This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
Dawnaitken (talk | contribs) |
|||
| Line 31: | Line 31: | ||
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | ||
| + | {{MemberLinksv2|link=http://dsigroup.org|logo=DSI_logo_web_large.png}} | ||
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | {{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | ||
| Line 41: | Line 42: | ||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | {{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | ||
| + | |||
{{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png|size=150x45px}} | {{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=Isclogo.jpg}} | {{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=Isclogo.jpg}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
| Line 48: | Line 49: | ||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | ||
| Line 55: | Line 56: | ||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot-north-america-on-white-green.png}} | {{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot-north-america-on-white-green.png}} | ||
| + | |||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}} | ||
| Line 62: | Line 63: | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | {{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png}} | ||
| Line 69: | Line 70: | ||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | {{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | {{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | ||
| Line 76: | Line 77: | ||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://2016.zeronights.org/|logo=Zn_150x45.png}} | {{MemberLinksv2|link=http://2016.zeronights.org/|logo=Zn_150x45.png}} | ||
Revision as of 00:56, 26 July 2016
Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
If you are interested in helping out at an OWASP booth, please see: Expo Area Call for Booth Volunteers


