This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Sponsors"
Mark Major (talk | contribs) (Created page with "====Sponsors==== If you are interested in sponsoring the Front Range OWASP Conference, please contact Micah Tapman at micah at aerstone dot com. <!-- <h...") |
Mark Major (talk | contribs) (Commented out the sponsorship package options) |
||
(20 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | ==== | + | ==Current Sponsors== |
+ | |||
+ | === [https://aerstone.com/ Aerstone] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement. Clients range from local businesses to government agencies. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:BoulderSponsorAerstone.png|160px| link=http://aerstone.com |alt=Aerstone|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.appliedtrust.com/ Applied Trust] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include: | ||
+ | <br> | ||
+ | <ul> | ||
+ | <li>Web Application Security</li> | ||
+ | <li>Drupal and Linux</li> | ||
+ | <li>Security</li> | ||
+ | <li>Technology Selection and Implementation</li> | ||
+ | <li>Operations</li> | ||
+ | <li>Performance and High Availability</li> | ||
+ | <li>Assessment and Audit</li> | ||
+ | <li>System, Network, and Security Architecture</li> | ||
+ | <li>Strategy and Governance</li> | ||
+ | </ul> | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:AppliedTrust.png |160px| link=http://www.appliedtrust.com|alt=Applied Trust|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.checkmarx.com Checkmarx] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Checkmarx - Source Code Analysis Made Easy | ||
+ | |||
+ | Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:Checkmarx.png |160px| link=http://www.checkmarx.com/|alt=Checkmarx|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.hp.com/ HP] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:HP.png |160px| link=http://www.hp.com/ |alt=HP|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.securitypursuit.com/ Security Pursuit] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:SecurityPursuit.png |160px| link=http://www.securitypursuit.com/ |alt=Security Pursuit|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.southseascorp.com/ SouthSeas] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:SouthSeas.png |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [https://www.veracode.com/ Veracode] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:Veracode.png |160px| link=https://www.veracode.com/ |alt=Veracode|right]] | ||
+ | |} | ||
+ | |||
+ | <!--<center> | ||
+ | {| style="width:95%;" cellpadding="40" style="border-collapse:collapse;" align="center" | ||
+ | |- | ||
+ | | [[Image:BoulderSponsorAerstone.png | 256px | link=https://aerstone.com | alt=Aerstone | Aerstone]] | ||
+ | | [[Image:AppliedTrust.png | 256px | link=http://www.appliedtrust.com | alt=Applied Trust | Applied Trust]] | ||
+ | | [[Image:Checkmarx.png | 256px | link=http://www.checkmarx.com/ | alt=Checkmarx | Checkmarx]] | ||
+ | |- | ||
+ | | [[Image:HP.png | 256px | link=http://www.hp.com/ | alt=HP | HP]] | ||
+ | | [[Image:SecurityPursuit.png | 256px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]] | ||
+ | | [[Image:SouthSeas.png | 256px | link=http://www.southseascorp.com/ | alt=SouthSeas | SouthSeas]] | ||
+ | |- | ||
+ | | [[Image:Veracode.png | 256px | link=https://www.veracode.com/ | alt=Veracode | Veracode]] | ||
+ | |} | ||
+ | </center>--> | ||
+ | |||
− | |||
<!-- | <!-- | ||
<hr> | <hr> | ||
Line 11: | Line 109: | ||
<hr> | <hr> | ||
--> | --> | ||
+ | |||
+ | <!-- | ||
+ | ==Sponsorship Opportunities== | ||
+ | |||
+ | Please contact [[User:Mark_Major|Mark Major]] for information regarding SnowFROC sponsorship opportunities. | ||
+ | *mark dot major at owasp dot org | ||
+ | *(720) 33-OWASP | ||
+ | |||
+ | {| style="width:95%;" cellpadding="8" style="border-collapse:collapse;" align="right" | ||
+ | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Booth Sponsorships | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#C4BC96; color:#FFFFCC" align="center" | Gold (1x) | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#BFBFBF; color:#F2F2F2" align="center" | Silver (3x) | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#948A54; color:#C4BC96" align="center" | Bronze | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Expo Space | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | Premium sized booth space (15x15); Premier location (first choice); | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | Premium sized booth space (15x15); Premier location (second choice); | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | Standard booth space (10x10); | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Expo Booth Passes | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | 4 | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | 3 | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | 2 | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Conference Passes | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | 4 | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | 4 | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | 2 | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Conference Pass Discount | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | 20% (up to 20x) | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | 20% (up to 10x) | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | 20% (up to 10x) | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Logo Placement | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | | ||
+ | *Conference website | ||
+ | *Conference brochure | ||
