Ukraine Signs Cyber Security Deal With NATO

Ukraine is coming closer to North Atlantic Treaty Organisation (NATO) in the cyber security field as its war with Russia has been going on for almost a year. Now, Ukraine is signing an agreement with NATO to formalise its participation in the security alliance's joint Center for Advanced Technologies in Cyber Defense (CCDCOE).  

The agreement comes after a series of cyber attack incidents in Ukraine and heightened tensions over Russia’s invasion. The new cyber security collaboration allows Ukrainian access to NATO’s malware information sharing platform along with enhanced cyber cooperation. 

According to a statement by NATO’s Secretary-General Jens Stoltenberg, cyber security experts from NATO will be working together with Ukraine to confront the rising cyber threats in the region. 

The CCDCOE functions as a cyber-defense knowledge center, research institution, and training and exercise facility that assists members with technology, threat-sharing and policy expertise. CCDCOE membership is not limited to NATO nations. “We have successfully worked with Ukraine for several years, delivering key capabilities and exchanging knowledge,” said NATO Communications & Information Agency  (NCI) Agency General Manager Ludwig Decamps. “Under this renewed agreement, we will deepen our collaboration with Ukraine to support them in modernising their information technology and communications services, while identifying areas where training may be required for their personnel. Our experts stand ready to continue this critical partnership.” 

Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

“Ukraine’s presence in the Centre will enhance the exchange of cyber expertise, between Ukraine and CCDCOE member nations. Ukraine could bring valuable first-hand knowledge of several adversaries within the cyber domain to be used for research, exercises and training,” commented General Jaak Tarien, the now retired Director of the CCDCOE.

Ukraine has been trying to become a member of the CCDCOE for a while, but only made some progress after Russia’s full-scale invasion. Last spring Ukraine was granted the formal role of “contributing participant.” Ukraine submitted its application to join the Estonia-based center in August 2021. Last April, the 27 sponsoring nations in the steering committee agreed Ukraine as a contributing participant in the CCDCOE, thus giving the other member state's access to Ukraine's "valuable first-hand knowledge of several adversaries".

That language was a reference to both the cyber warfare tactics Russia employed ahead of and during its illegal invasion of Ukraine, and Moscow's earlier attacks against Ukraine's power grids and other digital targets.Work with Ukraine also includes a Knowledge Sharing Initiative where subject matter experts share their knowledge of NATO practices in developing capabilities in the Command, Control, Communications and Computers (C4) domain.

The Knowledge Sharing Initiative includes training, workshops and subject matter expertise to support Ukraine in modernising its defence capabilities.

The CCDCOE was established in 2008 in response to Russian aggression in cyberspace against NATO member states and is one of NATO's key cyber defence structures dealing with cyber security issues. It includes 25 NATO member states and 4 partner countries.

NATO CCDCOE:     NATO:   The Register:    CyberWire:    The Record:    CISO Mag:    mind

You Might Also Read:

A Cyber Attack On NATO Could Trigger Article 5:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cloud-Based Security Solutions Are On The Up
Five Application Security Predictions For 2023 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.

Scytale

Scytale

Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant.