2023 Black Unicorn Report
2023 Black Unicorn Report
Table of Contents
A New Frontier of AI Innovation Look into the Future of The AI Security Market 3
Demystifying Cybersecurity Terms Vulnerability Assessments, Scanning, Penetration
Testing, And Red Teaming 10
The Cybersecurity Lens: PANCCD 13
Looking at the Cybersecurity Landscape with the PANCCD Lens 14
Meet The Judges 20
Eight Themes Driving The Future of Cybersecurity 24
Why Authorization Based API attacks are surfacing in Applications. 28
What Is the Definition of a Black Unicorn? 31
Spotlight: Women in Cybersecurity 32
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 2
A New Frontier of AI Innovation Look into the
Future of The AI Security Market
By Josiah Hsiung, Principal, NightDragon and Alec Kiang, Associate, NightDragon
Foreword
Artificial Intelligence is making unprecedented inroads into the world of cybersecurity and
ushering in a new wave of threats and potential safeguards. With new types of attacks that
enterprises need to be prepared for, enterprises have raised questions about how to manage risk
effectively and are looking for novel solutions to ensure the responsible usage of AI. This has
resulted in significant innovation, advancement, and commercialization of ML model security tools
that can help address data privacy issues, sensitive data leakage, and model robustness.
In a world where machine learning models are becoming the norm, security is essential. Until the
regulatory landscape and AI governance space matures, enterprises are left to their own devices
to be proactive and develop their own frameworks for securing ML models. New vendors continue
to emerge and meet the demand for ML model security as AI applications continue to skyrocket
– highlighting a new era in cybersecurity and machine learning.
Vijay Bolina, Chief Information Security Officer, Google DeepMind
In the second blog of our AI blog series, we examine the machine learning development lifecycle
to identify key areas where the ML model security technology stack comes into play. The ML
model security market is ripe for innovation and far from saturation. We will inevitably start to see
a rise in ML-specific attacks that will be driven by accelerated commercial adoption of these tools.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 3
A New Wave of AI Security Innovation, Policies to Respond to Risk
“I think that there is a good market opportunity for startups and applications to protect AI models.
The current discussion about AI and generative AI is rather about threats leveraging AI, and not
about threats against AI. Security risks of AI and generative AI systems are not widely known yet,
but I think this will change quickly in the near term”
Christoph Peylo, Chief Cyber Security Officer at Bosch
Driven by regulation, new adversarial attack vectors, and enterprise stakeholder risks, we believe
that there will be accelerated commercialization of solutions that are focused on protecting ML
models through their entire lifecycle. In order to secure ML models – enterprises must consider
the attack surface throughout the development cycle to determine and prioritize areas that need
to be secured.
Attacks against AI models and potential risks for AI models impact various stages across the ML
development cycle – each of which requires different security protocols to address these potential
risks. Existing cybersecurity solutions (e.g. identity and access management, data security,
infrastructure security, software supply chain security, and threat intelligence capabilities) can
support an enterprise’s ML security posture. However, current widely adopted solutions do not
directly address ML model risks and have created a new market for ML security-specific vendors.
“Establishing a framework for data privacy, model robustness, and model explainability is crucial
to support AI risk mitigation and ensure AI-enabled system reliability.”
Vijay Bolina, Chief Information Security Officer at Google DeepMind
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 4
Based on the current landscape, ML security vendors can enhance enterprise AI security and
safety through the following features:
• Training Data Security and Privacy Tools: Securing training data through (i) producing
synthetic data to train ML models, (ii) transforming representations of training data used
for ML models to reduce sensitive information exposure, and (iii) securing data sharing
and access management (protect and encrypt data).
• Model Attack Detection and Response Tools: ML model protection, intrusion detection,
and threat intelligence feeds that allow for real-time detection and remediation of ML-
based attacks (data poisoning, model evasion, model extraction).
• AI Governance, Risk, and Compliance Tools: Safety tools that ensure that developed
models follow regulatory guidelines and enterprise-determined guardrails.
Vendors that enable ML security and responsible AI have raised a total of +$687M from VCs
(Source: Pitchbook) which signals meaningful investment in a space that protects enterprises that
lack the resources to defend themselves against the latest cybercrime schemes.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 5
While we have only included what we believe are vendors who are primarily focused on
ML security in our market map, we recognize that other vendors may sell products that are
tangentially related to ML security (e.g. other ML operations tools).
While governments around the world continue to explore ways to regulate generative AI, other
leaders from Google DeepMind, Anthropic, and other AI labs have expressed their concerns
through a Statement of AI Risk published on the Center for AI Safety’s website. The statement
highlights wide-ranging concerns about the risk and dangers of AI are parallel to the dangers of
pandemics and nuclear weapons.
• Enterprises that are currently adopting ML-specific security tools are taking a
proactive approach. Many of the different types of attacks against ML models have only
been demonstrated in academia. Until there have been tangible and reported instances
of nation-states or hacker groups utilizing these attacks in practice, there will be a ramp
time before there is massive commercial adoption of ML security tools.
• CISOs will prioritize securing training data first prior to implementing model
security tools: Enterprises, especially in heavily regulated sectors (e.g. healthcare and
financial services) will have to find ways to mitigate the potential risks of sensitive data
leakage and poisoning.
• Enterprises will build more internally-hosted models in the long run rather than
leveraging a third-party LLM: We are progressing to a multi-model world where
enterprises will build both internally-hosted models and models that are leveraging third-
party LLMs. However, based on our advisors’ feedback, we believe that enterprises will
skew more toward building internally-hosted models. By training and managing their own
models, enterprises can build models based on proprietary data to support workflows that
are unique to them. As a result, we envision long-term adoption of pre-production
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 6
vulnerability testing and post-production monitoring tools that will improve model accuracy
and reduce model bias.
• Successful Model Attack Detection and Response Tools must be married with
threat intelligence tools: Integration into threat intelligence and extended detection and
response tools will be crucial to the timely detection, remediation, and response of ML-
related attacks. When combined with threat intelligence, enterprises will be able to better
anticipate ML attacks and ensure a strong ML model security foundation.
