logo
#

Latest news with #KyivInternationalCyberResilienceForum

Ukraine's enduring cyber defense: Assessing resilience and impact of shifting international support
Ukraine's enduring cyber defense: Assessing resilience and impact of shifting international support

Yahoo

time3 days ago

  • Politics
  • Yahoo

Ukraine's enduring cyber defense: Assessing resilience and impact of shifting international support

From my vantage point, having recently attended the Kyiv International Cyber Resilience Forum (KICRF) and witnessing firsthand the unwavering determination in the face of relentless digital aggression, the situation unfolding in Ukraine's cyber domain demands our unvarnished attention. The situation in Ukraine's cyber domain is not merely a theoretical exercise in network security; it directly impacts national sovereignty and societal resilience. What I observed in Kyiv was a nation locked in a persistent cyber struggle, primarily against the Kremlin's digital legions — The Federal Security Service (FSB), Main Intelligence Directorate (GRU), Foreign Intelligence Service (SVR) and the Russian criminal actors — now further complicated by a significant shift in the international support landscape. The U.S. government appears to be withdrawing from the cybersecurity battlefield as evidenced by its wholesale reduction in personnel within key government entities, including the Critical Infrastructure Security Agency, and directives from administration leadership not to have national resources focus on Russian cyber activities. In addition to this, the unexpected closure of the USAID mission in Ukraine, leading to the reduction of support to Ukraine's ongoing cybersecurity efforts, casts a long shadow over Kyiv's digital defenses. This was further highlighted by the palpable concerns expressed during the KICRF and the embarrassing and inexplicable absence of U.S. government participation. The Russian attacks on Ukraine are multifaceted, targeting critical infrastructure — power grids, telecom networks, the financial system — to inflict maximum disruption, all designed to erode public confidence. One cannot forget that intelligence gathering remains a constant, insidious undertow. Add to that the weaponization of information and the relentless campaigns to pollute the information space, erode trust, and undermine Ukraine's narrative globally. Read also: Senate to 'start moving' Russia sanctions bill next week, Graham says Then we have the repeated deployment of wiper malware — digital scorched earth tactics — underscoring the destructive intent. And while ransomware may have a profit motive, its impact on essential services amplifies the overall vulnerability. Ukraine possesses a cadre of highly skilled cyber professionals, both within government agencies and the private sector, individuals who are actively engaged in the digital war. However, amid this digital maelstrom, Ukraine demonstrates remarkable resilience and adaptability that demands significant attention and admiration. This is not a nation caught entirely off guard. Years of Russian aggression in the Donbas, the annexation of Crimea, and the 2015 attack on Ukraine's power grid all served as a training ground, forcing Kyiv to harden its digital defenses. Crucially, the steady hand of international assistance — governments pooling resources through mechanisms like the Tallinn Accord, the strategic guidance of entities like the EU and NATO, and the often-unsung contributions of private sector cyber defenders — has provided a vital lifeline of expertise, technology, and funding. And let me be clear, Ukraine possesses a cadre of highly skilled cyber professionals, both within government agencies and the private sector, individuals who are actively engaged in the digital war. Their agility, their ability to adapt to evolving threats in real-time, is a testament to their resolve. As we have seen, this adaptability and teamwork are foundational to their cyber resilience. However, the cessation of USAID's programs, which included significant initiatives in cybersecurity for critical infrastructure and digital transformation — areas where sustained support is paramount — injects a new and unwelcome element of uncertainty. The loss of this funding stream will undoubtedly create gaps in Ukraine's ability to modernize its defenses, train its personnel, and implement crucial security measures. The growing dependence on other international partners intensifies, placing greater pressure on those who remain dedicated to upholding Ukraine's digital sovereignty. This is where the global cyber ecosystem — both commercial and governmental, now operating with one less major player — faces a starker choice: stand by and watch the digital defenses fray or step into the breach with even greater resolve. For Ukrainian tech companies, this is not just a crisis; it is an even more urgent imperative to innovate under pressure. The demand for tailored cybersecurity solutions — threat intelligence platforms with local context, rapid incident response capabilities, and secure communication channels designed for a hostile environment — is now amplified. Investing in the next generation of cyber defenders through robust training and education programs is paramount. Strategic alliances with trusted international partners are no longer a luxury; they are a necessity for accelerated technology and knowledge transfer. For international companies, the call to action is now imbued with a greater sense of urgency. Providing Ukraine with access to the sharpest cyber tools — AI-driven threat detection, advanced endpoint protection, resilient cloud infrastructure — isn't just good PR; it is a strategic necessity to compensate for the receding U.S. presence. Investing in Ukraine's tech sector, establishing a local footprint, or forging genuine partnerships contributes to long-term stability and fills a growing void. More is needed to offset the USAID withdrawal. Read also: Russia 'testing' Europe's capacity to help Ukraine by intensifying air attacks The timely sharing of actionable threat intelligence is a cornerstone of the collective digital defense, now even more critical with potentially reduced intelligence sharing through formal U.S. channels. Supporting and contributing to cybersecurity education initiatives helps build a sustainable talent pipeline, which is crucial in light of potential limitations in U.S.-funded programs. Engaging in meaningful public-private partnerships and leveraging the unique strengths of all stakeholders are the only ways to build truly resilient defenses in this evolving landscape. Russia's cyber activity knows no geographic boundary. We must reject the notion that Russia's illegal war targets only Ukraine; Russia is at war with everyone. This is not about charity; it is about safeguarding the integrity of the global digital commons in the face of a persistent and emboldened adversary whose digital reach extends far beyond the physical borders of Ukraine. The imperative — and the heightened responsibility – to act decisively is now upon us. The unexpected withdrawal of a major player, the United States, only amplifies the urgency for others to step forward and fill the digital breach, recognizing that the digital front line in Ukraine is a frontline for us all. Submit an Opinion Editor's Note: The opinions expressed in the op-ed section are those of the authors and do not necessarily reflect the views of the Kyiv Independent. We've been working hard to bring you independent, locally-sourced news from Ukraine. Consider supporting the Kyiv Independent.

