The document discusses cyber warfare and whether businesses can trust governments to protect them. It notes that cyber attacks on private companies have increased in sophistication and many are state-sponsored. While governments have largely ignored the threat, some like the UK and India are now reaching out to the private sector to share information and establish partnerships to combat cyber attacks. However, there are still open questions around how such public-private partnerships would work in practice and whether increased cooperation could threaten privacy and enable government overreach.
This research report studies the economic impact that Cyber Security attacks have on society as a whole. The aim of this analysis is to examine the negative and positive impact of these compromises on multiple entities. Our descriptive analysis focuses on individuals, private and public organizations, costs, revenues, innovations, and jobs to determine if proliferation's of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay in its historical context of capital expenditures to private and public organizations due to the increased number of compromises and factors of this paradigm helping to fuel the growth of innovations or spawn a new industry as a whole.
This research report studies the economic impact that Cyber Security attacks have on society as a whole. The aim of this analysis is to examine the negative and positive impact of these compromises on multiple entities. Our descriptive analysis focuses on individuals, private and public organizations, costs, revenues, innovations, and jobs to determine if proliferation's of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay in its historical context of capital expenditures to private and public organizations due to the increased number of compromises and factors of this paradigm helping to fuel the growth of innovations or spawn a new industry as a whole.
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
http://bit.ly/Cybersecurite-sept14
Etude mondiale de PwC, CIO et CSO réalisée en ligne du 27 mars 2014 au 25 mai 2014. Les résultats présentés ici sont fondés sur les réponses de plus de 9700 CEO, CFO, CIO, RSSI, les OSC, les vice-présidents et des directeurs de l'information et des pratiques de sécurité de plus de 154 pays.
35 % des répondants sont d'Amérique du Nord, 34 % d'Europe, 14 % d'Asie-Pacifique, 13 % en Amérique du Sud, et 4 % du Moyen-Orient et d’Afrique.
This research report studies the economic impact that Cyber Security attacks have on
society as a whole. The aim of this analysis is to examine the negative and positive
impact of these compromises on multiple entities. Our descriptive analysis focuses on
individuals, private and public organizations, costs, revenues, innovations, and jobs to
determine if proliferations of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay
in its historical context of capital expenditures to private and public organizations due to
the increased number of compromises and factors of this paradigm helping to fuel the
growth of innovations or spawn a new industry as a whole
By David F. Larcker, Peter C. Reiss, and Brian Tayan
Stanford Closer Look Series, November 16, 2017
The board of directors is expected to ensure that management has identified and developed processes to mitigate risks facing the organization, including risks arising from data theft and the loss of information. Unfortunately, recent experience suggests that companies are not doing a sufficient job of securing this data. In this Closer Look, we examine they types of cyberattacks that occur and how companies respond to them.
We ask:
• What steps can the board take to prevent, monitor, and mitigate data theft?
• What data, metrics, and information should board members review to satisfy themselves that management has taken proper steps to minimize cyber risks?
• What qualifications should a board member have in order to constructively contribute to boardroom discussions on cybersecurity?
• How difficult is it to find board candidates with these skills?
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, at the January 27, 2017 meeting of (ISC)² Dallas Fort Worth Chapter.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit by Lynda Bennett
2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers. At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader concerns about national security and terrorist threats.
How Ellen Pao became Reddit’s Lee Harvey OswaldJason Fernandes
In July, popular website Reddit found itself suddenly mired in unprecedented controversy. When the dust settled, controversial CEO Ellen Pao resigned and those following the fiasco were left with more questions than answers. Pao’s stated reason for her departure was that the Reddit board was demanding a higher growth rate than she felt comfortable promising. Mundane sure, but many felt that given recent events at the company, the truth was likely murkier.