Closing Thoughts
The rapid advancement of generative AI, driven by the rise of OpenAI’s ChatGPT and the global
AI arms race, presents both significant opportunities and challenges. Enterprises are embracing
AI technologies at an unprecedented pace, recognizing their potential to revolutionize various
industries/sectors. However, as AI becomes a strategic imperative, it is crucial to navigate the
associated risks and ensure proper AI governance. The convergence of AI and cybersecurity
demands increased vigilance, innovative solutions, and regulatory frameworks to protect against
evolving threats and mitigate potential harm.
“Ultimately, you would want to protect the effort that you spent training the model and by
implementing a security tool for your AI, you are protecting your business.”
Christoph Peylo, Chief Cyber Security Officer at Bosch
NightDragon is committed to staying at the forefront of the AI security landscape, supporting and
collaborating with founders developing cutting-edge security solutions to safeguard against
adversarial ML threats. If you’re a founder in the generative AI security space, we’d love to hear
from you! Email us at josiah@nightdragon.com or alec@nightdragon.com.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 7
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 8
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 9
Demystifying Cybersecurity Terms Vulnerability
Assessments, Scanning, Penetration Testing,
And Red Teaming
By Dasha Deckwerth, President and CISO
The confusion begins with "vulnerability assessment" and "vulnerability scanning," terms which
may sound the same to the untrained ear. However, they serve different purposes in identifying
and eliminating weaknesses in cybersecurity. While vulnerability scanning gives a thorough list of
weaknesses in your network, it lacks detailed information about the potential consequences of
these flaws.
Vulnerability assessments, on the other hand, go a step further by not only identifying threats but
also outlining the likelihood of their exploitation and the ensuing repercussions. This deeper
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 10
understanding helps prioritize important assets, achieve compliance, and improve cybersecurity.
It is crucial to be careful of companies that misrepresent vulnerability scanning as an assessment.
True assessments provide valuable insights into your security position, while scans simply
present a list of vulnerabilities without the necessary context.
The distinction between penetration testing and red teaming requires clarity. A penetration test
focuses mainly on identifying vulnerabilities and misconfigurations to assess potential risks. It
attempts to identify whether particular parts of your infrastructure are vulnerable to attacks. In
contrast, red teaming adopts a more comprehensive approach, examining personnel, processes,
and technologies of an organization. A red team operates secretly, imitating advanced threat
actors to expose gaps in your defense strategy while striving to avoid detection.
Failure to grasp the differences between these terms can lead to incomplete security measures.
Recognizing the distinct functions of vulnerability assessments, scanning, penetration testing, and
red teaming allows you to modify your security approach to meet your company’s demands and
ensure compliance.
Conclusion
Failing to understand the distinctions between these terms can result in incomplete security
measures. Understanding the distinct responsibilities of vulnerability assessment, scanning,
penetration testing, and red teaming enables you to modify your security approach to match the
unique demands of your company while satisfying compliance requirements.
For more detailed information and guidance, visit www.stealth-iss.com
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 11
About the Author
As the president and founder of Stealth-ISS Group® Inc., Dasha
Deckwerth is an expert in cybersecurity operations and delivery, as
well as a U.S. Veteran. With over 25 years of experience as a
technology professional, Deckwerth has led key cybersecurity
initiatives within the government and civilian sectors where she has
provided IT Security and Cyber Warfare services to NATO, various
US, EU and Asian government agencies as well as multiple global
commercial clients. She has designed and implemented security
operations centers, incident response teams, delivered security
consulting and regulatory compliance/ISO audits across the
Americas, Europe, Middle East and Asia.
Deckwerth is a Certified CMMC Practitioner (CCP) for the Cybersecurity Maturity Model
Certification (CMMC), and she has earned numerous qualifications, including Certified
Information Systems Security Professional (CISSP), Project Management Professional (PMP),
Certified Confidentiality Officer/Counter Espionage (COO), Certified Chief Information Security
Officer (CCISO), and NSA IAM/IEM (InfoSec Assessment and Evaluation Methodology), Payment
Card Industry Qualified Security Auditor (PCI QSA).
Dasha can be reached online at d.deckwerth@stealth-iss.com and via our company website
https://stealth-iss.com/
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 12
The Cybersecurity Lens: PANCCD
How do you take over 3,500+ cybersecurity companies across the globe and fit them into
a box? It’s not easy, so one of the judges, Gary Miliefsky, took up the challenge to create
a new model for the entire marketplace with the acronym he’s coined “P.A.N.C.C.D.” -
People, Applications, Networking, Computing Devices, Code and Data. These six layers
to the stack, or the pyramid of cybersecurity make it much easier to understand the value
proposition of a cybersecurity vendor and where they fit, although within each box in the
stack there are subcategories and different angles of how the myriad of solutions solve
different problems related to the challenges caused by cyber risk.
First, we must understand that cyber risk relates to threats, vulnerabilities and assets, in
the well-known formula: Risk = Threats x Vulnerabilities x Assets or R = T x V x A
This formula cannot work without adding time to the equation, from the famous formula
created by Winn Schwartau, called Time-based Security: Exposure (time) = Detection
(time) + Response (time) or Pt=Dt + Rt
So cyber risk happens over a period of time – when a threat exploits a vulnerability, how
long does it take us to detect this threat and how long does it take us to respond? The
closer to zero that Dt+Rt equals, the lower our Exposure (time) or Et. This is why more
vendors are focusing on automation, machine learning and artificial intelligence to combat
the latest cyber threats. Focusing our Cybersecurity Lens on those vendors who have
entered the Black Unicorn Awards contest and made it into this report, we use the
PANCCD™ model as follows; what does the cybersecurity vendor focus on:
People, Applications, Networking, Computing Devices, Code, Data – the PANCCD™ lens
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 13
Looking at the Cybersecurity Landscape
with the PANCCD Lens
It’s now very easy to look at a vendor and categorize where they fit, into helping solve the
problems of cyber risk in a particular category.
