InFebruary2026,DutchtelecomproviderOdidodisclosedacyberincidentaffectingpersonaldatatiedtomorethansixmillion accounts.(LinktoReuters).Odidoisoneofthecountry’smajortelecomproviders,servingmillions.Thisincidentcaughtmy attentionforthescaleandbecausethemomentdataisalreadystolen,you’renolongerpreventingimpact,you’remanaging consequences…ThiswebsiteversionexpandstheoriginalLinkedInnewsletterwithadditionalseriescontext,internalnavigationandsourcedirection.The corelessonremainsthesame:accessisnotthesameaslegitimacy.Whenidentitytrustbecomesuncertain,resiliencedependsonwhether the organisation can reduce exposure before uncertainty turns into wider consequence.TheOdidostoryisn’tinterestingbecauseattackerswere“clever.”It’sinterestingbecauseitshowshowquicklyafamiliarpattern becomes large when warning signals exist, but decision pathways lag. (Link to IO+)There’s a moment in many incidents where nothing looks “down”… and yet control is already slipping.Not because systems failed.Because trust did.What makes the reporting uncomfortable is precisely that it isn’t exotic.Not a movie-plot zero-day.Morelikeachainofsmall,plausibleweaknessesthatcombinedintosomethinglarge:socialmanipulationofanemployee,access into a customer contact system, and permissions that enabled access to a broad set of records.Why this series starts with trustTheIdentity&containmentseriesstartsherebecausemanymodernincidentsdonotbeginwithadramaticshutdown.Theybegin withambiguity.Anaccountappearslegitimate.Asystemremainsavailable.Aworkflowcontinues.Buttheorganisationcanno longer be fully certain that the identity behind the access should still be trusted.Thatiswhythefirstresiliencequestionisnotonlywhetheraccesscanbeauthenticated.Itiswhetheraccesscanbenarrowed, challenged, isolated or withdrawn quickly enough when trust changes.What makes the reporting uncomfortable is precisely that it isn’t exotic.Not a movie-plot zero-day.Morelikeachainofsmall,plausibleweaknessesthatcombinedintosomethinglarge:socialmanipulationofanemployee,access into a customer contact system, and permissions that enabled access to a broad set of records. What happened (the facts)Odidostatedtheincidentinvolvedpersonaldatafromacustomercontactsystem,andthatpasswords,calldetails,andbillingdata were not involved.Publicreportingdescribesattackersusingsocialengineering—posingasinternalIT/helpdesktopersuadestafftoapproveaccess — rather than exploiting a novel software vulnerability.Severalwrite-upsalsohighlightanuncomfortabledetail:thisgeneralmethodwasnothypothetical.Warningsaboutthiskindof approach had been circulating, including in relation to widely used SaaS environments and identity/access patterns.That last point matters, because it changes the leadership question from:“How could anyone predict this?”…to something more practical:Whenwarningsexist,thegapisrarely“moretools.”It’swhethertheorganisationcanreducethetimebetweenknowing andacting—turningacrediblesignalintofast,governedcontainmentthatlimitsfurthercompromiseandrestores control.
Apracticalpoint:thisisalsowherecapabilitycangenuinelychangeoutcomes—notbycreatingmorealerts,butbycreating control.Whenyoucanreliablyseelateralmovementanddetectdata-exfiltrationbehaviourearlyenough,youcantriggercontainment actions that limit further spread and additional exposure.Thedifferenceisn’t“visibilityforreporting.”It’svisibilitythatenablesagovernedmove:reduceprivilegedpathways,isolaterisky segments, and keep essential operations running while trust is rebuilt.The decision boundary that matteredMost organisations will read this and think: “So… train people better.”Training matters. But notice what that framing does. It quietly places the centre of gravity on the individual who took the call.Amoreusefullessonisstructural:asecureenvironmentshouldn’trelyonasinglepersonbeingimpossibletomanipulate—and the way access is designed and governed matters.This is the boundary leaders tend to underestimate:We treat identity controls as “security”.Butinpractice,identitycontrolsaregovernance—becausetheydefinewhocanact,whattheycanreach,andhowquicklywecan reduce risk without freezing operations.In other words: the incident doesn’t start when data leaves.It starts when leaders realise, they no longer know what “legitimate access” means.And once legitimacy is uncertain, every response step becomes governance:•How broadly can we restrict access without breaking the business?•Who has the authority to do it fast?•What do we keep running while we regain confidence?This is the part that doesn’t show up in many incident decks:Detection buys awareness. Only pre-decided containment buys time.
- BOARD QUESTION - Do we know who decides when “still operational” is no longer “safe enough to trust”?