They say bad news comes in threes: After Nokia and Blackberry, now it’s HTC’...Jason Fernandes
HTC has been ailing for a while now, but in August something truly shocking happened: the market valuation of HTC fell below its available cash on hand. This theoretically means that should investors start to buy up all of HTC’s stock at its current valuation, the company would actually be paying those investors to take it over
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
http://bit.ly/Cybersecurite-sept14
Etude mondiale de PwC, CIO et CSO réalisée en ligne du 27 mars 2014 au 25 mai 2014. Les résultats présentés ici sont fondés sur les réponses de plus de 9700 CEO, CFO, CIO, RSSI, les OSC, les vice-présidents et des directeurs de l'information et des pratiques de sécurité de plus de 154 pays.
35 % des répondants sont d'Amérique du Nord, 34 % d'Europe, 14 % d'Asie-Pacifique, 13 % en Amérique du Sud, et 4 % du Moyen-Orient et d’Afrique.
This research report studies the economic impact that Cyber Security attacks have on
society as a whole. The aim of this analysis is to examine the negative and positive
impact of these compromises on multiple entities. Our descriptive analysis focuses on
individuals, private and public organizations, costs, revenues, innovations, and jobs to
determine if proliferations of these attacks are either, negative or positive. Although this
paper draws upon the economic factors as result of cyber-attacks, it looks at the outlay
in its historical context of capital expenditures to private and public organizations due to
the increased number of compromises and factors of this paradigm helping to fuel the
growth of innovations or spawn a new industry as a whole
By David F. Larcker, Peter C. Reiss, and Brian Tayan
Stanford Closer Look Series, November 16, 2017
The board of directors is expected to ensure that management has identified and developed processes to mitigate risks facing the organization, including risks arising from data theft and the loss of information. Unfortunately, recent experience suggests that companies are not doing a sufficient job of securing this data. In this Closer Look, we examine they types of cyberattacks that occur and how companies respond to them.
We ask:
• What steps can the board take to prevent, monitor, and mitigate data theft?
• What data, metrics, and information should board members review to satisfy themselves that management has taken proper steps to minimize cyber risks?
• What qualifications should a board member have in order to constructively contribute to boardroom discussions on cybersecurity?
• How difficult is it to find board candidates with these skills?
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, at the January 27, 2017 meeting of (ISC)² Dallas Fort Worth Chapter.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit by Lynda Bennett
2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers. At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader concerns about national security and terrorist threats.
How Ellen Pao became Reddit’s Lee Harvey OswaldJason Fernandes
In July, popular website Reddit found itself suddenly mired in unprecedented controversy. When the dust settled, controversial CEO Ellen Pao resigned and those following the fiasco were left with more questions than answers. Pao’s stated reason for her departure was that the Reddit board was demanding a higher growth rate than she felt comfortable promising. Mundane sure, but many felt that given recent events at the company, the truth was likely murkier.
They say bad news comes in threes: After Nokia and Blackberry, now it’s HTC’...Jason Fernandes
HTC has been ailing for a while now, but in August something truly shocking happened: the market valuation of HTC fell below its available cash on hand. This theoretically means that should investors start to buy up all of HTC’s stock at its current valuation, the company would actually be paying those investors to take it over
AN INTERVIEW WITH JASON FERNANDES, WHO PROVES THAT DISABILITY OR OTHERWISE, T...Jason Fernandes
Web designer, proprietor of an internet web site and winner of the Cable and Wireless International Childnet award and NINE other awards. A software trouble shooter for one of India’s most widely circulated computer magazines- Chip, and an amateur clay modeller to boot, Jason Fernandes has quite a few laurels to carry with him when he turns in for the night.
Periscope and Meerkat: Why broadcasters should stop worrying and learn to lov...Jason Fernandes
When Katy Perry set out to promote her new Epix concert movie she embraced live streaming app Periscope in a big way. Live streaming the film’s opening and post show Q&A was just the start. For many, this was their first introduction to the concept of live video streaming.
Net Neutrality and what initiatives like Internet.org and Airtel Zero mean fo...Jason Fernandes
What seemed like a noble initiative to connect millions of the world’s poor to basic internet services in the developing world had gone largely unnoticed till suddenly Facebook’s Internet.org initiative found itself mired in controversy. The main objection to Internet.org was its perceived violation of the principles of Net Neutrality.