When you hear about or read about a cybersecurity vendor, you can now quickly and
easily figure out what portion of cyber risk they solve, by using the PANCCD™ model.
Feel free to use and share this model, just give credit to the author, as follows
“PANCCD™ is a trademark of Gary Miliefsky, CEO, Cyber Defense Media Group” with a
hyperlink to the author’s bio, found here: https://www.cyberdefensemagazine.com/about-
our-founder/
In this Black Unicorn Report for 2023, we’ve taken a few unique cybersecurity lenses to
view the market and predict the future. Artificial intelligence (a.i.), telecommuting and
cloud-based apps (SaaS) are all in focus and part of the new attack vectors. Thus, the
major attack vectors have been improved by weaponization of a.i. and the shift to the
cloud and weaker home-computing hygiene as priority. This has opened doors for
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 14
increased revenues and visibility among those players who secure the cloud, SaaS apps
and deal with weak, remote, exposed endpoints.
Dr. David DeWalt’s Super Cycles view gives us an even clearer picture of where current
and future cybersecurity investments need to be made, and therefore where we expect
to find additional Black Unicorns in the coming years. According to Dr. DeWalt’s
NightDragon venture fund, by next year, the cybersecurity market will be worth over $248
billion. What’s driving this exponential growth?
● Attack surfaces continue to grow daily. As IT innovation around cloud, mobile, and
virtualization continues, the attack surfaces that must be monitored and protected
constantly grow and evolve.
● Tactics are becoming more sophisticated: Keeping up with new tactics like
monetizing attacks via cryptocurrency, renting attack infrastructure, phishing
attacks, and AI require new defenses.
With Robert (Bob) Ackerman running one of the most innovative and successful
cybersecurity venture funds in America, we have another unique investor who
understands the industry including bringing a reality check and a view on what is working
into the judging process and our report.
Dino Boukouris has spent over 16 years in the technology industry with expertise in
cybersecurity, finance, strategy, operations, entrepreneurship, and venture capital &
private equity. Dino is a Founding & Managing Director at Momentum Cyber, alongside
Founders Dave DeWalt, Michael Tedesco and Eric McAlpine. Dino adds some wonderful
market insights from his Cybersecurity Market Review for the 1st half of 2023:
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 15
Venture capital specialization is an emerging theme within the cybersecurity ecosystem. In the
past two years, a new class of cybersecurity-focused firms have raised over $5.2 billion of capital
in total. These specialist firms focus their investments exclusively on cybersecurity companies
and broaden their value creation cycle beyond capital alone.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 16
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 17
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 18
Gary Miliefsky’s take on market with the PANCCD model gives us focus and helps us
quickly determine where a vendor fits and how they might add value in the cyber risk
reduction equation.
This year, with the help of all the judges, given that we had to be pragmatic in our quest
for current and future Black Unicorns, here’s where we started: There are now over
3,500+ cybersecurity companies in the world. We only allowed a small number of
companies based on their funding, sales growth and scalability to be judged as Black
Unicorns.
Based on funding, sales and execution, only 10 companies are selected as Winners
each year, with at least 50 finalists. We also found very innovative companies that are
not quite yet on the $1B trajectory and they are also listed in our Top InfoSec Innovators
awards for 2023. You will find all finalists and winners worthy of our attention and yours
– you may find that they offer a unique solution missing in your cybersecurity portfolio.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 19
Meet The Judges
Dr. Lindsey Polley de Lopez is a futurist who
specializes in the emergent landscape around
space, cyber, and “cyber-adjacent”
technologies. She jointly serves as the
Director of Disruptive Technologies at
VentureScope and the Director of Cyber &
Space Intelligence at MACH37, providing C-
Suite and SES-Level leadership with strategic
and advisory services related to the research
and analysis of disruptive technologies,
emergent capability-sets, and investor
landscapes evolving within the commercial
sector to guide long-term technology adoption
and implementation. Dr. Polley de Lopez also
leads embedded strategic advisory cells that
provided emergent technology solution
identification for segments of the DoD, with an
emphasis on space applications.
Dr. Polley de Lopez also served briefly with NIST where she co-led the environmental scanning research
team for Executive Order 13800 – “Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure” – for the “American Cybersecurity Workforce Development” section, and also served as the
Senior Assistant Editor for the Journal of Public Management and Social Policy.
Through the Pardee RAND Graduate School, Dr. Polley de Lopez’s doctoral research examined the United
States Government’s Vulnerabilities Equities Process for assessing software vulnerabilities, and the
intricacies of balancing the various equities involved (both military and social). In addition to her PhD, she
holds a Master’s in Philosophy for Policy Analysis (from Pardee RAND Graduate School), a Master’s in
Public Administration (from California State University, San Bernardino), a Bachelor’s of Art in Cultural
Studies (from the University of California, Davis), and a Certificate in Terrorism and Counterterrorism
Studies (from the University of Leiden).
Dr. Polley de Lopez has been featured in several high-profile outlets, such as SXSW, Lawfare, Cyber
Defense Media TV, Authority Magazine, Techstrong TV, Journal of Cyber Policy, OODA Loop Magazine,
America’s Future Series events, GEOINT Symposium, and the international Ground Systems Architecture
Workshop.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 20
Dino Boukouris has spent over 16 years in
the technology industry with expertise in
cybersecurity, finance, strategy, operations,
entrepreneurship, and venture capital &
private equity. Dino has been a speaker at
Cybersecurity conferences across the
country including the RSA Conference,
Cybertech Tel Aviv, Structure Security,
Global Cyberspace Coop Summit, IoT
Security Panel, M&A East 2017, as well as
at numerous private events and corporate
gatherings.
Prior to Momentum Cyber, Dino was a Founding Director of Momentum Partners, the precursor to
Momentum Cyber, alongside Founders Eric McAlpine and Michael Tedesco. Prior to Momentum Partners,
Dino spent much of his career working with and advising venture-backed and bootstrapped start-ups,
including Cameron Health a medical device start-up which created the world’s first subcutaneous
implantable defibrillator and was ultimately acquired by Boston Scientific for $1.35B. Prior to Cameron
Health, Dino began his career with GKN, a multinational aerospace and automotive company, where he
was one of ten graduates selected from across the United States for their International Leadership
Development Program.
