecurity Marketer of the Year
- > Cybersecurity PR Professional of the Year
- > Cybersecurity Product Leader of the Year
- > Cybersecurity Professional in Financial Services
- > Cybersecurity Professional in Healthcare
- > Cybersecurity Professional of the Year
- > Cybersecurity Project of the Year
- > Cybersecurity Recruiter of the Year
- > Cybersecurity Risk Management Professional
- > Cybersecurity Strategist of the Year
- > Cybersecurity Team of the Year
- > Cybersecurity Vulnerability Management Professional of the Year
- > Cybersecurity Woman of the Year
- > Defensive Cyberspace Operations Team of the Year
- > Global Cybersecurity Advocate
- > Global Cybersecurity Visionary
- > Junior Cybersecurity Professional of the Year
- > Pentest Team of the Year
- > SOC Team of the Year
- > Threat Intelligence Team of the Year
