Creating a culture of cybersecurity
November 8, 2022
Confidential Information 2
A conversation with
Frederic Rivain
Chief Technology Officer
Dashlane
Confidential Information 3
Agenda
1. Welcome!
2. The cybersecurity landscape
3. It’s all about people
4. Cybersecurity doesn’t have to be difficult
5. Q&A and wrapping up
Confidential Information 4
Welcome!
Frederic Rivain, Chief Technology Officer
Confidential Information 5
The cybersecurity landscape
Confidential Information 6
Let’s face it…
Threats are everywhere, and
cybercriminals are notoriously adaptable.
Passwords are the path of least resistance
for cybercriminals, whether you’re a large
enterprise company, a small business, or a
nonprofit organization.
Change is the only constant when it comes
to cybercriminals. But a password
management system can help.
Confidential Information 7
Password quiz
What percent of people reuse passwords?
A. 23%
B. 44%
C. 63%
D. 72%
Confidential Information 8
Password quiz
How many people admitted to reusing
passwords from their personal accounts for
their work accounts?
A. 13%
B. 22%
C. 34%
D. 50%
Confidential Information 9
The metrics speak for themselves
In 2022, 82% of
breaches involved
the human element.
63% of people
reuse passwords
for other accounts.
22% of workers
admitted to reusing
passwords from their
personal accounts for
their work accounts.
Confidential Information 10
Passwords + sticky notes =
a disaster waiting to happen
In 2018, Hawaii’s Emergency Management Agency
accidentally broadcasted a false missile warning to
islanders, blaming it on an employee who pushed
the wrong button.
Shortly after, however, a newspaper photo came to
light. It showed one of the company’s operations
officers and a sticky note with a legible password in
the background.
There’s no evidence that the photographed
password contributed to the missile alert, but the
agency’s reputation suffered, and its security
practices came into question.
41%
of individuals write
down their passwords
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION
SECURITY BEHAVIORS REPORT,” PONEMON
Confidential Information 11
Recent breaches with big impacts,
from big brands to nonprofits
Server or
cybersecurity
breach that could
have been prevented
by building a culture
of cybersecurity
Confidential Information 12
Data breach quiz
What percent of successful data breaches
do you think involve stolen or compromised
passwords?
A. 27%
B. 39%
C. 54%
D. 81%
Confidential Information 13
Why you need a password manager
Shared networks and cloud computing are
becoming the standard
Databases are rich with a donor’s PII
information
High turnover and volunteer-based support
lead to poor password health
Board members are taking cybersecurity
more seriously
Password managers help you stay secure and
focus on your #1 priority: your mission
81%
of successful data
breaches involve stolen or
compromised passwords
SOURCE: Verizon DBIR, 2019
Confidential Information 14
It’s all about people
Confidential Information 15
For employees, managing logins for
a multitude of accounts or donors can be
agonizing.
It’s understandable why many will turn to
unsecured methods just to get it over with.
Confidential Information 16
Common password pitfalls
Sharing logins among colleagues in
unsecured ways
Using weak, easy-to-hack passwords
Storing passwords in web browsers, sticky
notes, Excel, Google Sheets & Docs, etc.
Reusing personal usernames and
passwords for business
Confidential Information 17
Password managers
help improve security
—without disrupting
the work day.
Confidential Information 18
Employees want to be part
of the solution
Help them understand their impact
Educate them on best practices
Give them tools to make it easy
79%
of respondents said they take
some personal responsibility for
the organization’s overall security
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS
REPORT,” PONEMON
Confidential Information 19
Password manager must-haves
Simple & easy to use
A password manager that’s simple for
admins and employees to use will
greatly improve adoption rates.
Convenient
Features such as autofill and syncing
across devices aren’t just
