Professor Donna O'Shea, a Principal Investigator with the Bernal Institute and faculty member at the School of Engineering, discusses the importance of cyber resilience in interconnected systems and why digital sovereignty is central to cybersecurity.
鈥淒igital systems are now deeply embedded in how we live, work, and interact 鈥 from energy and transport to manufacturing and healthcare,鈥 says Prof Donna O鈥橲hea.
鈥淎 successful cyberattack on these digital and often critical infrastructures can have devastating financial and societal consequences. We鈥檝e already seen fuel pipelines shut down, logistics operations halted, factory production stopped and power grids disrupted.鈥
O鈥橲hea 鈥 who previously held the position of chair of cybersecurity at Munster Technological University 鈥 is chair of digital engineering at 九色视频 (UL), where she focuses on cybersecurity. Her research is centred on building resilient and secure digital engineering ecosystems in the context of cybersecurity, interoperability and explainability.
O鈥橲hea鈥檚 focus on ensuring resilience in digital infrastructure extends across the island of Ireland, as seen in the CyberUnite project 鈥 an initiative co-led by O鈥橲hea and Queen鈥檚 University Belfast鈥檚 Dr Kieran McLaughlin that aims to enhance the cybersecurity of cross-border critical infrastructure.
In August, to receive funding from the Irish Government, with each project receiving up to 鈧4m over a four-year period.
Secure infrastructure
鈥淢y research is important as it helps make sure that cybersecurity doesn鈥檛 become the linchpin that holds back progress in digitalisation and digital engineering,鈥 O鈥橲hea explains to SiliconRepublic.com. 鈥淚nstead, it enables innovation by embedding security into the design of future systems.
鈥淚t also contributes to the development of resilient digital ecosystems 鈥 ones that can withstand disruption, safeguard users and continue to deliver societal value in an increasingly complex and interconnected world.鈥
As part of her research, O鈥橲hea works on modelling complex, interconnected systems, often involving embedded technologies and heterogeneous networks, and applying AI to make these systems 鈥渕ore robust and secure鈥.
One example of her work involves smart grids, which are modernised electricity networks that allow two-way flows of energy and data.
鈥淲hile smart meters offer benefits like accurate billing and energy efficiency, they also collect detailed information about household energy usage 鈥 which can reveal patterns about when people are home, what devices they use and even lifestyle habits,鈥 says O鈥橲hea. 鈥淭hat raises serious privacy concerns, especially as this data is shared across networks and third-party systems.
鈥淭o tackle this, we developed a technique called Enhanced Differential Privacy with Noise Cancellation (E-DPNCT), a method that helps protect personal energy data from being reconstructed or misused, even in cases where multiple entities might collude to access it.鈥
Supply chains and AI
O鈥橲hea says that as digital systems become more interconnected, cybersecurity faces new challenges.
She says one of the most important topics in cybersecurity at the moment is third-party and supply chain security, 鈥渨here a single vulnerability in a trusted provider can cascade across an entire ecosystem鈥.
She uses the example of the notorious SolarWinds attack in 2020, where malicious code was embedded into a routine update and distributed to thousands of customers worldwide 鈥 leading to multiple government systems being affected, including NATO, the European Parliament and the US and UK governments.
鈥淭his incident exposed the fragility of digital trust and underscored the importance of emerging security principles and topics such as zero trust,鈥 says O鈥橲hea.
One cybersecurity topic that O鈥橲hea believes deserves 鈥渇ar more attention鈥 is the privacy risks associated with AI assistants (such as those that incorporate agentic AI) and autonomous tools such as ChatGPT and Microsoft Copilot.
鈥淸These] systems have been designed to make decisions and take actions with minimal human intervention, improving automation and decision-making. However, the privacy challenges associated with these AI assistants have not been fully explored with risks including uncontrolled data access, inference and leakage risks, data retention and model memory, and user consent and control,鈥 she says.
O鈥橲hea thinks that more awareness is needed about these risks because AI assistants are 鈥渂eing integrated into enterprise environments at scale鈥 and are increasingly used by citizens to perform everyday tasks.
鈥淲ithout clear governance, transparency and privacy-by-design principles, these systems could inadvertently compromise personal and organisational data 鈥 undermining trust and introducing new vulnerabilities into already complex digital ecosystems,鈥 she says.
Digital sovereignty
In the face of growing geopolitical tension and instability, the subject of digital sovereignty has received strong attention recently. For example, earlier this year to improve technological independence and strengthen its digital sovereignty.
鈥淭he traditional notion of sovereignty 鈥 the power of a state to control its territory and make its own laws 鈥 has evolved in the age of digital technology,鈥 says O鈥橲hea. 鈥淲ithin Europe, digital sovereignty has become increasingly important and is about ensuring that European data, infrastructure and innovation are governed by European values and law, not by foreign interests.鈥
However, O鈥橲hea adds that the pursuit of digital sovereignty is not without its challenges.
鈥淎 number of factors threaten Europe鈥檚 ability to control its own digital future. One of the most significant risks is dependence on non-EU technology providers,鈥 she says. 鈥淢uch of Europe鈥檚 data is stored and processed by US-based cloud companies, much of its telecommunications infrastructure relies on Chinese hardware manufacturers while most advanced semiconductors are controlled by a handful of companies outside the EU.鈥
This dependency, she says, means that European data and critical services can 鈥渇all under the reach of foreign jurisdictions鈥.
鈥淭his concentration raises concerns about the integrity and security of hardware, software and managed services, particularly when global tensions disrupt supply chains,鈥 says O鈥橲hea.
鈥淒igital sovereignty is therefore central to cybersecurity: without control over data, technologies and infrastructure, nations cannot fully defend against cyberthreats or protect their citizens鈥 privacy and security.鈥