Winners will be recognized at the annual CSO50 Conference + Awards taking place September 19-21, 2022. Credit: IDG The CSO50 awards recognize security projects that demonstrate outstanding thought leadership and business value. The awards are scored according to a uniform set of criteria by a panel of judges that includes security leaders, industry experts, and academics. It is an opportunity for security leaders to share with their peers the risk and security innovations that led the way to greater success for their organizations.Honorees will be recognized in-person at the CSO50 Conference + Awards at the MGM National Harbor Hotel in National Harbor, MD from September 19-21, 2022. Over the course of the event, attendees will have the opportunity to connect with hundreds of peers, industry leaders, and security executives who will showcase demonstrable business value in their projects from AI and application security to zero trust. Congratulations to this year’s winners! 2022 CSO50 award winnersABM IndustriesAccentureAdobeAflacAmgenAmyrisAshlandAvanadeBanco BMGBank of AmericaCarrierCarrier GlobalCiscoCity of Seguin, TexasCode42Community Healthcare SystemCox AutomotiveCumminsGatesGenpactHong Kong Baptist UniversityICON PlcInvitaeIttihad International Investment LLCKrakenMarkenMicrosoft CorporationMS SocietyNational Cybersecurity AllianceOCS Group (India) Pvt. LtdPSA International Pte LtdRunBuggy Inc.SAP SEThe Kroger CompanyThe MITRE CorporationTIAAUnited AirlinesUnited Nations Development ProgrammeWesco International, Inc.World Fuel ServicesZoom Video CommunicationsZurich North America*Some companies have multiple winning projects. Related content news CISA inks 68 tech vendors to secure-by-design pledge — but will it matter? CISA’s pledge drew some big names, but the impact on software security could be limited. Meanwhile the org has extended its comment period on the CIRCIA cyberattack reporting law. By Jon Gold May 10, 2024 4 mins Regulation Technology Industry Security Practices news Google Chrome gets a patch for actively exploited zero-day vulnerability Details of the use-after-free memory vulnerability were not publicly released, but Google says it’s aware an exploit for the bug exists. By Lucian Constantin May 10, 2024 3 mins Threat and Vulnerability Management Zero-day vulnerability Vulnerabilities news Dell data breach exposes data of 49 million customers The company says the breach compromised non-critical customer data and involved no sensitive personal or financial information. By Shweta Sharma May 10, 2024 3 mins Data Breach Hacking feature Social engineering: Definition, examples, and techniques Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs. By Josh Fruhlinger May 10, 2024 15 mins Phishing Social Engineering PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe