{"id":1943,"date":"2016-03-10T12:08:33","date_gmt":"2016-03-10T12:08:33","guid":{"rendered":"http:\/\/conference.hitb.org\/hitbsecconf2016ams\/?page_id=1943"},"modified":"2020-01-13T18:10:28","modified_gmt":"2020-01-13T17:10:28","slug":"sponsors","status":"publish","type":"page","link":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/","title":{"rendered":"Sponsors"},"content":{"rendered":"<h1 id=\"gold\" style=\"text-align: center;\"><strong>Platinum Sponsors<\/strong><\/h1>\n<h2><strong>xen1thLabs<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5556 size-medium\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png\" alt=\"\" width=\"300\" height=\"42\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-768x109.png 768w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-212x30.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-400x57.png 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-355x50.png 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-306x43.png 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-642x91.png 642w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-978x138.png 978w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-424x60.png 424w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-600x85.png 600w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-883x125.png 883w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-812x115.png 812w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-953x135.png 953w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul>\n<li><strong>xen1thLabs<\/strong>\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today.<\/li>\n<\/ul>\n<h1 id=\"gold\" style=\"text-align: center;\"><strong>Gold Sponsors<\/strong><\/h1>\n<h2 style=\"text-align: justify;\">Microsoft<\/h2>\n<h1 style=\"padding-left: 30px; text-align: justify;\">\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/security\/dn440717\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-190\" src=\"http:\/\/conference.hitb.org\/hitbsecconf2017ams\/wp-content\/uploads\/2014\/06\/msft-logo-new-300x72.png\" alt=\"msft-logo-new\" width=\"367\" height=\"88\" \/><\/a><\/h1>\n<ul style=\"text-align: justify;\">\n<li>\n<div>\n<p>The MSRC works with partners and security researchers around the world to help prevent security incidents and to advance Microsoft product security.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h2>Polyswarm<\/h2>\n<h1>\u00a0<a href=\"https:\/\/polyswarm.io\/howitworks\/index.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4931\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2018\/03\/polyswarm-logo-purple-300x51.png\" alt=\"\" width=\"383\" height=\"65\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-300x51.png 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-768x131.png 768w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-212x36.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-400x68.png 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-355x60.png 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-306x52.png 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-642x109.png 642w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-352x60.png 352w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-499x85.png 499w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-734x125.png 734w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-675x115.png 675w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-793x135.png 793w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple-852x145.png 852w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/polyswarm-logo-purple.png 881w\" sizes=\"(max-width: 383px) 100vw, 383px\" \/><\/a><\/h1>\n<ul>\n<li>\n<div>\n<p>\u00a0The PolySwarm ecosystem incentivizes what matters most: quality output of malintent detection. It rewards honest market participation through collection and distribution of fees to value-adding, active security experts. The PolySwarm market runs on Nectar, a token that will make it easy to submit and classify potential threats on the PolySwarm market. Nectar replaces traditional lump anti-virus and threat scanning subscription payments that are inefficiently distributed to a single vendor that doesn\u2019t cover your variety of threats well.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h1 id=\"silver\" style=\"text-align: center;\"><strong>Silver Sponsors<\/strong><\/h1>\n<h2>Google<\/h2>\n<p><a href=\"http:\/\/goo.gl\/A60Oi3\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1075\" src=\"http:\/\/conference.hitb.org\/hitbsecconf2017ams\/wp-content\/uploads\/2015\/03\/Logo_Google_2013_Official.svg_-e1426122190709-300x103.png\" alt=\"Logo_Google_2013_Official.svg\" width=\"233\" height=\"80\" \/><\/a><\/p>\n<ul>\n<li>\n<div>\n<p>Information Security Engineering is a global organization responsible for Product Security and all-around hacking: breaking and fixing Google\u2019s code, providing security reviews and advice to engineers working on thousands of different projects, working with third-party vendors to help Google outsource business functions securely, and carrying out\u00a0<a href=\"http:\/\/www.google.com\/about\/appsecurity\/research\" target=\"_blank\" rel=\"noopener noreferrer\">cutting-edge security research<\/a>. Our mission is to keep Google\u2019s millions of users safe and secure.<\/p>\n<p>We work on a stunning array of different technologies: everything from hardware up through the software stack, including numerous different languages and frameworks.\u00a0 The organization is made up of various sub teams or focus areas: API and framework Hardening, Red Team, Security Education, Security Test Engineering, Third Party Security, and Security Reviews.<\/p>\n<p>We are part of the broader software engineering organization at Google, and work closely with other engineers to help them produce more secure code. We perform security reviews for thousands of product launches every year. In addition, the ISE Red Team handles a large volume of Third Party Vendor and Acquisition reviews annually.\u00a0 We also work on diverse software engineering projects, from creating robust sandboxes for untrusted code, Web application scanning and testing tools, through fuzzers, or tools for detecting attacks.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h2><\/h2>\n<h2>Beyond Security<\/h2>\n<p><a href=\"http:\/\/www.beyondsecurity.com\/ssd.