Additionally, Dino has been a lecturer, GS instructor and mentor for the MBA, EWMBA and Executive MBA
program for Venture Capital and Private Equity, Business Model Innovation, Entrepreneurial Strategy, and
Managerial Economics. Dino has also served as an advisor to and been involved with a number of leading
accelerators such as the Alchemist Accelerator, Intel Technology to Market Accelerator, National Science
Foundation Innovation Corps, and Lean Launchpad.
In his “spare” time, Dino received his MBA with Honors from UC Berkeley, where he was President of his
MBA program, a Haas Venture Fellow, a Turner Fellow, a Dean’s Scholar and chair of Venture Capital
Connect. Dino also graduated Summa Cum Laude with a B.S.E. in Mechanical Engineering and an M.S.E.
in Mechanical Engineering from the University of Michigan, where he entered the Honors Program and was
a Lawrence D. Corlett Scholar, an Engelbrecht Scholar and a David Aspland Scholar.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 21
Robert R. Ackerman, Jr. Managing
Director, AllegisCyber Capital
As an entrepreneur, Bob was the President and CEO of UniSoft Systems, a global leading
UNIX Systems House and the Founder and Chairman of InfoGear Technology
Corporation, a pioneer in the original integration of web and telephony technology and
creator of the original iPhone.
Outside of Allegis, Bob teaches New Venture Finance in the MBA program at the
University of California, co-manages his family’s small Napa Valley winery – Ackerman
Family Vineyards, and enjoys fly fishing.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 22
Gary Miliefsky, Founder & CEO of
Cyber Defense Media Group
(CDMG) is an internationally
recognized cybersecurity expert,
bestselling author and keynote
speaker. He is a Founding Member of
the US Department of Homeland
Security, the National Information
Security Group and the OVAL
advisory board of MITRE responsible
for the CVE Program. He also
assisted the National Infrastructure
Advisory Council (NIAC), which
operates within the U.S. Department
of Homeland Security, in their
development of The National Strategy
to Secure Cyberspace as well as the
Center for the Study of Counter-Terrorism and Cyber Crime at Norwich University. Gary
has been founder and/or inventor for technologies and corporations sold and licensed to
Hexis Cyber, WatchGuard, Intel/McAfee, IBM, Computer Associates and BlackBox
Corporation. Gary is a member of ISC2.org and is a CISSP®.
In 2012, he founded Cyber Defense Magazine, which has grown to a market leader on
sharing information on all things cybersecurity and continuing to grow, every day. Other
CDMG platforms he’s launched include CyberDefenseTV, CyberDefenseRadio,
CyberDefenseAwards, CyberDefenseProfessionals, CyberDefenseWebinars, with
additional platforms launching in 2023 and beyond.
He’s frequently writing articles published throughout the mainstream media and he also
likes to write thought provoking articles at LinkedIn as a Top 1% of all INFOSEC LinkedIn
profiles and a Top 3% Globally on LinkedIn.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 23
Eight Themes Driving The Future of Cybersecurity
“We live at a seminal time in Cybersecurity history, with risk rising to levels greater than
we have ever seen, while at the same time many businesses are unfortunately being
forced to do more with less amidst a global economic slowdown,” said Dave DeWalt,
Executive Chairman at Momentum Cyber. “While Cybersecurity venture investment
slowed in the second half of the year, continued budget increases from security teams
and ongoing Cybersecurity and geopolitical risk gives us optimism about the long-term
future of this industry.”
The foreword of this year’s Almanac in collaboration with Team8 features insights and
Cybersecurity predictions from Nadav Zafrir, Co-Founder and Managing Partner of
Team8, and Admiral Michael Rogers (Ret.), former Director of the NSA and
Operating Partner at Team8.
Layer 8
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 24
Shift-Left
If Shift-Left works, the biggest impact will be that it enhances the relationship between
security and AppDev, which will enable the faster creation of secure applications.
However, in order for Shift-Left to work, security has to adapt to the way developers think,
act, buy, and consume tools.
Additionally, with the emerging focus on the “software bill of materials” (SBOM), the ability
for software creators to track application componentry and provide evidence to their
customers will be critical.
Data Security
As businesses and consumers create richer digital footprints, stronger regulation and
consumer preferences will drive investment in data protection and data privacy solutions.
On one hand, globalization and the growth of the digital economy are accelerating the
need for digital collaboration. On the other, emerging privacy regulations and consumer
preferences are driving investment in privacy enhancing technologies and the means for
users to have more control over their data.
Perimeterless World
A perimeterless world requires enhanced processes for identity and access management
(IAM), with a growing use of zero trust architectures that provide better control.
In the modern environment, there are many things outside of the network that still need
to be trusted and depended upon. Thus, using network topology as the basis for trust
simply isn't a valid assumption anymore. That’s where identity comes into play.
Security of Things
There are concerns regarding the resiliency of critical infrastructure, and unfortunately,
much of this infrastructure is decades old and difficult to secure.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 25
Smarter Security
Because of both the supply problem (lack of talent) and the demand problem (dramatic
increase in volume/speed of attacks and AI-driven attacks), there may be no alternative
other than automation and AI-supported defense.
Smarter security solutions will mitigate many of these challenges through the
incorporation of automation, data, and AI to plug gaps and provide security teams with
better options to best-use their human capital.
Any sound security strategy must also consider resiliency and include the capability for
rapid recovery from degradation, disruption, or denial of access to enterprise systems or
data, and swift reconstitution of assets and capabilities.
When thinking about resilience and recovery, cybersecurity must primarily focus on
operational risk and resilience. Standard continuity of business processes are insufficient
in the face of malicious cybersecurity action.
Cloud Security
Security capabilities are evolving to allow enterprises to reap the benefits of moving to
the cloud, while retaining control over their security posture, data protection programs,
and application integrity.
