How are the winners of the Cyber Security Awards decided?
The jury will use a dedicated scoring system to safeguard the integrity of the award. This will ensure the winners are chosen on merit alone, following a specific code of conduct in their rating
The Cyber Security Personality has contributed in at least one of the following domains
PILLAR 1
Contribution to cyber resilience of the Belgian/European economy
- Technological or procedural contributions the applicant has made to increase cyber resilience in the Belgian and European economy.
- Initiatives or projects that have sustainably improved cyber security for individuals, businesses or public administrations.
- Impact of the applicant’s activities and, where possible, his/her quantified outcomes.
PILLAR 2
Contribution to awareness of the public
- The applicant’s strategic vision in terms of raising the general public’s cyber security awareness.
- How have the applicant’s initiatives or strategic involvement either helped raise awareness among the public or helped promote best practices to specific audiences or to the public.
- Impact of the applicant’s activities and, where possible, his/her quantified outcomes.
PILLAR 3
Contribution to the skills & diversity gap
- How has the applicant’s strategic vision sustainably reduced the skills and/or diversity gap.
- Initiatives or strategic involvements that have helped reduce the skills and/or diversity gap.
- Impact of the applicant’s activities and, where possible, his/her quantified outcomes.
PILLAR 4
Contribution to the cyber security ecosystem
- How has the applicant contributed or made an impact on the Belgian and European cyber security community. How has this individual advanced the cyber security ecosystem?
- Initiative(s) undertaken by the applicant or his/her decisive involvement in initiative(s) initiated by business, trade or professional organizations active in the cyber security ecosystem
- Impact of the applicant’s activities and, where possible, his/her quantified outcomes.
The CISO has contributed across the following domains:
PILLAR 1
Contribution to the organization’s information security performance
- Applicant’s strategic vision in terms of improving the organization’s information security performance
- Applicant’s use of governance programmes to measure the success of the organization’s information security strategy
- Applicant’s strategic use of innovation, creativity and emerging technologies to enhance the organization’s information security
PILLAR 2
Accomplishments in the current professional role
- Applicant’s initiative(s) and/or project(s) undertaken in the area of information security transformation over the past 24 months.
- Impact or effect of this (these) initiative(s) and/or project(s) in improving the cyber security posture of applicant’s organization and, where possible, his/her quantified outcomes.
- Applicant’s impact on the performance of his/her department highlighting the specific leadership qualities that generated any benefits noted.
PILLAR 3
Partnership with different stakeholders
- What are applicant’s other operational or functional responsibilities beyond information security. In which ways has the applicant in his/her CISO role influenced wider business operations.
- How has the applicant led change in the organization including the cyber security impacts of any partnership approaches adopted with different stakeholders.
- Applicant’s initiatives to raise awareness of information security risks among C-level executives and the board.
PILLAR 4
Contribution to foster a security culture
- Applicant’s approach to improve the skills and capabilities of his/her team. How has the applicant in his/her CISO role driven cyber security performance.
- Programmes implemented by the applicant to train staff and improve processes and systems
- Applicant’s achievements to help raise awareness for cyber risks among employees and create a security culture in his/her organization
The Researcher has contributed in at least one of the following domains:
PILLAR 1
Industrial valorization activities
- Applicant’s strategic vision on how to raise the state-of-the art in the cyber security field through industrial valorization activities.
- Initiative(s) undertaken by the applicant or his/her decisive involvement in Industrial valorization activities (i.a. technology transfer, R&D, patents, etc.)
- Impact or effect of the initiative(s) and, where possible, his/her quantified outcomes.
PILLAR 2
Scientific valorization activities
- Applicant’s strategic vision on how to raise the state-of-the art in the cyber security field through scientific valorization activities.
- Initiative(s) undertaken by the applicant or his/her decisive involvement in Scientific valorization activities (i.a. papers, conferences, workshops, etc.)
- Impact or effect of the initiative(s) and, where possible, his/her quantified outcomes
PILLAR 3
Educational activities
- Applicant’s strategic vision on how educate and empower the next generation of cyber security “leaders“.
- Initiative(s) undertaken by the applicant or his/her decisive involvement in executive and academic educational activities in domains related to cyber security management, technology, risk and mitigation models.
- Impact or effect of the initiative(s) and, where possible, his/her quantified outcomes.
The Young Cyber Security Professional has contributed in at least one the following domains:
PILLAR 1
Cyber security career foundations
- In which way has the young professional (30 years or younger) excelled in his/her role as cyber security professional. How will this high performance be sustained in the future.
- To what degree has the young professional exhibited engagement by actively pursuing personal, professional, intellectual and continuing education growth opportunities?
- The young professional should demonstrate leadership and teamwork skills.
PILLAR 2
Accomplishments in current professional role
- Initiative(s) and/or project(s) undertaken in the past 24 months that helped increase the organization’s cyber resilience.
- Impact or effect of these initiative(s) and/or project(s) in improving the cyber posture of applicant’s organization and, where possible, his/her quantified outcomes.
- Applicant’s use of innovation, creativity and emerging technologies while contributing to improving the organization’s cyber resilience.
PILLAR 3
Contribution to the cyber security ecosystem
- Value added by the young professional and his/her impact in a specific area or areas of cyber security activity (inside and/or outside the workplace) highlighting the special qualities and skills of the individual.
- Initiative(s) undertaken by the applicant or his/her decisive involvement in initiative(s) initiated by business, trade or professional organizations active in the cyber security ecosystem
- Impact of the applicant’s activities and, where possible, his/her quantified outcomes.
The Privacy Professional has contributed accross the following domains:
PILLAR 1
Contribution to the organization’s information privacy performance
- Applicant’s strategic vision in terms of improving the organization’s performance in the context of privacy management
- Description of the governance programmes, which the applicant uses to measure the success of the privacy strategy of the organization he/she is working for.
- Strategic use made of innovation, creativity, and emerging technologies to enhance the organization’s privacy practices.
PILLAR 2
Accomplishments in current professional role
- Initiative(s) or project(s) undertaken by the applicant in the area of privacy management over the past 24 months.
- Impact or effect of the initiative(s) or project(s) and, where possible, his/her quantified outcomes.
- Impact on the performance of the organization the applicant is working for, highlighting the specific leadership qualities that generated the benefits noted.
PILLAR 3
Partnership with different stakeholders
- Description of applicant’s other operational or functional responsibilities beyond privacy management. In which ways has he/ she in his/her role influenced wider business operations?
- Description of how applicant has led change in the organization he/she is working for, including the impacts of any partnership approaches adopted with different stakeholders.
- Description of applicant’s initiative(s) to raise awareness related to privacy among C-level executives and the board.
PILLAR 4
Contribution to foster a privacy culture
- Description of applicant’s approach to improve the skills and capabilities of his/her team? How has he/she as a privacy expert improved performance?
- Description of any programme(s) which applicant has implemented to train staff and improve processes and systems.
- Description of applicant’s achievement(s) to help raise awareness for privacy risks and create a culture conducive to privacy in the organization, he/she is working for.