+ | *Entrance to one track room (FCFS) | ||
+ | *Conference entrance (exclusive) | ||
+ | *Attendee pack branding (exclusive) | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | | ||
+ | *Conference website | ||
+ | *Conference brochure | ||
+ | *Entrance to one track room (FCFS) | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | | ||
+ | *Conference website | ||
+ | *Conference brochure | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Company Description Placement | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | Full-page info sheet in attendee pack | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | Half-page info sheet in attendee pack | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | Quarter-page info sheet in attendee pack | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Additional Perks | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | | ||
+ | *Scheduled slot for sponsor giveaways | ||
+ | *Attendee pack item insertion (SnowFROC approval required) | ||
+ | *Company information sheet distributed at breakfast locations | ||
+ | *Personal introduction and acknowledgement of sponsor executive during SnowFROC kick-off | ||
+ | *'''Exclusive VIP Dinner host''' | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | | ||
+ | *Scheduled slot for sponsor giveaways | ||
+ | *Attendee pack item insertion (SnowFROC approval required) | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | | ||
+ | *Scheduled slot for sponsor giveaways | ||
+ | *Attendee pack item insertion (SnowFROC approval required) | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | '''$15,000''' | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | '''$6,500''' | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | '''$3,500''' | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | OWASP Membership Discount | ||
+ | | style="border: 1px solid #365F91; background:#FFFFCC; color:#4A442A" align="left" valign="top" | - $3,000 | ||
+ | | style="border: 1px solid #365F91; background:#F2F2F2; color:#404040" align="left" valign="top" | - $1,300 | ||
+ | | style="border: 1px solid #365F91; background:#C4BC96; color:#4A442A" align="left" valign="top" | - $700 | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Food Sponsorships | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#F79646; color:#FDFDD9" align="center" | Breakfast (1x) -- SOLD | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#8064A2; color:#E5DFEC" align="center" | Coffee (2x) | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#4BACC6; color:#DAEEF3" align="center" | Lunch (2x) | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Description | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | Kick-start the day with a friendly and useful offering. This is the first sponsorship visible to attendees. | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | Sponsor either the morning or afternoon coffee break. This is a highly-visible sponsorship with heavy circulation. | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | Co-sponsor lunch and target a captive audience. Sponsors may have promotional opportunities during the lunch break. | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Sponsor Acknowledgement | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *Conference announcement; | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *Conference announcement; | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *Conference announcement; | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Branding | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | Breakfast area signage | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | Coffee bar area signage | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | Lunch area signage | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Sponsor Table Branding | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | | ||
+ | *Sponsors banner; | ||
+ | *Pre-approved, sponsor-provided literature; | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | | ||
+ | *Sponsors banner; | ||
+ | *Pre-approved, sponsor-provided literature; | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | | ||
+ | *Sponsors banner; | ||
+ | *Pre-approved, sponsor-provided literature; | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | '''$3,000''' | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | OWASP Member Discount | ||
+ | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | - $600 | ||
+ | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Event Sponsorships | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#365F91; color:#DBE5F1" align="center" | Capture the Flag (1x) -- SOLD | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#C0504D; color:#F2DBDB" align="center" | Networking Social (1x) -- SOLD | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#9BBB59; color:#EAF1DD" align="center" | Birds of a Feather (1x) | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Description | ||
+ | | style="border: 1px solid #365F91; background:#DBE5F1; color:#365F91" align="left" valign="top" | As the exclusive host of the conference hacking competition you will target the most technical attendees at SnowFROC. | ||
+ | | style="border: 1px solid #365F91; background:#F2DBDB; color:#C0504D" align="left" valign="top" | This event will be the last impression made on most conference attendees. The sponsor will provide a relaxed social setting for after-hours networking. | ||
+ | | style="border: 1px solid #365F91; background:#EAF1DD; color:#76923C" align="left" valign="top" | Sponsor the follow-up training and Birds of a-Feather events. This opportunity offers exclusive venue branding throughout the Friday morning sessions. | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Sponsor Acknowledgement | ||
