Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Virtual reality training tool helps nurses learn patient-centered care

University of Delaware computer science students have developed a digital interface as a two-way system that can help nurse trainees build their communication skills and learn to provide patient-centered care across a variety of situations. This virtual reality training tool would enable users to rehearse their bedside manner with expectant mothers before ever encountering a pregnant patient in person. The digital platform was created by students in Assistant Professor Leila Barmaki’s Human-Computer Interaction Laboratory, including senior Rana Tuncer, a computer science major, and sophomore Gael Lucero-Palacios. Lucero-Palacios said the training helps aspiring nurses practice more difficult and sensitive conversations they might have with patients. "Our tool is targeted to midwifery patients,” Lucero-Palacios said. “Learners can practice these conversations in a safe environment. It’s multilingual, too. We currently offer English or Turkish, and we’re working on a Spanish demo.” This type of judgement-free rehearsal environment has the potential to remove language barriers to care, with the ability to change the language capabilities of an avatar. For instance, the idea is that on one interface the “practitioner” could speak in one language, but it would be heard on the other interface in the patient’s native language. The patient avatar also can be customized to resemble different health stages and populations to provide learners a varied experience. Last December, Tuncer took the project on the road, piloting the virtual reality training program for faculty members in the Department of Midwifery at Ankara University in Ankara, Turkey. With technical support provided by Lucero-Palacios back in the United States, she was able to run a demo with the Ankara team, showcasing the UD-developed system’s interactive rehearsal environment’s capabilities. Last winter, University of Delaware senior Rana Tuncer (left), a computer science major, piloted the virtual reality training program for Neslihan Yilmaz Sezer (right), associate professor in the Department of Midwifery, Ankara University in Ankara, Turkey. Meanwhile, for Tuncer, Lucero-Palacios and the other students involved in the Human-Computer Interaction Laboratory, developing the VR training tool offered the opportunity to enhance their computer science, data science and artificial intelligence skills outside the classroom. “There were lots of interesting hurdles to overcome, like figuring out a lip-sync tool to match the words to the avatar’s mouth movements and figuring out server connections and how to get the languages to switch and translate properly,” Tuncer said. Lucero-Palacios was fascinated with developing text-to-speech capabilities and the ability to use technology to impact patient care. “If a nurse is well-equipped to answer difficult questions, then that helps the patient,” said Lucero-Palacios. The project is an ongoing research effort in the Barmaki lab that has involved many students. Significant developments occurred during the summer of 2024 when undergraduate researchers Tuncer and Lucero-Palacios contributed to the project through funding support from the National Science Foundation (NSF). However, work began before and continued well beyond that summer, involving many students over time. UD senior Gavin Caulfield provided foundational support to developing the program’s virtual environment and contributed to development of the text-to-speech/speech-to-text capabilities. CIS doctoral students Fahim Abrar and Behdokht Kiafar, along with Pinar Kullu, a postdoctoral fellow in the lab, used multimodal data collection and analytics to quantify the participant experience. “Interestingly, we found that participants showed more positive emotions in response to patient vulnerabilities and concerns,” said Kiafar. The work builds on previous research Barmaki, an assistant professor of computer and information sciences and resident faculty member in the Data Science Institute, completed with colleagues at New Jersey Institute of Technology and University of Central Florida in an NSF-funded project focused on empathy training for healthcare professionals using a virtual elderly patient. In the project, Barmaki employed machine learning tools to analyze a nursing trainee’s body language, gaze, verbal and nonverbal interactions to capture micro-expressions (facial expressions), and the presence or absence of empathy. “There is a huge gap in communication when it comes to caregivers working in geriatric care and maternal fetal medicine,” said Barmaki. “Both disciplines have high turnover and challenges with lack of caregiver attention to delicate situations.” UD senior Rana Tuncer (center) met with faculty members Neslihan Yilmaz Sezer (left) and Menekse Nazli Aker (right) of Ankara University in Ankara, Turkey, to educate them about the virtual reality training tool she and her student colleagues have developed to enhance patient-centered care skills for health care professionals. When these human-human interactions go wrong, for whatever reason, it can extend beyond a single patient visit. For instance, a pregnant woman who has a negative health care experience might decide not to continue routine pregnancy care. Beyond the project’s potential to improve health care professional field readiness, Barmaki was keen to note the benefits of real-world workforce development for her students. “Perceptions still exist that computer scientists work in isolation with their computers and rarely interact, but this is not true,” Barmaki said, pointing to the multi-faceted team members involved in this project. “Teamwork is very important. We have a nice culture in our lab where people feel comfortable asking their peers or more established students for help.” Barmaki also pointed to the potential application of these types of training environments, enabled by virtual reality, artificial intelligence and natural language processing, beyond health care. With the framework in place, she said, the idea could be adapted for other types of training involving human-human interaction, say in education, cybersecurity, even in emerging technology such as artificial intelligence (AI). Keeping people at the center of any design or application of this work is critical, particularly as uses for AI continue to expand. “As data scientists, we see things as spreadsheets and numbers in our work, but it’s important to remember that the data is coming from humans,” Barmaki said. While this project leverages computer vision and AI as a teaching tool for nursing assistants, Barmaki explained this type of system can also be used to train AI and to enable more responsible technologies down the road. She gave the example of using AI to study empathic interactions between humans and to recognize empathy. “This is the most important area where I’m trying to close the loop, in terms of responsible AI or more empathy-enabled AI,” Barmaki said. “There is a whole area of research exploring ways to make AI more natural, but we can’t work in a vacuum; we must consider the human interactions to design a good AI system.” Asked whether she has concerns about the future of artificial intelligence, Barmaki was positive. “I believe AI holds great promise for the future, and, right now, its benefits outweigh the risks,” she said.

