When ransomware becomes realThepreviousnewsletterissuefocusedonwhatremainscontrollablewhenacriticaldependencybecomesunsafe.Thisissuemoves onelayerclosertotheorganisationitself:whenpressureisrising,whatmattersjustasmuchiswhoisactuallyallowedtoact beforefullcertaintyexists.TherecentChipSoftransomwareincidentmadethatdependencyquestionveryconcreteforhealthcare leaders.Whenatrustedsupplierrouteisrestricted,systemsaredisconnectedasaprecaution,orpatient-facingservicesare temporarilyunavailable,theissuequicklymovesbeyondtechnology.Itbecomesaquestionofauthority:whoisallowedtodecide what must be narrowed, paused, isolated, or kept running while the facts are still incomplete?The Odido case adds another layer to that same question.There,servicesremainedavailable,buttrustdidnotsimplyreturnbecausethenetworkkeptworking.Customershadtocheck whethertheirdetailswerepartofthestolendataset,remainalerttoconvincingphishingattempts,anddealwiththeuncertainty that personal data may continue to create risk long after the incident itself has moved out of the headlines.That is why the first hour matters beyond the first hour.Whenidentity,access,customerdataordependencyroutesbecomeuncertain,delayedcontainmentdoesnotonlycreatetechnical exposure. It can create a longer trust problem for the people outside the organisation as well.Victimsrarelydescriberansomwareasacleantechnicalevent.Theydescribepowerlessness,disruption,andalongpersonal aftershock.InDutchreporting,onevictimsaidit“feltlikearobbery”,anotherdescribedthelingeringshockmonthslater,and another spoke of customers literally arriving at the door with clubs after operations had collapsed.Incriticalenvironments,theconsequencescanextendevenfurther.IntheUK,theSynnovisransomwareattacklaterbecame linkedtoapatientdeathafterdisruptiontopathologyservicesanddelaysinobtainingvitaltestresultswereidentifiedas contributingfactors.Thatmattersnotonlybecauseofthevictim,butbecauseeverysuchincidentalsoleavesafamily,acareteam, and a leadership team carrying consequences that cannot be undone.That is the part many organisations still underestimate: the human cost often begins while the incident is still unfolding.The first hour is not mainly technicalA live ransomware incident quickly stops feeling like a systems problem and starts becoming a governance burden.Experiencedleadersareforcedtomakehigh-impactdecisionswithoutfullcertainty.Teamslosesleep.Confidencebeginstocrack, andeveryunansweredquestionaddsweight.Thefearisnolongeronlythattheattackhappened,butthatthenextdecisionmay either contain the damage — or deepen it.Thisiswherepowerlessness,guilt,second-guessing,andthelongeraftershockoftenbegin.Notaftertheincident,butinthemiddle of it — when responsibility is high, facts are incomplete, and control starts to feel fragile.Not whether an alert fired.Not whether the SOC saw something unusual.Not whether a playbook exists somewhere.But who is allowed to act while the facts are still incomplete.•Who is allowed to isolate systems? •Who is allowed to revoke access? •Who is allowed to shut down services or force degraded operations? •Who is allowed to override business owners if delay increases the blast radius? •What level of uncertainty is enough to trigger action? •Which actions are pre-agreed, and which still need permission? That is the real middle of the incident.And it is where many mature organisations still struggle.
Newsletter #3 - 14 May 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF file
- ONE LESSON - If authority is not pre-agreed, the first hour is negotiated — not governed.
Why the first hour becomes a governance problem long before it becomes a recovery exercise.
The First Hour:Who Is Allowed to Act?