convenient—they increase productivity.
Robust security
Look for a password manager that has a
strong track record of security.
SSO integration
Many organizations adopt SSO for better,
safer sharing capabilities.
Dark web monitoring
Make sure the password manager monitors
the criminal underground for your logins and
immediately alerts you to change your
impacted passwords.
Password health
Look for password health features to help
employees understand their habits while
helping admins uncover gaps and take
corrective measures.
Confidential Information 20
Worry less about password hygiene. And
focus more on creating meaningful
connections with donors, volunteers, and
partners.
Confidential Information 21
Building a culture of security
doesn’t have to be difficult
Confidential Information 22
Acceptance Continuance
Adoption
3 steps to creating a culture of security
Step 1: Step 2: Step 3:
Confidential Information 23
Adoption
Ensuring the adoption of a password manager
among the existing people at the organization by
communicating the value to the mission.
Step 1:
Confidential Information 24
Acceptance
Onboard anyone new to the organization
immediately to the password manager to ensure
password health in the organization remains strong.
Remember, it only takes one compromised login to start a
breach, just like Hawaii’s Emergency Management Agency!
Step 2:
Confidential Information 25
Continuance
Monitor organizational health by utilizing Dark Web
Monitoring and Password Health scores for optimal
protection and success of your mission.
Step 3:
Confidential Information 26
Case study:
How NETA gained total password protection
& gave clients and employees peace of mind
In 2020, more people were working virtually than ever, and
security risks were at an all-time high for every organization.
NETA was no exception. Operating across multiple states,
NETA’s employees rely on a hybrid working environment, and
the organization constantly monitors its domain for threats.
While some applications that NETA relies upon require
stronger passwords, their leadership needed to see which
passwords were being reused and how they were being shared.
● Increased its company-wide Password Health
score from 70 to 86 in just three months.
● Ensures that important data is always shared
privately and securely and that authorized
employees can get the access they need
when they need it— even if the original
account owner is out of office.
● Uses unique passwords everywhere and
decreased their fear of breaches. NETA’s
clients and employees can rest assured that
information is always safe and secure.
Source: NETA Case Study
With Dashlane, NETA:
Confidential Information 27
Case study:
How VillageReach built a culture of
cybersecurity with Dashlane
VillageReach is a nonprofit with an inspiring mission to drive
equity and bring scalable, sustainable healthcare solutions to
rural areas in low-income countries.
Dashlane’s impact was felt immediately. Today, the
organization’s password health has improved by 122%, and it
continues to climb thanks to secure password sharing.
In addition to achieving those goals, implementing Dashlane
helped VillageReach foster a culture of security awareness.
d.
With Dashlane, VillageReach:
● Has more time to focus on their mission while
hands-off security monitoring secures their
tech stack
● Identified and cleaned up weak spots in their
password hygiene that posed a threat to their
donor database.
● Changed the way the entire organization
thinks about security—using Dashlane to
springboard into security awareness and
making security everyone’s responsibility
Source: VillageReach Case Study
Confidential Information 28
Wrapping up
Confidential Information 29
Securing your mission has never been
easier—and Dashlane can help!
Confidential Information 30
Take the next step today
Confidential Information 31
Q&A
Confidential Information 32
Thank you!
You have any follow-up questions about this webinar, or your plan and its features, you can email us at
community_success@dashlane.com.
For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our
Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
Copyright © 2022 Dashlane

