This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
Line 12: | Line 12: | ||
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | {{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | ||
+ | {{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
+ | |||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
− | |||
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
Line 22: | Line 23: | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
+ | |||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | ||
− | |||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png }} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png }} | ||
Line 29: | Line 30: | ||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
+ | |||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
− | |||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
Line 36: | Line 37: | ||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | ||
+ | |||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
− | |||
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | ||
[http://spooks.wpengine.com/home-2-2 Suits & Spooks] | [http://spooks.wpengine.com/home-2-2 Suits & Spooks] | ||
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} |
Revision as of 15:30, 26 March 2015
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.