Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Murdoch's shocking retirement: Expert predicts minimal change in Fox's stance or approach

Despite the fact that he was 92, Rupert Murdoch's retirement as chairman of Fox Corp. and News Corp. came as a shock. Many observers see the passing of the torch from right-wing Rupert to more right-wing son Lachlan as a potentially seismic shift in the media landscape. Danilo Yanich, professor of public policy and administration at the University of Delaware, can discuss the changing of the guard at Fox, which he believes won't alter the network's approach all that much. Yanich doesn't think anything will change from the media side of the equation – coverage won't be any more right wing than it was before. "Lachlan has been running the day-to-day activities for some time now." Also, Yanich said, whether Rupert is "retired" or not does not take him out of the picture. "He still owns the company." Yanich noted that there has been commentary regarding the implications his retirement has for the power arrangements within the company. "That is probably true, but I do not see any change in how Fox approaches its media activities." Yanich's research centers on the media and its intersection with citizenship, public policy and crime, as well as media ownership. He directs the Local Television News Media Project, which examines the role of the news media in democracy and public policy. Yanich was awarded presidential fellowships at two Salzberg Seminars (Salzburg, Austria), both focused on ethics and the news media. To set up an interview with Yanich, simply click on this profile below.

Danilo Yanich
1 min. read

Concerns Persist Over the State of Ecuadorian Democracy

On August 9, 2023, Ecuadorian presidential candidate Fernando Villavicencio was ambushed and killed following a campaign rally in Quito. The Alausí-born journalist-turned-assemblyman had long been a proponent of social and governmental reform, framing his election bid as a crusade against the drug traffickers, corrupt corporate interests and “political mafia” besetting his country. His assassination has, in turn, sparked concerns and discussion over the current state of democracy in Ecuador. Lowell Gustafson, PhD, is an expert on Latin American affairs and a professor of political science in Villanova University’s College of Liberal Arts and Sciences. From his perspective, Villavicencio’s murder stands as the latest chapter in a saga of malfeasance, intimidation and violence in the region. “This is not new in Latin American political history,” said Dr. Gustafson. “The role of private armies funded by economic sectors beyond state control has been an issue often for the national period. It has taken a stark turn with the riches pouring in from illegal drugs.” In Ecuador, “narco-capitalism” has emerged as a particularly corrosive force. According to Dr. Gustafson, Albanian, Mexican and South American criminal outfits established themselves within the nation by the early 2010s, drawn by the country’s vast network of ports and its proximity to coca-rich Colombia and Peru. “That became a problem for stability in 2016, when the government of Colombia signed a peace agreement with the Revolutionary Armed Forces of Colombia [or FARC],” he stated. “FARC had long controlled cocaine trafficking routes from southern Colombia to Ecuador’s ports on the Pacific Ocean. With their dominance gone, other cartels began to compete for control.” Since the opening of this power vacuum, the situation in Ecuador has grown increasingly volatile, with the governmental response ham-fisted at best and faciliatory at worst. Under the presidential administrations of Rafael Correa, Lenín Moreno and Guillermo Lasso, the cartels succeeded in infiltrating the country’s privatized ports and airports, seizing control of the nation’s prison system and contributing to an ever-growing wave of crime. “Violence against public officials and by vigilante groups have steadily increased since 2018,” Dr. Gustafson said. “With the familiar choice between bribes and cooperation or violence, it is no wonder that cartel influence throughout the Ecuadorian state and military is widely discussed.” While Dr. Gustafson acknowledges the Ecuadorian government’s culpability for this disastrous situation and its escalation, he also cites another factor: the United States’ “war on drugs.” According to the professor, the longstanding U.S. policy has only served to prop up criminal enterprises south of the border, fueling a market for illicit substances. “After a half-century of the war and over a trillion dollars spent on it, coca cultivation in Colombia in 2020 was at an all-time high,” he shared. “The war on drugs has led to the continued power of illegal drug cartels in many countries, now including Ecuador.” In Dr. Gustafson’s estimation, the recent murder of Villavicencio only brings greater attention to this unfortunate state of affairs—a state of affairs common throughout Latin America. “With his consistent and outspoken critique of the cartels’ influence in Ecuador, Villavicencio courageously knew he faced the threat of violence,” he concluded. “The assassination of a presidential candidate brings all of this to a higher level within Ecuador, but the likely reason for [his murder] plagues Mexico, El Salvador and other Latin American nations.”

