This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Supporting Partners"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.  
 
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.  
  
 +
{{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}}
Line 7: Line 8:
 
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH_EU_2014_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH_EU_2014_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://blackhat.com|logo=BH_USA_2014_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://blackhat.com|logo=BH_USA_2014_Logo.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}}
Line 14: Line 15:
 
{{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}}
 
{{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}}
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}}
Line 22: Line 23:
 
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
 
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}}
 
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}}
Line 29: Line 30:
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
Line 36: Line 37:
 
{{MemberLinksv2|link=http://www.scmagazine.com|logo=SC_Congress_Logo_.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.scmagazine.com|logo=SC_Congress_Logo_.png|size=150x45px}}
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}

Revision as of 16:17, 26 March 2015

Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

AW 145x50.jpg       Apps World North America-01.jpg       Blue Kaizen Logo.png       BSides Columbia Logo.png       BSides Logo.png       BH EU 2014 Logo.png       BH USA 2014 Logo.png      

CloudSecurityWorld 2015 Logo.png       CodeMashLogo.150px.png       Council on CyberSecurity log full color Resized.png       Cyber aces logo.png       Cyber Secure Pakistan 2015.png       DevTalks Logo.png      

Dragonjar.png       EBCG.png       ECC-Foundation-Logo.png       Fossetcon logo.jpeg       HITB-logo-regular.png       ISC2MainLogoGreen.jpg       (ISC)2 SecureIreland-OWASP-Ad.jpg      

IAASSE Logo.jpg       Info secutiry conference 2015 banner.png       InfoSec World Logo.gif       {{{size}}}       Insider Threat Summit 2015.LOGO.jpg       Logo ISACA Ecuador.jpg      

ISMG-logo-med.jpg       ISSA Marketing Partner Logo.jpg       MUNDO HACKER LOGO.jpg       NCCDC - Just Map.jpg       SC Congress Logo .png       SecAppDev Logo.jpg      

SecurityOrb Logo 2012.jpg       Segu-Info.png       Simply Voting Logo.png       Suits & Spooks UT-Austin-logo.jpg