Videos & Webinars
Past Webinars
How can you and your company stay safe whilst working from home?
Loic Castel, our pentest team leader, will present the case study of a real cyber-attack that took place during containment, how the quarantine situation contributed to it (or even caused it) and the measures you can apply now to ensure the security of your business while working from home.
Overview
- Case study of a proven intrusion during lockdown
- 5 remediation steps to apply now
Securing Remote Workers Through PKI
Join one of our most trusted partners, Sectigo, as PKI experts Jason Soroko and Tim Callan discuss the effects of the current pandemic on IT operations and the key role PKI can play in securing this new environment.
Overview
- What risks you potentially face from malicious actors
- How PKI can help secure your remote workforce
- Audience questions answered by the hosts
Social Engineering – When fishers meet COVID-19
In this webinar, our pentest team leader, Loïc Castel, will present a real case of a phishing attempt organized and carried out by his team. 30% of the recipients fell into the trap so book your seat now to find out what Loïc and his team did, how they did it and what measures you can take to protect you.
Overview
- Real case of a phishing attempt
- Measures you can take to protect you
Red team – tools & methodology: How I met your most sensitive data
During 'Red team – tools & methodology – How I met your most sensitive data' our pentest team leader will explain how Red Team services are conducted and how they can help identify vulnerabilities in your security.
Overview
- Red team methodology (Discovery, External, Physical, Persistence, etc.)
- Live demonstration of red team tools
Incident Response #2: How to detect and identify the threat
Incident Response #2: How to detect and identify the threat - developing upon the first webinar, we focus closely on how threats can be detected and categorised.
Overview
- Common methodologies and tools to trace & catch a threat, featuring case studies of real-life examples.
- Best practices and tips to make this phase easier.
Incident Response: When You're Hacked
'Incident Response - what to do when you've been hacked' - the webinar discusses the immediate steps you can take in the event of an attack and how to prepare for such an attack, ensuring damage to compromised systems is minimised.
Overview
- An introduction to common IT security threats (phishing, server compromising, global network compromising) and how these situations can manifest.
- Best reaction if your assets have been compromised or when there is a doubt.
Agile vs Standard Pentetration Testing
Penetration testing is an important process for an organisation looking to audit their security processes and ensure their systems are secure. Find our more in our exclusive webinar.
Overview
- What is agile penetration testing and how it compares to a standard test
- How SSL247 plans to introduce agile penetration testing into our services.
- Q&A session with Loic Castel, our pentest team leader
Live Hacking of IoT Devices
A live-hacking demonstration of medical IoT devices performed by one of our CREST accredited registered testers, Loic Castel. Innovations in IoT have taken great strides to improve user experience, but to what extent can the security of these devices be compromised and what steps can be taken to secure them?
Overview
- Our approach to discovering and exploiting security flaws on IoT devices
- Live-hacking demonstrations and explanations of the impact
- Conclusion and proposals on how secure an IoT should be in the future
Browse Videos
Video

The Fundamentals of Social Engineering
Our certified Lead Penetration Tester explains the fundamentals of Social Engineering, with real life examples and information on how to protect your business from hacking attempts.
ViewVideo

Video presentation of SSL247®
Find out more about what we do, our products and services at SSL247® and how we can help you with your organisation's security needs, whatever they may be.
ViewVideo

About SSL247®
SSL247 Sales Director Timothée Brogniart and Digital Project Manager Rosanna discuss taking control of your web and cyber security to increase customer trust and drive sales and revenue.
ViewVideo

Penetration Testing & Security Audit Services
Loïc Castel, our certified Lead Penetration Tester explains the different types of penetration tests, security audits and vulnerability assessments performed by his team.
View