This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
| Line 7: | Line 7: | ||
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH_EU_2014_Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH_EU_2014_Logo.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=https://blackhat.com|logo=BH_USA_2014_Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://blackhat.com|logo=BH_USA_2014_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | {{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | {{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | ||
{{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}} | {{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | {{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | ||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
| − | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png }} | + | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} |
| + | |||
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | {{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | ||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.scmagazine.com|logo=SC_Congress_Logo_.png|size=150x45px}} | {{MemberLinksv2|link=http://www.scmagazine.com|logo=SC_Congress_Logo_.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | ||
[http://spooks.wpengine.com/home-2-2 Suits & Spooks] | [http://spooks.wpengine.com/home-2-2 Suits & Spooks] | ||
| + | |||
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | ||
Revision as of 16:26, 26 March 2015
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

