Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue.

Agenda

5:30 PM-6:30 PM Registration

6:35 PM-6:40 PM Welcome & introduction

Hosts: Frederic Rivain, CTO, Dashlane & Joanna Chen, CISO, Dashlane

6:40 PM-7:10 PM Session 1 | The invisible key: Securing the new attack vector of OAuth tokens

OAuth tokens are the new crown jewels. Once issued, they bypass MFA and give API-level access that is hard to monitor. The opaque nature of their use and the difficulty in monitoring their activity create a dangerous blind spot for security teams, making them a primary target for attackers.

This presentation will delve into the lifecycle of OAuth tokens, explore real-world attack vectors, and provide actionable strategies for protecting these high-value assets. We will also review the tactics, techniques, and procedures (TTPs) of notorious gangs like ShinyHunters and Scattered Spider, as demonstrated in the 2025 Salesforce attacks.

Speaker: Gianluca Varisco, CEO, Netsec (ex-Principal Security Architect, Google Cloud)

7:10 PM-7:40 PM Session 2 | From “I Am Not a Robot” to Verifiable Humans

Speaker: Adam Surak, Senior Director of Engineering, Tools for Humanity

7:40 PM-9:00 PM Happy hour & networking

Meet the speaker

Gianluca Varisco
CEO, Netsec (ex-Principal Security Architect, Google Cloud)
Gianluca is the former CISO of Rocket Internet, where he oversaw IT infrastructure and cybersecurity for companies with over EUR 2B in revenue. He later led national security efforts for Italy’s Digital Transformation Team, served as CISO of Arduino, and, most recently, was Principal Security Architect and public spokesperson for Google Cloud. He recently started Netsec, a cybersecurity and managed IT services provider dedicated to protecting businesses from digital threats.


+
Adam Surak
Senior Director of Engineering, Tools for Humanity
Adam was the former Head of Platform at BeReal and VP of Infrastructure & Security at Algolia. He currently serves as the Senior Director of Engineering at Tools for Humanity, where he focuses on building, running, scaling, and securing systems that support millions of concurrent users—and saving millions of euros in the process.


+
John Smith
Founder at Company
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse quis sem nec magna pretium fringilla eget ac felis. Curabitur ullamcorper dolor non nibh vehicula aliquet. Mauris tempus placerat venenatis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Sed eget ultricies ante, vulputate lacinia nibh. Sed ac metus in nisi molestie placerat. Fusce quis convallis nulla. Fusce eget nibh porttitor, iaculis lacus sed, cursus magna. Morbi sodales ultricies mi in sagittis. Phasellus luctus justo vitae arcu imperdiet, eget suscipit leo hendrerit. Sed ultrices fermentum congue. Curabitur a nunc non nibh tempus aliquam. Nam eu enim id erat pretium venenatis quis eget arcu. Duis tempor velit tellus, vitae pulvinar lectus aliquet id. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris tincidunt sagittis suscipit

+
John Smith
Founder at Company
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse quis sem nec magna pretium fringilla eget ac felis. Curabitur ullamcorper dolor non nibh vehicula aliquet. Mauris tempus placerat venenatis. Interdum et malesuada fames ac ante ipsum primis in faucibus. Sed eget ultricies ante, vulputate lacinia nibh. Sed ac metus in nisi molestie placerat. Fusce quis convallis nulla. Fusce eget nibh porttitor, iaculis lacus sed, cursus magna. Morbi sodales ultricies mi in sagittis. Phasellus luctus justo vitae arcu imperdiet, eget suscipit leo hendrerit. Sed ultrices fermentum congue. Curabitur a nunc non nibh tempus aliquam. Nam eu enim id erat pretium venenatis quis eget arcu. Duis tempor velit tellus, vitae pulvinar lectus aliquet id. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris tincidunt sagittis suscipit

+

Check out more resources from Dashlane

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Three Col Image

Webinars & events

Attend digital events and view other recordings, including product demos.

Three Col Image

Success stories

Hear from real-life IT leaders about how they leveled up their organization's security.

Three Col Image

Why Dashlane

Discover how Dashlane can help you close your company’s credential security gap.

Phishing 101: A six-step action plan

When it comes to phishing initiatives, creating awareness with fear tactics often makes employees annoyed at your IT team—or worse,resentful.

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.
  • Lorem ipsum dolor sit amet, consectetur adipiscing elit.

7 ways to improve employee onboarding and offboarding

In the digital workplace, organizations regularly need to provide employees with access to dozens of tools—and revoke that access for former employees. But many don’t have effective employee onboarding and offboarding processes, resulting in lower productivity and higher security risks.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore lorem ipsum loren amet magna aliqua.

I always shock people when I tell them the best tool you can have is a human-first mindset.

Naya Moss

Founder, Frauvis

Agenda

5:30 PM-6:30 PM Registration

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
6:35 PM-6:40 PM Welcome & introduction

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
6:40 PM-7:10 PM Session 1 | TBD

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
7:10 PM-7:40 PM Session 2 | TBD

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
7:40 PM-9 PM Happy hour & networking

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+
Lorem ipsum dolor sit amet?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.

+

Can’t make it to Paris? Join us on Zoom.

You’ll enjoy the same discussions and insights from the comfort of your own office.

E-Book

Lorem Ipsum Dolor Sit Amet

What Do You Get With Dashlane?

Easy-to-deploy business protection

From making the most of your trial to integrating with your SSO provider to rolling Dashlane out to your entire company, we’re here to help you every step of the way.

Tab Image

Tab One

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Tab Two

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Tab Three

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

2 layers of protection

Continuously scan 20+ billion records attached to hacks and breaches.

Tab Image

Early warnings and risk mitigation

Continuously scan 20+ billion records attached to hacks and breaches.