Ukraine Signs Cyber Security Deal With NATO

Ukraine is coming closer to North Atlantic Treaty Organisation (NATO) in the cyber security field as its war with Russia has been going on for almost a year. Now, Ukraine is signing an agreement with NATO to formalise its participation in the security alliance's joint Center for Advanced Technologies in Cyber Defense (CCDCOE).  

The agreement comes after a series of cyber attack incidents in Ukraine and heightened tensions over Russia’s invasion. The new cyber security collaboration allows Ukrainian access to NATO’s malware information sharing platform along with enhanced cyber cooperation. 

According to a statement by NATO’s Secretary-General Jens Stoltenberg, cyber security experts from NATO will be working together with Ukraine to confront the rising cyber threats in the region. 

The CCDCOE functions as a cyber-defense knowledge center, research institution, and training and exercise facility that assists members with technology, threat-sharing and policy expertise. CCDCOE membership is not limited to NATO nations. “We have successfully worked with Ukraine for several years, delivering key capabilities and exchanging knowledge,” said NATO Communications & Information Agency  (NCI) Agency General Manager Ludwig Decamps. “Under this renewed agreement, we will deepen our collaboration with Ukraine to support them in modernising their information technology and communications services, while identifying areas where training may be required for their personnel. Our experts stand ready to continue this critical partnership.” 

Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

“Ukraine’s presence in the Centre will enhance the exchange of cyber expertise, between Ukraine and CCDCOE member nations. Ukraine could bring valuable first-hand knowledge of several adversaries within the cyber domain to be used for research, exercises and training,” commented General Jaak Tarien, the now retired Director of the CCDCOE.

Ukraine has been trying to become a member of the CCDCOE for a while, but only made some progress after Russia’s full-scale invasion. Last spring Ukraine was granted the formal role of “contributing participant.” Ukraine submitted its application to join the Estonia-based center in August 2021. Last April, the 27 sponsoring nations in the steering committee agreed Ukraine as a contributing participant in the CCDCOE, thus giving the other member state's access to Ukraine's "valuable first-hand knowledge of several adversaries".

That language was a reference to both the cyber warfare tactics Russia employed ahead of and during its illegal invasion of Ukraine, and Moscow's earlier attacks against Ukraine's power grids and other digital targets.Work with Ukraine also includes a Knowledge Sharing Initiative where subject matter experts share their knowledge of NATO practices in developing capabilities in the Command, Control, Communications and Computers (C4) domain.

The Knowledge Sharing Initiative includes training, workshops and subject matter expertise to support Ukraine in modernising its defence capabilities.

The CCDCOE was established in 2008 in response to Russian aggression in cyberspace against NATO member states and is one of NATO's key cyber defence structures dealing with cyber security issues. It includes 25 NATO member states and 4 partner countries.

NATO CCDCOE:     NATO:   The Register:    CyberWire:    The Record:    CISO Mag:    mind

You Might Also Read:

A Cyber Attack On NATO Could Trigger Article 5:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cloud-Based Security Solutions Are On The Up
Five Application Security Predictions For 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.