More Related Content

PDF
Protect Your Firm: Knowledge, Process, Policy and Action
PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PPTX
Strengthening Data Rooms Amidst Rising Cyber Threats
PPTX
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
PPTX
BU-Security-Camp-2020-Guidepoint.pptx
PDF
Protecting the Core of Your Network
PDF
Cal cpa meeting infosec challenge - 160511
PDF
Measures to Avoid Cyber-attacks
Protect Your Firm: Knowledge, Process, Policy and Action
Data Protection - Safeguarding Your Business in the Digital Age.pdf
Strengthening Data Rooms Amidst Rising Cyber Threats
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
BU-Security-Camp-2020-Guidepoint.pptx
Protecting the Core of Your Network
Cal cpa meeting infosec challenge - 160511
Measures to Avoid Cyber-attacks

Similar to Creating a culture of security.pdf (20)

PDF
Measure To Avoid Cyber Attacks
PDF
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
PPTX
Microsoft DATA Protection To Put secure.
PDF
BLACKOPS_USCS CyberSecurity Literacy
PPTX
How to assess your Cybersecurity Vulnerability_.pptx
PDF
How to assess your Cybersecurity Vulnerability_.pdf
PDF
Information Security Analyst Resume. When seeking
PPTX
6 Biggest Cyber Security Risks and How You Can Fight Back
PDF
Cultivate a stronger corporate culture to enhance cybersecurity
PDF
Common Cybersecurity Mistakes
PPTX
CyberSecurity Services and Why Cybersecurity is required
PPTX
5 Security Tips to Protect Your Login Credentials and More
PDF
6 Ways to Fight the Data Loss Gremlins
PDF
Responding to a Data Breach, Communications Guidelines for Merchants
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PDF
Azure Security.pdf
PPTX
Continuing Education Conferance
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Measure To Avoid Cyber Attacks
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Microsoft DATA Protection To Put secure.
BLACKOPS_USCS CyberSecurity Literacy
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pdf
Information Security Analyst Resume. When seeking
6 Biggest Cyber Security Risks and How You Can Fight Back
Cultivate a stronger corporate culture to enhance cybersecurity
Common Cybersecurity Mistakes
CyberSecurity Services and Why Cybersecurity is required
5 Security Tips to Protect Your Login Credentials and More
6 Ways to Fight the Data Loss Gremlins
Responding to a Data Breach, Communications Guidelines for Merchants
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Azure Security.pdf
Continuing Education Conferance
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Ad

More from TechSoup (20)

PDF
Tech Buy-In Starts Here: A CEO’s Guide to Board Engagement .pdf
PDF
The Art of The Possible Building Data Strategy for Greater Mission Impact (A...
PDF
Maximizing Donations with the Right Platform.pdf
PDF
Welcome to TechSoup New Member Orientation 8.13.25.pdf
PDF
Streamlining Nonprofit Website Navigation for Better Engagement.pdf
PDF
Introducing Nanoheal — the Invisible IT Team Member.pdf
PDF
Welcome to TechSoup New Member Orientation 7.16.25.pdf
PDF
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
PDF
Understanding Pastors Payroll for nonprofits.pdf
PDF
TechSoup Presentation - Cyber Risk Management July 9.pdf
PDF
AI-Powered-Visual-Storytelling-for-Nonprofits.pdf
PDF
WIX website Training Material - Material.pdf
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
PDF
Welcome to TechSoup New Member Orientation 6.18.25.pdf
PDF
Educational_ Leveraging Data to Strengthen Nonprofit Impact (1).pdf
PDF
Introduction to Generative AI and Copilot.pdf
PDF
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
PPTX
4 Time-Saving HR Tips—How to Speed Up HR Processes.pptx
PDF
Growth-Driven Design with TechSoup Website Services.pdf
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.05.28.pdf
Tech Buy-In Starts Here: A CEO’s Guide to Board Engagement .pdf
The Art of The Possible Building Data Strategy for Greater Mission Impact (A...
Maximizing Donations with the Right Platform.pdf
Welcome to TechSoup New Member Orientation 8.13.25.pdf
Streamlining Nonprofit Website Navigation for Better Engagement.pdf
Introducing Nanoheal — the Invisible IT Team Member.pdf
Welcome to TechSoup New Member Orientation 7.16.25.pdf
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
Understanding Pastors Payroll for nonprofits.pdf
TechSoup Presentation - Cyber Risk Management July 9.pdf
AI-Powered-Visual-Storytelling-for-Nonprofits.pdf
WIX website Training Material - Material.pdf
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
Welcome to TechSoup New Member Orientation 6.18.25.pdf
Educational_ Leveraging Data to Strengthen Nonprofit Impact (1).pdf
Introduction to Generative AI and Copilot.pdf
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
4 Time-Saving HR Tips—How to Speed Up HR Processes.pptx
Growth-Driven Design with TechSoup Website Services.pdf
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.05.28.pdf
Ad

