Date: January 22nd, 2025
Time: 1:00 PM ET
Most hacking-related breaches are caused by weak, stolen, or reused passwords, and the financial impact can be tremendous.
Join Dashlane experts to learn about: | |
✅ | The security risks associated with poor credential hygiene |
✅ | Security challenges that IT leaders face |
✅ | How to save time, reduce costs, streamline security, and improve overall security posture with a credential manager |
Jon Cho brings 20 years of experience in product management and business development at tech companies ranging from startups to public companies. He has a Bachelor of Science degree in mechanical engineering, a Master’s in engineering management, and an MBA. He grew up in San Francisco and lives in the Bay Area with his family.
Rachael Stockton has more than 25 years of product management and marketing experience in tech and cybersecurity. She has led product marketing teams at RSA (EMC), LogMeIn, Transmit Security, and Akamai to successfully build, launch, and grow solutions across the product lifecycle. She is also the lead inventor of two patents around distributed encryption solutions.
Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.
Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.
Dashlane uses a patented security architecture and AES 256-bit encryption, the strongest method available, to keep your info safe. Two-factor authentication is built into Dashlane by design, and we’re compatible with your favorite mobile authenticator apps or U2F keys.