In order for cloud provider-based security solutions to be successful, the cloud providers
themselves are going to have to be able to support their customers’ hybrid and multi-
cloud environments.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 26
About David G. DeWalt Ph.D.
He most recently served as the Executive Chairman of FireEye, Inc., a global network
cyber security company. Dr. David G. DeWalt served as FireEye’s Chief Executive Officer
from November 2012 to June 2016 and Chairman of the Board from June 2012 to January
2017. Dr. David G. DeWalt was President and Chief Executive Officer of McAfee, Inc., a
security technology company, from 2007 until 2011 when McAfee, Inc. was acquired by
Intel Corporation. From 2003 to 2007, Dr. David G. DeWalt held executive positions with
EMC Corporation, a provider of information infrastructure technology and solutions,
including serving as Executive Vice President and President-Customer Operations and
Content Management Software. Qualifications: Dr. David G. DeWalt has substantial
expertise in the information technology security industry and has strategic and operational
experience as the former Chief Executive Officer of FireEye, Inc. and former Chief
Executive Officer of McAfee, Inc. As a member of the boards of directors of public
companies other than Delta, Dr. David G. DeWalt has served on the audit and
compensation committees. Directorships: Five9, Inc.; Forescout Technologies, Inc.;
FireEye, Inc. (2012-2017); Jive Software, Inc. (2011-2013); Polycom Inc. (2005-2013)
Affiliations: National Security & Technology Advisory Committee.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 27
Why Authorization Based API attacks are surfacing in
Applications.
By Puneet Tutliani, AppSentinels.ai
In the digital age, business leaders see software teams as core to the business and are
demanding them to innovate faster in response to market and competitive demands.
Organizations are on the path of fast iteration - experimenting with new products or features,
gauging customer feedback, adopting or else dropping and moving-on to the next iteration. The
pace of change is not an option but existential for organizations. Organizations that can adapt will
gain market share and organizations that cannot, will cease to exist.
In response to the need, engineering leaders are constantly looking at ways to make software
delivery faster and better. Application architectures have evolved as a result with major shifts like-
• From monolithic architectures to micro-services design patterns
• From internally developed services to higher use of open-sources and 3rd party services.
• From pre-provisioned static infrastructure to cost optimized Pay-As-You-Go shared cloud
infrastructure.
• From waterfall releases to agile development and rapid deployments many times a day;
various deployment strategies like canary, blue-green etc.
• Immutable containers form-factors.
• Kubernetes simplifying deployments and enabling dynamic scaling of applications.
• Mobile being primary client access mechanism and adoption of single page applications
architectures.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 28
Engineering and Security leaders are working hard to keep up but cannot slow down even if they
are not prepared or have blind-spots.
Implication to Security
Business logic that was all embedded in a single application is now distributed across multiple
micro-services. Also due to frequent changes, business logic is never static rather it’s fluid and
constantly changing. Most importantly, business logic that was completely residing with servers
is now controlled by clients as clients connect responses from multiple API’s and present to the
user.
Further, developers write generic API’s serving multiple use-cases. This leads to unintended data
exposed to the clients.
All of these have large implications for Security. It means authorization needs to be enforced at
granular level across the services. This is a much tougher problem to tackle as traditionally RBAC
& role authorizations were weak spots of applications, had no standards and is now fully exposed
to the malicious users. This exposes many zero-day business logic exploits to the hackers.
Further as applications evolve over time, more API’s are added and obsolete APIs remain in the
system often undocumented. These are all potential entry points for hackers.
All these are blind spots for traditional application security products. Security leaders should look
forward to next generation of application security products that are purpose built to mitigate the
new threats.
Security leaders should keep above characteristics in mind while evaluating vendors for
application security products.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 29
Role of Big Data and AI/ML for Next Generation Application Security Product
Endpoints and Network Security verticals have transformed over last few years via EDR and
SASE and have shown successful path to do threat analytics in the cloud to protect against
advanced threats. At AppSentinels, we believe a similar shift is needed in the Application Security
to protect customers against advanced application threats.
No doubt, delivery from cloud helps simplify management and allow continuous evolvement to
cater to new threats. Security leaders looking for next generation application security product
should evaluate the solutions against this backdrop.
Summary
There are generational shifts happening in application architecture and delivery. Addressing
needs of the next generation applications requires building products grounds up to cater to the
requirements. Current generation products like WAF, RASP and SAST/DAST, in any form, cannot
fight against the new generation of threats as is evident with the news of API breaches reported
on a regular basis. We need purpose-built products to address these requirements.
Application Security must evolve with the Application architectures. We at AppSentinels have built
a platform that addresses many of the challenges listed above. Let us talk and we will be happy
to partner you in your journey to improve your API Security posture.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 30
What Is the Definition of a Black Unicorn?
In the venture capital industry, a unicorn refers to any tech startup company that reaches
a $1 billion-dollar market value as determined by private or public investment.
The term was originally coined in 2013 by venture capitalist Aileen Lee, choosing the
mythical animal to represent the statistical rarity of such successful ventures. Last year,
CB Insights reported that the odds of becoming a unicorn — a company valued at $1
billion or more — was less than 1% for companies that had raised venture capital. In
2013, according to PitchBook data, there were 35 unicorns. At the end of 2023’s first
quarter, that number was 704. Since 2020 alone, 423 companies have vaulted to unicorn
status.
In the cybersecurity industry, Gary S. Miliefsky coined the term black unicorn as a
cybersecurity company that has the potential to reach a $1 billion-dollar market value as
determined by private or public investment within 3-5 years.
The black unicorn awards are designed to help showcase companies with this kind of
potential. Ultimately, the judging in our awards is tough and it’s still up to those notable
mentions, finalists and the winners to execute a flawless business model to reach this
potential. It takes innovation, dedication, passion – the right team and the right cyber
security solution, harmoniously executed to become a unicorn.
Our mission is to uncover future Black Unicorns and based upon the hard work of our
judges and the entrants in our awards program, we think we’ve found them.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 31
Spotlight: Women in Cybersecurity
While we have many more women winners in our Top Global CISO Awards for 2023, we
wanted to spotlight other amazing women in their roles in cybersecurity as well. We
congratulate them all for breaking the glass ceiling and being role models.
