• United States



Contributing Writer

International cooperation is key to fighting threat actors and cybercrime

News Analysis
Sep 19, 20226 mins
Advanced Persistent ThreatsCritical Infrastructure

Western intelligence and national security leaders emphasize the importance of collaborating to better prepare and respond to cybersecurity threats.

global meeting conference international business
Credit: Thinkstock

In this era of cybersecurity, when nation-state digital attacks and cybercrime quickly cut across country borders and create global crises, international cooperation has become an urgent priority. The need for global collaboration to cope with various pressing threats, from electronic espionage to ransomware attacks on critical infrastructure, is imperative to prevent economic and social disasters, top cybersecurity professionals and government officials say.

At this year’s Billington Cybersecurity Summit, leaders from across the globe gathered to discuss the importance of international partnerships in managing the persistent threats governments must address. The near-total digitalization of every aspect of society that exposes virtually all public and private sector services to escalating cyber threats dictates a more robust, collective defense. Moreover, as cyber risks intensify and multiply, governments worldwide are stepping up their own independent efforts to protect against the rising tide of digital threats.

Intelligence community spearheads international cooperation

Many international cybersecurity partnerships have their origins in the intelligence community. “We have wonderful, deep partnerships with many sister nations across the world, and those partnerships continue to intensify in new and different ways,” George Barnes, deputy director, US National Security Agency (NSA), told conference attendees. “Many of our partnerships started in intelligence and others started within cybersecurity. Now we’re at this point where those two are inextricably linked. When you can bring them together for a nation, it’s a powerful combination.”

Barnes spoke of more than just the well-known “Five Eyes” intelligence alliance among the English-speaking nations of the US, the UK, Canada, Australia, and New Zealand. “Those of us in the Five Eyes partnership, we are making partnerships with others,” he said. “We have long-term partnerships, of course, in Europe, but we’re spending a lot of time focusing on the Far East because we need them, they need us. And that creates an opportunity for us to help them up their game, sharpen their trade, and increase our ability as a nation to leverage the insights that they have that we don’t have.”

Barnes said these international alliances make US partnerships a more vital route for dealing with cyber threats because US adversaries lack anything comparable. China and Russia, for example, focus on transactional relationships with other countries based on quid pro quos, while the US partners with other countries without forcing anything. “That is very different from the equation that China, Russia, and some of the other countries we face have in their systems,” Barnes said.

Lt. Gen Timothy Haugh, deputy commander at US Cyber Command, said that each of Cybercom’s components has a partnership engagement branch, “allowing us to extend our reach to nations that want to be teammates, or perhaps they’re just trying to get their feet on the ground. There’s no reason that we shouldn’t rapidly train them and then make specific actions that would make them less vulnerable to a determined adversary, but also then grow capacity that allows them to do whatever their nation needs them to be able to do.”

Other government agencies intensifying their efforts

Cybersecurity efforts are also underway outside the intelligence community, fueled most recently by Russia’s invasion of Ukraine. “We’ve tried to stay on top of everything we’ve learned from the Ukraine theater, everything that we’ve seen the Russians do over there, and contextualize it and promote some Canadian messages,” Samy Khoury, head of the Canadian Centre for Cyber Security (CCCS), said. “When they did DDoS, we pushed DDoS messages on the Canadian side. When they did the wiper malware, we promoted domestic messages to people to say, ‘Here are the signatures, here are the IOCs. Pay attention to that.’ So, it’s been a constant learning and communicating what we are seeing.”

One cybersecurity lesson that Lindy Cameron, CEO of the National Cyber Security Centre in the UK, has learned from the war in Ukraine is the importance of resilience. “The Ukrainians have demonstrated what you can do if you are well prepared. The message we’re doubling down on is, ‘Look what’s possible even against quite a sophisticated adversary,’” she said.

Under Secretary for Policy at the US Department of Homeland Security (DHS) Rob Silvers said that one thing the US plans to do is work with international partners to seek a common incident reporting mechanism. “One of the things we’re going to be doing is engaging with international partners that have similar reporting mandates to see if we can find some common ground at that level, too, because we have multinational companies that are hit,” Silvers said.

“They may very likely have to report to multiple national authorities. There’s no reason we shouldn’t be able to find some opportunities to lessen the burden and have streamlined ways to do it.” Silvers also wants the US to continue to break down the barriers to international cooperation. Cybersecurity is “so cross-sector, you just have to dissolve every barrier you can dissolve with people who are capable and whom you trust, whether they’re companies or whether they’re countries,” he said.

Countries learn cyber lessons from other countries

Gabby Portnoy, director general of Israel’s National Cyber Directorate, said, “Cybercrime, especially ransomware, is a global problem. We have to deliver, of course, internally on the state level but also internationally. And the interesting thing about it is the better we become, the worse situation goes” because it’s becoming more sophisticated every day.

“We are learning from the best, from the US, Australia, UK, Canada, Germany, and more countries,” Portnoy said. “And if we find good things, we even copy them, not try to invent the wheel. We are trying to gather all the relevant agencies to talk together. We call it the blue orchestra because we have the red one that talks with enemies, but now we need the blue one.”

Arne Schönbohm, president of the Federal Office for Information Security (BSI) in Germany, said he also borrows the experience of other countries to fashion how Germany responds to cyber threats. “If we can learn from someone else who has had a successful initiative, we like to copy and paste,” he said. “We don’t always have to invent the wheel twice or three or four times. We can learn from each other.”

Contributing Writer

Cynthia Brumfield is a veteran communications and technology analyst who is currently focused on cybersecurity. She runs a cybersecurity news destination site,, consults with companies through her firm DCT-Associates, and is the author of the book published by Wiley, Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework.

More from this author