Why organisations still lose the first hourMost cyber discussions begin in the wrong place.They begin with recovery, with restoration, with lessons learned afterward.But for the people inside a live ransomware incident, the first hour is rarely defined by recovery.It is defined by authority.Who has the right to act?Who can make the call?Who can move before every fact is known?That is where many organisations lose time they can no longer afford to lose.Not because nobody noticed the incident.But because action was not pre-agreed.Inmanyenvironments,awarenessarrivesbeforecontroldoes.Therealtestiswhetheracrediblesignalcantriggerasafemove quickly enough to matter.Why so many organisations are still not readyResearchcommissionedbytheUKHomeOfficefoundthatmanyransomwarevictimshadlittleawarenessoftherisksandimpacts beforetheirattack,wereunpreparedforthescaleandsophisticationofwhatfollowed,andwereoftenunclearonthekeysteps neededtomitigateransomware.Thesameresearchalsofoundthatveryfeworganisationsdescribedhavingabusinesscontinuity plan specific to cyber or ransomware.Thatshouldconcernleaders.Becausewherethereisnoclear,testedpath,peopleareleftcarryingmorethandisruption:theycarry uncertainty, pressure, second-guessing, and often guilt about the decisions made under incomplete trust.Abusinesscontinuityplancanreducethatburden—butonlyifithasbeenpressure-testedwellenoughtoremainusefulwhenthe incident is live, the facts are incomplete, and authority has to translate into action.A plan on paper is not the same as control under pressure.
- BOARD QUESTION - Have we pre-agreed who can make the first containment move before full certainty exists?
Investment is not executable controlManyorganisationshaveinvestedheavilyinprevention,detection,monitoring,backup,andresponsereadiness.Andstill,mature environmentsshouldassumethatacrediblesignalmayonedayarrivedespiteallofthat—notbecausetheorganisationwas careless, but because prevention lowers the chance of an incident; it does not remove the need for control in the first hour.When a ransomware incident becomes live, the hardest questions are not theoretical.They are immediate:Who can pull the trigger?Who can isolate?Who can revoke?Who can force degraded operations?Who can make the difficult trade-off between continuity and containment before the damage spreads further?This is why I keep coming back to a point that is easy to miss:Detection is not the same as control.Becausecontroldependsnotonlyonseeingtheproblem,butonwhethertheorganisationhasalreadydecidedwhoisallowedto act when certainty is still incomplete.Where the incident gets biggerYou can detect malicious activity and still lose critical time.You can have good tooling and still hesitate.Youcanhavestrongpeopleandstillfaceasituationinwhichthenextmoveisobviousoperationally,butunclearorganisationally because no one is fully authorised to make it.That is where the incident grows.Not always because people made the wrong decision.Oftenbecausetherightdecisionwasnotpre-authorisedstronglyenoughtobeexecutedunderpressure—andthatishow hesitation turns into cascade.Theattackerdoesnotwaitforclearergovernance.Delayisnotneutral;itchangestheshapeoftheincident.Andthatmatters, because the consequences are rarely limited to temporary inconvenience.A2024ForresterstudycommissionedbyVMwarefoundthat99%ofleaderswhoseorganisationshadfacedaransomwareattack reported at least one serious consequence, and 77% reported three or more.Thoseconsequencesincludedrevenueloss,ransompayments,joblosses,IPlossthroughexfiltration,boardorC-suite accountability, and reputational damage.In other words: the cost of delay is not theoretical either.
- PRESSURE POINT - Most organisations do not lose the first hour because nobody saw the problem.They lose it because the hard move is still waiting for permission.
Speed is permissionedThefirsthourisoftendescribedasaraceagainsttime.Thatistrue.Butitisequallyatestofgovernance.Becausespeedis permissioned.If authority is not pre-agreed, the incident is negotiated — not governed.Security may want to isolate.Operations may want to wait.Business owners may fear unnecessary disruption.Leadership may want one more confirmation before approving a hard move.And while that negotiation continues, the attacker does not pause.ThisiswhyIdonotthinktherealresiliencegapisonlyaboutprevention.Itisaboutwhetherorganisationshaveturnedawareness into authorised action.
- WHAT CONTAINMENT CHANGES - Authority only matters if the organisation also has a safe operational move available.Containment turns decision rights into executable control.
