SponSORSHIP
LET PEOPLE KNOW YOU're a LEADER, ALL YEAR ROUND
When companies sponsor conferences, they get to advertise to a certain number of people for a few days out of the year. OST2 has more than 56k YouTube subscribers, which is more people than attend even the largest security conferences like DEF CON or RSA. When you sponsor OST2, students will see your support all year. And when it comes to generating good will with our students - your prospective future employees - nothing beats providing support to the instructors who provide them with free high-quality education.
Email sponsor@ost2.fyi to set up a meeting to discuss sponsorship
Current SPONSORS
🥇GOLD LEVEL🥇
3mdeb shares OST2's mission of delivering cybersecurity training to individuals and organizations. With expertise in firmware security, hardware enablement, and open-source solutions, we empower you to utilize advanced security features in modern hardware and firmware.Â
Below are some of our current focus areas:Â
Dasharo Firmware: Merging coreboot, EDKII (UEFI reference implementation), LinuxBoot, U-Boot, and other open-source projects, we aim for clean, maintainable, and privacy-respecting code.Â
Embedded Linux Frameworks: We ensure the security of medical, automotive, and robotic leveraging Yocto, Buildroot, and OpenWRT, enabling new hardware, assuring reliable updates, and integrating Verified Boot and Secure Boot technologies for robust protection.Â
Trusted Computing: Our team implements Dynamic Root of Trust and Static Root of Trust technologies, facilitating measured boot and software stack attestation to enhance overall security.Â
Join us at OST2 to advance your cybersecurity skills, and let's shape the future of firmware together.
Binarly is a global firmware and software supply chain security company founded in 2021. The company’s flagship Binarly Transparency Platform is an enterprise-class, AI-powered solution used by device manufacturers, OEMs, IBVs and product security teams to identify known and unknown vulnerabilities, misconfigurations and signs of malicious code implantation. Binarly’s validated remediation playbooks have significantly reduced the cost and time to respond to security exposures. Based in Los Angeles, California, Binarly brings decades of research and program analysis expertise to build solutions to protect businesses, critical infrastructure, and consumers around the world.
Crowdfense is a world-leading research hub and acquisition platform for high-quality zero-day exploits and advanced vulnerability research.
We evaluate and purchase premium exploits and vulnerabilities, rewarding the highest bounties in the industry.
If you have what it takes, join our Vulnerability Research Hub, report your vulnerability and reclaim the highest payouts ever! https://vrh.crowdfense.com/
Dark Mentor LLC is a security consultancy specializing in firmware security, Bluetooth security, and training. Xeno Kovah, OST2's founder and leading class contributor, works for Dark Mentor whenever he has research or work to be done that isn't applicable to OST2's non-profit work.
NCC Group is a people-powered, tech enabled global cyber security and software escrow business.
Driven by a collective purpose to create a more secure digital future, c.2,400 colleagues across Europe, North America and Asia Pacific harness their collective insight, intelligence, and innovation to deliver cyber resilience for over 14,000 clients across the public and private sector globally.
With decades of experience and a rich heritage, NCC Group is committed to developing sustainable solutions that continue to meet clients' current and future cyber security challenges.
Winsider specializes in delivering in-depth training on topics related to operating system internals, focusing on Windows while comparing and contrasting to Mac & Linux design.
Our courses not only cover user & kernel developer topics, such as scheduling or memory management, but also architectural topics such as page table translation, virtualization and IO-SRV, Intel FRED, segmentation, and I/O APIC redirection. For security-minded organizations, content is tailored to include examples of past exploits at both the software and hardware level, as well as future possibilities and architectural weaknesses.
Classes include deep analysis of OS/CPU capabilities, such as Intel VT-x/Virtualization & Mode-Based Execution Control (MBEC), Supervisor Mode Execution Prevention (SMEP), Software Guard Extensions (SGX), User-Mode Instruction Prevention (UMIP), Control-flow Enforcement Technology (CET), and recent updates such as Hypervisor Linear Address Translation (HLAT), Linear Address Space Masking (LASM) & Separation (LASS). Â
Updated quarterly, courses include the latest developments in OS & CPU architecture, such as Gemini Lake & Windows 11 25H2.
🥈SILVER LEVEL🥈
🥉BRONZE LEVEL🥉
Cyber 5W is where DFIR Training is elevated to a form of art. Through our thoughtfully curated programs, we empower professionals to master Digital Forensics and Incident Response, equipping them to expertly navigate technology-related incidents. Join us as we shape the future of cybersecurity together.
IncludeSec is an all experts security assessment team that has hacked on thousands of products for hundreds of clients since 2011. We work on the toughest challenges in software of all types; from OS/Kernel/Servers to Web/Mobile from assembly/C to Python/Java, we’ve done it all!