Browse Nominations by Category
Start New Nomination- Cybersecurity Product / Service (10)
- Access Control (0)
- Advanced Persistent Threat Protection (APT) (0)
- AI Security Solution (0)
- Anti-Fraud and Compliance for Mobile Payments (0)
- Anti Malware (0)
- Anti Phishing (0)
- Anti-Piracy (0)
- Anti Virus (0)
- Anti-Vishing (0)
- API Security (0)
- Application Security (0)
- Application-Aware Workload Protection (0)
- Artificial Intelligence Security (0)
- Attack Surface Management (0)
- Authorization and Data Governance (0)
- Automotive Security (IoT) (0)
- Autonomous Penetration Testing (0)
- AWS Cloud Security (0)
- Azure Cloud Security (0)
- Balanced Development Automation (0)
- Best Artificial Intelligence (AI) Threat Detection (0)
- Best Cloud Runtime Security Solution (0)
- Best Cloud Security Certification (0)
- Best Cybersecurity Book (0)
- Best Cybersecurity Certification (0)
- Best Cybersecurity Podcast (0)
- Best Cybersecurity SOC Monitoring (0)
- Best Cybersecurity User Experience (0)
- Best Free Cybersecurity Tool (0)
- Best GRC Certification Program (0)
- Best In Multi-Cloud Data Activity Service (0)
- Best Integrated Authentication (0)
- Best Integrated Security Platform (0)
- Best New Compliance Solution (0)
- Best Passwordless Solution (0)
- Best RDK Video Accelerator Solution and Certification (0)
- Biometrics (0)
- Blockchain Security (0)
- Board Management Software (0)
- Bot Defense (0)
- Breach and Attack Simulation (0)
- Breach Notification (0)
- Breach Protection (0)
- Bring Your Own Device (BYOD) (0)
- Browser Isolation (0)
- Business Continuity / Disaster Recovery (BCDR) (0)
- Case Management (0)
- CCPA Compliance (0)
- Central Log Management (0)
- Certificate Lifecycle Management (0)
- Certificate-Based Authentication (0)
- Change Detection (0)
- Change Management (0)
- Client-Side Security (0)
- Cloud Access Security Broker (CASB) (0)
- Cloud File Analysis (0)
- Cloud Native Data Security (0)
- Cloud-Native Firewall (CNF) (0)
- Cloud Privileged Access Management (0)
- Cloud Security (0)
- Cloud Identity Governance (0)
- Cloud Identity Management (0)
- Cloud Infrastructure Entitlements Management (CIEM) (0)
- Cloud Infrastructure Security (0)
- Cloud Key Lifecycle Management (0)
- Cloud Security Automation (0)
- Cloud Security Operations (0)
- Cloud Workload Protection (0)
- CMMC Compliance (0)
- Communication Fraud Protection (0)
- Communication Risks (0)
- Compliance Program Management (0)
- Compliance Solution (0)
- Consumer Privacy Protection (0)
- Content Disarm and Reconstruction (CDR) (0)
- Continuous Controls Monitoring (0)
- Continuous Detection Posture Management (CDPM) (0)
- Continuous Improvement and Optimization (0)
- Continuous Penetration Testing (0)
- Continuous Security Validation (0)
- Continuous Threat Exposure Management (CTEM) (0)
- Critical Infrastructure Security (0)
- Cyber Asset Management (0)
- Cyber Defense Planning and Optimization (CDPO) (0)
- Cyber Exposure Management (0)
- Cyber Portfolio Management (0)
- Cyber Risk Quantification Management (0)
- Cyber Skilling (0)
- Cyber Threat Intelligence (0)
- Cybersecurity-as-a-Service (CSaaS) (0)
- Cybersecurity Assessment (0)
- Cybersecurity Audit (0)
- Cybersecurity Blog (0)
- Cybersecurity for Connected Home (0)
- Cybersecurity Learning Management System (0)
- Cybersecurity News (0)
- Cybersecurity Performance Management (0)
- Cybersecurity Posture (0)
- Cybersecurity Product of the Year (0)
- Cybersecurity Professional Association (0)
- Cybersecurity Program Management (0)
- Cybersecurity Research (0)
- Cybersecurity Talent Screening (0)
- Cybersecurity Training (0)
- Cyberstorage (0)
- Dark Web Monitoring (0)
- Data-centric Security (0)
- Data Classification (0)
- Data Cloud Security (0)
- Data Governance (0)
- Data Leakage Prevention (DLP) (0)
- Data Retention (0)
- Data Security (0)
- Data Security Platform (0)
- Data Security Posture Management (DSPM) (0)
- Database Security (0)
- Deception Technology (0)
- DevOps Mobile Security Tool (0)
- DevSecOps (0)
- Digital Certificates (0)
- Digital Document Security (0)
- Digital Footprint Management (0)
- Digital Rights Management (DRM) (0)
- Digital Risk Protection (0)
- DNS Security (1)
