InfoSec Awards 2018 Categories Selections

If your category is not listed, you can create it (subject to judging approval):

Access Control
Advanced Persistent Threat (APT) Detection and Response
Anti-malware
Anti-phishing
Anti-spam
Anti-virus
Application Security
Artificial Intelligence and Machine Learning
Authentication  (Multi, Single or Two-Factor)
Biometrics
Breach & Attack Simulation
Bring Your Own Device (BYOD)
Chief Executive Officer of the Year
Chief Information Security Officer of the Year
Chief Risk Officer of the Year
Chief Security Officer of the Year
Chief Technology Officer of the Year
Cloud Security
Compliance
Content Management and Filtering
Cybersecurity Discovery
Cybersecurity Research
Privacy Expert of the Year
Data Center Security
Data Loss Prevention (DLP)
Database Security, Data Leakage-Protection/ Extrusion Prevention
Deception Based Security
Deep Sea Phishing – Next Gen Email Security
Digital Footprint Security
Digital Rights Management
Email Security and Management
Embedded Security
Encryption
Encryption Expert of the Year
Endpoint Security
Enterprise Mobile Threat Defense
Enterprise Security
ERP Security
FERC/NERC CIP Compliance
Firewall
Forensics
Fraud Prevention
ICS/SCADA Security
Identity & Access Management
Identity Management
Incident Response
InfoSec Startup of the Year
Insider Threat Detection
Insider Threat Prevention
Internet of Things (IoT) Security
Intrusion Detection System (IDS)
Intrusion Prevention Systems (IPS)
IT Vendor Risk Management (ITVRM)
Malware Analysis
Managed Security Service Provider (MSSP)
Messaging Security
Micro-segmentation
Mobile Endpoint Security
Multi-factor Authentication
Network Access Control (NAC)
Network Security and Management
Open Source Security
Patch and Configuration Management
Policy Management
Privacy Expert of the Year
Privacy Management
Privacy Management Software
Privacy Management Hardware
Privileged Account Security
Risk Management
SaaS
SaaS/Cloud Security
Security
Security Abstraction
Security Expert of the Year
Security Company of the Year
Security Hardware
Security Information Event Management (SIEM)
Security Investigation Platform
Security Software
Security Training
Social Media, Web Filtering, and Content Security
Storage and Archiving
Threat Intelligence
Threat Modeling
Third Party Risk Management (TPRM)
Unified Threat Management (UTM)
User Behavior Analytics
VPN
Vulnerability Assessment, Remediation and Management
Vendor Security Assessment Platform (VSAP)
Vulnerability Management
Web Application Security
Wireless, Mobile, or Portable Device Security

       

 

Show Buttons
Hide Buttons