5 min. read

Insights: Cyber Risks & Opportunities in 2025

Managing cyber risk is no longer simply a technical necessity but also a strategic imperative in global business. With companies becoming more interconnected and reliant on artificial intelligence, the Internet of Things, and the rest of the digital ecosystem, they are exposed to greater opportunity and risk. In the video below, Senior Managing Director & cybersecurity expert Denis Calderone shares topics covered in the 2025 J.S. Held Global Risk Report focused on managing cyber risk in the year ahead. To view the report and learn more about cyber risks and opportunities, click on the button below: Looking to know more or connect with Denis Calderone Simply click on his icon to arrange an interview today.

1 min. read

J.S. Held 2025 Global Risk Report: Navigating Cyber Risk in an Era of Evolving Technology & Regulations

Managing cyber risk is no longer a technical necessity but also a strategic imperative in global business. As companies are more interconnected and reliant on artificial intelligence (AI), the Internet of Things, and the rest of the digital ecosystem, they are exposed to greater opportunities and risks. In this video, Senior Managing Director and cybersecurity expert Denis Calderone shares topics covered in the 2025 J.S. Held Global Risk Report focused on managing cyber risk in the year ahead. The global regulatory landscape is evolving rapidly in response to the increasing severity of cyber threats. Governments and regulatory bodies, including the U.S. Securities and Exchange Commission (SEC), the European Union (EU), and the U.S. Transportation Security Administration (TSA), have introduced cybersecurity mandates that require businesses to strengthen their defenses, improve incident reporting, and ensure compliance with new industry standards. The 2025 Global Risk Report by J.S. Held provides perspectives on these regulatory shifts, helping businesses navigate the complexities of cyber risk and compliance. The growing frequency and severity of cyberattacks are reshaping how businesses approach risk management. The J.S. Held 2025 Global Risk Report explores key issues facing business today, including: Business Interruption from Cyber Incidents: High-profile cases like Change Healthcare’s 2024 breach demonstrate how cyberattacks can halt operations, lead to regulatory scrutiny, and result in massive financial losses. Reputational and Legal Fallout: Cyber incidents can trigger lawsuits and damage a company’s reputation, often leading to prolonged trust recovery periods with customers and investors. Loss of Sensitive Data: Data breaches can expose critical information, including personal, financial, and proprietary data, amplifying risks of identity theft and fraud. Tightening Regulatory Landscape: New cybersecurity laws, such as the EU’s NIS2 Directive and Cyber Resilience Act, alongside the US SEC’s disclosure rules, demand stricter compliance from businesses in key sectors. Complexities in Cyber Insurance: Many companies lack clarity on whether their policies cover ransomware or meet legal and operational needs, leaving them exposed to potential financial risks. Ransomware Dilemmas and Legal Risks: Paying a ransom may violate international sanctions, creating additional legal complications for organizations already dealing with cyberattacks. Proactive Cybersecurity Enhancements: Companies implementing advanced cybersecurity measures like MFA, EDR, and immutable backup systems improve their defenses and reduce risks of disruption. AI-Powered Threat Detection: Artificial intelligence enables companies to identify fraud and cyberattacks faster by analyzing patterns and anomalies in real time, minimizing damage, and reducing costs. Increased Demand for Cyber Insurance: As companies across industries seek better coverage, insurers have opportunities to innovate new products, though exclusionary