Lowell Gustafson, PhD
3 min. read

Researchers fight cybercrime with new digital forensic tools and techniques

Irfan Ahmed, Ph.D., associate professor of computer science, provides digital forensic tools — and the knowledge to use them — to the good guys fighting the never-ending cyber-security war. Ahmed is director of the Security and Forensics Engineering (SAFE) Lab within the Department of Computer Science and VCU Engineering. He leads a pair of interrelated projects funded by the U.S. Department of Homeland Security (DHS) aimed at keeping important industrial systems safe from the bad guys — and shows the same tools crafted for investigating cyber attacks can be used to probe other crimes. The goal of cyber attacks on physical infrastructure may be to cause chaos by disrupting systems and/or to hold systems for ransom. The SAFE lab focuses on protecting industrial control systems used in the operation of nuclear plants, dams, electricity delivery systems and a wide range of other elements of critical infrastructure in the U.S. The problem isn’t new: In 2010, the Stuxnet computer worm targeted centrifuges at Iranian nuclear facilities before getting loose and infecting “innocent” computers around the world. Cyber attacks often target a portion of the software architecture known as the control logic. Control logic is vulnerable in that one of its functions is to receive instructions from the user and hand them off to be executed by a programmable logic controller. For instance, the control logic monitoring a natural gas pipeline might be programmed to open a valve if the system detects pressure getting too high. Programmers can modify the control logic — but so can attackers. One of Ahmed’s DHS-supported projects, called “Digital Forensic Tools and Techniques for Investigating Control Logic Attacks in Industrial Control Systems,” allows him to craft devices and techniques that cyber detectives can use in their investigations of attacks on sensitive critical infrastructure. Their investigation capabilities, he explains, is an under-researched area, as most of the emphasis to date has been on the prevention and detection of their cyber attacks. “The best scenario is to prevent the attacks on industrial systems,” Ahmed said. “But if an attack does happen, then what? This is where we try to fill the gap at VCU. And the knowledge that we gain in a cyber attack investigation can further help us to detect or even prevent similar attacks.” In the cat-and-mouse world of cyber security, the way cybercriminals work is in constant evolution, and Ahmed’s SAFE lab pays close attention to the latest developments by malefactors. For instance, an attacker may go for a more subtle approach than modifying the original control logic. An attack method called return-oriented programming sees the malefactor using the existing control logic code, but artfully switching the execution sequence of the code. Other attackers might insert their malware into another area of the controller, programmed to run undetected until it can replace the function of the original control logic. Attackers are always coming up with new methods, but each attack leaves evidence behind. The SAFE lab examines possible attack scenarios through simulations. Scale models of physical systems, including an elevator and a belt conveyor system, are housed at the SAFE lab to help facilitate this. The elevator is a four-floor model with inside and outside buttons feeding into a programmable logic controller. The conveyor belt is more advanced, equipped with inductive, capacitive and photoelectric sensors and able to sort objects. The tools and methods applied in cybercrime can be useful in tracking down other malefactors. That’s where Ahmed’s second DHS-funded project comes in. It’s called “Data Science-integrated Experiential Digital Forensics Training based-on Real-world Case Studies of Cybercrime Artifacts.” Ahmed is the principal investigator, working with co-PI Kostadin Damevski, Ph.D., associate professor of computer science. The goal is to keep law enforcement personnel abreast of the latest trends in the field of cybercrime investigation and to equip them with the latest tools and techniques, including those developed in the SAFE lab. “For example, investigators often have to go through thousands of images, or emails or chats, looking for something very specific,” Ahmed said. “We believe the right data science tools can help them to narrow down that search.” The FBI and other law enforcement agencies already have dedicated cybersleuthing units; the Virginia State Police have a computer evidence recovery section in Richmond. Ahmed and Damevski are arranging sessions showing investigators how techniques from data science and machine learning can make investigations more efficient by sorting through the mounds of digital evidence that increasingly is a feature of modern crime.