One practical pressure-test suggestionDon’t start by writing a new policy. Run a 60-minute identity-trust exercise with three timed phases:T+0 to T+10: credible signal, incomplete evidenceWhat do we do immediately that is reversible? Who authorises it?T+10 to T+30: suspicion of persistenceHow do we invalidate active trust (sessions/tokens), and what breaks operationally?T+30 to T+60: stabilisationHow do we progressively restore controlled access without re-opening the same pathways?The value isn’t the tabletop discussion.The value is discovering whether your organisation can execute the first move without debate, confusion, or operational shock.
A closing thoughtSo, I’ll leave you with a question I find more useful than “How do we prevent every breach?”:If identity trust broke tomorrow, would your first hour be governed… or negotiated?How this connects to newsletter issue # 2Thisfirstissuefocusedonidentitytrustinsidetheorganisation:thepointwhereaccessmaystillwork,butlegitimacybecomes uncertain.Thenextissuemovesthesamequestionoutward.Whathappenswhentheuncertaintrustpathisnotaninternaluseroraccount, but a critical vendor, supplier route or platform dependency the organisation cannot quickly exit?Thatiswhereaccesscontrolbecomesdependencycontrol,andwherecontainmenthastoincludethesystemsandrelationships the organisation relies on to keep operating.Resources for CIOs/CISOs to make this practical•Identity under pressure — 7 board questions (Trust vs Authority)•Three pressure-test briefings: (Pressure test for leadership control / First-hour containment decisions / Why pressure testing matters)IcanalsosharehowIpressure-testthisinpracticethroughafreeresilienceassessmentinyourownsandboxenvironment,with your existing security stack enabled.If any of these would be useful, feel free to contact me.sgemert@s10group.comWhere to go nextContinue the series:When the vendor is non-negotiable, what can you still control?Move to the live incident moment:The First Hour: who is allowed to act?
- PRESSURE POINT - The most dangerous phase is often not outage.It is the moment normal access continues while leadership can no longer be sure what that access means.
- WHAT CONTAINMENT CHANGES - Containment gives leadership a way to reduce exposure before uncertainty turns into wider consequence.
SOURCES AND FURTHER READINGThisnewsletterdrawsonpublicreportingandcompanycommunicationabouttheOdidocyberincident,includingthescaleof exposedcustomerdata,thereportedattackmethod,earlierwarningsaboutthetechniqueused,andOdido’sownstatementon what data was and was not involved.1. Reuters“Dutch telecom Odido hacked, 6 million accounts affected”Reportingonthescaleoftheincident,thecategoriesofexposedpersonaldata,Odido’sresponse,andtheaffectedcustomer contact system.2. IO+“Lessons from the Odido hack: Why devious hackers are no excuse”Analysisofthereportedsocial-engineeringmethodandwhytheincidentraisesquestionsaboutaccessdesign,permissions, warning signals and governed containment.3. Odido“Update about cyberattack”Odido’spublicstatementonthecyberattack,thesysteminvolved,theaffecteddatacategories,thedatanotaffected,andthe response taken.4. NOS“Toeleverancier Odido waarschuwde voor gebruikte hackmethode”ReportingthatanOdidosupplierhadpreviouslywarnedabouttheattackmethodused,reinforcingthenewsletter’sfocusonthe gap between warning and action.
The Odido Lesson:When “access” still works but trust doesn’t
Why identity trust is the real fault line in modern incidents.
The move from system failure to failureA system failure is visible: outage, latency, broken process.A trust failure is quieter: the system is still running, but you can’t prove who is driving.That is why “we detected it” is not the same as “we controlled it”.And why “we restored services” is not the same as “we regained governability”. Odido customers could still use services, according to the company’s own communication.But the incident still carried weight because identity and access pathways touched sensitive data at scale. (Link to Reuters)Three board questions to ask next timeThese aren’t technical questions. They force clarity before the next uncomfortable hour arrives.1.When identity trust is uncertain, what is our “minimum operational mode”?What must keep running, and what can be intentionally degraded — by design — to protect control?2.Who can trigger rapid access restriction, and what evidence is “enough” to act?Not “who should be consulted”, but who has authority to pull the first lever when the picture is incomplete.3.Where do we have concentration risk in access — and do we know it?If one compromised pathway can touch “too much,” is that an accepted architectural choice… or an accidental one?If you want to make this practical, the next step isn’t more policy, it’s a simple pressure-test of the first-hour decisions.
- ACCESS IS NOT LEGITIMACY - The moment services still run but trust is broken, the problem is already governance — not only recovery.