Why this is also a human crisisRecentacademicworkarguesthatransomwareshouldbeunderstoodasawhole-of-organisationcrisisphenomenonratherthan merelyanITissue,andexplicitlydocumentssevereorganisationalharms,includingaquotedvictimexperienceof“abitofPTSD” every time they walked through the office door.That human residue matters more than many board conversations admit.The Odido aftermath shows how that residue can also sit outside the organisation.Whenpersonaldatahasbeenexposed,affectedpeoplearenotsimply“notified”.Theyareaskedtostayalert,verifycalls,monitor suspiciousmessages,checkwhethertheirdetailsappearinleakeddatasets,andlivewiththepossibilitythatsomeonemayuse familiar information to make fraud feel credible.That is not a technical after-action item.It is a trust burden transferred to customers, citizens, patients, employees or partners.TheUKHomeOfficeresearchfoundthatstresswasthemostcommonpsychologicalimpactamongvictimorganisations,with respondents describing long-term effects including sleep loss, appetite loss, anxiety, and guilt among IT staff and senior leaders.So, when we talk about the first hour, we are not only talking about timing.Wearealsotalkingabouttheburdenpeopleareforcedtocarrywhenauthorityisunclear,decisionsaredelayed,andcontrolslips further than it needed to.Thedifferencebetweenahardincidentandalong,corrosiveoneisoftenshapedinthatfirstperiod—notonlybywhatisseen, but by what is allowed.The real question for leadershipThe practical question every CIO, CISO, and board should be able to answer before the next incident forces the issue is not only:Do we have the right tools?It is:Who is allowed to act, on what trigger, and with what authority, before the damage becomes harder to contain?Becauseifauthorityisstillbeingnegotiatedwhiletheincidentisalreadymoving,speedbecomesfriction,andcontrolbecomes fragile.
- TRIGGER LOGIC - In the first hour, perfect certainty rarely arrives.The real question is whether the organisation has defined what is “enough” to act.
What can still be preventedMuch of the suffering that follows a ransomware attack can be prevented.Not all uncertainty can be removed.Not every consequence can be avoided.Butcontroldoesnothavetocollapsebecauseauthoritywasunclear,actionwasdelayed,ortherightmovewasstillwaitingfor approval.Whendecisionrightsarepre-agreed,triggersareclear,andcontainmentcanbeexecutedsafely,thefirsthourbecomesmore governable.Andwhenthefirsthourismoregovernable,agreatdealofthechaos,escalation,andhumanburdenthatfollowscanbereduced before it spreads.
- WHAT DELAY COSTS - When action waits for full confirmation, the incident rarely stands still.The result is often a wider problem, a heavier burden, and fewer good options.
Practical resources for CIOs/CISOs•Pressure test for leadership control •First-hour containment decisions •Why pressure testing mattersFor readers who want to go further:IcansharemoredetailonwhatImeanbythemissingoperationallayer—andwhythatgapbecomessovisiblewhenhesitation becomes expensive.And for teams that want to pressure-test their own setup:Icanrunafreeremoteresilienceassessmentinyourownsandboxenvironment,withyourexistingsecuritycontrolsenabled,to show how your current environment behaves under pressure and what difference that operational layer makes in practice.If any of these would be relevant for your team, feel free to contact me.sgemert@s10group.comWhere to go nextRevisit the vendor-dependency question:When the vendor is non-negotiable, what can you still control?Return to the identity-trust starting point:The Odido lesson: when access still works, but trust does not
SOURCES AND FURTHER READINGThesourcesbelowinformedthethemesinthisnewsletter:first-hourauthority,ransomwarevictimimpact,clinicaldisruption, leadership pressure, and the difference between awareness and executable control.1. NOS“Als je bedrijf platligt door ransomware: ‘Klanten stonden met knuppels op de stoep’”2. Security.nl“Brits NHS: ransomware-aanval droeg bij aan overlijden van patiënt”3. GOV.UK / Home Office & Ipsos“The experiences and impacts of ransomware attacks on individuals and organisations”4. VMware / Forrester“Critical Ransomware Recovery Capabilities”5. Oxford Academic / Journal of Cybersecurity“‘TherewasabitofPTSDeverytimeIwalkedthroughtheofficedoor’:Ransomwareharmsandthefactorsthatinfluencethevictim organisation’s experience”6. RTL Z“Massaclaim van start vanwege groot datalek Odido”7. Politie.nl“Checkjehack aangevuld met Odido”8. Odido“Update over de cyberaanval”9. Veilig Internetten“Wat kan je doen na datalek bij Odido?”