clauses are becoming more common. Business Continuity and Resilience: Organizations with strong cyber hygiene, incident response plans, and dependency mapping are better prepared for attacks and may benefit from reduced insurance premiums. Cybersecurity risk is just one of the five key areas analyzed in the J.S. Held 2025 Global Risk Report. Other topics include sustainability, supply chain, cryptocurrency and digital assets, AI and data regulations. If you have any questions or would like to further discuss the risks and opportunities outlined in the report, email GlobalRiskReport@jsheld.com. To connect with Denis Calderone simply click on his icon now. For any other media inquiries - contact : Kristi L. Stathis, J.S. Held +1 786 833 4864 Kristi.Stathis@JSHeld.com

3 min. read

AI, Data & Digital Regulations: Global Risks & Opportunities in 2025

The adoption of artificial intelligence (AI) technologies and the massive growth of data generation is leading to significant advantages in global business. However, it is also presenting greater challenges with cybersecurity, data governance, regulatory compliance, and ethical conduct. In the video below, hear digital investigations and discovery experts Antonio Rega and Simon Placks discuss risks and opportunities around AI, data, and digital regulations covered in the 2025 J.S. Held Global Risk Report. To view the report and learn more about crypto and digital asset risks and opportunities click on the button below: Looking to know more or connect with Simon Placks or Antonio Rega? Simply click on either expert's icon now to arrange an interview today.

Antonio RegaSimon Placks
1 min. read

J.S. Held Global Risk Report Unpacks AI Challenges and Digital Regulations Reshaping Business

Artificial intelligence (AI) is transforming industries, yet its rapid adoption brings new risks and regulatory scrutiny. The J.S. Held 2025 Global Risk Report provides expert perspective on AI-driven cyber threats, data governance challenges, and compliance requirements shaping the future of business. As companies integrate AI to enhance efficiency, they must also navigate risks such as data poisoning, biased AI outputs, and legal exposure under the EU AI Act. The report highlights how businesses can safeguard their operations while leveraging AI’s potential for cybersecurity, fraud detection, and operational efficiency. Key insights from the report include: The growing use of AI by cybercriminals to launch sophisticated attacks The environmental impact of AI’s energy-intensive data centers How AI-specific insurance products are evolving to cover new risks Compliance challenges posed by the EU AI Act for high-risk systems The rise of AI governance roles to ensure ethical implementation “With regulatory landscapes shifting and cyber risks escalating, the 2025 Global Risk Report helps equip businesses with the knowledge needed to stay ahead of evolving threats,” noted digital forensics, data governance, privacy, security, emerging technology, and discovery expert Antonio Rega. London-based digital investigations and discovery expert Simon Placks joins Antonio Rega to discuss risks and opportunities around AI, data, and digital regulations explored in the J.S. Held 2025 Global Risk Report in this video: Beyond AI, the J.S. Held 2025 Global Risk Report examines four additional critical risk areas: sustainability, supply chain disruptions, cryptocurrency trends, and cyber risk management. Each section offers actionable strategies to mitigate threats and capitalize on emerging opportunities. For media inquiries, requests for interviews, or to further discuss the risks and opportunities outlined in the report, email GlobalRiskReport@jsheld.com. To connect with Simon Placks or Antonio Rega simply click on either expert's icon now. For any other media inquiries - contact : Kristi L. Stathis, J.S. Held +1 786 833 4864 Kristi.Stathis@JSHeld.com