Microsoft shocked and blindsided tech watchers last month when in a largely predictable conference they pulled a rabbit out of their hats and launched what could be one of the most transformative products not just of this year but perhaps the decade
Can cloud computing survive the NSA disclosuresJason Fernandes
Over the past several months, the disclosures by former National Security Agency (NSA) contractor Edward Snowden have hit internet companies hard. Lately, there has been a steady migration to the cloud services. People were increasingly comfortable with storing important documents online. The NSA disclosures have stopped this trend in its tracks, and could possibly lead to its reversal.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
In the past few years, a new approach to cybersecurity has emerged, based on the analysis of data on successful attacks. In this approach, continuous diagnostics and mitigation replace the reactive network security methods used in the past. The approach combines continuous monitoring of network health with relatively straightforward mitigation strategies. The strategies used in this approach reduce the opportunities for attack and force attackers to develop more sophisticated (and expensive) techniques or to give up on the target. In combination, continuous monitoring and mitigation strategies provide the basis for better cybersecurity.
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
www.pwc.com/gsiss2015
Managing cyber risks in an
interconnected world
Key findings from The Global State of
Information Security® Survey 2015
30 September 2014
03
Employees are the most-
cited culprits of incidents
p13
Nation-states, hackers, and
organized crime groups are
the cybersecurity villains that
everybody loves to hate
Figure 6: Insiders vs. outsiders
p15
High growth in high-profile
crimes
p18
Domestic intelligence: A new
source of concern
01
Cyber risks: A severe and
present danger
p1
Cybersecurity is now a persistent
business risk
p3
And the risks go beyond devices
p5
Cybersecurity services market
is expanding
Figure 1: Security incidents outpace
GDP and mobile phone growth
Table of contents
02
Incidents and financial
impacts continue to soar
p7
Continued year-over-year
rise is no surprise
Figure 2: Security incidents grow
66% CAGR
Figure 3: Larger companies detect
more incidents
Figure 4: Information security
budget by company size (revenue)
p10
Financial losses increase apace
Figure 5: Incidents are more costly
to large organizations
07
Evolving from security to
cyber risk management
p31
As incidents continue to proliferate
across the globe, it’s becoming
clear that cyber risks will never
be completely eliminated
p35
Methodology
p36
Endnotes & sources
p37
Contacts by region
04
As incidents rise, security
spending falls
p19
Organizations are undoubtedly
worried about the rising tide
of cybercrime
Figure 7: Overall, average security
budgets decrease slightly, reversing
a three-year trend.
Figure 8: Top spending priorities
over the next 12 months
05
Declines in fundamental
security practices
p25
Security practices must keep pace
with constantly evolving threats
and security requirements
Figure 9: Failing to keep up with
security threats
Figure 10: At most organizations, the
Board of Directors does not participate
in key information security activities
06
Gains in select security
initiatives
p29
While we found declines in
some security practices, we also
saw gains in important areas
Cybersecurity is
now a persistent
business risk
It is no longer an issue that
concerns only information
technology and security
professionals; the impact
has extended to the C-suite
and boardroom.
Awareness and concern about
security incidents and threats
also has become top of mind among
consumers as well. In short, few
risk issues are as all-encompassing
as cybersecurity.
Media reports of security incidents
have become as commonplace as the
weather forecast, and over the past
12 months virtually every industry
sector across the globe has been hit
by some type of cyber threat.
Following are but a few: As incidents
proliferate, governments are
becoming more proactive in helping
organizations fight cyber crime.
The US Federal Bureau of
Investigation (FBI), for example,
disclosed that it notified 3,000
companies—including banks,
retaile.
Project 2020
Scenarios for the Future of Cybercrime -
White Paper for Decision Makers
2
Contents
1. About Project 2020 3
2. Implications for Cybersecurity Stakeholders 3
3. Cybercriminal Threats 6
4. The View from 2012 8
5. Scenario Narratives for 2020 10
a. Citizen - Kinuko 10
b. Business - Xinesys Enterprises and Lakoocha 14
c. Government - South Sylvania 19
6. Beyond 2020 24
Appendix – Scenario Method 25
3
1. About Project 2020
Project 2020 is an initiative of the International Cyber Security
Protection Alliance (ICSPA). Its aim is to anticipate the future of
cybercrime, enabling governments, businesses and citizens to
prepare themselves for the challenges and opportunities of the
coming decade. It comprises a range of activities, including
common threat reporting, scenario exercises, policy guidance and
capacity building.
