Webinar: Cybersecurity Trends and Predictions

On-Demand Webinar
Next in Cybersecurity:
2022 Predictions 

OPTIONAL EYEBROW

Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.

Smart Spaces separate work & personal accounts

Unlimited devices

Group password sharing

Free personal Premium accounts

Protect your business,empower your employees

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.

eBookA Practical Guide to Info Security

PWMGMT-101-2X-Alpha.png



Cybersecurity is a fast-moving sector, with both hackers and security providers consistently vying to outsmart each other. New threats—and innovative ways to combat them—emerge all the time. This year we witnessed everything from increased ransomware attacks to social engineering trickery to vulnerable IoT devices due to remote work.

In this panel, hear what four cybersecurity leaders think about the state of security in 2021, what they predict is coming in 2022, and—most importantly—how we can all prepare for future challenges.

Fill out this form to
watch the webinar.

Protect your business,empower your employees

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt

Protect your business

Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.



Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.

Lorem ipsum dolor sit amet, consectetur adipiscing elit,

Lorem ipsum dolor sit amet, consectetur adipiscing elit,

Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut

About our speakers

Rachel Tobac

Rachel is a hacker and the CEO of SocialProof Security where she helps people and companies keep their data safe by training and pentesting them on social engineering risks. Rachel has shared her real-life social engineering stories with NPR, Last Week Tonight with John Oliver, The New York Times, Business Insider, CNN, NBC Nightly News with Lester Holt, Forbes and many more.

Maggie MacAlpine

Maggie is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of ten years spent in the field, MacAlpine has been a contributing researcher on the “Security Analysis of the Estonian Internet Voting System” in partnership with the University of Michigan, co-author of the DEF CON Voting Village annual reports, and appeared in the HBO documentary “Kill Chain”.

Camille Stewart

Camille is an industry-recognized, cybersecurity leader with experience building programs & solutions to address complex technology, cyber, and national security, and foreign policy challenges across the public and private sectors. Named the Global Head of Product Security Strategy at Google she leads federated security for the company.

Alyssa Miller

Alyssa is a hacker, security researcher, advocate, and international public speaker with over 15 years of experience in cyber security. She believes that in today’s inter-connected world, protecting privacy and building trust with secure systems are critical to protecting our way of life. As a result, she discusses real-world issues that affect people both within and outside the security community.

The only U.S.-patented password manager


Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.

The only U.S.-patented password manager


Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.

The only U.S.-patented password manager


Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.

Frequently
Asked
Questions

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eget semper dolor. Vestibulum congue auctor mi in tincidunt. Nullam volutpat mauris at massa auctor, ac auctor arcu lobortis. Integer urna turpis, pulvinar pellentesque aliquet eget, ullamcorper non magna. Cras quis orci eu ex vehicula pharetra eu eu eros. Nunc augue ante, ultricies quis luctus vitae, porta euismod ligula. Nullam maximus ante justo, non ornare ante gravida quis. Cras vulputate tellus quam. Duis eget risus vulputate est faucibus scelerisque. Fusce sit amet justo sollicitudin, suscipit ex ac, commodo tortor. In purus nulla, molestie ac molestie nec, semper quis felis.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eget semper dolor. Vestibulum congue auctor mi in tincidunt. Nullam volutpat mauris at massa auctor, ac auctor arcu lobortis. Integer urna turpis, pulvinar pellentesque aliquet eget, ullamcorper non magna. Cras quis orci eu ex vehicula pharetra eu eu eros. Nunc augue ante, ultricies quis luctus vitae, porta euismod ligula. Nullam maximus ante justo, non ornare ante gravida quis. Cras vulputate tellus quam. Duis eget risus vulputate est faucibus scelerisque. Fusce sit amet justo sollicitudin, suscipit ex ac, commodo tortor. In purus nulla, molestie ac molestie nec, semper quis felis.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eget semper dolor. Vestibulum congue auctor mi in tincidunt. Nullam volutpat mauris at massa auctor, ac auctor arcu lobortis. Integer urna turpis, pulvinar pellentesque aliquet eget, ullamcorper non magna. Cras quis orci eu ex vehicula pharetra eu eu eros. Nunc augue ante, ultricies quis luctus vitae, porta euismod ligula. Nullam maximus ante justo, non ornare ante gravida quis. Cras vulputate tellus quam. Duis eget risus vulputate est faucibus scelerisque. Fusce sit amet justo sollicitudin, suscipit ex ac, commodo tortor. In purus nulla, molestie ac molestie nec, semper quis felis.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eget semper dolor. Vestibulum congue auctor mi in tincidunt. Nullam volutpat mauris at massa auctor, ac auctor arcu lobortis. Integer urna turpis, pulvinar pellentesque aliquet eget, ullamcorper non magna. Cras quis orci eu ex vehicula pharetra eu eu eros. Nunc augue ante, ultricies quis luctus vitae, porta euismod ligula. Nullam maximus ante justo, non ornare ante gravida quis. Cras vulputate tellus quam. Duis eget risus vulputate est faucibus scelerisque. Fusce sit amet justo sollicitudin, suscipit ex ac, commodo tortor. In purus nulla, molestie ac molestie nec, semper quis felis.