Antonio RegaSimon Placks
2 min. read

Global Supply Chain Disruptions and Risks Intensify: 2025 J.S. Held Global Risk Report Highlights Key Challenges

Supply chain disruptions cost organizations an estimated $184 billion annually, according to Swiss Re. A recent survey of 2,000 European shipping customers by logistics giant Maersk revealed that 76% experienced supply chain disruptions that delayed their business operations in the past year, with 22% reporting more than 20 disruptive incidents in the same period. These figures underscore the growing businesses’ growing vulnerabilities, as detailed in the 2025 J.S. Held Global Risk Report, which outlines how companies worldwide must adapt to an increasingly complex and volatile supply chain landscape. As highlighted in the 2025 Global Risk Report, modern supply chain disruptions stem from a range of factors, including climate change, natural disasters, cyberattacks, fraud, and geopolitical instability. Conflicts such as the Russia-Ukraine war and tensions in the Middle East continue to exacerbate these challenges. Gone are the days when companies could shift blame to suppliers without accountability. The globalization of supply chains has made them increasingly susceptible to cyber incidents, material shortages, and regulatory scrutiny. Consumers and governments alike are demanding greater transparency, pushing companies to disclose where products come from, how they are sourced, and whether their manufacturing processes harm people or the environment. The 2025 Global Risk Report notes that in response, governments worldwide have introduced stricter regulations, particularly in the European Union, where new and existing legislation is enforcing greater oversight and compliance. “As consumers, governments, and corporations acknowledge the effects of supply chain risks, transparency and due diligence will become more critical to the internal compliance structure of global businesses,” said Vice President of Sustainability Andrea Korney. “The enactment and greater enforcement of laws focused on sustainability issues have increased the obligations on companies to examine the sources and actions of their suppliers and how it all impacts the entire value chain.” In the 2025 J.S. Held Global Risk Report, multidimensional experts who combine scientific, technical, financial, and risk management expertise identify and explore key business risks shaping the future of supply chain resilience, including: Geopolitical instability Natural disasters and climate science Maritime route disruptions Regulatory fragmentation Cybersecurity threats Trade and tariff threats Critical minerals dependency Financial risks and fraud J.S. Held environmental risk and compliance expert John Peiserich, Esq., observes, “These risks are no longer hypothetical—they are actively reshaping the business landscape. Organizations that fail to anticipate and mitigate these challenges risk operational disruptions, financial losses, and reputational damage.” For businesses seeking to build resilient supply chains, the 2025 J.S. Held Global Risk Report serves as an important guide, providing expert insights and data-driven analysis to help companies navigate the evolving risk landscape. J.S. Held experts serve as trusted advisors to global clients on these and other risks, crafting business strategies, leveraging technology seeking to mitigate risk, and optimizing business opportunities to build resilience in an era of uncertainty. Supply chain risk is just one of the five key areas analyzed in the J.S. Held 2025 Global Risk Report. Other topics include sustainability, the rise of crypto and digital assets, AI and data regulations, and managing cyber risk. If you have any questions or would like to further discuss the risks and opportunities outlined in the report, please email GlobalRiskReport@jsheld.com. To connect with Andrea Korney or John Peiserich simply click on either expert's icon now. For any other media inquiries - simply contact : Kristi L. Stathis, J.S. Held +1 786 833 4864 Kristi.Stathis@JSHeld.com

