SC Awards Europe 2021


Extended Entry Deadline Friday 5 March

With a constantly evolving threat landscape, SC Awards Europe has one objective: recognise and reward the people, products and services that exemplify the very best solutions for client-customers and the security sector as a whole.


We’re looking for trailblazers and innovators that are making an impact in the industry, demonstrating that they are at the top of their game, each adding value to the very core of Europe's cyber security defence, and that truly is worth celebrating.

 

Our judging panel of industry leaders will review and determine what products, companies and people are exemplifying best practice and the highest standards the industry can offer.

 

The entry process into the Awards is simple and this is your chance to battle it out against your competitors to prove you truly are the best in the industry to your clients and stakeholders!

What can the SC Awards Europe offer your business?


  • Marketing opportunities - The SC Awards Europe have truly established themselves as the most prestigious awards in the cyber-security sector. Entering the Awards gives you the opportunity to differentiate yourself as the best in the industry and get credibility from the leading brand in the profession - SC Media UK. 

  • Have your work judged by the best - Our prestigious judging panel consists of industry thought leaders who will review and determine what products, companies and people are exemplifying best practice and the highest standards the industry can offer. 

  • Share your work with the world - If shortlisted benefit from exposure for your projects on the awards website. Being able to classify yourselves globally as an award winning company is invaluable.
  • Employee motivation - A fantastic way to recognise all the hard work of your team - make sure to get their thoughts and ideas when you are putting your entries together to let them know the value of all the work they have been doing.

  • Support innovation in the industry - When writing your entries it allows you to evaluate your work from a different perspective, as well as introduce and publicise your new ideas to the industry - benchmarking yourself against your competition and making your work stand out. 

  • Cement your relationships - In the current climate, it is now more important than ever to focus on the positives on what your teams have been doing to combat an unprecedented challenge. Showcase and champion the astounding achievements and raise morale!

Key Information


Key Dates

26 February 2021 - Standard deadline
5 March 2021 - Extended deadline

April - Shortlist announced
8 June 2021 - Awards Celebration

Entry Pricing

Standard price per entry - £420 + VAT

Professional categories
Standard price per entry - £175 + VAT

Student Category
Free of charge

Categories


This category should include exemplary products that demonstrate advanced computer security testing methods which can identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors.

 

Best Security Company
Nominees should be the tried-and-true, longer-standing companies which have been offering products and services to customers for at least three years. Nominations can come from all sectors. Areas that will be accounted for in the judging process include: product line strength, customer base, customer service/support, research and development, company growth and solvency, innovation and more.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Enterprise Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry’s continued evolution. Best Risk Management/Regulatory