The scenarios in this document are not predictions of a single
future. Rather, they are descriptions of a possible future, which
focuses on the impact of cybercrime from the perspectives of an
ordinary Internet user, a manufacturer, a communications service
provider and a government. The events and developments
described are designed to be plausible in some parts of the world,
as opposed to inevitable in all. They take their inspiration from
analysis of the current threat landscape, the expert opinion of
ICSPA members and extensive horizon scanning, particularly of
emerging technologies.
The European Cybercrime Centre (EC3) at Europol and the ICSPA
would like to express their heartfelt thanks to the Global Review
Panel of experts from governments, international organisations,
industry and academia who took the time to validate the scenarios.
This document is undoubtedly the better for it.
2. Implications for Cybersecurity Stakeholders
The scenarios presented in Section 5 raise a number of questions to
be answered by today’s stakeholders and decision makers. These
include:
• Who owns the data in networked systems, and for how
long?
• Who will distinguish between data misuse and legitimate
use, and will we achieve consistency? What data will the
authorities be able to access and use for the purposes of
preventing and disrupting criminal activity?
• Who covers (and recovers) the losses, both financial and in
terms of data recovery?
• Who secures the joins between services, applications and
networks? And how can objects that use different technologies
operate safely in the same environment?
4
• Do we want local or global governance and security
solutions?
• Will we be able to transit to new governance and business
models without causing global shocks, schisms and
significant financial damage?
If these questions remain unanswered, or the responses are
uncoordinated, we risk imposing significant barriers to the
technological advantages prom.
This Frost & Sullivan analyst report reveals how the legal and threat environment, combined with BYOD and cost factors, make multi-factor, risk-based authentication the logical approach to solving the security challenges posed by threat actors.
The Future of Security in Australia: a Think Tank Report by BlackBerry. This white paper from BlackBerry, the mobile-native software and services company dedicated to securing the Enterprise of Things, features the analysis and thoughts from a 10-expert roundtable late last year looking at trends in cyber and mobile security.
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020.
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
With the release of the two next gen gaming consoles imminent, comparisions rule the day. So, which one should you get? The answer, of course, depend on which console has the games you really want to play, If early indications are to be believed, PS4 has quite a lead on it's competition. The PS4 and Xbox One are born out of compeltely different design aesthetics and which one you choose depends greatly on your taste.
A Whatsapp rival, Google's answer to Evernote...six apps that are destined to climb the popularity charts.
WeChat, PAC-Man + Tournaments, Modem Combat, Zero Hour, AppLock, Breaking News, Google Keep
We recently became the proud owners of one of the hottest products of 2013: the Pebble smartwatch. Many might recognise Pebble as the breakout project of crowdfunding website Kickstarter, where it raised over $10million, For the uninitiated, however, Pebble is designed to synchronise with your Android/iOS smartphone via Bluetooth, bringing text, email notifications, social media update and more right to your wrist.
The Phonograph, The Turntable, Vacuum Tube Audio amplifier, Transistor Radio, Sony Walkman, CD Player, Sony MD ( Minidisc), Apple Ipod, USB Turntables And Tube Amp
A portable karaoke device, an invisible gamepad and, among others, a BBQ assistant: here's what we are putting our money on the renowned crowdfunding platform.
Will whatsapp anti-corruption campaign reduce graft in the police department?Jason Fernandes
Technology is an excellent tool to make the government more efficient and easily accountable to people. WhatsApp usage is universal across vast socio-economic spectrum, so it is most likely that the WhatsApp anti-graft campaign would be successful here. I applaud the initiative and welcome the government into the 21st century.