Irfan Ahmed, Ph.D.Kostadin Damevski, Ph.D.
3 min. read

What You Need To Know About Cybersecurity From the Director of the Rensselaer Future of Computing Institute

Cyber threats have become one of the leading issues for corporations, governments, and public institutions across America. With ransomware attacks, hackers, and other nefarious threats, the issue is becoming a daily occurrence and leading news story. Rensselaer Polytechnic Institute’s James Hendler, director of the Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration, weighs in on what we should all know about cybersecurity. Overview Think about cybersecurity the way you think about home security – the more valuables you have, the more security you need. A normal user needs the equivalent of a lock on the door, which most of our computers provide out of the box. However, a user with a fair amount of personal information, who keeps financial records or runs a small business, probably wants a firewall or other additional protection. We used to tell people to protect their computers with firewalls, malware detectors, and the like, but now it is much more important to protect your web access, be wary of external sites, and keep your passwords secure and not easily guessed. Use of a password manager program can be really helpful for people who use a lot of different accounts. Threats The biggest threat facing individuals is identity theft caused by someone getting into an account that you don’t control. Most malware or password stealing comes via a phishing attack (a fake email that convinces you to click a bad link), so if you see an offer that looks too good to be true, don’t believe it. Never give out a password or personal information without confirming that it is legitimate. We also recommend not using major accounts (like Google, Facebook, etc.) to log in to new apps where you aren’t completely sure of the reliability – you’re safer if you use a separate password. It’s also worth noting that these kinds of attacks are now happening on cell phones – if you get a text saying your Amazon, Netflix, or other services have been shut off, be very careful. These companies almost never send out such messages, and if they do, they come via email, not text. For businesses, ransomware is becoming an increasing challenge. Frequent backups and dual authentication are absolute musts for small businesses. Large businesses, and especially those with cyber-physical connections such as a manufacturing device, must have someone on the team who understands internet technology. Outside audits done annually, at least, are also highly recommended. The biggest danger in cybersecurity is that people, especially in businesses, think that the software industry will fix things and that they don’t have to worry. That’s like expecting auto manufacturers to stop car theft, or the government to prevent all crime – these organizations certainly need to help, but they cannot be perfect. So while there definitely needs to be a role for manufacturers and government, people need to understand that the threats are now coming from social interactions such as phishing, or serious criminal enterprises such as ransomware attackers, and not just maladjusted teenagers. They must be ready to pay for some security if they have things on their network that need protection. The Cloud Cloud-based services are a major boon to cybersecurity for individuals and small businesses if, and only if, people protect their access. If a breach is reported to you by a company, don’t ignore it, change your password, and, whenever possible, use dual authentication. The cloud companies can afford to spend more on security than you can and thus your information stored in these services tends to be quite secure. However, people need to be careful in using the cloud. Just as you may trust a bank with your money, you want to be sure not to be robbed on your way there. Future Computing Systems and Cybersecurity New technologies, such as artificial intelligence (AI), are arising all the time in today’s fast-moving cyber world. As these technologies arise, they can create new opportunities for cybersecurity, but can also create new challenges. Cybercrime will never disappear, and each new capability comes with a price. Increased education and awareness of emerging computing technologies (blockchain, quantum, etc.) are important not just for the expert, but also for the general public. It is important to stay informed and pay attention to what is being reported. Just as buying a new appliance can be a great advantage at home (I love my new air-fryer), you also have to be sure to be using it appropriately (used wrong, it can cause fires). Looking to learn more or connect with an expert for your questions and coverage? James Hendler is the director of the Rensselaer Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration. Hendler has authored over 400 books, technical papers, and articles in the areas of Semantic Web, artificial intelligence, cybersecurity, and high-performance processing. Hendler is available to speak with media - simply click on his icon now to arrange an interview today.

James Hendler
4 min. read

Experts in the Media: Georgia Southern investing $1.2 million to upgrade campus security cameras

Georgia Southern University is planning a major upgrade to its campus security cameras and video technology. With approximately $1.2 million budgeted, the University will upgrade the cameras in the resident halls and other buildings in Statesboro, Savannah and Hinesville to bring the current cameras from analog to a digital platform. Additionally, new cameras will be placed at entrances to theirr campuses that can tie into those from other law enforcement agencies. The end result will be an interconnected network of cameras across the region. The new technology package includes state-of-the-art Flock cameras, which are motion-activated and record license plate numbers of any vehicle that comes into the hall parking lots. Flock Safety’s “Vehicle Fingerprint” technology lets police search the video by vehicle make, color, type, license plate, state of the license plate, missing plate, covered plate, paper plate, and unique vehicle details such as roof racks, bumper stickers, and more. The cameras can be used to look for a specific suspect or a vehicle that has been entered into law enforcement databases. Additionally, the University can use Flock for investigative purposes as well by going back and looking for any cars that fit a certain profile if it was associated with a crime or if there was a gunshot detected nearby. “This upgrade allows us to add more cameras, extend our reach, add storage and searching capabilities and better integrate our cameras into other video surveillance networks in use by local law enforcement,” said Georgia Southern University Police Chief Laura McCullough. “This is a major step forward in our ongoing work to keep our campus safe.” The new equipment will add to, and augment, Georgia Southern’s network of more than 1,800 video cameras on its three campuses. The project will begin in the coming weeks and is expected to be completed by the start of the fall 2023 semester. The announcement has garnered a lot of attention, especially with local media and publications covering security. If you're a journalist looking to know more about this announcement or speak to an expert about campus security and safety - then let us help with your coverage. Georgia Southern University Police Chief Laura McCullough is available - simply reach out to Georgia Southern Director of Communications Jennifer Wise at jwise@georgiasouthern.edu to arrange an interview today.