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Risk Management
These products measure, analyse and report risk, as well as enforce and update configuration policies within the enterprise, including but not limited to network, encryption, software and hardware devices. Entrants’ products should be enterprise-centric; collect data across the network; report associated risk, endpoint configuration, enforcement, auditing and reporting; provide remediation options (but are not exclusively patch management systems); and, finally, offer centralised reports based on regulatory requirements and local policies.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best SME Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of small- to mid-sized businesses. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry’s continued evolution.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Customer Service
Support as well as service of products and services sold are critical components of any contract. For many organisations that seek out help from information security vendors and service providers, the assistance they get from customer service representatives is crucial to the deployment, ongoing maintenance and successful running of the technologies they’ve bought and to which they have entrusted their businesses and sensitive data. For this category, we’re looking for vendor and service providers that offer excellent support and service – the staff that fulfilled its contracts and maybe even goes a little beyond them to ensure that organisations and their businesses are safe and sound against the many threats launched by today’s savvy cybercriminals.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Emerging Technology
What cutting-edge technologies are bursting onto the scene to address the newest information security needs facing organisations with some innovative capabilities? This new category welcomes both new vendors and old pros looking to provide products and services that look to help shape the future by addressing fast-evolving threats through the creation of these types of offerings. The product must have been launched not more than 18 months prior to entry, and entries should have some customers available who can act as references. The company should also have an office in UK/ Europe and provide ready support and service to customers in the UK/Europe.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Authentication Technology
Products here provide enhanced security to end-users or devices by offering credentials for access to an authenticator or authentication server. Software and hardware that specialises in the biometric authentication of users is also included here. These solutions may use a tangible device (something you have) for authentication and knowledge (something you know) for authentication. For biometrics, the solution provides identification and authentication using any of the following methods: finger/ thumb print/retinal scan/voice recognition/ hand/palm geometry/ facial recognition, or other unique user identifier.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Behaviour Analytics/ Enterprise Threat Detection
A still somewhat-emerging category, these products focus on detecting insider threats, targeted attacks and other fraudulent activities by examining human behaviours, identifying patterns that are then analysed through the application of algorithms and statistical analysis to detect anomalies that may indicate threats of loss or compromise to organisations’ critical data. Offerings in this space are also referred to as “user-behaviour analytics” products by analyst company Gartner.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Cloud Computing Security Solution
These technologies are deployed to protect data and/or applications in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers – and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privileged user access and controls or more.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Data Leakage Prevention (DLP) Solution
Products in this category include those that help organisations safeguard their intellectual property and customers’ critical data persistently – inside and outside the company. Network based and endpoint data leakage prevention products will be considered. Products should prevent data from unauthorised exit from the network, or protect data on the endpoint – whether the endpoint is connected to a network or not. Products typically are policy-driven and should include scanning of all data, regardless of protocol or application leaving the network, and/or keep track of peripherals, such as removable storage and attached to the endpoint – reporting that inventory to a central location or administrator. All entrants should have the capability of being managed by a centralised administrator. Those products considered part of this category include: network DLP products, which are typically gateways; those products protecting only endpoints; and hybrid products that operate at both the gateway to the network and at the endpoint. Specifically for endpoint DLP, traffic should be monitored and encryption should be available.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Email Security Solution
Email security addresses the ability to exchange email messages with assurance, as well as the ability to filter email messages based on content, source or other criteria. Solutions should ensure the privacy of sensitive messages, limit the repercussions of email forgery, and manage other aspects of safeguarding email within the organisation. These products are enterprise-centric and should have, but are not required to have, some form of centralised management. They may include spam filters, junk mail filters, malware filters, unauthorised content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, and more.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Endpoint Security
While the emphasis has moved from protect to detect, its not time to take down the barriers, and strength in depth requires a multi-layered approach which still needs endpoint protection including Anti-virus and firewalls.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Identity Management Solution
Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Incident Response Solution
The faster and more effectively you respond to an incident, the shorter time you give attackers to steal from or do damage on your systems. But care also has to be taken to preserve digital forensic evidence in the event of criminal action. While IR is led by policies, procedures and training, there are tools and organisations that can help, from specialist services in the event of a crime, to complete outsourced teams. We are looking for those services and tools that stand out as a must have.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best IOT/IIOT Security Solution
One of the biggest concerns for the security sector is the truly exponential growth of the Internet of Things, and the Industrial Internet of Things, increasing the attack surface to include everything from previously isolated industrial processes to everyday consumer appliances. Anything that connects to the internet is potentially hackable, so what solutions are there that organisations and their key employees can deploy to minimise and mitigate the threat posed by myriad connected devices?

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Managed Security Service
These offerings provide a turnkey approach to an organisation’s primary technical security needs. These offerings can either be a co-located device at the client organisation facility, or can be a completely outsourced solution where the application to be protected would reside at the vendor’s data centre.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Mobile Security Solution
More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Some examples include iPhones, iPads, Android devices, BlackBerries and more. Products in this category deal with not only a collapsing perimeter, but also consumer-owned and controlled devices being used to get at corporate resources. At a minimum, these devices likely will require strong endpoint security, point-to-point encryption and more. This is a broad category - if your product is used to secure this type of small device/handheld, it may fit. Security can be for data at rest in the device itself, secure access to data in the enterprise, and encryption for data in motion between the enterprise and the device. It also includes anything from hard disk encryption solutions and tools that track lost mobile devices to USB/ thumb drive security solutions.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Privileged Access Management
Privileged users can have the keys to the kingdom. So impersonating them and taking control of their access is a key target for attack groups, from criminals to nation states. Hence ramped up versions of identity and access control, network segmentation tools, and approaches to outsourcing and third parties are appropriate here, where they may have been considered too cumbersome for the average user. Yet these, often senior, users are just as resistant to friction as any other, so how do you reduce reliance on trust while still letting people do their job?