Has the state govt done enough to ease the way for entrepreneursJason Fernandes
The government could do more for startups, particularly in the areas of streamlining processes and providing greater access to capital. I'm optimistic that some of these concerns can be addressed through greater dialogues between private/ public stakeholders.
CUT THOSE UMBILICAL TIES. OR NOT…- The Goan Jason Fernandes
Jason Fernandes talks about how even though he has moved out of his own parents house and is living alone, the bond between a parent and offspring is permanent and immutable.
We want an IT policy which will have a focus on startups and not just benefit medium and large scale businesses. Encouraging a vibrant startup atmosphere is exactly what Goa should do if is to ever grow as an IT hub.
He is the founder of US-based technology company Smartklock. He is attempting to create a WiFi/Bluetooth connected desktop that will dynamically pull social media and other updates from the Internet.
Has the state govt. done enough to ease the way for entrepreneurs- -Times of ...Jason Fernandes
The government could do more for startups, particularly in the areas of streamlining processes and providing greater access to capital. I’m optimistic that some of these concerns can be addressed through greater dialogue between private/public stakeholders.
GOAN WINS ACCLAIM AT ASIAN SCIENCE WRITING PRIZE, 2015 - The Times Of IndiaJason Fernandes
A Goan entrepreneur, Jason Fernandes received an honourable mention at the Asian Scientist Writing Prize 2015, after competing with 300 writers from 16 different countries in Asia, including China, Japan and Thailand, recently.
Suddenly, the world has opened up, the walls have come down and even the sky’s not the limit. At 16, Jason Fernandes is proof of that. Himself Dyslexic, the teenager responded to one of his own needs – and created an internet based support group for learning disabilities. One year later his website, ldkids.zeocities.com, is one of the three largest in the world- and besides unconditional help in the form of laptops and free domain hosting, Jason goes to Barbedos this month to pick up a 1500-pound award from ChildNet, an international organisation working with young people.
TEENAGER WITH DYSLEXIA WINS AWARD FOR HIS WEB SITE - India Abroad Jason Fernandes
Jason Fernandes, a boy who suffers from the learning disability (LD), Dyslexia, has achieved the distinction of becoming the first Indian student to win a prestigious international honour for his innovative work on the Internet.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
"Impact of front-end architecture on development cost", Viktor Turskyi
Cyber Warfare
1. Technology
50 | GlobeAsia April 2015
T
he past several years have seen a rise
in private companies being targeted by
everyone from state sponsored hackers to
criminals and even so called Hacktivists (hackers
for a cause). Businesses have found that the
attacks have reached a level of sophistication that
often times is far in excess of what the company
is handle themselves. Particularly in the case of
state sponsored cyber-attacks, fighting back on
equal footing is not an option for most businesses.
The alarming number of recent high profile
hacks occurring with increasing frequency have
many questioning the role of government, the
responsibilities of businesses and whether closer
cooperation between the two could successfully
combat cyber-attacks.
Virtual Hacks, but very real damage
Coordinated cyber-attacks can ruin a brand’s rep-
utation and in many cases directly affects their
bottom line. The recent Sony hack for example is
considered by experts to be the most damaging
attack in history, cost the entertainment company
at least $15 million in the third quarter. The
Cyber warfare: Can business trust
the government to protect them?
CLOUDFRONT.NET
Entrance to the Mountain View office which is home to both the Mozilla
Foundation and the Mozilla Corporation.
2. April 2015 GlobeAsia | 51
situation was because “The unique na-
ture of cyberspace and its potential for
damage has propelled the government
and private sector to work together”
Late to the party, but not to be
outdone President Obama was at the
Cyber Security summit at Stanford in
February this year where he a signed
an executive order that would allow
for much closer cooperation between
government and industry. The order is
expected to help create a framework
that will allow intelligence gathering
on threats to industries such as the
private defense, utility and the bank-
ing sectors. The information sharing
arrangement should allow the firms
to both protect themselves better and
better secure the United States as a
whole against these cyber-attacks. In
February, a slew of major U.S corpora-
tions such as Walgreens and Bank of
America signed on to set of cybersecu-
rity standards mandated by the White
House
Positive steps but is “targeted
liability” a red herring?
