This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
Dawnaitken (talk | contribs) |
|||
| Line 4: | Line 4: | ||
If you are interested in helping out at an OWASP booth, please see: [https://www.owasp.org/index.php/Expo_Space_Call_for_Volunteers Expo Area Call for Booth Volunteers] | If you are interested in helping out at an OWASP booth, please see: [https://www.owasp.org/index.php/Expo_Space_Call_for_Volunteers Expo Area Call for Booth Volunteers] | ||
| + | |||
{{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}} | {{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}} | ||
| Line 12: | Line 13: | ||
{{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | ||
| Line 19: | Line 21: | ||
{{MemberLinksv2|link=http://www.cisomiddleeast.misti.com|logo=CISO_MIDDLE_EAST_SUMMIT_2016_DUBAI.png|size=150x45px}} | {{MemberLinksv2|link=http://www.cisomiddleeast.misti.com|logo=CISO_MIDDLE_EAST_SUMMIT_2016_DUBAI.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | {{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | ||
| Line 26: | Line 29: | ||
{{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}} | {{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}} | {{MemberLinksv2|link=http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://cybersummitusa.com|logo=Cyber_Security_Summit_2016_Logo_.png}} | {{MemberLinksv2|link=http://cybersummitusa.com|logo=Cyber_Security_Summit_2016_Logo_.png}} | ||
| Line 33: | Line 37: | ||
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
| Line 39: | Line 44: | ||
{{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | {{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://iccs.fordham.edu|logo=FordhamLogo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://iccs.fordham.edu|logo=FordhamLogo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | {{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | ||
{{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png|size=150x45px}} | {{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=Isclogo.jpg}} | {{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=Isclogo.jpg}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | ||
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | {{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot_north_america.png}} | {{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot_north_america.png}} | ||
{{MemberLinksv2|link=http://www.iottechexpo.com/europe/|logo=IoTLogo-europe.png}} | {{MemberLinksv2|link=http://www.iottechexpo.com/europe/|logo=IoTLogo-europe.png}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | {{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | ||
| − | |||
{{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | {{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | ||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | {{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | ||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | {{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
Revision as of 18:27, 25 August 2016
Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
If you are interested in helping out at an OWASP booth, please see: Expo Area Call for Booth Volunteers