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Regulatory Compliance Tools and Solutions
There have long been regulatory compliance tools, but they have been thrust to the fore in the cyber-security sphere in the wake of GDPR, though this category encompasses other regulations and compliance requirements relevant to cyber-security and GRC teams. Solutions can be software, algorithms, or other innovative approaches that aid companies so that they know their compliance requirements, or prevent, identify, or remediate non-compliance.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best SIEM Solution
Security information and event management (SIEM) tools are used to collect, aggregate and correlate log data for unified analysis and reporting. Typically, these tools can take logs from a large number of sources, normalise them and build a database that allows detailed reporting and analysis. While forensic analysis of network events may be a feature of a SIEM, it is not the only feature, nor is it the primary focus of the tool.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Threat Intelligence Technology
Contenders in this category should help cyber-security teams research and analyse cyber-crime and other threat trends and any technical developments being made by those engaging in cyber-criminal activity against both private and public entities. These technologies facilitate the understanding and contextual relevance of various types of data, often an overwhelming amount, collected from internal network devices, as well as from external sources (such as open source tools, social media platforms, the dark web and more). Armed with these more digestible analysis on risks and cyber-threats, cyber-security teams should be able to enhance their tactical plans preparing for and reacting to an infrastructure intrusion prior to, during and after an attack, ultimately improving their overall security posture so their long-term security strategy is more predictive rather than simply reactive.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Use of Machine Learning/AI
From big data analysis, dealing with millions of logs, to cutting edge analytics, cyber security is moving closer to Artificial Intelligence and driving potential use-cases for deployment. Machine learning should be more than automating manual tasks, but should apply logic to infer conditions and courses of action; AI is currently referring to machine learning from unstructured data, and while other definitions will be considered, judges will be alert to hype exceeding reality in this cutting edge area.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Vulnerability Management Solution
These products perform network/device vulnerability assessment and/or penetration testing. They may use active or passive testing, and are either hardware or software-based solutions that report vulnerabilities using some standard format/reference.

Please download the entry kit to view the category criteria and qualifying questions.

 

CSO / CISO of the Year
Nominations for this award are the stand-out champions who have led best-in-class programes of IT security. Whatever the company size that they represent, they have demonstrated to peers and stakeholders at every level, the importance of sound security strategy and implementation. Their planning and execution of a balanced tech and people-led approach will be clear from projects and delivery they are able to demonstrate. References from stakeholders and colleagues will support this entry.

This category can be nominated or self-entered.

Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category. However, vendors may nominate the CISO at an end-user customer and SC will follow up to confirm that they wish to enter and submit an application.

Please download the entry kit to view the category criteria and qualifying questions.

 

Woman of Influence Award
In theory cyber-security is a results-oriented industry where no one notices your age, sex, background or other characteristics not relevant to your ability to deliver. But in reality there are obstacles in society, education, companies and organisations that have resulted in women representing less than 20% of the industry.
This award recognises the women leaders who are paving the way in the industry and challenging the status quo. This award will recognise women for their professional success, community involvement and leadership roles in the fields of Information Security, Risk Management and Privacy.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Security Team
Contenders should only include teams from end-user companies that have executed and are managing exceptional and strong security programmes, which they have built from virtually non-existent ones. The team should have successfully established and implemented an integral and/or innovative/ cutting-edge component of their security programme, and should have spearheaded various areas of support for its success, such as strong end-user awareness training, good configuration management, and more.
Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category. However, vendors may nominate the team at an end-user customer and SC will follow up to confirm that they wish to enter and submit an application.