The missing operational layerThat is also where I believe many organisations need a different operational layer.Not another awareness layer.Not another abstract assurance exercise.Butacontainmentlayerthathelpsleadershipactdecisivelyoncetheincidentisalreadylive.Becauseauthorityonitsownisnot enough. Authority still needs a safe move.That is the gap I focus on.Not replacing the existing stack.Not dismissing the money already spent on EDR, SIEM, backup, and response.Buthelpingorganisationsturndecisionrightsintoexecutablecontrolwhenhesitationbecomesexpensiveandthefirst safe move has to happen before full certainty arrives.In practice, that means giving leadership a way to act without waiting for the whole picture to become clear.Awaytoreduceexposure,interruptmaliciousbehaviour,narrowtheblastradius,andpreserveenoughoperationalroomtokeep the incident governable.Not just knowing that action is needed — but having a move that is safe enough to authorise and practical enough to execute.The goal is simple:Stop the cascade before uncertainty, delay, and spread become much harder to contain.
- SPEED IS PERMISSIONED - Delay is not neutral.If the hard move still needs approval,the incident keeps moving while the organisation negotiates.
Newsletter #3 - 14 May 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF file
When ransomware becomes realThepreviousnewsletterissuefocusedonwhat remainscontrollablewhenacriticaldependency becomesunsafe.Thisissuemovesonelayercloser totheorganisationitself:whenpressureisrising, whatmattersjustasmuchiswhoisactuallyallowed toactbeforefullcertaintyexists.TherecentChipSoft ransomwareincidentmadethatdependency questionveryconcreteforhealthcareleaders.When atrustedsupplierrouteisrestricted,systemsare disconnectedasaprecaution,orpatient-facing servicesaretemporarilyunavailable,theissue quicklymovesbeyondtechnology.Itbecomesa questionofauthority:whoisallowedtodecidewhat mustbenarrowed,paused,isolated,orkeptrunning while the facts are still incomplete?TheOdidocaseaddsanotherlayertothatsame question.There,servicesremainedavailable,buttrustdidnot simplyreturnbecausethenetworkkeptworking. Customershadtocheckwhethertheirdetailswere partofthestolendataset,remainalerttoconvincing phishingattempts,anddealwiththeuncertainty thatpersonaldatamaycontinuetocreaterisklong aftertheincidentitselfhasmovedoutofthe headlines.Thatiswhythefirsthourmattersbeyondthefirst hour.Whenidentity,access,customerdataordependency routesbecomeuncertain,delayedcontainmentdoes notonlycreatetechnicalexposure.Itcancreatea longertrustproblemforthepeopleoutsidethe organisation as well.Victimsrarelydescriberansomwareasaclean technicalevent.Theydescribepowerlessness, disruption,andalongpersonalaftershock.In Dutchreporting,onevictimsaidit“feltlikea robbery”,anotherdescribedthelingeringshock monthslater,andanotherspokeofcustomers literallyarrivingatthedoorwithclubsafter operations had collapsed.Incriticalenvironments,theconsequencescan extendevenfurther.IntheUK,theSynnovis ransomwareattacklaterbecamelinkedtoapatient deathafterdisruptiontopathologyservicesand delaysinobtainingvitaltestresultswereidentified ascontributingfactors.Thatmattersnotonly becauseofthevictim,butbecauseeverysuch incidentalsoleavesafamily,acareteam,anda leadershipteamcarryingconsequencesthatcannot be undone.Thatisthepartmanyorganisationsstill underestimate:thehumancostoftenbeginswhile the incident is still unfolding.The first hour is not mainly technicalAliveransomwareincidentquicklystopsfeelinglike asystemsproblemandstartsbecominga governance burden.Experiencedleadersareforcedtomakehigh-impact decisionswithoutfullcertainty.Teamslosesleep. Confidencebeginstocrack,andeveryunanswered questionaddsweight.Thefearisnolongeronlythat theattackhappened,butthatthenextdecisionmay either contain the damage — or deepen it.Thisiswherepowerlessness,guilt,second-guessing, andthelongeraftershockoftenbegin.Notafterthe incident,butinthemiddleofit—when responsibilityishigh,factsareincomplete,and control starts to feel fragile.Not whether an alert fired.Not whether the SOC saw something unusual.Not whether a playbook exists somewhere.Butwhoisallowedtoactwhilethefactsarestill incomplete.•Who is allowed to isolate systems? •Who is allowed to revoke access? •Whoisallowedtoshutdownservicesorforce degraded operations? •Whoisallowedtooverridebusinessownersif delay increases the blast radius? •Whatlevelofuncertaintyisenoughtotrigger action? •Whichactionsarepre-agreed,andwhichstill need permission? That is the real middle of the incident.Anditiswheremanymatureorganisationsstill struggle.