2 min. read

FBI data shows murders are up, and our experts are ready to help with your coverage

FBI data shows murder rates are up, with the latest figures showing a staggering 21,570 murders happening nationwide in 2020. Dr. Kim Davies teaches a sociology of murder course at Augusta University and was recently interviewed on the topic by a local CBS affiliate. Davies has developed the course to help educate students and get them thinking about ways they can bring awareness to the violent crime problem. Students put a tick on the sidewalk in chalk to represent every murder to offer a better understanding of the number of families affected. “If I put that number on the board, it looks like a big number," said Davies. "But nobody really knows what that is. If we tick every mark and we say, ‘Look, that’s a victim,’ it means more to the students.” Davies also reiterates that even though this current number is probably the highest it’s ever been since she's been offering this class, it's not at an all-time high. "Murder was higher in the '90s when I was in grad school, but it’s been going down, down, down. Hopefully it’s not a trend where we continue up, but we’re back up.” If you’re a journalist covering true crime or any other aspect of this topic, then let us help with your stories. Davies is a sociologically trained criminologist with academic focus is on homicide and violence. Her most recent book, The Murder Book: Understanding Homicide Today, explores topics such as the increase in mass murders, the change in Stand Your Ground laws across the country and police shootings as it relates to the Black Lives Matter movement. Davies is available to speak with media about this subject – simply click on her icon now to arrange an interview today.

Kim Davies, PhD
2 min. read

Podcast: The partition of India: an ‘evil act’ or ‘rush to grant independence’?

Aston University academic discusses need to understand what resulted in up to two million deaths The partition formed part of a global pattern of expanding nation-states, fitting populations to borders, and decolonisation throughout the 20th century Debate now needed to find ways to accommodate human diversity rather than pulling people apart The partition of India at the end of the Second World War was not an “evil scheme” but a case of being “overtaken by events”, according to an academic at Aston University. Dr Volker Prott, a senior lecturer in modern history, spoke about the legacy of India and Pakistan’s independence in the latest episode of the ‘Society matters’ podcast series, presented by journalist Steve Dyson. Dr Prott said there was a “bitter irony” in “celebrating” the 75th anniversary of the partition and independence of India and Pakistan, granted on 15 August 1947. But he argued that now was the time to overcome divisions in society caused by Britain’s colonial past. He said: “Partition is very much an ambivalent event because, on the one hand, there is indeed grounds for celebration because it meant independence from British colonial rule for India and Pakistan … but at the same time partition was a reason for frustration and then, further on, it was a cause of violence.” Historians have estimated up to 20 million people were displaced in the years following partition, with the death toll “somewhere between 200,000 and two million people”, and possibly hundreds of thousands of girls and women suffering rape and abduction. Partition also led to a lasting long-term conflict between India and Pakistan involving several wars and the break-up of Pakistan in 1971. Dr Prott said Britain had come in for a lot of criticism due to the violence, with various historical studies regarding Indian partition as a “deliberate design” to weaken India and secure long-term British influence. But he argued that Britain was “overtaken by events” in the sense they underestimated “the dynamic for independence” and the huge potential for violence. “That’s the moment they rushed independence and rushed partition … a quick and easy exit option for the British Empire,” he said. As a result, no-one put mechanisms in place for refugee or minority protection, or to draw borders “in a sensible way”. Dr Prott said the partition of India was not an exception, but part of a larger historical pattern throughout the 20th century that also included new borders drawn that split Ireland, Palestine, Korea, Germany, Vietnam and Cyprus. This pattern comprised of three factors – the global expansion of the nation-state, “international stability” involving “fitting populations to borders”, and decolonisation leading to “friction and conflict”. He said: “We shouldn’t blame the British for plotting partition. It wasn’t an evil scheme they came up with.” But he stressed that the British did try to avoid assuming responsibility for more than a century of colonial rule in India, including “colonial violence, economic exploitation, and politicising religious identities of Muslims and Hindus” in particular. Dr Prott said the “starkest example” of a nation taking responsibility for the past was his own country, Germany, which committed the Holocaust, the “most extreme case of genocide in history”. Germany had come to terms with its crime and guilt, and accepted the need to work towards reconciliation. He said this was mostly seen as a historic problem in Germany, “but in Britain the legacy of colonialism is with us every day” with the Black Lives Matter movement, decolonising the curriculum in universities, changing street names, and removing controversial statues. He said: “We should see this dealing with our colonial past as an opportunity to bridge existing divides, to learn from each other. We need an open-ended debate.” Many people, he said, have very extreme views on the partition. Some praised the British Empire and said the violence was all because of racial hatreds, while others claimed people lived in harmony for centuries and problems were only caused by “evil British plotting”. “What we need to do is move away from these simplistic views of the past. History shows us that partitions very often cause more problems than they solve and we should try to find ways to accommodate human diversity rather than pulling people apart.” Aston University is marking the 75th anniversary of Indian partition by taking part in an exhibition at Birmingham New Street Station called ‘Children of the Railway: The Partition of India 75 Years On’, which opens on 6 September for three weeks. Dr Prott is also giving a public talk on partition at 5pm on 25 August at the Hockley Social Club.

