Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue.

Agenda

5:00 PM-5:45 PM Registration

5:50 PM-6:00 PM Welcome & introduction

Host: Frederic Rivain, CTO, Dashlane

6:00 PM-6:30 PM
Session 1 | Securing general consumer AI task agents

We will look at what it takes to secure arbitrary task execution. Many of these problems are not fully solved, so we will describe techniques we are deploying in consumer Copilot for mitigating prompt injection, securing infrastructure, and build trust incrementally with the user. Some of this is "traditional" security, but much of it veers towards things you'd want to trust another person: judgment, social intelligence, and other attributes.

Speaker: Umesh Shankar, Corporate VP,  Microsoft AI

6:30 PM-7:00 PM
Session 2 | Credential theft is no longer the biggest threat

Auth is (mostly) a solved problem. With standards like FIDO2/WebAuthn and the introduction of passkeys, auth has become almost phishing-resistant. Attackers recognize this and are adapting to other attack methods like malicious OAuth apps and browser extensions. This session will walk through how to apply security frameworks that already exist to think about these emerging surface areas and show a demo of exactly how hard it is to detect and respond to a malicious OAuth app.

Speaker: Rajan Kapoor, VP of Security, Material Security

7:00 PM-8:00 PM Happy hour & networking

Meet the speakers

Umesh Shankar
Corporate VP, Microsoft AI
Umesh Shankar is a Corporate VP in Microsoft AI, focused on building systems to ensure privacy in the age of AI. He was previously a Distinguished Engineer at Google and Chief Technologist for Google Cloud Security, working on cross-cutting initiatives such as the application of AI to security and securing AI. Before that, Umesh started the Data Protection effort at Google, building foundational security and privacy infrastructure that keeps user data safe across all Google’s products.

Umesh has a Ph.D. in computer science from the University of California, Berkeley, and an A.B. from Harvard University. He is a soccer player, mixologist, clarinetist, husband, and dad to three boys.


+
Rajan Kapoor
VP of Security, Material Security
Rajan is the VP of Security at Material Security. With over 20 years of experience in cybersecurity, privacy, and information technology, Rajan has held technical roles across various industries, including tech, finance, media, advertising, consulting, and political risk. Before joining Material Security, Rajan was a Director of Security Dropbox, where he led the Data Security, Account Security, and Technical Program Manager Security teams.

+
John Smith
Founder at Company
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse quis sem nec magna pretium fringilla eget ac felis. Curabitur ullamcorper dolor non nibh vehicula aliquet. Mauris tempus placerat venenatis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Sed eget ultricies ante, vulputate lacinia nibh. Sed ac metus in nisi molestie placerat. Fusce quis convallis nulla. Fusce eget nibh porttitor, iaculis lacus sed, cursus magna. Morbi sodales ultricies mi in sagittis. Phasellus luctus justo vitae arcu imperdiet, eget suscipit leo hendrerit. Sed ultrices fermentum congue. Curabitur a nunc non nibh tempus aliquam. Nam eu enim id erat pretium venenatis quis eget arcu. Duis tempor velit tellus, vitae pulvinar lectus aliquet id. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris tincidunt sagittis suscipit

+
John Smith
Founder at Company
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse quis sem nec magna pretium fringilla eget ac felis. Curabitur ullamcorper dolor non nibh vehicula aliquet. Mauris tempus placerat venenatis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Sed eget ultricies ante, vulputate lacinia nibh. Sed ac metus in nisi molestie placerat. Fusce quis convallis nulla. Fusce eget nibh porttitor, iaculis lacus sed, cursus magna. Morbi sodales ultricies mi in sagittis. Phasellus luctus justo vitae arcu imperdiet, eget suscipit leo hendrerit. Sed ultrices fermentum congue. Curabitur a nunc non nibh tempus aliquam. Nam eu enim id erat pretium venenatis quis eget arcu. Duis tempor velit tellus, vitae pulvinar lectus aliquet id. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris tincidunt sagittis suscipit

+

Check out more resources from Dashlane

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Three Col Image

Webinars & events

Attend digital events and view other recordings, including product demos.

Three Col Image

Success stories

Hear from real-life IT leaders about how they leveled up their organization's security.

Three Col Image

Why Dashlane

Discover how Dashlane can help you close your company’s credential security gap.

Phishing 101: A six-step action plan

When it comes to phishing initiatives, creating awareness with fear tactics often makes employees annoyed at your IT team—or worse,resentful.

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.

7 ways to improve employee onboarding and offboarding

In the digital workplace, organizations regularly need to provide employees with access to dozens of tools—and revoke that access for former employees. But many don’t have effective employee onboarding and offboarding processes, resulting in lower productivity and higher security risks.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore lorem ipsum loren amet magna aliqua.

I always shock people when I tell them the best tool you can have is a human-first mindset.

Naya Moss

Founder, Frauvis

Agenda

5:30 PM-6:30 PM Registration

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
6:35 PM-6:40 PM Welcome & introduction

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
6:40 PM-7:10 PM Session 1 | TBD

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
7:10 PM-7:40 PM Session 2 | TBD

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
7:40 PM-9 PM Happy hour & networking

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+

Can’t make it to NYC? Join us on Zoom.

You’ll enjoy the same discussions and insights from the comfort of your own office.

E-Book

Lorem Ipsum Dolor Sit Amet

What Do You Get With Dashlane?

Easy-to-deploy business protection

From making the most of your trial to integrating with your SSO provider to rolling Dashlane out to your entire company, we’re here to help you every step of the way.

Tab Image

Tab One

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Tab Two

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Tab Three

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.