- ONE LESSON - If authority is not pre-agreed, the first hour is negotiated — not governed.
Why the first hour becomes a governance problem long before it becomes a recovery exercise.
The First Hour:Who Is Allowed to Act?
Why organisations still lose the first hourMostcyberdiscussionsbegininthewrong place.Theybeginwithrecovery,withrestoration,with lessons learned afterward.Butforthepeopleinsidealiveransomware incident,thefirsthourisrarelydefinedby recovery.It is defined by authority.Who has the right to act?Who can make the call?Who can move before every fact is known?Thatiswheremanyorganisationslosetime they can no longer afford to lose.Not because nobody noticed the incident.But because action was not pre-agreed.Inmanyenvironments,awarenessarrives beforecontroldoes.Therealtestiswhethera crediblesignalcantriggerasafemovequickly enough to matter.Why so many organisations are still not readyResearchcommissionedbytheUKHome Officefoundthatmanyransomwarevictims hadlittleawarenessoftherisksandimpacts beforetheirattack,wereunpreparedforthe scaleandsophisticationofwhatfollowed,and wereoftenunclearonthekeystepsneededto mitigateransomware.Thesameresearchalso foundthatveryfeworganisationsdescribed havingabusinesscontinuityplanspecificto cyber or ransomware.Thatshouldconcernleaders.Becausewhere thereisnoclear,testedpath,peopleareleft carryingmorethandisruption:theycarry uncertainty,pressure,second-guessing,and oftenguiltaboutthedecisionsmadeunder incomplete trust.Abusinesscontinuityplancanreducethat burden—butonlyifithasbeenpressure-testedwellenoughtoremainusefulwhenthe incidentislive,thefactsareincomplete,and authority has to translate into action.Aplanonpaperisnotthesameascontrol under pressure.
- BOARD QUESTION - Have we pre-agreed who can make the first containment move before full certainty exists?