“It’s an honor to be recognized for this award. Cybersecurity risk and assisting
organizations in protecting and preparing themselves against such threats is
tremendously important to me, and it is rewarding to be recognized for these efforts. I’m
also pleased to accept this award alongside other trailblazers and outstanding women in
the cybersecurity industry who are bringing forth necessary perspectives and solutions to
support customers and their respective organizations.” – Carolyn Crandall, CMO
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 32
About Annabelle Klosterman
Throughout the years, Annabelle has competed in numerous competitions and placed
nationally at the Collegiate Cyber Defense Competition in 2022 and 2023 and was a
national finalist in CyberPatriot in 2019 and 2020. Additionally, she earned 1st place in
the 2022 Idaho National Laboratory CyberCore CTF, and Women in Cybersecurity
(WiCyS) CTF in 2021 and 2022. She holds SANS certifications in Cybersecurity
Technologies (GFACT), Cloud Security (GCLD), and Incident Handling (GCIH).
Annabelle has spoken on cybersecurity and career topics at various events and
organizations including US Cyber Games, RSA Conference, Secure360, Texas Cyber
Summit, BSidesSATX, South Dakota InfraGard, Civil Air Patrol, and more. Annabelle’s
goal is to be in a position that changes the way people view and handle security, for their
protection and safety, and the benefit of everyone. Annabelle can be reached online at
https://www.linkedin.com/in/annabelleklosterman and at her website
https://www.annabelleklosterman.com/.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 33
gearing up to acquire the esteemed CISSP certification and her Masters of Science in
Computer Science.
Currently, Tiffany works as a Senior Cloud & Cybersecurity Engineer at SAIC. Here, she
helms critical projects, from developing cloud infrastructure for the US ARMY DEVCOM
to creating AI solutions for NASA Langley Research Center. She also works as a
researcher at UAH’s Center for Cybersecurity Research and Education (CCRE). At
CCRE, she has led initiatives and handled classified projects for government contractors
and agencies.
She is also passionately involved in her community and academic endeavors. Notably,
she founded UAH’s Women in Cybersecurity chapter and has made significant
contributions in her leadership positions at UAH’s Honors College and Student
Government Association. Outside of her cybersecurity pursuits, she has been recognized
by several prestigious bodies, from being a CrowdStrike Next Gen Scholar to earning the
title of a National Security Agency (NSA) Stokes Scholar. Her journey, marked by
consistent achievements and leadership, stands testament to her drive in the
cybersecurity field.
Beyond her academic and professional life, Tiffany is a firm believer in lifelong learning.
She’s determined to continue broadening her horizons with aspirations to give back to the
cybersecurity community and inspire future generations.
Honored with the opportunity with Cyber Defense Magazine, Tiffany is excited to delve
into her role as a cybersecurity reporter and blogger. This new venture aligns seamlessly
with her objective to share knowledge, highlight advancements, and drive conversations
in the dynamic world of cybersecurity.
I'm deeply honored to receive the Cyber Defense Media Group Women in Cybersecurity
scholarship. As I navigate my Master's in Computer Science at The University of Alabama
in Huntsville, this award reinforces my aspiration to further delve into advanced education,
potentially pursuing a PhD. My ultimate aim is to instigate meaningful advancements in
cybersecurity, and this scholarship is a pivotal step towards that vision.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 34
About Kylie Amison
In addition, I also work part time with startup company, Auspex Labs, as a Cybersecurity
Software Developer, where I am the main developer on Diplomacy™, a geopolitical threat
intelligence engine that combines a broad assortment of metrics and NLP sentiment
analysis to calculate nuanced and real-time threat scores per nation state. Working at
Auspex has been pivotal in my knowledge in creating secure software and has given me
the opportunity to not only develop my first product, but to also start my own startup
company, productizing the software and capabilities created in Diplomacy™. Which
brings me to my final achievement, I am now co-founder and CTO of Xenophon Analytics,
a company that grew from shared interests in international political affairs and my project
of building the geopolitical risk engine.
Throughout all of these experiences and my coursework at GMU, I have gained essential
skills in secure software development, risk management, data analysis, Python,
penetration testing, and mobile security. When I’m not researching or coding, you can
find me watching anime, reading Sci Fi, or playing with my dogs! I have aspirations of
going back to school to get a graduate degree in either Digital Forensics, or Cyber Law
(maybe both?). My ultimate goal in life is to learn every single day, and I’m proud to be
doing just that.
With her award, she has received an opportunity for a part-time internship with CDM as
a cybersecurity reporter and blogger.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 35
About Tami Hudson
A seasoned executive, Tami has over two decades of technology and security experience
effectively managing risk while driving enterprise objectives. Shei is a former CISO and
Big 4 consulting executive who has hands-on experience leading companies in business
focused cyber transformations, global ransomware breaches, and cyber crisis
management.
With a career focused on building widespread cyber resiliency for Fortune 500 companies
across multiple industries, and a strong blend of technical, business, and communication
skills, Tami is at the forefront of accelerating cybersecurity across our global footprint
while closing the gap between cybersecurity and business through wide-spread risk
mitigation.
A consummate learner, Tami is an avid community builder with deep involvement across
several charities focused on serving under-privileged youth and women in technology
related fields. A scholarship recipient, Tami obtained a bachelors from Georgia Tech and
an MBA from Duke University.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 36
About Aradhna Chetal
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 37
services, manufacturing.services, manufacturing.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 38
In our 11th year of awards, we continue to find tremendous.
innovation from these winners.
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 39
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 40
http://www.sepiocyber.com
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 41
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 42
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 43
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 44
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 45
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 46
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 47
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 48
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 49
The Top Global CISOs 2023
These CISOs competed against thousands of candidates for this prestigious award. Judges look
at these candidates, searching for the most innovative, with unparalleled success in
communicating with their boards and senior level executives, detecting, and stopping breaches
and data loss, complying with regulations, and building powerful risk reduction programs for their
organizations.
