Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Theos CyberNova. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Theos CyberNova or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Mick Moran: CSAM as the Insider Threat Missing from Your Playbook

40:52
 
Share
 

Manage episode 505827308 series 3637932
Content provided by Theos CyberNova. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Theos CyberNova or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Disclaimer: This episode discusses child sexual abuse material (CSAM) and includes references that some listeners may find distressing.
For Mick Moran, child sexual abuse material (CSAM) is not just a law enforcement issue; it is a cybersecurity blind spot. As CEO of the Irish Internet Hotline and a former INTERPOL Assistant Director, he argues that every CISO needs to know how to detect CSAM, what to do if it surfaces, and how to protect both staff and reputation.
Through wargames at the Council of Europe, Mick shows how easily organisations falter without a CSAM policy: HR rushing to dismiss, legal silenced by uncertainty, and security teams exposing staff to trauma. He connects these lessons to Asia Pacific, where remote abuse and sextortion networks highlight the urgent need for corporate readiness.
This is not a topic widely discussed in cybersecurity circles, but it is one every CISO must factor into their playbook. Detection, wargaming, reporting, and welfare cannot be ignored.

Production Credits:

Presented by: Paul Jackson
Studio Engineer & Editor: Roy D'Monte
Executive Producers: Paul Jackson and Ian Carless
Co-produced by: Theos Cyber and W4 Podcast Studio

  continue reading

Chapters

1. Introduction to CSAM as Cybersecurity Threat (00:00:00)

2. Understanding CSAM: Definition and Impact (00:08:04)

3. Corporate Risk and Reputational Damage (00:16:31)

4. Trauma and Welfare in Investigations (00:21:40)

5. Creating Effective CSAM Response Policies (00:30:11)

6. AI-Generated CSAM and Future Challenges (00:35:01)

19 episodes

Artwork
iconShare
 
Manage episode 505827308 series 3637932
Content provided by Theos CyberNova. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Theos CyberNova or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Disclaimer: This episode discusses child sexual abuse material (CSAM) and includes references that some listeners may find distressing.
For Mick Moran, child sexual abuse material (CSAM) is not just a law enforcement issue; it is a cybersecurity blind spot. As CEO of the Irish Internet Hotline and a former INTERPOL Assistant Director, he argues that every CISO needs to know how to detect CSAM, what to do if it surfaces, and how to protect both staff and reputation.
Through wargames at the Council of Europe, Mick shows how easily organisations falter without a CSAM policy: HR rushing to dismiss, legal silenced by uncertainty, and security teams exposing staff to trauma. He connects these lessons to Asia Pacific, where remote abuse and sextortion networks highlight the urgent need for corporate readiness.
This is not a topic widely discussed in cybersecurity circles, but it is one every CISO must factor into their playbook. Detection, wargaming, reporting, and welfare cannot be ignored.

Production Credits:

Presented by: Paul Jackson
Studio Engineer & Editor: Roy D'Monte
Executive Producers: Paul Jackson and Ian Carless
Co-produced by: Theos Cyber and W4 Podcast Studio

  continue reading

Chapters

1. Introduction to CSAM as Cybersecurity Threat (00:00:00)

2. Understanding CSAM: Definition and Impact (00:08:04)

3. Corporate Risk and Reputational Damage (00:16:31)

4. Trauma and Welfare in Investigations (00:21:40)

5. Creating Effective CSAM Response Policies (00:30:11)

6. AI-Generated CSAM and Future Challenges (00:35:01)

19 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play