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3930\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2016\/05\/beyond-security.png\" alt=\"\" width=\"204\" height=\"141\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security.png 290w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-212x146.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-273x188.png 273w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-87x60.png 87w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-123x85.png 123w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-181x125.png 181w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-167x115.png 167w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-196x135.png 196w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/05\/beyond-security-210x145.png 210w\" sizes=\"(max-width: 204px) 100vw, 204px\" \/><\/a><\/p>\n<ul>\n<li>\n<div>\n<p>Beyond Security\u2019s SecuriTeam Secure Disclosure (SSD) can help you turn your experience uncovering security vulnerabilities into a highly paid career. SSD was designed by researchers for researchers and will give you the fast response and great support you need to make top dollar for your discoveries. We work with some of the brightest and most highly compensated people in the security industry and can help you advance your game \u2013 regardless of whether you are a beginner or have been discovering security issues for years.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\">Applied Risk<\/h2>\n<p style=\"padding-left: 30px; text-align: justify;\"><a href=\"https:\/\/applied-risk.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3880 size-full\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2017\/11\/applied-risk.jpg\" alt=\"\" width=\"206\" height=\"100\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/11\/applied-risk.jpg 206w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/11\/applied-risk-124x60.jpg 124w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/11\/applied-risk-175x85.jpg 175w\" sizes=\"(max-width: 206px) 100vw, 206px\" \/><\/a><\/p>\n<ul>\n<li>Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat. Operating on a global scale, we work with a wealth of large organisations that rely on our expertise to safeguard their critical assets. Our proven experience of identifying vulnerabilities and security risks is based on methodologies honed over years of conducting assessments in industrial environments.<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">Our engineering experience and cyber security knowledge proves invaluable in securing the critical infrastructures and industrial assets of companies across the globe. We understand the need to maintain secure and reliable control environments, working across a range of industries we deliver solutions tailored to asset owners\u2019 and manufacturers\u2019 security requirements.<\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/applied-risk.com\/solutions\/products\/ics-cyber-security-awareness-training\">Industrial Control Systems (ICS) security<\/a><b><\/b> is an engineering-based problem that requires an engineering-focused solution. Our offerings includes a wealth of engineering and technical assurance services, combined with comprehensive security assessments that cover the full spectrum of our client\u2019s critical asset requirements while meeting industry standards.<\/p>\n<h2>Facebook<\/h2>\n<p><a href=\" https:\/\/www.facebook.com\/BugBounty\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4101\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2016\/03\/Facebook-06-2015-White-on-Blue.jpg\" alt=\"\" width=\"279\" height=\"98\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue.jpg 350w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-300x105.jpg 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-212x75.jpg 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-306x108.jpg 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-171x60.jpg 171w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-242x85.jpg 242w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/Facebook-06-2015-White-on-Blue-327x115.jpg 327w\" sizes=\"(max-width: 279px) 100vw, 279px\" \/><\/a><\/p>\n<ul>\n<li>Facebook&#8217;s mission is to give people the power to build community and bring the world closer together. Our journey is only 1% done.Our security team are focused on making Facebook a safe and secure place for the 2 billion people on our service to connect and share with each other. We&#8217;re fortunate to have some of the brightest security minds at Facebook, and they are working around the clock to help protect people&#8217;s Facebook accounts.<\/li>\n<\/ul>\n<h1 id=\"commsec\" style=\"text-align: center;\"><strong>CommSec Track Sponsor<\/strong><\/h1>\n<h2 style=\"text-align: justify;\">NIXU<\/h2>\n<p><a href=\"http:\/\/nixu.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1921\" src=\"http:\/\/conference.hitb.org\/hitbsecconf2017ams\/wp-content\/uploads\/2016\/03\/Nixu_CyberSecurity_logo_2014-300x104.jpg\" alt=\"Nixu_CyberSecurity_logo_2014\" width=\"254\" height=\"88\" \/><\/a><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<div>\n<p>Nixu provides cybersecurity consultancy and \u2013services to help organizations identify and mitigate the risks of digitally connecting people, information, production, business and devices whilst complying with the applicable regulations.<\/p>\n<p>Our consultants offer their unique knowledge and international experience to customers in nearly every industry, and share their newly acquired knowledge and insights \u2013as far as confidentiality permits- with the global community of cyber security professionals that Nixu is a part of.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h1 id=\"ctf\" style=\"text-align: center;\"><strong>CTF Main Sponsor<\/strong><\/h1>\n<h2><strong>xen1thLabs<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5556 size-medium\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png\" alt=\"\" width=\"300\" height=\"42\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-768x109.png 768w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-212x30.