Chief Information Security Officers are the first responders of cyberspace and deserve to be
recognized for their tremendous achievements as they fend off cyber criminals, cyber terrorists,
malicious insiders, and nation state sponsored attacks.
For years they have been considered operating cost centers while helping corporations avert
disasters that could put them out of business. They work tirelessly to allow companies to grow,
expand, and increase potential profits by managing and mitigating major risks and regulatory
compliance issues on a day-to-day basis.
“We’re pleased to name this small, elite group of information security professionals in our Top
Global CISOs Awards for 2023,” said Gary Miliefsky, Publisher of Cyber Defense Magazine.
Here are the winners in alphabetical order by the name of their company:
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 50
Evan Morgan Awwab Arif Gary Gooden
Ally Financial Inc. Bank of Hope CISO at Large
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 51
Endre Jarraux - Walls Lance Harris William Telles
Customers Bank Everi Holdings Inc. Grupo Águia Branca
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 52
Brent Conran Harold Moore Venkatesh Subramaniam
Intel Lifeway Christian Resources Mindsprint
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 53
Idan Malei Mark Leary James Beeson
Ormat Ltd. Regeneron The Cigna Group
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 54
Shane Callahan Sunil Seshadri David Tyburski
Vanderbilt University Wells Fargo Wynn Resorts
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 55
The Top InfoSec Innovators 2023
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 56
Camelot Secure CybeReady Deepwatch
Most Innovative Most Innovative Editor's Choice
Advanced Persistent Security Awareness Cyber Resilience
Threat (APT) Detection Training
and Response Defendify
Cybersixgill Hot Company
Cerby Cutting Edge Cyber Resilience
Most Innovative Threat Intelligence
Identity & Access Destination Certification
Management Cyble Inc.
Editor's Choice Most Innovative
Cervello Ltd. Threat Intelligence Cybersecurity Training
Most Innovative Videos
Railway Cybersecurity Cycode
Most Innovative Dig Security
Cloud Range Cyber Application Security Most Innovative
Cutting Edge Data Security
Cybersecurity Training Cydome
Cutting Edge Digital Hands
Conquest Cyber Maritime Cybersecurity Most Innovative
Most Innovative Managed Security Service
Third Party Cyber Risk CYE Provider (MSSP)
Management (TPCRM) Most Innovative
Risk Management Digital Silence
Coro Most Innovative
Most Innovative Cyera Breach & Attack
Midmarket cybersecurity Most Innovative Simulation
Cybersecurity Startup
Corvus Insurance DNSFilter
Editor's Choice Cymulate Cutting Edge
Cyber Insurance Most Innovative DNS Security
Breach and Attack
Cranium Simulation Don't Be Breached, Inc.
Cutting Edge Editor's Choice
Cybersecurity Artificial DataDome Data Security
Intelligence Most Innovative
Bot Management Donoma Software
Critical Start Cutting Edge
Most Innovative Deep Instinct Data Security Platform
Managed Detection and Editor's Choice
Response (MDR) Cybersecurity Artificial
Intelligence
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 57
Eclypsium Genie Networks Hornetsecurity Ltd.
Most Innovative Hot Company Most Innovative
Software Supply Chain Network Detection and Data Loss Prevention
Security Response (DLP)
Gigamon
Endace Most Innovative HYAS Infosec Inc.
Most Innovative Cloud Security Monitoring Most Innovative
Cloud Threat Detection Protective DNS
Investigation & Response Good Code
(TDIR) Most Innovative Hyperproof
Cybersecurity Engineering Most Innovative
Ermes Browser Security Solutions Governance, Risk and
Most Innovative Compliance (GRC)
Browser Security Graylog
Most Innovative HYPR
Eventus Security Central Log Management Most Innovative
Cutting Edge Identity Verification
Managed Security Service Grip Security
Provider (MSSP) Most Innovative iboss
Identity Security Most Innovative
Flexxon Browser Isolation
Hot Company Guardsquare, Inc.
Endpoint Security Cutting Edge Illumio
Mobile App Security Cutting Edge
Forcepoint Zero Trust
Most Innovative Gurucul
Content Disarm and Most Innovative ImmuniWeb
Reconstruction (CDR) Security Information Event Publisher's Choice
Management (SIEM) Application Security
Fortra’s Digital Defense
Editor's Choice hackrocks Imprivata
Vulnerability Management Most Innovative Cutting Edge
Cybersecurity Training Identity & Access
Forward Networks Management
Hot Company Halcyon
Compliance Cutting Edge Infolock
Cyber Resilience Editor's Choice
GeeTest Data Loss Prevention
Editor's Choice HiddenLayer (DLP)
Bot Management Most Innovative
Adversarial ML Threat
Mitigation
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 58
IONIX Mend.io NINJIO, LLC
Most Innovative Hot Company Most Innovative
Attack Surface Application Security Cybersecurity Awareness
Management
mSOC.io LLC Nisos
iTRUSTXForce Hot Company Publisher's Choice
Corporation SOC-as-a-Service Threat Intelligence
Most Innovative
Cybersecurity-as-a- Netcraft NordLayer
Service (CaaS) Editor's Choice Most Innovative
Cybersecurity Company Zero Trust
JumpCloud
Hot Company Netragard Normalyze
SMB Cybersecurity Cutting Edge Cutting Edge
Penetration Testing Data Security Posture
Karan Dwivedi of Google Management (DSPM)
Most Innovative NetRise
Security Expert Cutting Edge
Firmware Onyxia Cyber Inc.