4 min. read

Politics, policy and public safety: Experts explain why a popular Atlanta festival was canceled

A sad tune is being hummed in Atlanta, where it was announced the popular annual Music Midtown festival is not happening, possibly in part due to the state’s laws surrounding guns in public parks. The event's cancellation, which brought tens of thousands of music lovers to the city -- along with the tourism dollars they spend -- has caused disappointment and drawn local and national media coverage. Calling it a “sad day” for the city, Atlanta City Council President Doug Shipman wrote on Twitter that: “Public policy has real impacts and, in this case, economic and social implications on a great tradition.” And state Democrats chastised Republicans for adopting a raft of pro-gun legislation, including a 2022 law that allows Georgians to carry concealed handguns without first getting a license from the state. The governor, who is seeking a second term, did not immediately comment on the festival’s decision. But state Rep. Rick Jasperse, a Jasper Republican who sponsored the 2014 law, said the measure is designed with public safety in mind. He said those intent on “causing chaos and crime in Georgia” won’t care if the festival bans firearms and would try to bring them in regardless. “Good Georgians who can qualify for a permit and carry a weapon do so to protect themselves from that element in our society,” he said.  -- The Atlanta Journal Constitution, Aug. 1, 2022 Organizers of events like Music Midtown could look at Georgia’s gun laws and regulation of firearms as a potential legal liability. If there is a firearms incident, organizers may fear being held legally accountable and sued for any potential damages. The companies and their risk management advisors might think twice about holding large events in Georgia. Augusta University's Dr. William Hatcher, an expert when it comes to public administration and social, economic and political institutions in local communities, agrees that event organizers might be rethinking their plans in the state. "Yes. I think so. These types of laws have an impact on the economy and the business decisions of firms. We may see future effects on the economic behavior of individuals and firms." This topic could have further economic impact beyond canceled events, including affecting property values and home prices. If you're a journalist looking to know more, then let us help with your stories. Dr. William Hatcher is a professor of political science and chair of Augusta University’s Department of Social Sciences. He is an expert in the areas of public administration and social, economic and political institutions. Hatcher is available to speak with media regarding this topic. To arrange an interview today, simply click on his icon now.

William Hatcher, PhD, MPA
2 min. read

'I knew the men murdered in the Amazon—and their alleged killer'