Please download the entry kit to view the category criteria and qualifying questions.

 

Best Professional Training or Certification Programme
This category targets companies and organisations that provide end-user awareness training and/or certification programmes for those looking to ensure that its employees are knowledgeable and supportive of IT security and risk management plans. It also considers training and certification organisations that provide programmes for end-user organisations’ IT security professionals to help them better address components of their IT security and risk management plans, such as secure coding, vulnerability management and incident response/computer forensics. Programmes usually entail training and education or examination/assessment by outside industry experts who may hold various seminars, hands-on classes, etc. and recommend additional activities that further support training sessions. Entrants should include companies and organisations that offer such training without the requirement or need to secure any particular professional certification, as well as certification programmes that may or may not provide training. Programmes typically are defined as professional industry groups offering certifications to IT security professionals wishing to receive educational experience and credentials. Entrants can include organisations in the industry granting certifications for the training and knowledge they provide.

Please download the entry kit to view the category criteria and qualifying questions.

 

Cybersecurity Student of the Year
Cyber-security Student of the Year honouring undergraduate and current masters students pursuing degrees in cybersecurity and cyber-security-related fields, this category is focused on acknowledging up-and-coming talent who will be responsible for helping to evolve and advance the information security industry.

Please download the entry kit to view the category criteria and qualifying questions.

 

Outstanding Contribution
Every year SC honours those companies that have excelled, along with individual CISOs and Student(s) of the year - but there are other individuals who have made outstanding contributions to cyber security in a wide range of potential categories. So this year we have introduced a new Award for you to nominate someone (including yourself), whatever their job title, who has made a positive impact on the industry, above and beyond the norm. For example, you could be a regulator overseeing implementation of new regulation, or a lobbyist that caused the introduction of that regulation, a threat hunter or security analyst who discovered or identified a new threat group or malware - or came up with the way to tackle that threat. Or you might be in education, data protection, in the SOC, or indeed a vendor or supplier that has made a significant contribution beyond your commercial role, a trainer, law-maker or enforcer. We’ll consider all-comers - with the proviso that the impact of what they have done has had a positive effect wider than their own organisation.

Please download the entry kit to view the category criteria and qualifying questions.

 

How To Enter?


1) Register to enter on our Eventsforce platform
2) Download our Entry Kit - this includes requirements and tips 
3) Select the categories that best describe your companies, individuals or projects
4) Write your entry - make sure to stay inside the entry guidelines
5) Attach any supporting material (e.g. images, articles or client approval)
6) Enter your submission online before the deadline
We invite you to nominate yourself or a colleague

Meet our 2021 Judges


img-responsive
Standard Life Aberdeen
Head of Information Security Services
 
img-responsive
Lloyds Banking Group
Head of IT Risk and Governance
 
img-responsive
Thales eSecurity
Global CISO
 
img-responsive
Atcore
Information Security Officer
img-responsive
cyberY Ltd
CEO
 
img-responsive
Institution of Engineering and Technology
Data Protection Officer
 
img-responsive
BT
Director, BT Security
 
img-responsive
The Security Awareness Special Interest Group
Chairman & Founder
 
img-responsive
Micro Focus
Group CISO
 
img-responsive
Dixons Carphone
Deputy CISO
 
img-responsive
Titania
Chief Strategy Officer
img-responsive
McAfee
Chief Scientist
 
img-responsive
Microsoft
Chief Security Advisor
 
img-responsive
Department for Work & Pensions
Head of Enterprise Security & Risk Management
 
img-responsive
Enablement Tech
Interim CIO
img-responsive
Worldpay
Regional Director
 

SC Media UK


SC Media UK is the leading information resource for cyber-security professionals in the UK and Europe, who need knowledge on IT security strategies, data protection best practices, government regulations and current IT security technologies.

Well-regarded in the industry for providing up-to-date news, comprehensive analysis, cutting-edge features, expert contributions and the best, most extensive collection of product reviews in the business, SC has readily advanced its editorial offerings over time to supplement its award-winning print and digital media.