Kasada Cutting Edge
Hot Company NetSfere Cybersecurity
Bot Management Most Innovative Performance Management
Secure Communications
Keyavi Data Open Text Cybersecurity
Visionary Market Maker NetSPI Most Innovative
Self-Protecting Data Cutting Edge Cyber Resilience
Breach & Attack
Kingston IronKey Simulation Paladin Cyber
Most Innovative Most Innovative
Encrypted Hardware Netwrix SMB Cybersecurity
Most Innovative
Lattice Semiconductor Privileged Access Panaseer
Most Innovative Management (PAM) Most Innovative
Embedded Security Continuous Controls
Next DLP Monitoring Platform
Level 6 Cybersecurity Cutting Edge
Most Innovative Data Loss Prevention Panther Labs
Artificial Intelligence and (DLP) Hot Company
Machine Learning Cybersecurity Startup
NextRay AI
LinkShadow Cutting Edge Prelude Security
Most Innovative Network Detection and Cutting Edge
Network Detection and Response Cybersecurity Startup
Response
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 59
Protegrity Salt Security SlashNext
Publisher's Choice Most Innovative Most Innovative
Data Security API Security Email Security and
Scalarr Inc. Management
Pvotal Technologies Inc. Most Innovative
Most Innovative Cybersecurity Artificial Spin.AI
Enterprise Security Intelligence Most Innovative
Ransomware Protection of
Qrypt Scribe Security SaaS Data
Most Innovative Cutting Edge
Quantum Encryption Software Supply Chain Stealth-ISS Group Inc.
Security Most Innovative
Radiant Security SOC-as-a-Service
Cutting Edge Seclore
AI Security Co-pilot Hot Company Stellar Cyber
Data Security Most Innovative
Raytheon XDR – Extended Detection
Cutting Edge SeeMetrics and Response
Cybersecurity Company Most Innovative
Cybersecurity Sternum
Reblaze Performance Management Hot Company
Most Innovative Healthcare IoT Security
Next Generation Firewall Semperis
Cutting Edge Strata Identity
Red Access Active Directory Security Cutting Edge
Most Innovative Identity Orchestration
Hybrid Work Security SendQuick Pte Ltd.
Most Innovative Suridata
Reflectiz Authentication (Multi, Most Innovative
Most Innovative Single or Two-Factor) SaaS Security
Web Application Security
Sepio Syxsense
ReversingLabs Most Innovative Most Innovative
Hot Company Asset Risk Management Vulnerability Assessment,
Software Supply Chain Remediation and
Security Sevco Security Management
Cutting Edge
RunSafe Security Attack Surface Tami Hudson of WELLS
Hot Company Management FARGO
Critical Infrastructure Most Innovative
Protection Simeio Women in Cybersecurity
Most Innovative
Identity Orchestration
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 60
Tanium Varonis Systems Zero Networks Inc.
Most Innovative Most Innovative Most Innovative
Cybersecurity Company Data Security Posture Micro-segmentation
Management (DSPM)
ThreatConnect, Inc. Zimperium
Hot Company Verimatrix Most Innovative
Threat Intelligence Hot Company Mobile App Security
Mobile App Security
ThreatLocker Zivver
Editor's Choice Versa Networks Cutting Edge
Zero Trust Platform Most Innovative Email Security and
Cloud Security Management
Traceable AI
Editor's Choice Viakoo
API Security Most Innovative
Internet of Things (IoT)
Trend Micro Security
Most Innovative
Cybersecurity Visionary XONA Systems
Most Innovative
Tufin OT Security (Operational
Most Innovative Technology Security)
Network Security and
Management XTN Cognitive Security
Most Innovative
TuxCare Account Takeover
Most Innovative Protection
Vulnerability Management
Yizhi Sec
ULTRA RED Cutting Edge
Most Innovative Data Security
Continuous Threat
Exposure Management Zenity
(CTEM) Most Innovative
Low-code/no-code
UnknownCyber Security
Cutting Edge
Zero-day Threat Detection
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 61
The Black Unicorn Awards Winners for 2023
Conceal
Corelight
Cyderes
Deepwatch
HiddenLayer
Huntress
Iboss
Panaseer
SixMap
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 62
The Black Unicorn Awards Finalists for 2023
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 63
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 64
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 65
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 66
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 67
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 68
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 69
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 70
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 71
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 72
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 73
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 74
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 75
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 76
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 77
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 78
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 79
out The Black Unicorn Report
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 80
The Black Unicorn Report is a once-per-year publication of the Cyber Defense Awards and Cyber Defense
Magazine team, two leading platforms of the Cyber Defense Media Group. This is Cyber Defense
Magazine’s 11th year of honoring cybersecurity innovators, in this case the Black Unicorn Awards for 2023
on our Cyber Defense Awards platform. In this competition, judges for these prestigious awards includes
cybersecurity industry veterans, trailblazers and market makers Gary Miliefsky of CDMG, Robert R.
Ackerman Jr. of Allegis Cyber, Dino Boukouris of MomentumCyber, Lindsey Polley de Lopez, PhD, MPA,
M.Phil of VentureScope and MACH37 and with much appreciation to emeritus judges Robert Herjavec of
Cyderes, Dr. Peter Stephenson of CDMG and David DeWalt of NightDragon.
To see the complete list of finalists and winners for the Black Unicorn Awards for 2023 please visit
https://cyberdefenseawards.com/black-unicorn-winners-for-2023/
All rights reserved worldwide. No part of this newsletter may be used or reproduced by any means, graphic,
electronic, or mechanical, including photocopying, recording, taping or by any information storage retrieval
system without the written permission of the publisher except in the case of brief quotations embodied in
critical articles and reviews. Because of the dynamic nature of the Internet, any Web addresses or links
contained in this newsletter may have changed since publication and may no longer be valid. The views
expressed in this work are solely those of the author and do not necessarily reflect the views of the
publisher, and the publisher hereby disclaims any responsibility for them.
Black Unicorn Report for 2023, Copyright © 2023, Cyber Defense Magazine, a division of CYBER
DEFENSE MEDIA GROUP 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-
844-9468 d/b/a CyberDefenseAwards.com, CyberDefenseMagazine.com, CyberDefenseNewswire.com,
CyberDefenseProfessionals.com, CyberDefenseRadio.com and CyberDefenseTV.com, is a Limited
Liability Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-
4188465, Cyber Defense Magazine® is a registered trademark of Cyber Defense Media Group. DUNS#
078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 81
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 82
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 83
2023 | The Black Unicorn Report – Including Top InfoSec Innovators & Top Global CISOs 84