- eDiscovery (0)
- Email Security (0)
- Embedded Security (1)
- Employee Privacy Protection (1)
- Encryption (0)
- Endpoint Detection and Response (0)
- Endpoint Security (0)
- Endpoint Security Analytics (0)
- ERP Cybersecurity (0)
- Executive Privacy Protection (0)
- Extended Detection and Response (XDR) (0)
- Firewall (0)
- Firmware Security (0)
- Forensics (0)
- Fraud Prevention (0)
- Fraud Protection (0)
- Free Patch Management Tool (0)
- GDPR Compliance (0)
- Google Cloud Security (0)
- Hardware Access Control (0)
- Human Risk Management (0)
- Hybrid Active Directory Protection (0)
- Hybrid Cloud Security (0)
- ICS / SCADA Security (1)
- Identity and Access Governance (0)
- Identity and Access Management (1)
- Identity Proofing and Corroboration (0)
- Identity Theft Resolution Service (0)
- Identity Threat Detection and Response (ITDR) (0)
- Incident Response (0)
- Information Archiving (0)
- Insider Threat Solution (1)
- Integrated Risk Management (0)
- Intelligence Powered Cybersecurity (0)
- Internet Connectivity with Embedded Security (0)
- Internet of Things Security (IoT) (0)
- Intrusion Detection & Prevention (0)
- Just-in-Time Administration (0)
- Level 0 OT Detection (0)
- Machine Learning (0)
- Magecart Protection (0)
- Managed Detection and Response (MDR) (0)
- Managed Security Service (0)
- Memory Protection (1)
- Messaging Security (0)
- Micro-Segmentation (0)
- Mobile Application Security (0)
- Mobile Application Security Testing (0)
- Mobile Bot Defense (0)
- Mobile Device Management (MDM) (0)
- Mobile Geo Compliance (0)
- Mobile Payment Security (0)
- Mobile Risk AI Platform (0)
- Mobile Security (0)
- Mobile Security Automation (0)
- Mobile Security Diagnostics (0)
- Mobile Security Platform (0)
- Mobile Social Engineering Defense (0)
- Mobile Threat Defense (0)
- Mobile XDR (0)
- Modular Cybersecurity (0)
- Multi-Factor Authentication (0)
- Network Access Control (NAC) (0)
- Network and System Admin Training (0)
- Network Detection and Response (0)
- Network Security (0)
- Network Security Policy Management (NSPM) (0)
- Network Traffic Analysis (0)
- Next Generation Firewall (NGFW) (0)
- Open Source Security (0)
- Optical Document Security (0)
- OT Cyber Risk Management (0)
- OT Security (0)
- Patch and Configuration Management (0)
- Payment Security (0)
- Pentest as a Service (PtaaS) (0)
- Phishing Detection and Response (PDR) (0)
- Phishing-Resistant MFA (0)
- Policy and User Management (0)
- Post Quantum Authentication (0)
- Post Quantum Crypto (0)
- Post Quantum General Data Protection (0)
- Post Quantum Network Data Protection (0)
- Post Quantum Privacy Data Filter (0)
- Post Quantum Privileged Access Management (0)
- Quantum Key Distribution (0)
- Privacy (0)
- Privacy Enhancing Technology (0)
- Privileged Access Management (0)
- Privileged Access Workstations (0)
- Product Security Platform (0)
- Ransomware Protection (0)
- Ransomware Recovery (0)
- Red Teaming (0)
- Remote Monitoring and Management (RMM) (0)
- Remote Wipe (0)
- Risk-Based Vulnerability Management (0)
- Risk Management (0)
- Runtime Application Protection (0)
- Runtime Application Self-Protection (0)
- SaaS Security Posture Management (SSPM) (1)
- SBOM Management (0)
- SDLC Security (0)
- SDN / NFV Security (0)
- Secure Access (0)
- Secure Access Service Edge (SASE) (0)
- Secure Data Erasure (0)
- Secure File Transfer (0)
- Secure Mobile Device (0)
- Security Analytics (0)
- Security Automation (0)
- Security Awareness Program (0)
- Secure Collaboration Platform (0)
- Security Education (0)
- Security Education Platform (0)
- Security Information and Event Management (SIEM) (0)
- Security Investigation (0)
- Security Log Analysis (0)
- Security Management (0)
- Security Management and Operations (0)
- Security Monitoring (0)
- Security Operations (0)
- Security Operations Center (SOC) (0)
- Security Orchestration, Automation & Response (SOAR) (0)
- Security Platform (0)
- Security Posture (0)
- Security Virtual Assistant (0)
- Secure Remote Access (0)
- Serverless Security (0)
- Session Monitoring and Recording (0)
- Single Sign-On (SSO) (0)
- SOC Automation Solution (0)
- Social Media Security (0)
- Software Composition Analysis (SCA) (0)
