This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Supporting Partners"

From OWASP
Jump to: navigation, search
Line 5: Line 5:
 
{{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}}
 
{{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}}
 +
{{MemberLinksv2|link=http://www.acsac.org|logo=ACSAC_Logo.gif|size=150x45px}}
 
{{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}}
 
{{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}}
 
 
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}}
 
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}}
Line 15: Line 16:
 
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}}
 
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}}
 
{{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}}
Line 22: Line 23:
 
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
Line 29: Line 30:
 
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}}
 
{{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}}
 
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}}
 
 
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}}
 
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}}
 
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}}
 
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}}
Line 36: Line 37:
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
Line 43: Line 44:
 
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}}
 
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}}
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 +
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
Line 50: Line 51:
 
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}}  
 
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}}  
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} ‎
 
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} ‎
Line 57: Line 58:
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} ‎
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} ‎
 
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}}
 
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}}
 +
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}}
 
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}}
Line 64: Line 65:
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
 +
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}

Revision as of 23:06, 19 November 2015

Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.

Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

AW 145x50.jpg       Apps World North America-01.jpg       ACSAC Logo.gif       Blue Kaizen Logo.png       BSides Columbia Logo.png       Bsides 15 Logo.png      

BSides Lagos.png       BSides Logo.png       BH 2015 Europe logo black updated.png       BH 2015 USA logo black updated.png       CloudSecurityWorld 2015 Logo.png       CodeMashLogo.150px.png      

Council on CyberSecurity log full color Resized.png       Cyber aces logo.png       CyberSecure Logo .gif       Cyber Secure Pakistan 2015.png       Cybit Logo.jpg       DarkReadingLogo.jpg      

DevTalks Logo.png       Dragonjar.png       EBCG.png       ECC-Foundation-Logo.png       Ekoparty-logo.png       Europython-2015-logo-white-bg.png      

Fossetcon logo.jpeg       Hack In Paris Logo.png       HITB-logo-regular.png       ISC2MainLogoGreen.jpg       (ISC)2 SecureIreland-OWASP-Ad.jpg       SecureTurkey-OWASP-Ad.jpg      

IAASSE Logo.jpg       Information Security (ProMedia) Original Logo.png       Info secutiry conference 2015 banner.png       InfoSec World Logo.gif       {{{size}}}       Insider Threat Summit 2015.LOGO.jpg      

Logo ISACA Ecuador.jpg       ISMG-logo-med.jpg       ISSA Marketing Partner Logo.jpg       MIST Logo.jpg       4th Annual CISO ASIA Summit & Roundtable.jpg       MUNDO HACKER LOGO.jpg      

NCCDC - Just Map.jpg       O'Reilly Logo.jpg       One2One IT-Security logo.jpg       ‎ SC Magazine Logo FINAL.jpg       SANS-Cyber-Talent-Logo.png       ‎ SecTor Logo 494 wide.jpg      

SecAppDev Logo.jpg       (ISC)2 Security Congress APAC 2015.png       SecureWorld Logo resized-2.jpg       SecurityOrb Logo 2012.jpg       Segu-Info.png       Simply Voting Logo.png      

Suits & Spooks UT-Austin-logo.jpg