This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
| Line 12: | Line 12: | ||
{{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | ||
| + | {{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.blackhat.com/asia-16/|logo=BlackHat_ASIA_2016_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.blackhat.com/asia-16/|logo=BlackHat_ASIA_2016_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}} | {{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.blackhat.com/us-16/|logo=Bh16usa_logo_black_updated.png|size=150x45px}} | {{MemberLinksv2|link=https://www.blackhat.com/us-16/|logo=Bh16usa_logo_black_updated.png|size=150x45px}} | ||
| + | {{MemberLinksv2|link=http://www.cisomiddleeast.misti.com|logo=CISO_MIDDLE_EAST_SUMMIT_2016_DUBAI.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | {{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | ||
| Line 27: | Line 28: | ||
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | ||
| + | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
| Line 34: | Line 35: | ||
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | {{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | {{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | {{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | ||
| + | |||
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | {{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | ||
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | {{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | ||
| Line 61: | Line 61: | ||
{{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | {{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | ||
{{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | {{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | {{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | ||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
Revision as of 02:05, 17 February 2016
Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
If you are interested in helping out at an OWASP booth, please see: Expo Area Call for Booth Volunteers

