This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
| Line 5: | Line 5: | ||
{{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}} | {{MemberLinksv2|link= http://www.apps-world.net/germany|logo=AW_145x50.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.apps-world.net/northamerica/|logo=Apps World North America-01.jpg|size=150x45px}} | ||
| + | {{MemberLinksv2|link=http://www.acsac.org|logo=ACSAC_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.bluekaizen.org|logo=Blue_Kaizen_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.securitybsides.com/w/page/12194156/FrontPage|logo=BSides_Columbia_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsidesknoxville.com|logo=Bsides_15_Logo.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslagos.org|logo=BSides_Lagos.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://bsideslv.org|logo=BSides_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}} | {{MemberLinksv2|link=https://blackhat.com/eu-14/|logo=BH 2015 Europe logo black updated.png|size=150x45px}} | ||
| Line 15: | Line 16: | ||
{{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://cloudsecurityworld.homestead.com|logo=CloudSecurityWorld_2015_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | {{MemberLinksv2|link=http://www.codemash.org|logo=CodeMashLogo.150px.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | {{MemberLinksv2|link=http://www.counciloncybersecurity.org|logo=Council_on_CyberSecurity_log_full_color_Resized.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/cyberaces-us-career-fair#!eventLanding;eventCode=cyberaces-us-career-fair|logo=Cyber_aces_logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}} | {{MemberLinksv2|link=https://www.eiseverywhere.com/135818?discountcode=OWASP15|logo=CyberSecure Logo .gif|size=150x45px}} | ||
| Line 22: | Line 23: | ||
{{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cybitexpo.com|logo=Cybit_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
| Line 29: | Line 30: | ||
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | {{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | {{MemberLinksv2|link=https://ep2015.europython.eu/en/|logo=Europython-2015-logo-white-bg.png|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
| − | |||
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | {{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=150x85px}} | ||
{{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | {{MemberLinksv2|link=http://conference.hitb.org/hitbsecconf2015ams|logo=HITB-logo-regular.png|size=150x45px}} | ||
| Line 36: | Line 37: | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureireland-conference-2015/event-summary-32b87af71b91494c937cf40ade419bc3.aspx|logo=(ISC)2_SecureIreland-OWASP-Ad.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.cvent.com/events/-isc-secureturkey-conference-2015/event-summary-6e9ed179315240a6a57175212285fd3f.aspx|logo=SecureTurkey-OWASP-Ad.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2015kl|logo=Info_secutiry_conference_2015_banner.png|size=150x50px}} | ||
| Line 43: | Line 44: | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | ||
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | {{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | ||
| + | |||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
| Line 50: | Line 51: | ||
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | ||
| Line 57: | Line 58: | ||
{{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://app.brazenconnect.com/events/sans-cybertalent-fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | {{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=150x45px}} | ||
| + | |||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
| − | |||
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | {{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | ||
| Line 64: | Line 65: | ||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | ||
| + | |||
[http://spooks.wpengine.com/home-2-2 Suits & Spooks] | [http://spooks.wpengine.com/home-2-2 Suits & Spooks] | ||
| − | |||
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | ||
Revision as of 23:06, 19 November 2015
Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

