This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Supporting Partners"
From OWASP
Dawnaitken (talk | contribs) |
Dawnaitken (talk | contribs) |
||
| Line 28: | Line 28: | ||
{{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.darkreading.com|logo=DarkReadingLogo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://dsigroup.org|logo=DSI_logo_web_large2.png}} | {{MemberLinksv2|link=http://dsigroup.org|logo=DSI_logo_web_large2.png}} | ||
| − | |||
| + | {{MemberLinksv2|link=http://devtalks.ro|logo=DevTalks_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | {{MemberLinksv2|link=http://www.dragonjar.org|logo=Dragonjar.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | {{MemberLinksv2|link=http://ebcg.biz/|logo=EBCG.png|size=150x45px}} | ||
| Line 36: | Line 36: | ||
{{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=170x60px}} | {{MemberLinksv2|link=https://www.ekoparty.org|logo=Ekoparty-logo.png|size=170x60px}} | ||
{{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | {{MemberLinksv2|link=http://fossetcon.org/2014/|logo=Fossetcon logo.jpeg|size=150x85px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=https://gotoams.nl/|logo=Goto Amsterdam logo.png|size=150x85px}} | {{MemberLinksv2|link=https://gotoams.nl/|logo=Goto Amsterdam logo.png|size=150x85px}} | ||
{{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=200x80px}} | {{MemberLinksv2|link=https://www.hackinparis.com|logo=Hack_In_Paris_Logo.png|size=200x80px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png}} | {{MemberLinksv2|link=https://conference.hitb.org|logo=HITB-logo-regular.png}} | ||
{{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=ISC2-Main-Logo-Green.png|size=200x80px}} | {{MemberLinksv2|link=https://www.isc2.org/events/default.aspx|logo=ISC2-Main-Logo-Green.png|size=200x80px}} | ||
{{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.iaasse.org|logo=IAASSE_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=180x60px}} | {{MemberLinksv2|link=http://www.meinfosecurity.com|logo=Information_Security_(ProMedia)_Original_Logo.png|size=180x60px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://www.infosecurity-magazine.com/conferences/boston-agile- | {{MemberLinksv2|link=http://www.infosecurity-magazine.com/conferences/boston-agile- | ||
cybersecurity/|logo=Infosecurity_Magazine_Logo_High-Res.png|size=190x60}} | cybersecurity/|logo=Infosecurity_Magazine_Logo_High-Res.png|size=190x60}} | ||
{{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | {{MemberLinksv2|link=http://www.questexevent.com/InfoSecurityConference/2016/singapore|logo=InfoSec_Logo_2016_150_45_(1).png|size=150x50px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | {{MemberLinksv2|link=http://www.infosec-world.com|logo=InfoSec_World_Logo.gif|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | {{MemberLinksv2|link=http://www.informationsecuritybuzz.com|logo=Inforamtion_Secuirty_Buzz_Logo.png}} | ||
{{MemberLinksv2|link=http://www.insidedarkweb.com/|logo=Dark_Web_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.insidedarkweb.com/|logo=Dark_Web_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | {{MemberLinksv2|link=http://www.insiderthreatevents.com|logo=Insider Threat Summit 2015.LOGO.jpg|size=150x50px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | {{MemberLinksv2|link=https://www.isaca.org/Pages/default.aspx|logo=Logo_ISACA_Ecuador.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.isaca.org/chapters5/ireland/Pages/default.aspx|logo=ISACA Ireland.jpg|size=175x60px}} | {{MemberLinksv2|link=http://www.isaca.org/chapters5/ireland/Pages/default.aspx|logo=ISACA Ireland.jpg|size=175x60px}} | ||
| − | |||
{{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot_north_america.png}} | {{MemberLinksv2|link=http://www.iottechexpo.com/northamerica/|logo=Iot_north_america.png}} | ||
{{MemberLinksv2|link=http://www.iottechexpo.com/europe/|logo=IoTLogo-europe.png}} | {{MemberLinksv2|link=http://www.iottechexpo.com/europe/|logo=IoTLogo-europe.png}} | ||
