̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

BabelStreet-microsite-logo.png
Babel Street

Babel Street Law Enforcement Webinar


Event Date: July 10, 2025
Hosted By: Babel Street & ̽»¨ÊÓÆµ

In this session, Brittany Mason, Director of Partner Enablement at Babel Street introduced the Babel Street Law Enforcement Bundle, an affordably packaged solution specifically designed to meet the unique needs of law enforcement. Attendees were provided comprehensive demonstrations of Babel Street Insights and Secure Access, highlighting their individual capabilities and demonstrating how their combined power can elevate your investigative efforts.

The webinar dived into practical applications that showcased essential OSINT tradecraft through example use cases such as combating illicit drug activity and enhancing event and executive protection.

During this webinar, attendees learned:

  • How to streamline investigative workflows for increased efficiency.
  • Leverage real-time open-source data to accelerate and enhance investigations.
  • How to protect user identity and organizational networks through robust managed attribution.
  • Ways to utilize proven OSINT tradecraft to effectively address critical law enforcement challenges.

Fill out the form below to view this archived event.


Resources


Defend Developers and Applications at the Perimeter of the Open-Source Ecosystem and the Tools Used to Build Source Code
Resources

Defend Developers and Applications at the Perimeter of the Open-Source Ecosystem and the Tools Used to Build Source Code

Developers are responsible for innovation, have the AWS, SSH and GPG keys, often the signing keys, and unfettered access to build infrastructure and source code version control systems. These are the new keys to the kingdom. Learn how Phylum protect developers and applications from software supply chain risks and attacks.


Fill out the form below to view this Resource.