Recently uploaded (20)

PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
International_Financial_Reporting_Standa.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Compact First Student's Book Cambridge Official
PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
English-bài kiểm tra tiếng anh cơ bản.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
Farming Based Livelihood Systems English Notes
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Civil Department's presentation Your score increases as you pick a category
International_Financial_Reporting_Standa.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Climate Change and Its Global Impact.pptx
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
The TKT Course. Modules 1, 2, 3.for self study
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
plant tissues class 6-7 mcqs chatgpt.pdf
Journal of Dental Science - UDMY (2022).pdf
Laparoscopic Colorectal Surgery at WLH Hospital
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Compact First Student's Book Cambridge Official
Nurlina - Urban Planner Portfolio (english ver)
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
English-bài kiểm tra tiếng anh cơ bản.pdf
Module on health assessment of CHN. pptx
Farming Based Livelihood Systems English Notes

Creating a culture of security.pdf

  • 1. Creating a culture of cybersecurity November 8, 2022
  • 2. Confidential Information 2 A conversation with Frederic Rivain Chief Technology Officer Dashlane
  • 3. Confidential Information 3 Agenda 1. Welcome! 2. The cybersecurity landscape 3. It’s all about people 4. Cybersecurity doesn’t have to be difficult 5. Q&A and wrapping up
  • 4. Confidential Information 4 Welcome! Frederic Rivain, Chief Technology Officer
  • 5. Confidential Information 5 The cybersecurity landscape
  • 6. Confidential Information 6 Let’s face it… Threats are everywhere, and cybercriminals are notoriously adaptable. Passwords are the path of least resistance for cybercriminals, whether you’re a large enterprise company, a small business, or a nonprofit organization. Change is the only constant when it comes to cybercriminals. But a password management system can help.
  • 7. Confidential Information 7 Password quiz What percent of people reuse passwords? A. 23% B. 44% C. 63% D. 72%
  • 8. Confidential Information 8 Password quiz How many people admitted to reusing passwords from their personal accounts for their work accounts? A. 13% B. 22% C. 34% D. 50%
  • 9. Confidential Information 9 The metrics speak for themselves In 2022, 82% of breaches involved the human element. 63% of people reuse passwords for other accounts. 22% of workers admitted to reusing passwords from their personal accounts for their work accounts.
  • 10. Confidential Information 10 Passwords + sticky notes = a disaster waiting to happen In 2018, Hawaii’s Emergency Management Agency accidentally broadcasted a false missile warning to islanders, blaming it on an employee who pushed the wrong button. Shortly after, however, a newspaper photo came to light. It showed one of the company’s operations officers and a sticky note with a legible password in the background. There’s no evidence that the photographed password contributed to the missile alert, but the agency’s reputation suffered, and its security practices came into question. 41% of individuals write down their passwords SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 11. Confidential Information 11 Recent breaches with big impacts, from big brands to nonprofits Server or cybersecurity breach that could have been prevented by building a culture of cybersecurity
  • 12. Confidential Information 12 Data breach quiz What percent of successful data breaches do you think involve stolen or compromised passwords? A. 27% B. 39% C. 54% D. 81%
  • 13. Confidential Information 13 Why you need a password manager Shared networks and cloud computing are becoming the standard Databases are rich with a donor’s PII information High turnover and volunteer-based support lead to poor password health Board members are taking cybersecurity more seriously Password managers help you stay secure and focus on your #1 priority: your mission 81% of successful data breaches involve stolen or compromised passwords SOURCE: Verizon DBIR, 2019
  • 15. Confidential Information 15 For employees, managing logins for a multitude of accounts or donors can be agonizing. It’s understandable why many will turn to unsecured methods just to get it over with.
  • 16. Confidential Information 16 Common password pitfalls Sharing logins among colleagues in unsecured ways Using weak, easy-to-hack passwords Storing passwords in web browsers, sticky notes, Excel, Google Sheets & Docs, etc. Reusing personal usernames and passwords for business
