Estonia’s Crucial Role In Tackling Growing Cyber Threats

Estonia's  presidency of the UN Security Council refreshes the debate on global cyber security just as the coronavirus pandemic exposes the consequences of failing to protect critical digital infrastructures.   

By Esther Naylor

Recent targeted cyberattacks exploiting the increased demand placed on the healthcare sector during the pandemic led to many calls of condemnation as well as a renewed focus on the connection between cyberspace and the UN’s role in maintaining peace and security.

Many world leaders and renowned experts have been urging governments to take action at the UN level to uphold the international laws being breached by these incidents. UN secretary general Antonio Guterres condemned those carried out on critical civilian infrastructure during his remarks at the Security Council in May following a wave of incidents such as cyberattacks on Czech hospitals and targeting of coronavirus medical research by hostile state actors.

At the same time, Estonia began its first ever presidency of the UN Security Council with a signature virtual event putting cyber security at the heart of its agenda and holding an event on cyber stability, conflict prevention, and capacity-building.

During this meeting member states recognised the COVID-19 crisis has created increased reliance on critical digital infrastructure, and some condemned those targeting hospitals with cyberattacks. However, one permanent security council member abstained from attending - Russia.

Russia-Estonia relations are generally often strained, but the infamous 2007 Tallinn cyberattacks - suspected to be Russian in origin - took down online services for banks, media outlets, even parts of the government, and triggered a radical change in how Estonia managed cyber security.

The lesson from Estonia for any country wishing to undergo digital transformation is simple – that threats to peace and security in the physical world can be translated to cyberspace. Through developing its cyber incident response, the government’s own cyber security capacity and its digital infrastructure, Estonia became a model and a leader on digitization and e-governance efforts.

And although those involved in developing the governance of cyberspace pay credence to a multi-stakeholder approach - involving actors from the private sector, technical community, civil society and academia - states remain the key players.

Countries agreed on a number of commitments in 2015 on norms of responsible state behaviour with the aim of maintaining stability in cyberspace. Yet these commitments were voluntary rather than legally binding and the challenge remains in the implementation of these commitments, the evolving nature of cyberspace, the threat landscape, and the widening capacity gap between those countries with developed cyber capacity and those with nascent digitization.

At the UN level, the debate on global cyber governance is currently split into two parallel processes, within which there are differing views on how cyberspace should be governed. The Open Ended Working Group includes all UN member states and hears consultations from civil society, academia and industry, while the 2019 Group of Governmental Experts contains a group of 25 member countries.

Both processes were due to deliver reports from their proceedings over the next two years to the UN General Assembly, and, although these will most probably be delayed due to COVID-19, Estonia’s decision to put cyber security on the UN Security Council agenda can at least preserve momentum gained from the processes.

But despite being the most powerful UN body, which is capable of issuing binding resolutions, and having permanent members drawn from the world’s most powerful countries – and prolific users of offensive cyberattacks – the Security Council is often criticized for inaction or being paralysed by ‘veto politics’.

Worryingly the council has been unable to even pass a resolution on the coronavirus pandemic and its threat to peace and security. Indeed, exactly what the council deems a threat has evolved over time as events trigger changes in international relations. But what is certain is the fallout from the pandemic will underscore the need for international cooperation on cyberspace to maintain peace and security.

Estonia’s election onto the council accompanied by its campaign commitment to promoting cybersecurity issues is a promising start, and its non-permanent membership does give a genuine opportunity for assertive action against cyberattacks. It has already helped set a precedent of bringing attribution of a cyberattack to the Security Council when, along with the UK and the US, it attributed an attack on Georgia to Russia.

This sets a strong example of how countries can hold each other to account for violations of international norms and reminds states that actions have consequences. State-sponsored cyberattacks are among the most threatening to peace and security, and often states are also the target of such attacks. Therefore, bringing cyber to the Security Council acknowledges the role states have in fulfilling their obligations to each other.

Estonia’s role on the Security Council is also important for small states undergoing digital transformation which may be rather beholden to more technologically dominant states. The pandemic has stretched critical digital infrastructure to its limits and increased the overall harm caused by attacks.

Small states are often heavily reliant on other countries complying with international law and norms to maintain peace and security, but Estonia has the opportunity to frame the cyber security debate beyond the usual geopolitical tensions on the UN Security Council and reflect the true reality - that every country, regardless of size or power, has a key part to play in protecting cyberspace.

Esther Naylor  Is  Research Assistant, International Security Programme at Chatham House

You Might Also Read:

Wanted: International Cyber Standards:

 

« British SMEs Are Suffering A Surge In Cyber Attacks
Artificial Intelligence Improves Business Processes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.