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-400x57.png 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-355x50.png 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-306x43.png 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-642x91.png 642w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-978x138.png 978w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-424x60.png 424w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-600x85.png 600w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-883x125.png 883w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-812x115.png 812w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-953x135.png 953w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul>\n<li><strong>xen1thLabs<\/strong>\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\">S-Unit<\/h2>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.the-s-unit.nl\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1640\" src=\"http:\/\/conference.hitb.org\/hitbsecconf2017ams\/wp-content\/uploads\/2016\/01\/the-s-unit1.jpeg\" alt=\"the-s-unit\" width=\"216\" height=\"65\" \/><\/a><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<div>\n<p style=\"text-align: justify;\">The S-Unit is uw offensieve partner op het gebied van Security. Wij kunnen u vertellen waar u kwetsbaar bent en doen dit graag v\u00f3\u00f3rdat u er last van heeft.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h1 id=\"ctf\" style=\"text-align: center;\"><strong>CTF Prize Sponsor<\/strong><\/h1>\n<h2><strong>xen1thLabs<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5556 size-medium\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png\" alt=\"\" width=\"300\" height=\"42\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-768x109.png 768w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-212x30.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-400x57.png 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-355x50.png 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-306x43.png 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-642x91.png 642w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-978x138.png 978w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-424x60.png 424w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-600x85.png 600w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-883x125.png 883w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-812x115.png 812w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-953x135.png 953w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul>\n<li><strong>xen1thLabs<\/strong>\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today.<\/li>\n<\/ul>\n<h1 id=\"silver\" style=\"text-align: center;\"><strong>Bronze Sponsors<\/strong><\/h1>\n<h2>Zerodium<\/h2>\n<p><a href=\"http:\/\/zerodium.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3892\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2016\/03\/zerodiumlogo.png\" alt=\"\" width=\"240\" height=\"60\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/zerodiumlogo.png 240w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2016\/03\/zerodiumlogo-212x53.png 212w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/a><\/p>\n<ul>\n<li>\n<div>\n<p>ZERODIUM is a privately held and venture backed cybersecurity company with operations in North America, Europe, and MEA. ZERODIUM was founded by cybersecurity veterans with unparalleled experience in advanced vulnerability research and active cyber defense. ZERODIUM is a privately held and venture backed cybersecurity company with operations in North America, Europe, and MEA. ZERODIUM was founded by cybersecurity veterans with unparalleled experience in advanced vulnerability research and active cyber defense.<\/p>\n<p>We\u2019ve created ZERODIUM to build a global community of talented and independent security researchers working together to provide the most up-to-date source of cybersecurity research and capabilities. ZERODIUM rewards independent researchers for their zero-day discoveries and then analyzes, documents, and reports all acquired security information, along with protective measures and security recommendations, to its clients as part of the ZERODIUM Security Research Feed (Z-SRF).<\/p>\n<p>For more information about our corporate solutions and our tailored capabilities for governments, please <a href=\"https:\/\/www.zerodium.com\/contact.html\">contact us<\/a>. Access to ZERODIUM solutions and capabilities is highly restricted.<\/p>\n<\/div>\n<p>&nbsp;<\/li>\n<\/ul>\n<h2>Secura<\/h2>\n<p><a href=\"https:\/\/www.secura.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4658 size-medium\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2018\/03\/Secura_logo-300x71.jpg\" alt=\"\" width=\"300\" height=\"71\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-300x71.jpg 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-212x50.jpg 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-400x94.jpg 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-355x84.jpg 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-306x72.jpg 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-254x60.jpg 254w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo-360x85.jpg 360w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/Secura_logo.jpg 424w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>\n<div>\n<p>Established in 2000 in the Netherlands, Secura is an independent, specialised security expert with offices in Eindhoven and Amsterdam. Our service lines are: Advisory &amp; Audit, Security Testing (including penetration testing, Red Teaming and source code reviews), Certification Services and Training &amp; Awareness.<\/p>\n<p>We help our clients take control of their digital security and are fully privately owned and not a reseller of any products or services, giving us the independence we require to provide our customers with high-value recommendations and knowledge transfer.<\/p>\n<\/div>\n<h2><\/h2>\n<\/li>\n<\/ul>\n<h2>Blue Frost Security<\/h2>\n<p><a href=\"https:\/\/www.bluefrostsecurity.de\/en\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4922\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2018\/03\/Logo_Bluefrostsecurity_block_4c.png\" alt=\"\" width=\"199\" height=\"68\" \/><\/a><\/p>\n<ul>\n<li>\n<div>Blue Frost Security is an independent provider of high qualified consulting services in the field of IT Security. Through intensive research, we ensure the continuous training of our <a href=\"https:\/\/www.bluefrostsecurity.de\/en\/about-us.html\">employees<\/a> and use the results to protect our customers from tomorrow\u2019s threats. With our <a href=\"https:\/\/www.bluefrostsecurity.de\/en\/services\/\">services<\/a>, we take a holistic approach. We provide professional services on multi-vendor platforms in the field of IT Security. The range of services covers the entire chain of assessments, audits and analysis to evaluate the need to protect our customers\u2019 core data and improve their IT security.