Andrea KorneyJohn Peiserich, Esq.
3 min. read

J.S. Held Releases 2025 Global Risk Report Addressing Critical Risks Amid Uncertainty

On the first day of the new presidential administration in the United States, global consulting firm J.S. Held unveils its annual report focused on critical areas impacting industries and economies worldwide. Explore the 2025 J.S. Held Global Risk Report here: In an increasingly uncertain and volatile global landscape, businesses, governments, and investors face a growing array of challenges that demand immediate attention and innovative solutions. The 2025 J.S. Held Global Risk Report explores five interconnected topics that organizations must consider in managing risk and opportunity in the year ahead. These include: 1. Sustainability Investments & Headwinds: With various ESG regulations across jurisdictions and increasing scrutiny over corporate environmental and social practices, experts explore how organizations can align with evolving frameworks while driving innovation. 2. Global Supply Chain Challenges: From geopolitical conflicts to climate disruptions, the report analyzes how companies can build more resilient and sustainable supply chains. 3. Crypto & Digital Asset Intensification: As the crypto landscape transitions through regulatory shifts and technological advancements, the report highlights both the risks and opportunities for businesses and investors. 4. Artificial Intelligence, Data & Digital Regulatory Response: With Artificial Intelligence (AI) systems reshaping industries, experts examine the regulatory, ethical, and operational challenges, as well as the competitive advantages for organizations that harness this transformative technology responsibly. 5. Cybersecurity Complexities: From AI-powered cyberattacks to evolving data protection laws, the report provides insights into how organizations can safeguard operations and maintain customer trust in a rapidly shifting digital environment. The 2025 J.S. Held Global Risk Report includes an analysis of these categories of risk and actionable opportunities for companies to gain a competitive edge while addressing critical vulnerabilities. “The 25 technical, scientific, financial, and strategic advisory experts who contributed to the J.S. Held Global Risk Report have collaboratively parsed not only each risk independently but also at their unique points of intersection to create a framework to support business decision-making,” noted Greg Esslinger, Executive Vice President and Global Investigations Practice Leader. “Our experts’ deep understanding of the external factors related to the topics that keep CEOs, CFOs, COOs, CLOs, and Boards of Directors up at night drives the curated insights shared in the report and helps clients navigate risks and capitalize on emerging opportunities in the year ahead,” adds John Peiserich, Esq., Executive Vice President and Environmental, Health, & Safety Practice Leader. The depth and breadth of J.S. Held’s work in the insurance market provides a strong foundation in risk assessment, data analysis, global awareness, regulatory compliance, technological adaptability, and risk mitigation. Collectively, these skills better equip the firm’s experts to assess business risk across diverse geographies, geopolitical landscapes, compliance frameworks, and digital advancements. "In a world where uncertainty is the only constant, there is a need for something solid you can hold onto," observes J.S. Held Chief Executive Officer Jonathon Held. "Our name is our promise," he adds. "Our role as strategic advisor is emblematic of this promise, even in the face of the most daunting risks, clients have the expertise and guidance to act with confidence" "Agile, collaborative, and creative client-centric teams provide solution-forward advisory to our clients across the globe, no matter the scope or complexity of a project; the J.S. Held Global Risk Report is reflective of the trusted advisor role we have earned over the last 50 years," noted J.S. Held President and Chief Operating Officer Lee Spirer. J.S. Held's expertise in strategic advisory is built upon five decades of experience in the most rigorous venues – state, federal, and international courts – and spans more than 150 different industry segments. If you have any questions or would like to further discuss the risks and opportunities outlined in the report, please email GlobalRiskReport@jsheld.com. To connect with Greg Esslinger or John Peiserich simply click on either expert's icon now. For any other media inquiries - simply contact : Kristi L. Stathis, J.S. Held +1 786 833 4864 Kristi.Stathis@JSHeld.com

