Hi [[ session.user.profile.firstName ]]

What is the Price of Employee Loyalty?

What is the Price of Employee Loyalty? - and how can you mitigate the risk of theft using steganography?
Recorded Jun 20 2019 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Stevenson
Presentation preview: What is the Price of Employee Loyalty?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Steps to a Clean Cloud Recorded: Nov 13 2019 35 mins
    John Stevenson, Head of Content and Communications, Deep Secure Ltd.
    How to Stop Document-Based Malware Infecting your Workflows and Applications

    The essential everyday business requirement of receiving documents via the cloud from un-trusted sources opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.

    These documents contain malware specifically designed to bypass Web Application Firewalls (WAFs), AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 13th November, join Deep Secure’s Head of Content & Communications John Stevenson – a 25 year veteran of the cyber security industry - and learn the steps to take to ensure documents arriving via the cloud are free of document-based malware. You’ll find out:

    • Why your Web Application Firewall (WAF) can’t protect you from file-based malware

    • How to design-in “zero trust security” into your cloud-based portals and workflows

    • Why As-a-Service threat removal is the most effective way of eliminating the threat

    You’ll also get to see just how one of the most common and notorious pieces of malware on the planet can escape detection and walk right through conventional defences AND what you can do about it.
  • Protecting Web Users from Document Malware Recorded: Oct 9 2019 38 mins
    John Stevenson, Head of Content and Communications, Deep Secure Ltd.
    About this webinar

    The essential everyday act of downloading business information – documents and images – from the internet provides attackers with an ideal threat channel and a vector by which they can steal a user’s credentials and/or compromise the endpoint device to gain access to the corporate network.

    Downloaded documents contain malware specifically designed to bypass Secure Web Gateways, Firewalls, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.
    On 9th October, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    • That the bad guys keep winning - 90% of unknown, undetected malware is delivered via the web. (Source SANS Institute)
    • Why detection-based anti-malware can’t cope with the threat
    • How Deep Secure’s zero trust technology ensures downloaded documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • 3 Steps to a Clean Cloud Recorded: Sep 25 2019 36 mins
    John Stevenson, Head of Content and Communications, Deep Secure Ltd.
    How to Stop Document-Based Malware

    The essential everyday business requirement of receiving documents via the cloud from un-trusted sources opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.

    These documents contain malware specifically designed to bypass Web Application Firewalls (WAFs), AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 25th September, join Deep Secure’s Head of Content & Communications John Stevenson – a 25 year veteran of the cyber security industry - and learn the steps to take to ensure documents arriving via the cloud are free of document-based malware. You’ll find out:

    • Why your Web Application Firewall (WAF) can’t protect you from file-based malware

    • How to design-in “zero trust security” into your cloud-based portals and workflows

    • Why As-a-Service threat removal is the most effective way of eliminating the threat

    You’ll also get to see just how one of the most common and notorious pieces of malware on the planet can escape detection and walk right through conventional defences AND what you can do about it.
  • Protecting your Portal from File-based Malware Recorded: Aug 21 2019 32 mins
    John Stevenson
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Protecting Web Users from File-based Malware Recorded: Jul 24 2019 31 mins
    John Stevenson, Head of Content and Communications, Deep Secure Ltd.
    John Stevenson will explore the threats posed by file-based malware delivered over the Web and look at some best practices for combating it. Join us as we cover:

    - The problem with content
    - Why anti-virus is failing
    - Some best practices techniques
    - Taking a zero trust approach to the problem

    John Stevenson is a 25 year veteran of the cyber security industry. Working as a journalist, presenter, trainer and marketeer he focuses on helping organisations find innovative solutions to complex security problems.
  • What is the Price of Employee Loyalty? Recorded: Jun 20 2019 25 mins
    John Stevenson
    What is the Price of Employee Loyalty? - and how can you mitigate the risk of theft using steganography?
  • Best Practices for Ensuring Threat-free Digital Content in the Cloud Recorded: May 14 2019 24 mins
    John Stevenson & Rebecca Hibberd
    Best Practices for Ensuring Threat-free Digital Content in the Cloud
  • Eliminating Content Threats from Applications and Workflows Recorded: Apr 16 2019 23 mins
    John Stevenson and Rebecca Hibberd
    •Learn how Deep Secure Content Threat Removal as a Service (CTRaaS) delivers 100% threat-free digital content - eliminating the threats AV cannot even see – with no scanning, no sandboxing and no waiting!
    •Understand how it is accessed via cloud APIs specifically designed to make it easy to integrate with your applications and workflows.
  • Why Detection Doesn't Work Recorded: Mar 5 2019 29 mins
    Rebecca Hibberd, Aaron Mulgrew and John Stevenson
    See for yourself how easy it is to penetrate any cyber security defence that relies on detection based anti-virus tools.
  • How to Eliminate Zero Day Threats in Web Content Recorded: Feb 27 2019 30 mins
    Rebecca Hibberd and John Stevenson
    Discover how you can eliminate zero-day threats in Web content. By adding Deep Secure to an existing McAfee Web Gateway the organisation’s Web users can enjoy 100% threat-free digital content.
  • How to Eliminate Zero Day Threats in Web Content Recorded: Feb 5 2019 21 mins
    John Stevenson and Rebecca Hibberd
    with Deep Secure and McAfee
Securing Digital Content
100% “threat free” assurance for all your content… no loss, no fail, no evasion.
Our ground-breaking Content Threat Removal Platform creates secure zones around key parts of a business, or the entire organisation to ensure protection from zero-day threats, sophisticated ransomware, polymorphic or steganography attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What is the Price of Employee Loyalty?
  • Live at: Jun 20 2019 10:00 am
  • Presented by: John Stevenson
  • From:
Your email has been sent.
or close