Newsletter #1 - 17 Mar 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF fileUpdated 14 May 2026
InFebruary2026,DutchtelecomproviderOdido disclosedacyberincidentaffectingpersonaldata tiedtomorethansixmillionaccounts.(Linkto Reuters).Odidoisoneofthecountry’smajor telecomproviders,servingmillions.Thisincident caughtmyattentionforthescaleandbecausethe momentdataisalreadystolen,you’renolonger preventing impact, you’re managing consequences…ThiswebsiteversionexpandstheoriginalLinkedIn newsletterwithadditionalseriescontext,internal navigationandsourcedirection.Thecorelesson remainsthesame:accessisnotthesameaslegitimacy. Whenidentitytrustbecomesuncertain,resilience dependsonwhethertheorganisationcanreduce exposurebeforeuncertaintyturnsintowider consequence.TheOdidostoryisn’tinterestingbecauseattackers were“clever.”It’sinterestingbecauseitshowshow quicklyafamiliarpatternbecomeslargewhen warningsignalsexist,butdecisionpathwayslag. (Link to IO+)There’samomentinmanyincidentswherenothing looks “down”… and yet control is already slipping.Not because systems failed.Because trust did.Whatmakesthereportinguncomfortableis precisely that it isn’t exotic.Not a movie-plot zero-day.Morelikeachainofsmall,plausibleweaknessesthat combinedintosomethinglarge:socialmanipulation ofanemployee,accessintoacustomercontact system,andpermissionsthatenabledaccesstoa broad set of records.Why this series starts with trustTheIdentity&containmentseriesstartshere becausemanymodernincidentsdonotbeginwitha dramaticshutdown.Theybeginwithambiguity.An accountappearslegitimate.Asystemremains available.Aworkflowcontinues.Butthe organisationcannolongerbefullycertainthatthe identity behind the access should still be trusted.Thatiswhythefirstresiliencequestionisnotonly whetheraccesscanbeauthenticated.Itiswhether accesscanbenarrowed,challenged,isolatedor withdrawn quickly enough when trust changes.Whatmakesthereportinguncomfortableis precisely that it isn’t exotic.Not a movie-plot zero-day.Morelikeachainofsmall,plausibleweaknessesthat combinedintosomethinglarge:socialmanipulation ofanemployee,accessintoacustomercontact system,andpermissionsthatenabledaccesstoa broad set of records. What happened (the facts)Odidostatedtheincidentinvolvedpersonaldata fromacustomercontactsystem,andthat passwords,calldetails,andbillingdatawerenot involved.Publicreportingdescribesattackersusingsocial engineering—posingasinternalIT/helpdeskto persuadestafftoapproveaccess—ratherthan exploiting a novel software vulnerability.Severalwrite-upsalsohighlightanuncomfortable detail:thisgeneralmethodwasnothypothetical. Warningsaboutthiskindofapproachhadbeen circulating,includinginrelationtowidelyusedSaaS environments and identity/access patterns.Thatlastpointmatters,becauseitchangesthe leadership question from:“How could anyone predict this?”…to something more practical:Whenwarningsexist,thegapisrarely“more tools.”It’swhethertheorganisationcanreduce thetimebetweenknowingandacting—turning acrediblesignalintofast,governedcontainment thatlimitsfurthercompromiseandrestores control.
Apracticalpoint:thisisalsowherecapability cangenuinelychangeoutcomes—notby creatingmorealerts,butbycreating control.Whenyoucanreliablyseelateralmovement anddetectdata-exfiltrationbehaviourearly enough,youcantriggercontainmentactions thatlimitfurtherspreadandadditional exposure.Thedifferenceisn’t“visibilityforreporting.”It’s visibilitythatenablesagovernedmove: reduceprivilegedpathways,isolaterisky segments,andkeepessentialoperations running while trust is rebuilt.The decision boundary that matteredMostorganisationswillreadthisandthink: “So… train people better.”Trainingmatters.Butnoticewhatthatframing does.Itquietlyplacesthecentreofgravityon the individual who took the call.Amoreusefullessonisstructural:asecure environmentshouldn’trelyonasingleperson beingimpossibletomanipulate—andtheway access is designed and governed matters.Thisistheboundaryleaderstendto underestimate:We treat identity controls as “security”.Butinpractice,identitycontrolsare governance—becausetheydefinewhocan act,whattheycanreach,andhowquicklywe can reduce risk without freezing operations.Inotherwords:theincidentdoesn’tstartwhen data leaves.Itstartswhenleadersrealise,theynolonger know what “legitimate access” means.Andoncelegitimacyisuncertain,every response step becomes governance:•Howbroadlycanwerestrictaccesswithout breaking the business?•Who has the authority to do it fast?•Whatdowekeeprunningwhileweregain confidence?Thisisthepartthatdoesn’tshowupinmany incident decks:Detectionbuysawareness.Onlypre-decided containment buys time.
- BOARD QUESTION - Do we know who decides when “still operational” is no longer “safe enough to trust”?