Greg EsslingerJohn Peiserich, Esq.
3 min. read

Expert Q&A - Craig Albert, PhD, talks election interference

Going into the final days of the 2024 election cycle there is a very real concern about election interference from both foreign and domestic actors, and it's something that will continue to be monitored even after the final votes are tallied. Craig Albert, PhD, graduate director of the PhD in Intelligence, Defense, and Cybersecurity Policy and Master of Arts in Intelligence and Security Studies programs at Augusta University, is a leading expert on propaganda, information warfare and national security studies. Albert has answered key questions about who is trying to interfere in the U.S. elections and why it matters. Q: How and when should someone vote and does it protect you more to avoid interference? The access to instantaneous news or events could affect people and their understanding of whom they want to vote for all the way up until the day they vote. Because of this ease of access, this election cycle has especially shown us how cautious we need to be in regards to scams. It's also why I know there has been a big push for early voting and mail-in voting, and it's necessary in some cases, but I prefer to vote on Election Day because you never know what type of news might come out about one of the candidates or parties. If something comes out that proves to be true, it could affect how someone might vote, but if you voted before Election Day, it's too late. At the same time, a very serious deepfake could be released that could manipulate how people choose to vote and it could mislead people, as well. Q: What are the consequences of the optics of an 'unfair' election? What the U.S. needs to be cautious about is preserving and maintaining the legitimacy of the election cycle. After the election, no matter who wins, narratives of interference and how it impacted the election are going to be shared and that's just irresponsible. Unless there's damning information and very clear evidence, you shouldn't mess around with the idea that the election was interfered with, because that could threaten the very structure of the United States. Q: What's the potential for post-election meddling? We have domestic bad actors as well as foreign maligned actors that are going to say the election was delegitimized no matter who wins. They have social media campaigns ready to post no matter which side wins, they're going to circulate false videos of ballot boxes burning or news that not all the the votes were counted and things of that nature. They're going to do all kinds of things because anybody can fake a ballot box being burned or mail in votes not being counted properly on video or something like that. The problem is if it goes out there or becomes viral, so many people will believe it and that sows discord. So, that creates distrust in the public system on a pretty big swath of the American population. Q: Who benefits from post-election doubts and chaos? You have foreign actors that really build on the type of anger that the political candidates and their parties already use through their propaganda and rhetoric. We have already seen Russia amplifying the message that somebody cheated or elections were hacked, and you have China, Iran, Venezuela, ISIS and Al Qaeda doing that, as well. You also have regular cyber criminals that just want to sew discord and distress so they can manipulate people later on and get into our banking systems and things of that nature. You have potentially hundreds, if not thousands of attack vectors coming at the United States between election night and January 20 when the new President will be sworn in. And then afterwards, they will all still be trying to create chaos, rebellion, civil unrest, or in the case of Iran, China and Russia, open civil war in the United States. Looking to know more and covering the election, Augusta University can help. Albert is available to speak with media – simply click on his name to arrange an interview today.

Craig Albert, PhD
3 min. read

ExpertSpotlight: A Brief History of Espionage

The world was watching with wonder this week as news stories poured in about exploding pagers and how the armed devices made their way around an international supply chain and into the hands (and pockets) of Hezbollah. Espionage, a practice as old as civilization itself, has shaped the course of history by influencing wars, international relations, and technological advancements. From ancient times to the digital age, espionage has played a crucial role in national security and global diplomacy. This topic remains highly relevant today as concerns over cybersecurity, state-sponsored hacking, and corporate espionage dominate public discourse. Journalists covering this topic will find a rich array of story angles, including historical perspectives and modern implications. Key sub-topics that may interest journalists and the public include: Evolution of Espionage Tactics: Examining how espionage methods have developed from traditional spying techniques to modern digital surveillance, cyber-espionage, and the use of AI in intelligence gathering. Espionage and International Relations: Investigating the role of espionage in shaping diplomatic relations and its influence on global politics, alliances, and rivalries. Cybersecurity and Digital Espionage: Exploring how espionage has evolved in the digital age, focusing on cyber threats, hacking incidents, and the growing importance of cybersecurity in national defense. Famous Spies and Spy Agencies: Delving into the history of iconic spies and intelligence agencies, from World War II's codebreakers to Cold War espionage, and how these figures shaped the geopolitical landscape. Ethical and Legal Considerations: Analyzing the ethical dilemmas and legal boundaries surrounding espionage, including the balance between national security and individual privacy. Espionage in Popular Culture: Looking at how espionage has been depicted in literature, film, and media, and how these portrayals reflect and shape public perceptions of intelligence work. As espionage continues to evolve alongside technological advancements, it remains a critical issue in discussions of national security, global power dynamics, and privacy. This historical overview provides journalists with an opportunity to explore the enduring relevance of espionage in shaping both the past and future. Connect with an expert about the History of espionage: To search our full list of experts visit www.expertfile.com