  • 17. Confidential Information 17 Password managers help improve security —without disrupting the work day.
  • 18. Confidential Information 18 Employees want to be part of the solution Help them understand their impact Educate them on best practices Give them tools to make it easy 79% of respondents said they take some personal responsibility for the organization’s overall security SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 19. Confidential Information 19 Password manager must-haves Simple & easy to use A password manager that’s simple for admins and employees to use will greatly improve adoption rates. Convenient Features such as autofill and syncing across devices aren’t just convenient—they increase productivity. Robust security Look for a password manager that has a strong track record of security. SSO integration Many organizations adopt SSO for better, safer sharing capabilities. Dark web monitoring Make sure the password manager monitors the criminal underground for your logins and immediately alerts you to change your impacted passwords. Password health Look for password health features to help employees understand their habits while helping admins uncover gaps and take corrective measures.
  • 20. Confidential Information 20 Worry less about password hygiene. And focus more on creating meaningful connections with donors, volunteers, and partners.
  • 21. Confidential Information 21 Building a culture of security doesn’t have to be difficult
  • 22. Confidential Information 22 Acceptance Continuance Adoption 3 steps to creating a culture of security Step 1: Step 2: Step 3:
  • 23. Confidential Information 23 Adoption Ensuring the adoption of a password manager among the existing people at the organization by communicating the value to the mission. Step 1:
  • 24. Confidential Information 24 Acceptance Onboard anyone new to the organization immediately to the password manager to ensure password health in the organization remains strong. Remember, it only takes one compromised login to start a breach, just like Hawaii’s Emergency Management Agency! Step 2:
  • 25. Confidential Information 25 Continuance Monitor organizational health by utilizing Dark Web Monitoring and Password Health scores for optimal protection and success of your mission. Step 3:
  • 26. Confidential Information 26 Case study: How NETA gained total password protection & gave clients and employees peace of mind In 2020, more people were working virtually than ever, and security risks were at an all-time high for every organization. NETA was no exception. Operating across multiple states, NETA’s employees rely on a hybrid working environment, and the organization constantly monitors its domain for threats. While some applications that NETA relies upon require stronger passwords, their leadership needed to see which passwords were being reused and how they were being shared. ● Increased its company-wide Password Health score from 70 to 86 in just three months. ● Ensures that important data is always shared privately and securely and that authorized employees can get the access they need when they need it— even if the original account owner is out of office. ● Uses unique passwords everywhere and decreased their fear of breaches. NETA’s clients and employees can rest assured that information is always safe and secure. Source: NETA Case Study With Dashlane, NETA:
  • 27. Confidential Information 27 Case study: How VillageReach built a culture of cybersecurity with Dashlane VillageReach is a nonprofit with an inspiring mission to drive equity and bring scalable, sustainable healthcare solutions to rural areas in low-income countries. Dashlane’s impact was felt immediately. Today, the organization’s password health has improved by 122%, and it continues to climb thanks to secure password sharing. In addition to achieving those goals, implementing Dashlane helped VillageReach foster a culture of security awareness. d. With Dashlane, VillageReach: ● Has more time to focus on their mission while hands-off security monitoring secures their tech stack ● Identified and cleaned up weak spots in their password hygiene that posed a threat to their donor database. ● Changed the way the entire organization thinks about security—using Dashlane to springboard into security awareness and making security everyone’s responsibility Source: VillageReach Case Study
  • 29. Confidential Information 29 Securing your mission has never been easier—and Dashlane can help!
  • 30. Confidential Information 30 Take the next step today
  • 32. Confidential Information 32 Thank you! You have any follow-up questions about this webinar, or your plan and its features, you can email us at [email protected]. For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
  • 33. Copyright © 2022 Dashlane