Estonia’s Crucial Role In Tackling Growing Cyber Threats

Estonia's  presidency of the UN Security Council refreshes the debate on global cyber security just as the coronavirus pandemic exposes the consequences of failing to protect critical digital infrastructures.   

By Esther Naylor

Recent targeted cyberattacks exploiting the increased demand placed on the healthcare sector during the pandemic led to many calls of condemnation as well as a renewed focus on the connection between cyberspace and the UN’s role in maintaining peace and security.

Many world leaders and renowned experts have been urging governments to take action at the UN level to uphold the international laws being breached by these incidents. UN secretary general Antonio Guterres condemned those carried out on critical civilian infrastructure during his remarks at the Security Council in May following a wave of incidents such as cyberattacks on Czech hospitals and targeting of coronavirus medical research by hostile state actors.

At the same time, Estonia began its first ever presidency of the UN Security Council with a signature virtual event putting cyber security at the heart of its agenda and holding an event on cyber stability, conflict prevention, and capacity-building.

During this meeting member states recognised the COVID-19 crisis has created increased reliance on critical digital infrastructure, and some condemned those targeting hospitals with cyberattacks. However, one permanent security council member abstained from attending - Russia.

Russia-Estonia relations are generally often strained, but the infamous 2007 Tallinn cyberattacks - suspected to be Russian in origin - took down online services for banks, media outlets, even parts of the government, and triggered a radical change in how Estonia managed cyber security.

The lesson from Estonia for any country wishing to undergo digital transformation is simple – that threats to peace and security in the physical world can be translated to cyberspace. Through developing its cyber incident response, the government’s own cyber security capacity and its digital infrastructure, Estonia became a model and a leader on digitization and e-governance efforts.

And although those involved in developing the governance of cyberspace pay credence to a multi-stakeholder approach - involving actors from the private sector, technical community, civil society and academia - states remain the key players.

Countries agreed on a number of commitments in 2015 on norms of responsible state behaviour with the aim of maintaining stability in cyberspace. Yet these commitments were voluntary rather than legally binding and the challenge remains in the implementation of these commitments, the evolving nature of cyberspace, the threat landscape, and the widening capacity gap between those countries with developed cyber capacity and those with nascent digitization.

At the UN level, the debate on global cyber governance is currently split into two parallel processes, within which there are differing views on how cyberspace should be governed. The Open Ended Working Group includes all UN member states and hears consultations from civil society, academia and industry, while the 2019 Group of Governmental Experts contains a group of 25 member countries.

Both processes were due to deliver reports from their proceedings over the next two years to the UN General Assembly, and, although these will most probably be delayed due to COVID-19, Estonia’s decision to put cyber security on the UN Security Council agenda can at least preserve momentum gained from the processes.

But despite being the most powerful UN body, which is capable of issuing binding resolutions, and having permanent members drawn from the world’s most powerful countries – and prolific users of offensive cyberattacks – the Security Council is often criticized for inaction or being paralysed by ‘veto politics’.

Worryingly the council has been unable to even pass a resolution on the coronavirus pandemic and its threat to peace and security. Indeed, exactly what the council deems a threat has evolved over time as events trigger changes in international relations. But what is certain is the fallout from the pandemic will underscore the need for international cooperation on cyberspace to maintain peace and security.

Estonia’s election onto the council accompanied by its campaign commitment to promoting cybersecurity issues is a promising start, and its non-permanent membership does give a genuine opportunity for assertive action against cyberattacks. It has already helped set a precedent of bringing attribution of a cyberattack to the Security Council when, along with the UK and the US, it attributed an attack on Georgia to Russia.

This sets a strong example of how countries can hold each other to account for violations of international norms and reminds states that actions have consequences. State-sponsored cyberattacks are among the most threatening to peace and security, and often states are also the target of such attacks. Therefore, bringing cyber to the Security Council acknowledges the role states have in fulfilling their obligations to each other.

Estonia’s role on the Security Council is also important for small states undergoing digital transformation which may be rather beholden to more technologically dominant states. The pandemic has stretched critical digital infrastructure to its limits and increased the overall harm caused by attacks.

Small states are often heavily reliant on other countries complying with international law and norms to maintain peace and security, but Estonia has the opportunity to frame the cyber security debate beyond the usual geopolitical tensions on the UN Security Council and reflect the true reality - that every country, regardless of size or power, has a key part to play in protecting cyberspace.

Esther Naylor  Is  Research Assistant, International Security Programme at Chatham House

You Might Also Read:

Wanted: International Cyber Standards:

 

« British SMEs Are Suffering A Surge In Cyber Attacks
Artificial Intelligence Improves Business Processes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.