{"id":1885,"date":"2025-02-11T13:56:59","date_gmt":"2025-02-11T13:56:59","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1885"},"modified":"2025-02-11T13:56:59","modified_gmt":"2025-02-11T13:56:59","slug":"cso-award-and-hall-of-fame-nominations-open-now","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1885","title":{"rendered":"CSO Award and Hall of Fame Nominations Open Now"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is the time to showcase your achievements and gain industry-wide recognition.<\/p>\n<p>As organizations navigate an era defined by evolving threats\u2014including AI-driven attacks, heightened risks, and shifting dynamics of digital trust\u2014the Chief Information Security Officer (CISO) role has never been more critical. Recognizing the organizations at the forefront of these challenges is essential to driving progress and strengthening the industry.<\/p>\n<p>That\u2019s why organizations of all sizes and sectors are invited to submit nominations for the prestigious CSO Awards. These awards honor visionary security initiatives that have made a tangible impact in areas such as threat assessment, identity and access management, next-generation security, compliance and risk management, security training and education, and more.<\/p>\n<p>Submitting a nomination is straightforward and can be done online before the <strong>April 10 deadline<\/strong>. Your submission will be evaluated by a distinguished panel of security leaders, industry experts, and academics, ensuring a fair and impartial review process.<\/p>\n<p><a href=\"https:\/\/events.idc.com\/87rNR5\"><strong>It\u2019s also time to nominate security leaders for induction to the CSO Hall of Fame<\/strong><\/a>. This prestigious honor is reserved for security leaders with at least 10 years at the CSO or CISO level who have demonstrated exceptional vision, leadership, and influence throughout their careers. Inductees have not only shaped their organizations\u2019 security strategies but have also contributed to the broader industry through service, mentorship, innovation, and thought leadership. <a href=\"https:\/\/events.idc.com\/87rNR5\"><strong>Nominations for the CSO Hall of Fame<\/strong><\/a> are open through <strong>February 20<\/strong>.<\/p>\n<p>Winners will be celebrated at the <strong>CSO Conference &amp; Awards<\/strong>, taking place <strong>October 20-22, 2025<\/strong>, at the <strong>Grand Hyatt Indian Wells Resort &amp; Villas in Southern California. <\/strong>The conference presents a vital opportunity to discuss current challenges in the industry and share the award-winning security innovations.<\/p>\n<p><strong>Why Nominate Your Organization?<\/strong><\/p>\n<p>Here are a few compelling reasons to submit a nomination:<\/p>\n<p>Industry-Wide Recognition \u2013 Winning a CSO Award affirms your organization\u2019s commitment to excellence in cybersecurity and highlights your team\u2019s success in tackling today\u2019s biggest security challenges.<\/p>\n<p>Elite Networking \u2013 The CSO Conference brings together top security leaders, industry experts, and academics worldwide. By attending, you\u2019ll engage with peers, exchange ideas, and gain firsthand knowledge of emerging trends and best practices.<\/p>\n<p>Exclusive Learning Opportunities\u2014The conference features CISOs and security pioneers sharing their real-world experiences managing disruption. Gain strategic insights that can help shape your organization\u2019s security future.<\/p>\n<p>Receiving a CSO Award isn\u2019t just a personal achievement\u2014it\u2019s a recognition for your entire organization. It highlights the collective effort of your team in driving security innovation and delivering measurable business impact.<\/p>\n<p>Don\u2019t miss this opportunity to showcase your organization\u2019s risk and security innovations. <a href=\"http:\/\/www-eur.cvent.com\/c\/abstracts\/75ecb4d9-3d23-4220-b71f-f78b491ada3e\"><strong>Submit your nomination for a CSO Award today<\/strong><\/a>and join us at the <a href=\"https:\/\/event.foundryco.com\/cso-conference-awards\/\"><strong>2025 CSO Conference &amp; Awards<\/strong><\/a> to celebrate excellence in cybersecurity.<\/p>\n<p>We look forward to receiving your nominations and welcoming you to the CSO Conference &amp; Awards in October!<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is the time to showcase your achievements and gain industry-wide recognition. As organizations navigate an era defined by evolving threats\u2014including AI-driven attacks, heightened risks, and shifting dynamics of digital trust\u2014the Chief Information Security Officer (CISO) role has never been more [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1886,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1885"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1885"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1885\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1886"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}