{{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|}} | {{MemberLinksv2|link=http://www.ismgcorp.com|logo=ISMG-logo-med.jpg|}} | ||
{{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.issa.org|logo=ISSA_Marketing_Partner_Logo.jpg|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.ciso-summit.com/ciso-asia.html|logo=4th_Annual_CISO_ASIA_Summit_&_Roundtable.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=160x45px}} | {{MemberLinksv2|link=http://www.mundohacker.es|logo=MUNDO HACKER LOGO.jpg|size=160x45px}} | ||
{{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.nationalccdc.org|logo=NCCDC_-_Just_Map.jpg|size=150x45px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=http://mobilewebdevconference.com/san-francisco-2017/|logo=Mobile_web_devcon.png}} | {{MemberLinksv2|link=http://mobilewebdevconference.com/san-francisco-2017/|logo=Mobile_web_devcon.png}} | ||
{{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.oreilly.com|logo=O'Reilly_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.one2onesummits.com/itsec/|logo=One2One_IT-Security_logo.jpg|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://qubitconference.com|logo=QuBit_Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.rochestersecurity.org/|logo=RSS_Designer_39_VECTORFile.png|size=200x100px}} | {{MemberLinksv2|link=https://www.rochestersecurity.org/|logo=RSS_Designer_39_VECTORFile.png|size=200x100px}} | ||
{{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | {{MemberLinksv2|link=http://www.sccongress.com|logo=SC_Magazine_Logo_FINAL.jpg |size=150x45px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=https://www.sans.org/cybertalent/fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | {{MemberLinksv2|link=https://www.sans.org/cybertalent/fair|logo=SANS-Cyber-Talent-Logo.png|size=150x45px}} | ||
{{MemberLinksv2|link=https://www.se-conference.org/|logo=Logo-secon.png|size=180x70px}} | {{MemberLinksv2|link=https://www.se-conference.org/|logo=Logo-secon.png|size=180x70px}} | ||
{{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=170x60px}} | {{MemberLinksv2|link=https://www.sector.ca|logo=SecTor_Logo_494_wide.jpg |size=170x60px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://secappdev.org|logo=SecAppDev_Logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | {{MemberLinksv2|link=http://apaccongress.isc2.org|logo=(ISC)2_Security_Congress_APAC_2015.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.secureworldexpo.com/bay-area/home|logo=SecureWorld Logo resized-2.jpg|size=150x45px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.securityorb.com|logo=SecurityOrb_Logo_2012.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | {{MemberLinksv2|link=http://segu-info.com.ar/|logo=Segu-Info.png|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | {{MemberLinksv2|link=http://www.simplyvoting.com/|logo=Simply_Voting_Logo.png|size=150x45px}} | ||
| + | |||
| + | |||
{{MemberLinksv2|link=https://edgesecurityconference.com/|logo=Sword_&_shield.jpg|size=150x45px}} | {{MemberLinksv2|link=https://edgesecurityconference.com/|logo=Sword_&_shield.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://www.technosecurity.us/|logo=Logo-technosecurity.png|size=150x45px}} | {{MemberLinksv2|link=http://www.technosecurity.us/|logo=Logo-technosecurity.png|size=150x45px}} | ||
| − | |||
| − | |||
{{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | {{MemberLinksv2|link=http://www.utexas.edu|logo=UT-Austin-logo.jpg|size=150x45px}} | ||
{{MemberLinksv2|link=http://2016.zeronights.org/|logo=Zn_150x45.png|size=150x45px}} | {{MemberLinksv2|link=http://2016.zeronights.org/|logo=Zn_150x45.png|size=150x45px}} | ||
Revision as of 12:47, 13 April 2017
Disclaimer: Supporting Partner logos are not endorsements and reflect the message of the supporter only.
Thank you to the following Organizations for helping promote OWASP and making software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
If you are interested in helping out at an OWASP booth, please see: Expo Area Call for Booth Volunteers










