The winners of the fifth annual Security Serious Unsung Heroes Awards have been announced.
The awards rejoice the individuals making a modify inside of the cybersecurity industry. The winners ended up introduced at a digital ceremony compèred by Brian Higgins, security qualified at Comparitech and Yvonne Eskenzi, co-founder of Eskenzi PR, and supported by sponsors KnowBe4, Protiviti and Qualys. The judging panel for the awards provided associates from Infosecurity, ISACA, Higgins and Eskenzi.
“It is most most likely considerably extra essential this calendar 12 months than ever just ahead of to honor the cybersecurity gurus who have held us all up and running during lockdown,” claimed Yvonne Eskenzi. “The cyber-abilities gap is a large issue for this nation and an function like this severely displays off what a good sector it is to be a ingredient of and the wonderful people that make it.”
The winners from all groups finished up:
Security Leader/Mentor
Winner: David Chan – entrepreneur in property at CyLon
Cyber Writer
Winner: Davey Winder – freelance tech writer
Remarkably Recommended: Raef Meeuwisse – author at Cyber Simplicity
Suitable Security Consciousness Campaign
Winner: Cygenta for CV-19
Apprentice/Climbing Star
Winner: Ben Chater – junior security analyst at Pinsent Masons
Pretty Commended: Madeline Howard – Cygenta/Cynam
Best Educator
Winner: Toni Scullion – founder of dressCode
Godparent of Security
Winner: Pat Ryan – founder of Cyber Women of all ages First
Best Moral Hacker / Pen Tester
Winner: James Mullen – senior security guideline at Edgescan
Info Guardian
Winner: Dominic Hartley – DPO at the Business of Performs and Pensions
DevSecOps Trailblazer
Winner: Didar Gelici – facts privateness and cybersecurity risk professional
Captain Compliance
Winner: Ian Bernhardt – head of governance and compliance at Sprout IT
Security Avengers
Winner: Chani Simms and the SHe CISO Bootcamp Team
CISO Supremo
Winner: Emma Leith – CISO at Santander
COVID Hero
Winner: Lisa Forte – partner of Crimson Goat Cyber Security
Some parts of this submitting are sourced from:
www.infosecurity-magazine.com