On June 5, 2022, Indigenous expert Bruno Pereira of Brazil and freelance reporter Dom Phillips of Britain went missing while working in a remote part of the Amazon. Since then, a suspect in the case has confessed to their murders. But the story hasn't ended there. As journalists and experts take a closer look, the plot behind the story has thickened with politics, Indigenous rights, and organized crime. Scott Wallace, an associate professor of journalism at the University of Connecticut and author of The Unconquered: In Search of the Amazon’s Last Uncontacted Tribes, has worked extensively in Brazil's Javari Valley. He shared his perspective -- as someone who knew the victims as well as the alleged perpetrator, with National Geographic: The increasingly brazen intruders are no longer small-time players with a net or rifle seeking to put a meal on the family table. Members of the Indigenous patrols say that more and more, poaching crews appear to be highly-capitalized ventures, backed by a shadowy network of outside investors with suspected links to the illicit drug trade. Their fishing boats feature high-horsepower motors, and they carry large quantities of fuel, expensive gill nets, ice, and hundreds of kilos of salt to preserve bushmeat and critically endangered pirarucu, one of the world’s largest freshwater fish. In a rare police action, officers in March intercepted fishermen leaving the reserve with two dozen endangered river turtles, 650 pounds of salted bushmeat, and nearly 900 pounds of salted pirarucu. The evident outlays of cash create both the ability and the imperative for fishermen such as Oliveira to head deeper into the Javari territory, stay there longer, and return with hefty payloads to settle their debts. Unconfirmed reports indicate that Oliveira may have owed a Peruvian financier nicknamed “Colombia” more than $15,000 because a load of his contraband had been intercepted by the Indigenous patrols. As intruders penetrate into the depths of the Javari, Indigenous leaders and their allies fear the growing likelihood of a conflagration involving the uncontacted nomads roaming the forest. “They’re definitely putting the isolados—the isolated ones—at risk,” says Orlando Possuelo, Sydney’s son, who is based in Atalia do Norte and has been working alongside Pereira in advising the Indigenous patrols for the past two years. Poachers are pillaging the animals the isolated groups depend on for survival. And uncontacted groups remain highly vulnerable to contagious diseases, for which they have little to no immunological defense. Finally, and perhaps most immediately, there’s the very real danger of violence. “These fishermen don’t hesitate to shoot,” Orlando says. “If they’re willing to kill outside the reserve, there’s no doubt the lives of the isolated ones are in danger.” An uncontacted Indigenous group would have no way to peacefully communicate with interlopers entering their territory. Their likely first response would be to attack, which could provoke a bloodbath when intruders respond to spears or arrows with far more lethal bullets, says Paulo Marubo. “Anyone knows what the results will be between those carrying firearms and those who do not have them.” The hope of averting that alarming possibility was what led Pereira to risk his life. “The greatest concern that I have is the advance of outsiders—be they for projects authorized by the government or illegal players like loggers, miners, and land-grabbers—into the territories of the isolados,” Pereira told me in a phone call in 2019 after he was ousted from heading the isolated tribes department. “At the same time, you have the crippling of FUNAI and the department to protect the isolated tribes. It’s a very dangerous mix.” Scott Wallace is a bestselling author, photojournalist and educator who covers the environment and vanishing cultures worldwide. Scott is available to speak to media - simply click on his icon now to arrange an interview today.

Scott Wallace
3 min. read

Aston University cyber expert to appear at FinTech event in Birmingham

'FinTech Secured – Next Generation' will showcase the work of leading stakeholders in the research and development of financial technology (FinTech) and security Professor Vladlena Benson will offer insight on illicit money flows and trends in Financial Security Registrations are now open for the event on 7 June 2022 at The Compound, Birmingham. The director of the Cyber Security Innovation (CSI) Centre at Aston University is set to appear at a networking event around financial technology (FinTech). Following the success of their first flagship event of 2022 ‘Secure by Design, Advanced Manufacturing’, Midlands Cyber will launch 'FinTech Secured – Next Generation' on the 7 June 2022. The event will be the first face to face event after the pandemic in Birmingham, bringing together thought leaders and service applications specialists for an evening of industry networking. Professor Vladlena Benson, who also serves on the EU’s Agency for Cybersecurity (ENISA) task force defining the Cybersecurity Skills Framework at the European level, will be joined by contacts from within the cryptocurrency sector and offer insight on illicit money flows and trends in financial security. The event will also showcase the work of leading stakeholders in the research and development of FinTech and financial security. FinTech’s academic innovators, CEOs and company founders, entrepreneurs, contractors, investors and policymakers are encouraged to register now to discuss, participate, network and put their questions to our panel of industry experts. Professor Vladlena Benson, an industry-recognised expert in cybersecurity risk management and director of CSI Centre at Aston Business School, said: “Financial services are core to the UK economy and continue to be a common target for cyber criminals. Challenges to the insurance sector and cyber crime prosecution when crypto assets are involved are emerging and at the CSI we are working to provide forensic and data integrity solutions which help secure the FinTech sector.” User of contactless Europay, Mastercard, and Visa (EMV) may be interested in the insights of Tom Chothia, reader in cyber security at the University of Birmingham, on how the vulnerabilities of Apple Pay and Visa could enable hackers to ’Take £1000 from a locked iPhone’. Registrations are now open to join the cluster at 18:00 hrs on the 7 June 2022 at The Compound, Birmingham.

Vladlena Benson
2 min. read