What we do
Our mission is to empower individuals and businesses to thrive in the new digital security age.
We believe that every organisation can achieve an acceptable level of cyber risk by adopting pragmatic and proven security practices, as long as they are driven by an overall Strategic Cyber Programme. Practical steps instead of silver bullets.
We work with Insurance Firms in Hong Kong to ensure readiness against the IA Guideline on Cybersecurity.
We help Businesses build a solid foundation of cybersecurity to protect their businesses and be more attractive in the eyes of their investors, prospective partners, and clients.
We provide Organizations with a clear snapshot of the effectiveness of their current cybesecurity measures and their preparedness in managing cyber risks.
Security & Risk Management
- Cyber Maturity Assessment
- IT Risk Assessment
- InfoSec Policies Development
- Privacy Assessment
- GDPR Compliance
- Architecture Roadmaps & Blueprints
- Extended Perimeter Defences: Network, Cloud, Web, Email, DDOS. WAF
- Endpoint Protection
- OS Hardening
Cyber Threat Management
- Incident Response Planning Playbooks Development
- Vulnerability Management
- Penetration Testing
- Threat Detection & Response
We are a true Security Team
We were the internal security team of a regulated Asian Fintech company, and we recognised the opportunity to leverage our learnings and skillset to help other organisations that are going through the same pain points we have been going through.
CSO & Founder
Alex is responsible for the strategy and direction of Theos as well as the company’s financial and management operations. He has more than 15 years of experience as an Information Security professional, having previously worked as the CISO of an Asian Fintech company.
Security and Risk Management Consultant
Kristine is responsible for managing Theos’ Security & Risk Management consulting and operations. She has more than 6 years of experience in compliance and security industries, helping corporate companies get certified and compliant with field-proven standards and frameworks.
Application Security Consultant
Peter is responsible for overseeing Theos’ Application Security Practice. He previously worked as a Web Application Security Tester at HP Fortify, Penetration Tester at Trustwave, and Application Security Lead at several startup companies in the blockchain and fintech industries.
Infrastructure and Network Services Consultant
Recelio oversees Theos' overall IT Infrastructure. He makes sure that all tools, apps, and IT devices run properly and are configured correctly and securely. He has over 10 years of experience working on Large Enterprises IT Infrastructure deployments for multinatiomal firms including Accenture, Sitel, Reed Elsevier, and Essilor.
Felix has a double Master's degree in Security and Innovation & Transformation. He conducts research on Threat Intelligence, Cyber Adversaries and their Tools, Tactics and Procedures. With a solid understanding on the adversary landscape and a problem solving mindset, he assesses threats and attack vectors and then works towards forward-looking solutions to mitigate risks and increase cyber resiliency.
Endpoint Security Consultant
With over 20 years of IT Security experience including tenures at McAfee and TrendMicro, Fred comes with invaluable knowledge on helping enterprises secure their endpoints and come up with effective Incident Response plans and processes. He specializes in Endpoint Security, Threat and Incident Response and Malware forensics.
Practice Lead - Cyber Threat Management
Jayson leads the Cyber Threat Management practice for Theos. He is a seasoned security professional with over 10 years of experience in the IT Security industry. He has pioneered and built security teams during his time as a Managing Consultant for Trustwave Spiderlabs and HP Fortify on Demand. He has been a security consultant for several enterprise companies including Fortune 500 companies.
Build security on solid foundations to efficiently protect what matters most
Pragmatic solutions that combine proven practices with the insights of global security experts