APRIL 14th, 2026 | 5 PM–8 PM EDT
Dashlane NYC Office, 44 W. 18th Street, 4th FL, New York, NY
Join us to:

In this e-book, discover:
Lorem ipsum dolor sit amet
| 5:00 PM-5:45 PM | Registration |
| 5:50 PM-6:00 PM | Welcome & introduction Host: Frederic Rivain, CTO, Dashlane |
| 6:00 PM-6:30 PM |
Session 1 | Securing general consumer AI task agents
We will look at what it takes to secure arbitrary task execution. Many of these problems are not fully solved, so we will describe techniques we are deploying in consumer Copilot for mitigating prompt injection, securing infrastructure, and build trust incrementally with the user. Some of this is "traditional" security, but much of it veers towards things you'd want to trust another person: judgment, social intelligence, and other attributes.
Speaker: Umesh Shankar, Corporate VP, Microsoft AI |
| 6:30 PM-7:00 PM |
Session 2 | Credential theft is no longer the biggest threat
Auth is (mostly) a solved problem. With standards like FIDO2/WebAuthn and the introduction of passkeys, auth has become almost phishing-resistant. Attackers recognize this and are adapting to other attack methods like malicious OAuth apps and browser extensions. This session will walk through how to apply security frameworks that already exist to think about these emerging surface areas and show a demo of exactly how hard it is to detect and respond to a malicious OAuth app. Speaker: Rajan Kapoor, VP of Security, Material Security |
| 7:00 PM-8:00 PM | Happy hour & networking |


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Attend digital events and view other recordings, including product demos.
Hear from real-life IT leaders about how they leveled up their organization's security.
Discover how Dashlane can help you close your company’s credential security gap.
When it comes to phishing initiatives, creating awareness with fear tactics often makes employees annoyed at your IT team—or worse,resentful.
In the digital workplace, organizations regularly need to provide employees with access to dozens of tools—and revoke that access for former employees. But many don’t have effective employee onboarding and offboarding processes, resulting in lower productivity and higher security risks.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore lorem ipsum loren amet magna aliqua.
I always shock people when I tell them the best tool you can have is a human-first mindset.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
You’ll enjoy the same discussions and insights from the comfort of your own office.
From making the most of your trial to integrating with your SSO provider to rolling Dashlane out to your entire company, we’re here to help you every step of the way.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.