Investment is not executable controlManyorganisationshaveinvestedheavilyin prevention,detection,monitoring,backup,and responsereadiness.Andstill,matureenvironments shouldassumethatacrediblesignalmayoneday arrivedespiteallofthat—notbecausethe organisationwascareless,butbecauseprevention lowersthechanceofanincident;itdoesnotremove the need for control in the first hour.Whenaransomwareincidentbecomeslive,the hardest questions are not theoretical.They are immediate:Who can pull the trigger?Who can isolate?Who can revoke?Who can force degraded operations?Whocanmakethedifficulttrade-offbetween continuityandcontainmentbeforethedamage spreads further?ThisiswhyIkeepcomingbacktoapointthatiseasy to miss:Detection is not the same as control.Becausecontroldependsnotonlyonseeingthe problem,butonwhethertheorganisationhas alreadydecidedwhoisallowedtoactwhencertainty is still incomplete.Where the incident gets biggerYoucandetectmaliciousactivityandstilllosecritical time.You can have good tooling and still hesitate.Youcanhavestrongpeopleandstillfaceasituation inwhichthenextmoveisobviousoperationally,but unclearorganisationallybecausenooneisfully authorised to make it.That is where the incident grows.Notalwaysbecausepeoplemadethewrong decision.Oftenbecausetherightdecisionwasnotpre-authorisedstronglyenoughtobeexecutedunder pressure—andthatishowhesitationturnsinto cascade.Theattackerdoesnotwaitforclearergovernance. Delayisnotneutral;itchangestheshapeofthe incident.Andthatmatters,becausethe consequencesarerarelylimitedtotemporary inconvenience.A2024ForresterstudycommissionedbyVMware foundthat99%ofleaderswhoseorganisationshad facedaransomwareattackreportedatleastone seriousconsequence,and77%reportedthreeor more.Thoseconsequencesincludedrevenueloss,ransom payments,joblosses,IPlossthroughexfiltration, boardorC-suiteaccountability,andreputational damage.Inotherwords:thecostofdelayisnottheoretical either.
- PRESSURE POINT - Most organisations do not lose the first hour because nobody saw the problem.They lose it because the hard move is still waiting for permission.
Speed is permissionedThefirsthourisoftendescribedasaraceagainst time.Thatistrue.Butitisequallyatestof governance. Because speed is permissioned.Ifauthorityisnotpre-agreed,theincidentis negotiated — not governed.Security may want to isolate.Operations may want to wait.Business owners may fear unnecessary disruption.Leadershipmaywantonemoreconfirmationbefore approving a hard move.Andwhilethatnegotiationcontinues,theattacker does not pause.ThisiswhyIdonotthinktherealresiliencegapis onlyaboutprevention.Itisaboutwhether organisationshaveturnedawarenessinto authorised action.
- WHAT CONTAINMENT CHANGES - Authority only matters if the organisation also has a safe operational move available.Containment turns decision rights into executable control.
Why this is also a human crisisRecentacademicworkarguesthatransomware shouldbeunderstoodasawhole-of-organisation crisisphenomenonratherthanmerelyanITissue, andexplicitlydocumentssevereorganisational harms,includingaquotedvictimexperienceof“a bitofPTSD”everytimetheywalkedthroughthe office door.Thathumanresiduemattersmorethanmanyboard conversations admit.TheOdidoaftermathshowshowthatresiduecan also sit outside the organisation.Whenpersonaldatahasbeenexposed,affected peoplearenotsimply“notified”.Theyareaskedto stayalert,verifycalls,monitorsuspiciousmessages, checkwhethertheirdetailsappearinleaked datasets,andlivewiththepossibilitythatsomeone mayusefamiliarinformationtomakefraudfeel credible.That is not a technical after-action item.Itisatrustburdentransferredtocustomers, citizens, patients, employees or partners.TheUKHomeOfficeresearchfoundthatstresswas themostcommonpsychologicalimpactamong victimorganisations,withrespondentsdescribing long-termeffectsincludingsleeploss,appetite loss,anxiety,andguiltamongITstaffandsenior leaders.So,whenwetalkaboutthefirsthour,wearenot only talking about timing.Wearealsotalkingabouttheburdenpeopleare forcedtocarrywhenauthorityisunclear,decisions aredelayed,andcontrolslipsfurtherthanitneeded to.Thedifferencebetweenahardincidentandalong, corrosiveoneisoftenshapedinthatfirstperiod— not only by what is seen, but by what is allowed.The real question for leadershipThepracticalquestioneveryCIO,CISO,andboard shouldbeabletoanswerbeforethenextincident forces the issue is not only:Do we have the right tools?It is:Whoisallowedtoact,onwhattrigger,andwith whatauthority,beforethedamagebecomes harder to contain?Becauseifauthorityisstillbeingnegotiatedwhile theincidentisalreadymoving,speedbecomes friction, and control becomes fragile.