+ | | style="border: 1px solid #365F91; background:#DBE5F1; color:#365F91" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *CTF awards ceremony participation; | ||
+ | | style="border: 1px solid #365F91; background:#F2DBDB; color:#C0504D" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *Conference announcement; | ||
+ | | style="border: 1px solid #365F91; background:#EAF1DD; color:#76923C" align="left" valign="top" | | ||
+ | *Conference website and brochure; | ||
+ | *Conference announcement; | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Branding | ||
+ | | style="border: 1px solid #365F91; background:#DBE5F1; color:#365F91" align="left" valign="top" | | ||
+ | *CTF area signage; | ||
+ | *Name and logo on CTF-related swag; | ||
+ | | style="border: 1px solid #365F91; background:#F2DBDB; color:#C0504D" align="left" valign="top" | | ||
+ | *Party entrance signage (pending venue approval); | ||
+ | | style="border: 1px solid #365F91; background:#EAF1DD; color:#76923C" align="left" valign="top" | | ||
+ | *Reception and meeting room signage; | ||
+ | *Coffee bar area signage (Friday only); | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Conference Passes | ||
+ | | style="border: 1px solid #365F91; background:#DBE5F1; color:#365F91" align="left" valign="top" | 4 | ||
+ | | style="border: 1px solid #365F91; background:#F2DBDB; color:#C0504D" align="left" valign="top" | 4 | ||
+ | | style="border: 1px solid #365F91; background:#EAF1DD; color:#76923C" align="left" valign="top" | - | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | ||
+ | | style="border: 1px solid #365F91; background:#DBE5F1; color:#365F91" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#F2DBDB; color:#C0504D" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#EAF1DD; color:#76923C" align="left" valign="top" | ''<Call for details>'' | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | | colspan="4" style="background:white; color:white" | | ||
+ | |- | ||
+ | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Swag Sponsorships | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#343E45; color:#AEBEC3" align="center" | Badges -- SOLD | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#4A7B6F; color:#CCDDDD" align="center" | Internet Service | ||
+ | ! style="width:28%; border: 1px solid #365F91; background:#EF8956; color:#FFDDAA" align="center" | Miscellaneous | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Description | ||
+ | | style="border: 1px solid #365F91; background:#AEBEC3; color:#343E45" align="left" valign="top" | Provide high-quality, co-branded badges produced according to SnowFROC specifications for all conference speakers, sponsors, volunteers, and other attendees (approximated 320). | ||
+ | | style="border: 1px solid #365F91; background:#CCDDDD; color:#4A7B6F" align="left" valign="top" | Sponsor Internet access to conference attendees. (Actual service will be provided by the venue.) | ||
+ | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | Provide approximately 320 co-branded lanyards, pens, notebooks, or other swag (apparel, bottles, stress balls, contest giveaways, etc.). All items require SnowFROC approval. | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Sponsor Acknowledgement | ||
+ | | style="border: 1px solid #365F91; background:#AEBEC3; color:#343E45" align="left" valign="top" | Conference website and brochure | ||
+ | | style="border: 1px solid #365F91; background:#CCDDDD; color:#4A7B6F" align="left" valign="top" | Conference website and brochure | ||
+ | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | Conference website and brochure | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Branding | ||
+ | | style="border: 1px solid #365F91; background:#AEBEC3; color:#343E45" align="left" valign="top" | Co-branded (with OWASP) on conference badges | ||
+ | | style="border: 1px solid #365F91; background:#CCDDDD; color:#4A7B6F" align="left" valign="top" | Co-branded (with OWASP) on WiFi SSID | ||
+ | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | Co-branded (with OWASP) on selected item(s) | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | Sponsor Table Branding | ||
+ | | style="border: 1px solid #365F91; background:#AEBEC3; color:#343E45" align="left" valign="top" | - | ||
+ | | style="border: 1px solid #365F91; background:#CCDDDD; color:#4A7B6F" align="left" valign="top" | | ||
+ | *Sponsors banner; | ||
+ | *Pre-approved, sponsor-provided literature; | ||
+ | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | - | ||
+ | |- | ||
+ | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | ||
+ | | style="border: 1px solid #365F91; background:#AEBEC3; color:#343E45" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#CCDDDD; color:#4A7B6F" align="left" valign="top" | ''<Call for details>'' | ||
+ | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | ''<Call for details>'' | ||
+ | |} | ||
+ | --> |
Latest revision as of 15:42, 4 April 2013
Current Sponsors
Aerstone
Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement. Clients range from local businesses to government agencies. |
Applied Trust
AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include:
|
Checkmarx
Checkmarx - Source Code Analysis Made Easy
Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries. |
HP
HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. |
Security Pursuit
Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. |
SouthSeas
Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation. |
Veracode
Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. |