<\/div>\n<\/li>\n<\/ul>\n<h1 id=\"ctf\" style=\"text-align: center;\"><strong>Post Conference Party Sponsors<\/strong><\/h1>\n<h2>JD.com<\/h2>\n<p><a href=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2017\/04\/DM-LOGO-634x135.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4697 size-medium\" src=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/2\/2018\/03\/JD-logo-300x78.png\" alt=\"\" width=\"300\" height=\"78\" srcset=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-300x78.png 300w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-768x200.png 768w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-1024x267.png 1024w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-212x55.png 212w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-400x104.png 400w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-355x92.png 355w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-306x80.png 306w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-642x167.png 642w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-978x255.png 978w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-231x60.png 231w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-327x85.png 327w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-480x125.png 480w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-442x115.png 442w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-519x135.png 519w, https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2018\/03\/JD-logo-557x145.png 557w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>\n<div>\n<p style=\"text-align: justify;\">JD.com, Inc. (Nasdaq: JD) is China&#8217;s largest B2C online retailer and the world&#8217;s third largest Internet company by revenue. It has been listed at Nasdaq Stock Market since May, 2014. The business involves e-commerce, finance and logistics.<\/p>\n<p style=\"text-align: justify;\">It is a technology-driven company which has launched its own standard technology-development strategy against the background of &#8220;The 4th Retail Industry Revolution&#8221;. As information security plays a fundamental role to support the retail business operation, the information security department of JD.com has invested a lot of resources in technology research and development to ensure the security of the information assets for customers, suppliers and JD itself.<\/p>\n<p style=\"text-align: justify;\">Vigorously advancing comprehensive technology, such as artificial intelligence, big data and robotics automation, JD.com has gone through the technology innovations and business operation improvements over the past ten years. Facing the opportunity and challenge of AI security, loT security and cloud security, JD Security actively introduced talents in internet security, conducted prospective technical researches, founded a R&amp;D Centre and a security and anti-attack laboratory in Silicon Valley and expanded in-depth cooperation with world-widely famous universities and research institutes in AI security.<\/p>\n<p style=\"text-align: justify;\">With a neutral, open and win-win mind, JD.com not only practices the responsibility of enterprise safety, but also advances internet security with the internet companies, universities and government to boost the internet development.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Platinum Sponsors xen1thLabs xen1thLabs\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today. Gold Sponsors Microsoft \u00a0 The [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1943","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sponsors - HITBSecConf2020 - Singapore<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sponsors - HITBSecConf2020 - Singapore\" \/>\n<meta property=\"og:description\" content=\"Platinum Sponsors xen1thLabs xen1thLabs\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today. Gold Sponsors Microsoft \u00a0 The [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2020 - Singapore\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-13T17:10:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/\",\"name\":\"Sponsors - HITBSecConf2020 - Singapore\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png\",\"datePublished\":\"2016-03-10T12:08:33+00:00\",\"dateModified\":\"2020-01-13T17:10:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png\",\"width\":1024,\"height\":145},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sponsors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/\",\"name\":\"HITBSecConf2020 - Singapore\",\"description\":\"HITBSecConf Returns to Asia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sponsors - HITBSecConf2020 - Singapore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/","og_locale":"en_US","og_type":"article","og_title":"Sponsors - HITBSecConf2020 - Singapore","og_description":"Platinum Sponsors xen1thLabs xen1thLabs\u00a0conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication signals. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. xen1thLabs is committed to uncovering new vulnerabilities that combat tomorrow\u2019s threats today. Gold Sponsors Microsoft \u00a0 The [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/","og_site_name":"HITBSecConf2020 - Singapore","article_modified_time":"2020-01-13T17:10:28+00:00","og_image":[{"url":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/","name":"Sponsors - HITBSecConf2020 - Singapore","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1-300x42.png","datePublished":"2016-03-10T12:08:33+00:00","dateModified":"2020-01-13T17:10:28+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-content\/uploads\/sites\/10\/2017\/02\/xen1thLabs-1024x145-1.png","width":1024,"height":145},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/sponsors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/"},{"@type":"ListItem","position":2,"name":"Sponsors"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/","name":"HITBSecConf2020 - Singapore","description":"HITBSecConf Returns to Asia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/pages\/1943"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/comments?post=1943"}],"version-history":[{"count":26,"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/pages\/1943\/revisions"}],"predecessor-version":[{"id":5558,"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/pages\/1943\/revisions\/5558"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2020sin\/wp-json\/wp\/v2\/media?parent=1943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}