Estonia’s Crucial Role In Tackling Growing Cyber Threats

Estonia's  presidency of the UN Security Council refreshes the debate on global cyber security just as the coronavirus pandemic exposes the consequences of failing to protect critical digital infrastructures.   

By Esther Naylor

Recent targeted cyberattacks exploiting the increased demand placed on the healthcare sector during the pandemic led to many calls of condemnation as well as a renewed focus on the connection between cyberspace and the UN’s role in maintaining peace and security.

Many world leaders and renowned experts have been urging governments to take action at the UN level to uphold the international laws being breached by these incidents. UN secretary general Antonio Guterres condemned those carried out on critical civilian infrastructure during his remarks at the Security Council in May following a wave of incidents such as cyberattacks on Czech hospitals and targeting of coronavirus medical research by hostile state actors.

At the same time, Estonia began its first ever presidency of the UN Security Council with a signature virtual event putting cyber security at the heart of its agenda and holding an event on cyber stability, conflict prevention, and capacity-building.

During this meeting member states recognised the COVID-19 crisis has created increased reliance on critical digital infrastructure, and some condemned those targeting hospitals with cyberattacks. However, one permanent security council member abstained from attending - Russia.

Russia-Estonia relations are generally often strained, but the infamous 2007 Tallinn cyberattacks - suspected to be Russian in origin - took down online services for banks, media outlets, even parts of the government, and triggered a radical change in how Estonia managed cyber security.

The lesson from Estonia for any country wishing to undergo digital transformation is simple – that threats to peace and security in the physical world can be translated to cyberspace. Through developing its cyber incident response, the government’s own cyber security capacity and its digital infrastructure, Estonia became a model and a leader on digitization and e-governance efforts.

And although those involved in developing the governance of cyberspace pay credence to a multi-stakeholder approach - involving actors from the private sector, technical community, civil society and academia - states remain the key players.

Countries agreed on a number of commitments in 2015 on norms of responsible state behaviour with the aim of maintaining stability in cyberspace. Yet these commitments were voluntary rather than legally binding and the challenge remains in the implementation of these commitments, the evolving nature of cyberspace, the threat landscape, and the widening capacity gap between those countries with developed cyber capacity and those with nascent digitization.

At the UN level, the debate on global cyber governance is currently split into two parallel processes, within which there are differing views on how cyberspace should be governed. The Open Ended Working Group includes all UN member states and hears consultations from civil society, academia and industry, while the 2019 Group of Governmental Experts contains a group of 25 member countries.

Both processes were due to deliver reports from their proceedings over the next two years to the UN General Assembly, and, although these will most probably be delayed due to COVID-19, Estonia’s decision to put cyber security on the UN Security Council agenda can at least preserve momentum gained from the processes.

But despite being the most powerful UN body, which is capable of issuing binding resolutions, and having permanent members drawn from the world’s most powerful countries – and prolific users of offensive cyberattacks – the Security Council is often criticized for inaction or being paralysed by ‘veto politics’.

Worryingly the council has been unable to even pass a resolution on the coronavirus pandemic and its threat to peace and security. Indeed, exactly what the council deems a threat has evolved over time as events trigger changes in international relations. But what is certain is the fallout from the pandemic will underscore the need for international cooperation on cyberspace to maintain peace and security.

Estonia’s election onto the council accompanied by its campaign commitment to promoting cybersecurity issues is a promising start, and its non-permanent membership does give a genuine opportunity for assertive action against cyberattacks. It has already helped set a precedent of bringing attribution of a cyberattack to the Security Council when, along with the UK and the US, it attributed an attack on Georgia to Russia.

This sets a strong example of how countries can hold each other to account for violations of international norms and reminds states that actions have consequences. State-sponsored cyberattacks are among the most threatening to peace and security, and often states are also the target of such attacks. Therefore, bringing cyber to the Security Council acknowledges the role states have in fulfilling their obligations to each other.

Estonia’s role on the Security Council is also important for small states undergoing digital transformation which may be rather beholden to more technologically dominant states. The pandemic has stretched critical digital infrastructure to its limits and increased the overall harm caused by attacks.

Small states are often heavily reliant on other countries complying with international law and norms to maintain peace and security, but Estonia has the opportunity to frame the cyber security debate beyond the usual geopolitical tensions on the UN Security Council and reflect the true reality - that every country, regardless of size or power, has a key part to play in protecting cyberspace.

Esther Naylor  Is  Research Assistant, International Security Programme at Chatham House

You Might Also Read:

Wanted: International Cyber Standards:

 

« British SMEs Are Suffering A Surge In Cyber Attacks
Artificial Intelligence Improves Business Processes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Direct Recruiters Inc

Direct Recruiters Inc

Direct Recruiters is a relationship-focused search firm that assists IT Security and Cybersecurity companies with recruiting high-impact talent.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.