- Software Supply Chain Security (0)
- Storage and Archiving (0)
- Third Party Risk Management (TPRM) (0)
- Third-Party Security Risk Management (0)
- Threat Detection and Response (0)
- Threat Hunting (0)
- Threat Intelligence (0)
- Threat Modeling (0)
- Trusted User Experience (0)
- Unified HSM and Key Management (0)
- Unified Threat Management (UTM) (0)
- Unstructured Data Security (0)
- User and Entity Behavior Analytics (UEBA) (0)
- Vendor Risk Management (0)
- Virtual CISO (0)
- Virtual Private Network (VPN) (0)
- Vulnerability Management (0)
- Web Application Security (1)
- Web Content Filtering (0)
- Website Security (0)
- Wireless Security (0)
- Zero Day Exploit Detection (0)
- Zero Trust Security (1)
- Cybersecurity Company (6)
- Best Cybersecurity Company (2)
- Best Cybersecurity Compliance Company (0)
- Best Cybersecurity Education Provider (1)
- Best Cybersecurity Marketing Agency (1)
- Best Cybersecurity Solutions Consolidator (0)
- Best Cybersecurity Startup (0)
- Best Cybersecurity Conference (0)
- Best Data Security Company (0)
- Best Device Risk Intelligence Company (0)
- Best Fraud Protection Company (0)
- Best Managed Security Service Provider (MSSP) (0)
- Best Mobile App Defense Company (0)
- Biggest Cybersecurity Brand Growth (0)
- Cybersecurity PR Agency of the Year (0)
- Cybersecurity Compliance Service Provider of the Year (0)
- Cybersecurity Service Provider of the Year (1)
- Defensive Cyberspace Operations Service Provider (0)
- Fastest Growing Cybersecurity Company (1)
- Most Innovative Cybersecurity Company (0)
- MSSP of the Year (0)
- vCISO Service Provider of the Year (0)
- Cybersecurity Industry Solution (2)
- Automotive (0)
- Best Maritime Cybersecurity (0)
- Brand Protection and Darkweb Monitoring Provider of the Year (1)
- Construction (0)
- Cyber Insurance (0)
- Energy (0)
- Financial Services (0)
- Government (0)
- Healthcare (0)
- Hospitality (0)
- Manufacturing (0)
- Modern Banking Cybersecurity Solution (0)
- National Cyber Defense (1)
- Pharmaceuticals & Biotech (0)
- Professional Services (0)
- Retail (0)
- Security Risk Management for Healthcare (0)
- Software (0)
- Software & Internet (0)
- Supply Chain Security for Healthcare (0)
- Technology (0)
- Vulnerability Management for Healthcare (0)
- Cybersecurity Professional / Team (8)
- Best Cybersecurity Awareness Program (0)
- Best Cybersecurity Strategy (0)
- Best Risk and Compliance Program (0)
- Chief Executive Officer of the Year (CEO) (0)
- Chief Information Security Officer of the Year (CISO) (0)
- Chief Technology Officer of the Year (CTO) (1)
- Continuous Improvement and Optimization Expert of the Year (0)
- CSO Team of the Year (0)
- Cybersecurity and Privacy Management Excellence (0)
- Cybersecurity Application Security Leader of the Year (0)
- Cybersecurity Architect of the Year (1)
- Cybersecurity Audit Professional of the Year (0)
- Cybersecurity Audit Team of the Year (0)
- Cybersecurity Blogger of the Year (0)
- Cybersecurity Compliance & Assurance Professional of the Year (0)
- Cybersecurity Compliance Service Provider of the Year (0)
- Cybersecurity Consultant of the Year (0)
- Cybersecurity Educator of the Year (0)
- Cybersecurity Entrepreneur of the Year (0)
- Cybersecurity Executive of the Year (1)
- Cybersecurity Innovator of the Year (0)
- Cybersecurity Instructor Team of the Year (0)
- Cybersecurity Journalist of the Year (0)
- Cybersecurity Marketer of the Year (0)
- Cybersecurity PR Professional of the Year (0)
- Cybersecurity Product Leader of the Year (0)
- Cybersecurity Professional in Financial Services (0)
- Cybersecurity Professional in Healthcare (2)
- Cybersecurity Professional of the Year (2)
- Cybersecurity Project of the Year (0)
- Cybersecurity Recruiter of the Year (0)
- Cybersecurity Service Provider Auditor of the Year (0)
- Cybersecurity Strategist of the Year (0)
- Cybersecurity Team of the Year (0)
- Cybersecurity Vulnerability Management Professional of the Year (0)
- Cybersecurity Woman of the Year (1)
- Defensive Cyberspace Operations Team of the Year (0)
- Global Cybersecurity Visionary (0)
- Junior Cybersecurity Professional of the Year (0)
- Pentest Team of the Year (0)
- SOC Team of the Year (0)