Ukraine's cyber chief wants ‘tens of thousands' more computer whizzes to combat Russian hackers
Ukraine's cyber chief wants ‘tens of thousands' more computer whizzes to combat Russian hackers

Yahoo

time14-03-2025

  • Politics
  • Yahoo

Ukraine's cyber chief wants ‘tens of thousands' more computer whizzes to combat Russian hackers

Formally a brigadier general, Oleksandr Potiy is today tasked with guarding Ukraine on the civilian side — far from the battlefield but right at the front line of Russia's cyber war. Potiy is in camo fatigues when he addresses the crowd of IT workers and foreign investors for the keynote address at the Kyiv International Cyber Resilience Forum that took place on March 11-12. 'Our priority is a departure from the traditional schema of a KSZI,' Potiy tells the Kyiv Independent in an interview on the conference's sidelines, referring to a Soviet acronym for information defense that had a reputation of being corrupt. 'We totally changed the approach.' In December, Potiy took charge of Derzhspetszvyazku, or the State Service of Special Communications. The agency guards the Ukrainian government's digital infrastructure. It's a job that's grown massively in the four years since Potiy first joined the agency, which now has a headcount of 1,300. Russia has long been a breeding ground for some of the most aggressive hackers in the world. As an overture to the February 2022 full-scale invasion of Ukraine, those hackers launched a salvo of cyber attacks at Ukraine, one that continues to the present day. Despite systems — including massive telecomms networks — going down periodically, Ukraine has remained remarkably steadfast in the face of this assault. The agency monitors and tracks upwards of 3,000 attacks each year on the Ukrainian civil government alone — not including the military, whose digital security falls to the Defense Ministry and intelligence agencies. The most recent report for the first half of 2024 counts among major threats a DDoS gang going by 'From Russia with Love' and another cyber gang based in Russian-occupied Luhansk who 'factually are traitors,' per the report. Those are in addition to hacking groups long associated with Russian intelligence and General Staff like Sandworm and Armageddon. Attacks have included a spear-phishing campaign that used QR codes to short-circuit Signal — increasingly a go-to messenger for Ukrainians seeking security away from Russian-originated Telegram — and link hostile devices that government officials are unaware are reading their classified or private comms. The aggregate figure of the most recent report notes a significant increase in the total number of attacks but a merciful decline in those defined as 'critical' from 31 to 3. Nonetheless, Ukraine needs a new training and certification scheme, Potiy said, ambitiously aiming at fostering a new generation of cyber security specialists, 'tens of thousands if not more,' with solid jobs within Ukraine. It is one of his core ambitions for his first year in charge of the agency. 'We have educational institutions that turn out cybersecurity specialists who could provide services,' Potiy continued. 'But there's no job market.' Aside from a simple mass of professional cybersecurers, Potiy aims to distribute the authorities — decentralization, in other words. Centralization is one of the cardinal sins of cybersecurity, one that was likely responsible for a collapse in government data that rattled Ukraine in December. The agency is taking as a model for a new regional network of cyber offices the European Union's National Coordination Centers. An overarching goal of the Ukrainian government is the 'harmonization' of its practices with EU law — preparation for eventually joining the union. At the conference, the agency signed a memorandum of understanding with a number of European counter-parties, entailing some fairly vague concepts of cooperation. Part of what that translates to in practice is data-sharing from the agency to the West on the cyberattacks they face, Potiy explains. 'We have obtained unique experience, which today can prove useful to partners from around the world,' Potiy told the crowd at the conference's opening. The Ukrainian cyber dataset is potentially extremely valuable for Western cybersecurity agencies, as many of the attacks Russian hackers are launching against Ukraine today are easy enough to replicate on Western systems tomorrow. Speaking on what turned into the last day of frozen U.S. weapons aid and intel sharing with Ukraine, Potiy noted that the agency had not stopped providing its network of data to analogous Western cyber agencies, including the American CISA. 'We have a very tight relationship with our American partners and friends,' Potiy said. 'We, as competent technical professionals, are still working with them like we worked before.' In addition to its cyber duties, by an odd set of circumstances at the war's outset, the agency ended up holding the purse strings for Ukraine's drone purchases. It retains, today, a budget of Hr 65 billion — just over $1.5 billion. Potiy's own ascension in December was part of a scandal in which anti-corruption activists raised alarms that the new office would stop publishing information on those drone purchases, including cost and quantity, on Ukraine's public platform for government acquisitions, Prozorro. 'Everything's done in accordance with the legislation of Ukraine, including acquisitions going through Prozorro,' said Potiy. When asked if that was going to change, Potiy answered, 'It's established procedure.' Read also: Russian hackers target Signal accounts in growing espionage effort We've been working hard to bring you independent, locally-sourced news from Ukraine. Consider supporting the Kyiv Independent.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store