The hacking of a water treatment plant only months ago demonstrated the risks often associated with critical infrastructure and the industrial control systems that many critical infrastructure entities rely upon to operate. From legacy considerations to access controls, the challenges facing these entities are distinct and alarming when one considers implications of a breach.

The technologies recognized in this category reinforce critical infrastructure security through both supervisory control and data acquisition (SCADA) offerings and solutions that tackle security associated with the internet of things. They respond the the array of threats, whether they be spearheaded by nation-state bad actors or organized criminals.