This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Sponsors"

From OWASP
Jump to: navigation, search
(Updated the header types (so the current sponsors nest correctly as sub-headers under "Current Sponsors"))
Line 57: Line 57:
 
{| style="width: 100%;"
 
{| style="width: 100%;"
 
  |- valign="top"
 
  |- valign="top"
  | Sponsor information coming soon
+
  | Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation.
 
  | style="width: 200px; |
 
  | style="width: 200px; |
 
  | [[Image:SouthSeas.png  |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]]
 
  | [[Image:SouthSeas.png  |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]]

Revision as of 15:34, 26 March 2013

Current Sponsors

Aerstone

Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement.  Clients range from local businesses to government agencies.
Aerstone


Applied Trust

Sponsor information coming soon
Applied Trust


Checkmarx

Checkmarx - Source Code Analysis Made Easy

Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries.

Checkmarx


HP

Sponsor information coming soon
HP


Security Pursuit

Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization.
Security Pursuit


SouthSeas

Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation.
SouthSeas


Veracode

Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack.
Veracode



Sponsorship Opportunities

Please contact Mark Major for information regarding SnowFROC sponsorship opportunities.

  • mark dot major at owasp dot org
  • (720) 33-OWASP
Booth Sponsorships Gold (1x) Silver (3x) Bronze
Expo Space Premium sized booth space (15x15); Premier location (first choice); Premium sized booth space (15x15); Premier location (second choice); Standard booth space (10x10);
Expo Booth Passes 4 3 2
Conference Passes 4 4 2
Conference Pass Discount 20% (up to 20x) 20% (up to 10x) 20% (up to 10x)
Logo Placement
  • Conference website
  • Conference brochure
  • Entrance to one track room (FCFS)
  • Conference entrance (exclusive)
  • Attendee pack branding (exclusive)
  • Conference website
  • Conference brochure
  • Entrance to one track room (FCFS)
  • Conference website
  • Conference brochure
Company Description Placement Full-page info sheet in attendee pack Half-page info sheet in attendee pack Quarter-page info sheet in attendee pack
Additional Perks
  • Scheduled slot for sponsor giveaways
  • Attendee pack item insertion (SnowFROC approval required)
  • Company information sheet distributed at breakfast locations
  • Personal introduction and acknowledgement of sponsor executive during SnowFROC kick-off
  • Exclusive VIP Dinner host
  • Scheduled slot for sponsor giveaways
  • Attendee pack item insertion (SnowFROC approval required)
  • Scheduled slot for sponsor giveaways
  • Attendee pack item insertion (SnowFROC approval required)
Cost $15,000 $6,500 $3,500
OWASP Membership Discount - $3,000 - $1,300 - $700
Food Sponsorships Breakfast (1x) -- SOLD Coffee (2x) Lunch (2x)
Description Kick-start the day with a friendly and useful offering. This is the first sponsorship visible to attendees. Sponsor either the morning or afternoon coffee break. This is a highly-visible sponsorship with heavy circulation. Co-sponsor lunch and target a captive audience. Sponsors may have promotional opportunities during the lunch break.
Sponsor Acknowledgement
  • Conference website and brochure;
  • Conference announcement;
  • Conference website and brochure;
  • Conference announcement;
  • Conference website and brochure;
  • Conference announcement;
Branding Breakfast area signage Coffee bar area signage Lunch area signage
Sponsor Table Branding
  • Sponsors banner;
  • Pre-approved, sponsor-provided literature;
  • Sponsors banner;
  • Pre-approved, sponsor-provided literature;
  • Sponsors banner;
  • Pre-approved, sponsor-provided literature;
Cost <Call for details> $3,000 <Call for details>
OWASP Member Discount <Call for details> - $600 <Call for details>
Event Sponsorships Capture the Flag (1x) -- SOLD Networking Social (1x) -- SOLD Birds of a Feather (1x)
Description As the exclusive host of the conference hacking competition you will target the most technical attendees at SnowFROC. This event will be the last impression made on most conference attendees. The sponsor will provide a relaxed social setting for after-hours networking. Sponsor the follow-up training and Birds of a-Feather events. This opportunity offers exclusive venue branding throughout the Friday morning sessions.
Sponsor Acknowledgement
  • Conference website and brochure;
  • CTF awards ceremony participation;
  • Conference website and brochure;
  • Conference announcement;
  • Conference website and brochure;
  • Conference announcement;
Branding
  • CTF area signage;
  • Name and logo on CTF-related swag;
  • Party entrance signage (pending venue approval);
  • Reception and meeting room signage;
  • Coffee bar area signage (Friday only);
Conference Passes 4 4 -
Cost <Call for details> <Call for details> <Call for details>
Swag Sponsorships Badges -- SOLD Internet Service Miscellaneous
Description Provide high-quality, co-branded badges produced according to SnowFROC specifications for all conference speakers, sponsors, volunteers, and other attendees (approximated 320). Sponsor Internet access to conference attendees. (Actual service will be provided by the venue.) Provide approximately 320 co-branded lanyards, pens, notebooks, or other swag (apparel, bottles, stress balls, contest giveaways, etc.). All items require SnowFROC approval.
Sponsor Acknowledgement Conference website and brochure Conference website and brochure Conference website and brochure
Branding Co-branded (with OWASP) on conference badges Co-branded (with OWASP) on WiFi SSID Co-branded (with OWASP) on selected item(s)
Sponsor Table Branding -
  • Sponsors banner;
  • Pre-approved, sponsor-provided literature;
-
Cost <Call for details> <Call for details> <Call for details>