October 30th, 2025 | 6:30 PM–9 PM CET
Dashlane Paris Office, 21 rue Pierre Picard, 75018 Paris
Join us to:
In this e-book, discover:
Lorem ipsum dolor sit amet
5:30 PM-6:30 PM | Registration |
6:35 PM-6:40 PM | Welcome & introduction Hosts: Frederic Rivain, CTO, Dashlane & Joanna Chen, CISO, Dashlane |
6:40 PM-7:10 PM | Session 1 | The invisible key: Securing the new attack vector of OAuth tokens OAuth tokens are the new crown jewels. Once issued, they bypass MFA and give API-level access that is hard to monitor. The opaque nature of their use and the difficulty in monitoring their activity create a dangerous blind spot for security teams, making them a primary target for attackers. This presentation will delve into the lifecycle of OAuth tokens, explore real-world attack vectors, and provide actionable strategies for protecting these high-value assets. We will also review the tactics, techniques, and procedures (TTPs) of notorious gangs like ShinyHunters and Scattered Spider, as demonstrated in the 2025 Salesforce attacks. Speaker: Gianluca Varisco, CEO, Netsec (ex-Principal Security Architect, Google Cloud) |
7:10 PM-7:40 PM | Session 2 | From “I Am Not a Robot” to Verifiable Humans Speaker: Adam Surak, Senior Director of Engineering, Tools for Humanity |
7:40 PM-9:00 PM | Happy hour & networking |
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Attend digital events and view other recordings, including product demos.
Hear from real-life IT leaders about how they leveled up their organization's security.
Discover how Dashlane can help you close your company’s credential security gap.
When it comes to phishing initiatives, creating awareness with fear tactics often makes employees annoyed at your IT team—or worse,resentful.
In the digital workplace, organizations regularly need to provide employees with access to dozens of tools—and revoke that access for former employees. But many don’t have effective employee onboarding and offboarding processes, resulting in lower productivity and higher security risks.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore lorem ipsum loren amet magna aliqua.
I always shock people when I tell them the best tool you can have is a human-first mindset.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim.
You’ll enjoy the same discussions and insights from the comfort of your own office.
From making the most of your trial to integrating with your SSO provider to rolling Dashlane out to your entire company, we’re here to help you every step of the way.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.
Continuously scan 20+ billion records attached to hacks and breaches.