If your category is not listed, you can create it (subject to judging approval):
Access Control |
Advanced Persistent Threat (APT) Detection and Response |
Anti-malware |
Anti-phishing |
Anti-spam |
Anti-virus |
Application Security |
Artificial Intelligence and Machine Learning |
Authentication (Multi, Single or Two-Factor) |
Biometrics |
Breach & Attack Simulation |
Bring Your Own Device (BYOD) |
Chief Executive Officer of the Year |
Chief Information Security Officer of the Year |
Chief Risk Officer of the Year |
Chief Security Officer of the Year |
Chief Technology Officer of the Year |
Cloud Security |
Compliance |
Content Management and Filtering |
Cybersecurity Discovery |
Cybersecurity Research |
Privacy Expert of the Year |
Data Center Security |
Data Loss Prevention (DLP) |
Database Security, Data Leakage-Protection/ Extrusion Prevention |
Deception Based Security |
Deep Sea Phishing – Next Gen Email Security |
Digital Footprint Security |
Digital Rights Management |
Email Security and Management |
Embedded Security |
Encryption |
Encryption Expert of the Year |
Endpoint Security |
Enterprise Mobile Threat Defense |
Enterprise Security |
ERP Security |
FERC/NERC CIP Compliance |
Firewall |
Forensics |
Fraud Prevention |
ICS/SCADA Security |
Identity & Access Management |
Identity Management |
Incident Response |
InfoSec Startup of the Year |
Insider Threat Detection |
Insider Threat Prevention |
Internet of Things (IoT) Security |
Intrusion Detection System (IDS) |
Intrusion Prevention Systems (IPS) |
IT Vendor Risk Management (ITVRM) |
Malware Analysis |
Managed Security Service Provider (MSSP) |
Messaging Security |
Micro-segmentation |
Mobile Endpoint Security |
Multi-factor Authentication |
Network Access Control (NAC) |
Network Security and Management |
Open Source Security |
Patch and Configuration Management |
Policy Management |
Privacy Expert of the Year |
Privacy Management |
Privacy Management Software |
Privacy Management Hardware |
Privileged Account Security |
Risk Management |
SaaS |
SaaS/Cloud Security |
Security |
Security Abstraction |
Security Expert of the Year |
Security Company of the Year |
Security Hardware |
Security Information Event Management (SIEM) |
Security Investigation Platform |
Security Software |
Security Training |
Social Media, Web Filtering, and Content Security |
Storage and Archiving |
Threat Intelligence |
Threat Modeling |
Third Party Risk Management (TPRM) |
Unified Threat Management (UTM) |
User Behavior Analytics |
VPN |
Vulnerability Assessment, Remediation and Management |
Vendor Security Assessment Platform (VSAP) |
Vulnerability Management |
Web Application Security |
Wireless, Mobile, or Portable Device Security |