One practical pressure-test suggestionDon’tstartbywritinganewpolicy.Runa60-minute identity-trust exercise with three timed phases:T+0 to T+10: credible signal, incomplete evidenceWhatdowedoimmediatelythatisreversible?Who authorises it?T+10 to T+30: suspicion of persistenceHowdoweinvalidateactivetrust(sessions/tokens), and what breaks operationally?T+30 to T+60: stabilisationHowdoweprogressivelyrestorecontrolledaccess without re-opening the same pathways?The value isn’t the tabletop discussion.Thevalueisdiscoveringwhetheryourorganisation canexecutethefirstmovewithoutdebate, confusion, or operational shock.
A closing thoughtSo,I’llleaveyouwithaquestionIfindmoreuseful than “How do we prevent every breach?”:Ifidentitytrustbroketomorrow,wouldyourfirst hour be governed… or negotiated?How this connects to newsletter issue # 2Thisfirstissuefocusedonidentitytrustinsidethe organisation:thepointwhereaccessmaystillwork, but legitimacy becomes uncertain.Thenextissuemovesthesamequestionoutward. Whathappenswhentheuncertaintrustpathisnot aninternaluseroraccount,butacriticalvendor, supplierrouteorplatformdependencythe organisation cannot quickly exit?Thatiswhereaccesscontrolbecomesdependency control,andwherecontainmenthastoincludethe systemsandrelationshipstheorganisationrelieson to keep operating.Resources for CIOs/CISOs to make this practical•Identityunderpressure—7boardquestions(Trust vs Authority)•Threepressure-testbriefings:(Pressuretestfor leadershipcontrol/First-hourcontainment decisions / Why pressure testing matters)IcanalsosharehowIpressure-testthisinpractice throughafreeresilienceassessmentinyourown sandboxenvironment,withyourexistingsecurity stack enabled.Ifanyofthesewouldbeuseful,feelfreetocontact me.sgemert@s10group.comWhere to go nextContinue the series:Whenthevendorisnon-negotiable,whatcanyoustill control?Move to the live incident moment:The First Hour: who is allowed to act?
- PRESSURE POINT - The most dangerous phase is often not outage.It is the moment normal access continues while leadership can no longer be sure what that access means.
- WHAT CONTAINMENT CHANGES -Containment gives leadership a way to reduce exposure before uncertainty turns into wider consequence.
SOURCES AND FURTHER READINGThisnewsletterdrawsonpublicreportingand companycommunicationabouttheOdidocyber incident,includingthescaleofexposedcustomer data,thereportedattackmethod,earlierwarnings aboutthetechniqueused,andOdido’sown statement on what data was and was not involved.1. Reuters“DutchtelecomOdidohacked,6millionaccounts affected”Reportingonthescaleoftheincident,thecategories ofexposedpersonaldata,Odido’sresponse,andthe affected customer contact system.2. IO+“LessonsfromtheOdidohack:Whydevioushackersare no excuse”Analysisofthereportedsocial-engineeringmethod andwhytheincidentraisesquestionsaboutaccess design,permissions,warningsignalsandgoverned containment.3. Odido“Update about cyberattack”Odido’spublicstatementonthecyberattack,the systeminvolved,theaffecteddatacategories,the data not affected, and the response taken.4. NOS“ToeleverancierOdidowaarschuwdevoorgebruikte hackmethode”ReportingthatanOdidosupplierhadpreviously warnedabouttheattackmethodused,reinforcing thenewsletter’sfocusonthegapbetweenwarning and action.
Why identity trust is the real fault line in modern incidents.
The move from system failure to failureAsystemfailureisvisible:outage,latency,broken process.Atrustfailureisquieter:thesystemisstillrunning, but you can’t prove who is driving.Thatiswhy“wedetectedit”isnotthesameas“we controlled it”.Andwhy“werestoredservices”isnotthesameas “we regained governability”. Odidocustomerscouldstilluseservices,according to the company’s own communication.Buttheincidentstillcarriedweightbecauseidentity andaccesspathwaystouchedsensitivedataatscale. (Link to Reuters)Three board questions to ask next timeThesearen’ttechnicalquestions.Theyforceclarity before the next uncomfortable hour arrives.1.Whenidentitytrustisuncertain,whatisour “minimum operational mode”?Whatmustkeeprunning,andwhatcanbe intentionallydegraded—bydesign—toprotect control?2.Whocantriggerrapidaccessrestriction,and what evidence is “enough” to act?Not“whoshouldbeconsulted”,butwhohas authoritytopullthefirstleverwhenthepicture is incomplete.3.Wheredowehaveconcentrationriskin access — and do we know it?Ifonecompromisedpathwaycantouch“toomuch,” isthatanacceptedarchitecturalchoice…oran accidental one?Ifyouwanttomakethispractical,thenextstepisn’t morepolicy,it’sasimplepressure-testofthefirst-hour decisions.
- ACCESS IS NOT LEGITIMACY - The moment services still run but trust is broken, the problem is already governance — not only recovery.
Newsletter #1 - 17 Mar 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF fileUpdated 14 May 2026