The Fight Comes to Our Shores: Breaking Down the Cyber Attack on Stryker

Start: March 13, 2026 | 12:00 pm ET / 9:00 am PT
End: March 13, 2026 | 12:45 pm ET / 9:45 am PT

On Wednesday, March 11, a pro-Iran hacking group claimed to have wiped 200,000 devices of a major U.S. medical device manufacturer. What do we know about what happened, and who carried out this destructive attack? How should policymakers and critical infrastructure owners and operators respond?

On Wednesday, March 11, a pro-Iran regime hacking group claimed to have wiped 200,000 devices of a major U.S. medical device manufacturer. Press reports indicate that operations at the company, Stryker, have been affected. While there have been ongoing pro-Iranian cyber operations in the Middle East since Israel and the United States launched strikes on Iran at the end of February, this is the first significant domestic incident.

What do we know about what happened, and who carried out this destructive attack? What are the potential motivations behind the targeting? How does it compare to past cyber operations? And how should policymakers and critical infrastructure operators respond? Join Institute for Security and Technology friends and adjunct advisors to hear them break down this attack on the U.S. homeland and its implications. Read the recap.

Moderator: Megan Stifel, IST

Panelists: Jason Kikta, Alex Orleans, Christopher Plummer

Panelists

Megan Stifel

Chief Strategy Officer

Jason Kikta

Adjunct Senior Technical Advisor

Alex Orleans

Head of Threat Intelligence, Sublime Security

Christopher Plummer

Senior Cybersecurity Architect, Dartmouth Health