Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=9RxzRfwCNmg



Duration: 0:00
9 views
0


What does it really mean to be crisis-ready? In this conversation from InfoSecurity Europe 2025, Steve Wright—a data privacy and cybersecurity leader with three decades of experience spanning Siemens, Unilever, John Lewis, and the Bank of England—joins Sean Martin and Marco Ciappelli to unpack the heart of effective crisis management. With a career that’s evolved from risk, through cybersecurity, and now into privacy, Wright offers a refreshingly grounded perspective: crisis management starts with staying calm—but only if you’ve done the work beforehand.


Preparation Over Panic


Crisis management isn’t just a technical checklist—it’s a cultural discipline. Wright emphasizes that calm only comes from consistent practice. From live simulations to cross-functional coordination, he warns that too many organizations are underprepared, relying on ad hoc responses when a breach or outage occurs. Drawing on a real-life ransomware scenario from his time at John Lewis, Wright illustrates the importance of verification, collaboration with law enforcement, and informed decision-making over knee-jerk reactions.


Containment, Communication, and Culture


Preparation leads naturally to containment—an organization’s ability to limit the damage. Whether it’s pulling cables or isolating systems, quick thinking can prevent weeks of downtime. But just as important is how you communicate. Wright points to the contrast between companies that respond with transparency and empathy versus those that go silent, risking public trust. Modern crisis management requires the ability to shift the narrative and speak directly to affected stakeholders—before speculation takes over.


Trust and Accountability in a Global Ecosystem


Digital trust has become a board-level concern, not just a technical one. Wright notes that conversations with executives have moved beyond compliance to include broader questions of data ownership, consumer expectations, and supply chain accountability. As global systems grow more complex, clarity about who owns what—and who’s responsible when things go wrong—becomes harder to establish, but more important than ever.


Looking Ahead


Wright ends with a look to the future, imagining a world where individuals control their data through biometric locks and personal data brokers. Whether this utopia (or dystopia) arrives remains to be seen—but the path forward demands organizations prioritize practice, transparency, and trust today.


___________

Guest: Steve Wright, Data Protection Officer, Financial Services Compensation Scheme | https://www.linkedin.com/in/stevewright1970/


Hosts:
Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/


___________


Episode Sponsors


ThreatLocker: https://itspm.ag/threatlocker-r974


___________


Resources


Learn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25


Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage


Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf


Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us


___________


KEYWORDS


steve wright, sean martin, marco ciappelli, infosecurity, crisis, privacy, cybersecurity, resilience, communication, trust, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-06-19“These Aren’t Soft Skills — They’re Human Skills” Infosecurity Europe 2025 Coverage by ITSPmagazine
2025-06-18A Conversation with Kiki L'Italien | After 40 Podcast with Dr. Deborah Heiser
2025-06-18A Conversation with Kiki L'Italien | After 40 Podcast with Dr. Deborah Heiser
2025-06-16Inside the Mind of the UK’s Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An I...
2025-06-16Inside the Mind of the UK’s Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An I...
2025-06-16Inside the Mind of the UK’s Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check
2025-06-15What Hump? Thirty Years of Cybersecurity and the Fine Art of Pretending It’s Not a Human Problem ...
2025-06-15What Hump? Thirty Years of Cybersecurity and the Fine Art of Pretending It’s Not a Human Problem ...
2025-06-11Episode 103 - Space Medicine (with Dr. Shawna Pandya)
2025-06-10Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe...
2025-06-10Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe...
2025-06-10The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Sti...
2025-06-10The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Sti...
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe...
2025-06-10Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach with Steve Wright
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe...
2025-06-10The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits Jemma Davis
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | Infosecurity w/ Rob Black
2025-06-10Reframing | A Conversation with Frank Douglas | After 40 Podcast with Dr. Deborah Heiser