2012 Security Innovation Award entry form

July 5, 2012
Use this form to create your entry for the 2013 Security Innovation Awards, presented by STE magazine, the Security Industry Association (SIA) and ISC East.

Please click the nearby link to download a PDF of the 2013 Security Innovation Award official entry form and rules.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.