2 min. read

Global Technology Outage Raises Concerns About Ease of Future Cybersecurity Attacks

The world came to a standstill after a technology outage reported Thursday evening grounded airplanes, disconnected hospitals and shut down banks across the globe. A faulty software update was to blame, not cybercriminals, but Florida Tech assistant professor TJ O’Connor said the outage’s cascading effect points to larger concerns about our society’s reliance on the internet. The outage, which affected users’ ability to access Microsoft 365 applications, was traced back to a defect found in a software update from cybersecurity company CrowdStrike. CrowdStrike quickly released a statement confirming that the outage was “not a security incident or cyberattack.” The outage was nonetheless damaging, kicking institutions offline. Issues remained more than a day later. “Once those services go down, there’s this massive cascading effect,” O’Conner said. “If bank processing doesn’t work, then aviation doesn’t work. If aviation doesn’t work, shipping doesn’t work.” Ultimately, O’Connor explained, the biggest concern isn’t the glitch in the system; it’s the number of systems that broke because CrowdStrike wasn’t working. “I think what we’ll see a lot of people learn from this CrowdStrike incident is…that if they want to take the internet down in the future, all they have to do is hit one target,” O’Connor said. “It makes the threat landscape a lot smaller to attack for an adversary.” Over the course of several hours, a blue Microsoft error screen taunted companies worldwide. Airlines including Delta, American and Frontier grounded all flights. Several television news outlets, including the United Kingdom’s Sky News, were unable to hold live broadcasts. Some of the biggest concerns lie in the hospital industry, where planning, evaluation and continuous monitoring are essential, O’Connor noted. “[Hospitals] are constantly processing so much data, and for them to go out for a couple of hours means that decisions aren’t being made on an automated basis,” O’Connor said. “We’ve kicked over so much of our decision making to automated systems that we can’t let those networks fail.” According to the United Kingdom’s National Health Service (NHS), the outage disrupted its appointment and patient record system. Mass General Brigham in Boston, Massachusetts was also one of several U.S. hospitals that cancelled non-urgent surgeries, procedures, and medical visits because of the disruption. 911 outages were also reported in several states, including Phoenix, Arizona, whose computerized dispatch center was affected, the police department posted on social media. In Portland, Oregon, Mayor Ted Wheeler issued a citywide state of emergency due to the outage’s impact on city servers, computers and emergency communications. Although CrowdStrike confirmed the incident was not malicious, O’Connor said it raises questions about overall reliance on the internet to make decisions, as well as ineffectiveness in securing it. “We continually have these wake-up moments where something happens, it’s large scale, it’s a news blip, and then we forget about it… but our adversaries don’t,” O’Connor said. “Unfortunately, the attack infrastructure and the ability to attack is getting easier and easier.” O’Connor also expects future network attacks to get worse, calling the unstable global environment a “national-level issue to address.” While large-scale attacks and outages are mostly out the individuals’ control, O’Connor said, people can take action to protect themselves from personal cybersecurity attacks by using multi-factor authentication as much as possible. Looking to know more?  Dr. TJ O’Connor’s research is focused on cybersecurity education, wireless protocols, software-defined radio and machine learning. If you're looking to connect with Dr. O'Connor - simply click on his icon now to arrange an interview today.

3 min. read