Episodios

  • Bill Marczak: Mobile Phone Espionage, Zero-Click Attacks, and Invisible Threats
    Jan 17 2026

    f your phone were compromised, would you even know?

    Most cybersecurity defenses are built to stop loud, disruptive attacks like ransomware. But the most serious threats to mobile devices often look very different. They are expensive, targeted, and designed for espionage rather than disruption.

    In this episode of THEOS Cybernova, host Paul Jackson speaks with Bill Marczak, a senior cybersecurity researcher at the University of Toronto’s Citizen Lab, about the realities of mobile phone espionage. They explore why smartphones have become a platform of choice for spying, how attacks can remain invisible to the user, and what makes mobile threats fundamentally different from traditional cybercrime.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    34 m
  • Steve Santorelli: Trust, Community, and the Reality of Cybercrime Investigation
    Jan 9 2026

    What really happens when a cyberattack becomes a criminal investigation?

    In this episode of THEOS Cybernova, Paul Jackson speaks with Steve Santorelli, formerly of Scotland Yard, whose career spans Microsoft’s Internet Crimes Investigation Team and Team Cymru.

    They explore how cybercrime investigations succeed in the real world: why trust and community matter as much as technical skill, how speed determines whether evidence survives, and why cyber threat intelligence only creates impact when it can be acted on. The conversation also looks at cross-border investigations, collaboration between law enforcement and industry, and the role of trusted forums like RISE in turning intelligence into outcomes.

    A grounded discussion on cybercrime investigation and the human relationships behind effective action.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    34 m
  • James McLeary: When a Nation-State Attack Tests a CISO
    Jan 2 2026

    What do you do when a nation-state attack hits just days into a new CISO role and it’s already Friday?

    In this episode of THEOS Cybernova, James McLeary shares real-world lessons from leading a live cyber incident response under intense pressure. From coordinating multiple DF/IR firms to fast-tracking procurement in Asia, this conversation reveals what cyber readiness really looks like when theory disappears.

    A candid discussion on incident response, leadership, and resilience when it matters most.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    36 m
  • Geert Baudewijns: Inside Ransomware Negotiations and the Ethics of Paying
    Dec 19 2025

    What really happens when a company negotiates with ransomware groups?

    In this episode of THEOS Cybernova, Paul Jackson speaks with Geert Baudewijns, founder of Secutec and a veteran ransomware negotiator with over 500 real-world cases. Geert explains how ransomware negotiations actually work, from verifying stolen data and confirming the real threat actor to understanding payment dynamics and insurance involvement.

    He challenges common myths, including whether attackers remain inside networks after encryption and why some victims end up paying the wrong criminal group. A practical, experience-led look at ransomware negotiation grounded in real incidents, essential for security leaders and incident response teams.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    39 m
  • Cathy Chan: Post-Quantum Security and the Shift Toward Crypto-Agility
    Dec 12 2025

    Quantum computing is moving from theory to reality, and with it comes a fundamental shift in how organizations must protect long-lived and sensitive data.

    In this episode, Cathy Chan from Cyberforce explains what Q-Day really means, why “harvest now, decrypt later” is already a live threat, and how enterprises can build crypto-agility before post-quantum standards fully enforce.

    Clear, practical, and free from hype, this conversation gives security leaders a grounded view of quantum risk, emerging cryptographic changes, and the essential steps to begin preparing today with confidence.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    29 m
  • Jussi Aittola: The Truth Behind Crypto Recovery, Scams and Nation-State Attacks
    Dec 5 2025

    What if stolen crypto is not gone forever? In this week's Cybernova episode, Paul Jackson speaks with Jussi Aittola, Senior Partner and Country Head at Sphere State Group in Singapore, about the real mechanics of modern crypto crime, from industrial romance-investment scams to a 20 million dollar wallet breach linked to a nation state.

    Jussi explains why crypto recovery is more possible than most assume and how bridges, mixers and automated laundering scripts still leave a trail for skilled investigators.

    A sharp and eye opening look at digital asset investigations for cybersecurity and DF/IR teams across APAC.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    42 m
  • Carolyn Bigg: Navigating China Data, Cyber and AI Laws
    Sep 22 2025

    From incident response to red teaming, many global teams touch systems and data in China without realising the legal tripwires. In this live CIO Summit conversation, THEOS Cyber CEO Paul Jackson speaks with DLA Piper’s Carolyn Bigg about the realities of operating in China’s data and cyber landscape. Topics include why consent is foundational, why remote access counts as a cross-border transfer, volume thresholds that trigger filings or approvals, and new breach notification measures with four-hour reporting for higher-severity incidents and mandatory 30-day remediation reporting. They also cover local technical standards beyond ISO 27001, provincial CAC dynamics, operational risks such as license exposure, and the unique AI environment in China where toolsets, policy aims, and threat models differ from the West. A clear, practical primer for CISOs, legal, and operations leaders who need to plan before the crisis.

    Disclaimer: This episode provides general information. It is not intended to be, and should not be used as, a substitute for taking legal advice in any specific situation. Organisations should consult counsel for guidance.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    39 m
  • Mick Moran: CSAM as the Insider Threat Missing from Your Playbook
    Sep 12 2025

    Disclaimer: This episode discusses child sexual abuse material (CSAM) and includes references that some listeners may find distressing.

    For Mick Moran, child sexual abuse material (CSAM) is not just a law enforcement issue; it is a cybersecurity blind spot. As CEO of the Irish Internet Hotline and a former INTERPOL Assistant Director, he argues that every CISO needs to know how to detect CSAM, what to do if it surfaces, and how to protect both staff and reputation.

    Through wargames at the Council of Europe, Mick shows how easily organisations falter without a CSAM policy: HR rushing to dismiss, legal silenced by uncertainty, and security teams exposing staff to trauma. He connects these lessons to Asia Pacific, where remote abuse and sextortion networks highlight the urgent need for corporate readiness.

    This is not a topic widely discussed in cybersecurity circles, but it is one every CISO must factor into their playbook. Detection, wargaming, reporting, and welfare cannot be ignored.

    Production Credits:

    Presented by: Paul Jackson
    Studio Engineer & Editor: Manny Peñamora
    Executive Producers: Paul Jackson and Ian Carless
    Co-produced by: Theos Cyber and W4 Podcast Studio

    Más Menos
    41 m