Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

12 - IDNOG03 - Hammam Riza (BPPT) Welcoming Speech

473 views

Published on

12 - IDNOG03 - Hammam Riza (BPPT) Welcoming Speech

Published in: Internet
  • Be the first to comment

12 - IDNOG03 - Hammam Riza (BPPT) Welcoming Speech

  1. 1. IDNOG3 CONFERENCE Jakarta, 28 July 2016 Dr. Hammam Riza Deputy Chairman Information, Energy and Material Technologies Agency for the Assessment and Applicationn of Technology (BPPT) DIGITAL TRANSFORMATION INDONESIA
  2. 2. Agenda National ICT Development Projects Cybersecurity Challenges
  3. 3. What is the Positive Side of This Chaotic Traffic?? Population, Infrastructure and Economy 3
  4. 4. UNTUK INDONESIA YANG BERDAULAT, MANDIRI, DAN BERKEPRIBADIAN Sumber: Visi, Misi dan Program Aksi Jokowi-Jusuf Kalla 2014 NATIONAL DEVELOPMENT 2015-2019 Slide - 4
  5. 5. ICT Priority Program – Infrastructure Development
  6. 6. 6 Building Digital Platform
  7. 7. 7 Building Digital Platform
  8. 8. Toward e-Services Renewal of the Public Service system and public participation Implementation of Innovative Public Services , Transparent and Integrated Implementation of Public Service and Public Participation CONVENTIONAL Implementation of Public Service and Public Interaction using ICT TECHNOLOGY TRANSFER MANUAL to ELECTRONIC Utilization Technology Information and Communication the use of the device Use of Telematics Infrastructure Use of Application Systems / Embedded Security standardization Transactions and Electronic Data Interchange Electronic Documentation System Transfer of Technology • Transfer of Work Culture • Changes in Work Process • Rules and Regulations • SOP and Public Policy
  9. 9. 5 PRIORITY SECTORS e- Government e- Procurement G2G e-Education e-Health G2C e-Logistic G2B Keterangan: G2G: Government-to-Government; G2C: Government-to-Citizen; G2B: Government-to-Business Slide - 9
  10. 10. Road to “e-election governance” in Indonesia 10 33 Provinces 408 Regencies 97 Cities 81,253 Villages 550,000 Polling Stations 185,000,000 Voters  Secrecy of Vote  Integrity of Result  Equality of Vote  Universality of Vote  Transparency  Accountability  Public Confidence Highly Secure Flexible Solution CHALLENGE GOALS SUPPORTING THE DEMOCRATIC PROCESS
  11. 11. - Enable new type of services - Cost reduction of services (e.g. building unique unified user profile) - Enabling innovation of transaction (trust in internet economy) - Fight against cyber crime - Increase user confidence Trusted Digital Identity as Fundamental Foundation Trusted Digital Identity Security & Privacy Services Improvement Economic Benefits Source: Pratama, Security of Digital Identity 11
  12. 12. Card Body Electronic Functions Electronic ID Authentication : -Visual Picture (on chip) verification -Visual biodata and hand signature (on chip) verification - Fingerprint verification 1:1 E- Voting : - Regulation pending -E- Signing : - Regulation pending For every one whose age > 17 or already married E-KTP Integrate the conventional ID with electronic functions Indonesia Electronic ID Card (e-KTP)
  13. 13. ACT 24 2013 Population Administration Future Development e-KTP is the key to almost every government e-service ACT 7 2014 Trade • Public services, • development planning, • budget allocation, • development of democracy, • law enforcement and • crime prevention Trade to e-Trade e-ID for e-Trade Services ACT 25 2009 Public Services Public Services to Public e-services Law No 11 / 2008 on Information and Electronic Transaction (UU ITE)
  14. 14. MULTIFUNCTIONALITY OF POPULATION DATABASE SINGLE IDENTITY POPULATION DATABASE (MoHA) REGIO NAL KEUANG -AN HUKUM HAM AGAMA KEHUTAN AN BIN BPN POLICE KPK BAPPENAS MASYA RAKAT HEALTH SOCIAL LABOUR ELECT BKKBN PER BANKAN LEMBAGA KEUANGAN DUNIA USAHA Source : MOHA National Election and Regional Election Cross Border Workers Subsidy Program
  15. 15. FOCAL CONCERN Conceptual Diagram QoS Internet Intranet (GSI) Backbone Access High BW Security Central Gov. Local Gov. Internet Data Management Center Data Recovery CenterGIX Grand Design CIIP Risk Business Impact Analysis Critical Information Infrastructure Critical Infrastructure Protection Central Government Agencies Regional Government Agencies Public Infrastruct ure and Utilities Citizen and Business National ICT Infrastructure Plan National Information System
  16. 16. Agenda NationalICT Development Project Cybersecurity Challenges
  17. 17. Sypris Electronics, LLC and Sypris Europe ApS -Proprietary NATION STATE ADVANCED PERSISTANT THREAT CONVENTIONAL THREAT Agility / Speed of Action/ Kecepatan AE BD C DB EA Reactive & Manual Tools-Based Integrated Picture Dynamic Defense People based following doctrine and doing their best to “put out fires” Applying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for IA situational awareness Resilient Enterprise Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack Threat/Ancaman A CC DB Most Organizations D Cyber Security Maturity Model* *Cyber Security Strategies, LLC E Information Resiliency Indonesia NCS
  18. 18. Obstacles and Challenges of Indonesia National Cyber Security • Sources: Indonesia National ICT Council, DETIKNAS 2013 Vision of Cyber Security not Intregated Quantity and Quality of Information Security Human Resources are Limited ICT Critical Infrastructure Protection Mechanisms and Standards not exist Cyber Law and Policy not Completed Governance and Organization of National Cyber Security not Synergized Weakness of Coordination and Cooperation between Agency Application, Data and Infrastructure of Information Security not Integrated Lack of Awareness in Information Security Obstacles and Challenges of National Cyber Security
  19. 19. Cyber Interdependency An Infrastructure has Cyber Interdendency if its state depends on the information transmitted through information infrastructure Steven Rinaldi et.al, IEEE Control System, 2001
  20. 20. Thank You Terima Kasih

×