After Hours: Paul Wright

Arabian Computer News delves below the corporate strategy to understand what really makes the region’s IT leaders tick.

Tags: AccessData Group LLC (
  • E-Mail
After Hours: Paul Wright Paul Wright Manager, AccessData, MEA Professional Services and Investigations.
By Staff Writer Published  September 15, 2013

Arabian Computer News delves below the corporate strategy to understand what really makes the region’s IT leaders tick.

Paul Wright Manager, AccessData, MEA Professional Services and Investigations

Getting personal

Nationality: British
Number of years in the industry: 20
Favourite food: Indian
Holiday destination: Sri Lanka
Music: Varied, everything from Rod Stewart to Reggae
Dream car: An original VW Beetle
Gadget: The TV control
Movie/book: Commitments - Funny Money by Stephen Jory
Piece of advice: “Be prepared, be prepared, the sky is blue, water is wet and women have secrets”

How did you end up where you are now?

I have extensive experience in the investigation of cybercrime, incident response and IT security, and in this role I’m engaged on a daily basis in incident response and forensic investigations, services that helps customers who have been subject of a security breach and those who want to protect themselves.

Growth makes the Middle East a target for those who are looking to abuse and make money from the electronic environment. This makes the protection of the IT Industry and the investigation of any security breach a new and exciting challenge. Therefore, when the opportunity arose for me to relocate to the Middle East, I took it.

What is your management philosophy?

Good News – Bad News – Good News. Start with some good news, quickly add the bad news, and then put some good news on top. When your IT Security Admin tells you: “Your network security is better than most, however, after we put the new cyber security tool from AccessData in, it will put us at the top of the pile” he’s applying the sandwich theory.

What was your first computer?

What stands out in my memory was the replacement of teleprinters that we used with our computers in the late 1970s. They were for input and output and in due course were replaced by fast printers, but teleprinters continued to be used as interactive time-sharing terminals until video displays became widely available. The most significant part about this was the development of the typewriter-like keyboard. This came about as a result of the Murray system that employed a keyboard perforator, which allowed you to punch a paper tape, and a tape transmitter for sending the message from the punched tape. At the receiving end of the line, a printing mechanism would print on a paper tape, and could be used to make a perforated copy of a message. The Murray code actually introduced what became known as ‘control characters’ – the CR (Carriage Return) and LF (Line Feed) codes.

What is your greatest achievement?

Being able to provide for my family and having a great wife and loveable children are my greatest achievements in life.

What is your biggest mistake?

Not joining the French Foreign Legion! I did not have a misspent youth. I’m probably a romantic at heart and see joining the Legion as following in the footsteps of Beau Geste.

What is your fondest memory of working in the Middle East IT industry?

There are several, but they all have one common theme; that point when organisations click into understanding that they need to know where they are exposed in relation to incident response and forensic procedures.

What technology do you think will have the biggest impact in 2013?

Organisations must make a major investment in integrating comprehensive network forensics with computer forensics, automating their incident response and remediation operations, and enabling real-time collaboration among all security and information assurance teams. This will give them the visibility they need to detect threats that have slipped past their alerting tools, and to reduce their response times by orders of magnitude. AccessData has made those advancements in its Cyber Intelligence & Response Technology (CIRT).

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code