- TRIGGER LOGIC - In the first hour, perfect certainty rarely arrives.The real question is whether the organisation has defined what is “enough” to act.
What can still be preventedMuchofthesufferingthatfollowsaransomware attack can be prevented.Not all uncertainty can be removed.Not every consequence can be avoided.Butcontroldoesnothavetocollapsebecause authoritywasunclear,actionwasdelayed,orthe right move was still waiting for approval.Whendecisionrightsarepre-agreed,triggersare clear,andcontainmentcanbeexecutedsafely,the first hour becomes more governable.Andwhenthefirsthourismoregovernable,agreat dealofthechaos,escalation,andhumanburden that follows can be reduced before it spreads.
- WHAT DELAY COSTS - When action waits for full confirmation, the incident rarely stands still.The result is often a wider problem, a heavier burden, and fewer good options.
Practical resources for CIOs/CISOs•Pressure test for leadership control •First-hour containment decisions •Why pressure testing mattersFor readers who want to go further:IcansharemoredetailonwhatImeanbythe missingoperationallayer—andwhythatgap becomessovisiblewhenhesitationbecomes expensive.Andforteamsthatwanttopressure-testtheirown setup:Icanrunafreeremoteresilienceassessmentin yourownsandboxenvironment,withyourexisting securitycontrolsenabled,toshowhowyourcurrent environmentbehavesunderpressureandwhat difference that operational layer makes in practice.Ifanyofthesewouldberelevantforyourteam,feel free to contact me.sgemert@s10group.comWhere to go nextRevisit the vendor-dependency question:Whenthevendorisnon-negotiable,whatcanyoustill control?Return to the identity-trust starting point:TheOdidolesson:whenaccessstillworks,buttrust does not
SOURCES AND FURTHER READINGThesourcesbelowinformedthethemesinthis newsletter:first-hourauthority,ransomwarevictim impact,clinicaldisruption,leadershippressure,and thedifferencebetweenawarenessandexecutable control.1. NOS“Alsjebedrijfplatligtdoorransomware:‘Klanten stonden met knuppels op de stoep’”2. Security.nl“BritsNHS:ransomware-aanvaldroegbijaanoverlijden van patiënt”3. GOV.UK / Home Office & Ipsos“Theexperiencesandimpactsofransomwareattacks on individuals and organisations”4. VMware / Forrester“Critical Ransomware Recovery Capabilities”5. Oxford Academic / Journal of Cybersecurity“‘TherewasabitofPTSDeverytimeIwalkedthrough theofficedoor’:Ransomwareharmsandthefactors that influence the victim organisation’s experience”6. RTL Z“Massaclaim van start vanwege groot datalek Odido”7. Politie.nl“Checkjehack aangevuld met Odido”8. Odido“Update over de cyberaanval”9. Veilig Internetten“Wat kan je doen na datalek bij Odido?”
The missing operational layerThatisalsowhereIbelievemanyorganisationsneed a different operational layer.Not another awareness layer.Not another abstract assurance exercise.Butacontainmentlayerthathelpsleadershipact decisivelyoncetheincidentisalreadylive.Because authorityonitsownisnotenough.Authoritystill needs a safe move.That is the gap I focus on.Not replacing the existing stack.NotdismissingthemoneyalreadyspentonEDR, SIEM, backup, and response.Buthelpingorganisationsturndecisionrights intoexecutablecontrolwhenhesitation becomesexpensiveandthefirstsafemovehas to happen before full certainty arrives.Inpractice,thatmeansgivingleadershipawaytoact withoutwaitingforthewholepicturetobecome clear.Awaytoreduceexposure,interruptmalicious behaviour,narrowtheblastradius,andpreserve enoughoperationalroomtokeeptheincident governable.Notjustknowingthatactionisneeded—buthaving amovethatissafeenoughtoauthoriseand practical enough to execute.The goal is simple:Stopthecascadebeforeuncertainty,delay,and spread become much harder to contain.
- SPEED IS PERMISSIONED - Delay is not neutral.If the hard move still needs approval,the incident keeps moving while the organisation negotiates.