This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Supporting Partners"

From OWASP
Jump to: navigation, search
Line 17: Line 17:
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}}
  
{{MemberLinksv2|link= http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}}
+
{{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}}
 +
{{MemberLinksv2|link=http://cybersecurepakistan.com |logo=Cyber_Secure_Pakistan_2015.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
 
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.eccouncil.org|logo=ECC-Foundation-Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}}
 
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}}
Line 31: Line 32:
 
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}}
 
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}}
 
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}}
Line 38: Line 39:
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
 
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}}
 
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}}
 
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}}
 
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}}
 
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}}
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
 
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}}
Line 45: Line 46:
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://emeacongress.isc2.org/events/-isc-security-congress-emea-2015/event-summary-1ea184dd6dc1467bb0dd530ecac3bc5b.aspx|logo=MIST Logo.jpg|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}}  
 
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}}  
 
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}}
Line 52: Line 53:
 
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} ‎
 
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} ‎
 
{{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}}
 
{{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}}
 +
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} ‎
 
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} ‎
 
 
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}}
 
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}}
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}}
Line 59: Line 60:
 
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}}
 +
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
 
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}}
  
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
[http://spooks.wpengine.com/home-2-2 Suits & Spooks]
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}
 
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}}

Revision as of 12:55, 21 October 2015

Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.

Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

AW 145x50.jpg       Apps World North America-01.jpg       Blue Kaizen Logo.png       BSides Columbia Logo.png       Bsides 15 Logo.png       BSides Logo.png      

BH 2015 Europe logo black updated.png       BH 2015 USA logo black updated.png       CloudSecurityWorld 2015 Logo.png       CodeMashLogo.150px.png       Council on CyberSecurity log full color Resized.png       Cyber aces logo.png      

CyberSecure Logo .gif       Cyber Secure Pakistan 2015.png       Cybit Logo.jpg       DarkReadingLogo.jpg       DevTalks Logo.png       Dragonjar.png      

EBCG.png       ECC-Foundation-Logo.png       Ekoparty-logo.png       Europython-2015-logo-white-bg.png       Fossetcon logo.jpeg       Hack In Paris Logo.png       HITB-logo-regular.png       ISC2MainLogoGreen.jpg      

(ISC)2 SecureIreland-OWASP-Ad.jpg       SecureTurkey-OWASP-Ad.jpg       IAASSE Logo.jpg       Information Security (ProMedia) Original Logo.png       Info secutiry conference 2015 banner.png       InfoSec World Logo.gif      

{{{size}}}       Insider Threat Summit 2015.LOGO.jpg       Logo ISACA Ecuador.jpg       ISMG-logo-med.jpg       ISSA Marketing Partner Logo.jpg       MIST Logo.jpg      

4th Annual CISO ASIA Summit & Roundtable.jpg       MUNDO HACKER LOGO.jpg       NCCDC - Just Map.jpg       O'Reilly Logo.jpg       One2One IT-Security logo.jpg       ‎ SC Magazine Logo FINAL.jpg      

SANS-Cyber-Talent-Logo.png       ‎ SecTor Logo 494 wide.jpg       SecAppDev Logo.jpg       (ISC)2 Security Congress APAC 2015.png       SecurityOrb Logo 2012.jpg       Segu-Info.png      

Simply Voting Logo.png      

Suits & Spooks UT-Austin-logo.jpg