An unfortunate side effect of large
internet companies like Gmail and
Facebook being based in the US is that
its policies can become de facto stan-
dards in other nations (even if only
effectively, due to the popularity of
these US based sites). One key aspects
of President Obama’s plan calls for
Jason Fernandes
Tech commentator and the founder of SmartKlock.
“The unique nature of
cyberspace and its potential
for damage has propelled
the government and private
sector to work together”
complete tab isn’t in however and a
Reuter’s article quoted a senior fellow
at the Center for Strategic and Interna-
tional Studies estimating the total cost
could rise to as high as $100 million as
the full effects of the hack are rever-
berate over the next several month.
These damages are absolutely unrelat-
ed to a previous 2011 incident where
the Sony PSN network was hacked,
that cost the company $170 million.
Not just Sony
One might be tempted to ignore this if
hackers focused their ire on the studio
that brought us such cinematic gems
as Paul Blart: Mall Cop and The Green
Hornet starring Seth Rogan, but the
financial system has been hit hard too.
This summer, JPMorgan Chase was
hit in a breach affecting 76 million
account holders and as many as 7 mil-
lion small businesses. The same sus-
pected Russian criminal attackers also
successfully targeted 9 other banks.
The problem is serious enough that
Newsweek published an end of the
year cheat sheet listing cyber-attacks
in 2014. Target, Home Depot, Neiman
Marcus and even Jimmy Johns (a
sandwich company) were all named as
victims of cyber-attacks in 2014.
Governments have largely ignored the
threat
The potential for disaster is much
greater when one considers that so
many critical infrastructure services
are managed by private companies.
Any effective defense against cyber
warfare therefore will have to involve
close cooperation with private compa-
nies. Even attacks on private institu-
tions could cause enough damage that
the economy as a whole could suffer
irreparable harm.
As the Sony attack proved, gov-
ernment and private companies are
very much on different pages. Reports
say the US government was largely
blindsided by a cyberattack of such a
magnitude on a private company and
that coordination between Sony and
the White House during the crisis was
minimal. Sony took the difficult steps
it felt were necessary to protect public
safety but nonetheless had to contend
with President Obama chiding their
decision to capitulate. While certainly
both the White House and Sony talked,
apparently they did not agree on a
response. Regardless of the details, the
fact remains that there appeared to
have been no contingency planning for
this sort of occurrence and the Sony
incident leaves one less than optimistic
about how the government will react
to similar situations in the future.
Government finally reaching out to
industry
The lack of coordination between the
private and public sector is just the
sort of problems some governments
are now taking steps to avoid. The
UK for example just launched a £650
million 4 year National Cyber Secu-
rity Program. Information about the
program, available on the UK govern-
ment website lists that they intend to
partner with companies that own or
operate key infrastructure to “ensure
key data and systems continue to be
safe and resilient.” Another goal of the
program was to “Establish a new op-
erational partnership with the private
sector to share information on threats
in cyberspace.” What shape this initia-
tive will eventually take is anybody’s
guess but it’s a positive sign.
India too has made similar moves.
As early as 2012, the government setup
a Joint Working Group on Cyber Se-
curity with representatives from both
the public and private sector to help
execute a plan to protect the country
against cyber-attacks. Indian National
Security Advisor Shivshankar Menon
took pains to point out how this was
the first time India would allow the
private sector a seat in a national secu-
rity matter. Menon explained this rare
3. Technology
52 | GlobeAsia April 2015
millions of dollars the present model that relies
on private companies to inform governments of
possible breaches just takes too long. Sometimes
even further discussions may be needed before
an acceptable response that both fulfills the cor-
poration’s business aims and yet prevents the
incident from escalating can be agreed upon. The
present two or three step system before a deci-
sion is made is an enormous waste of time and
not quite sustainable as these attacks become
more frequent. Time is a commodity one can
scarce afford to waste if you happen to be a busi-
ness in the midst of a sustained and coordinated
attack and hence the need for urgent reform
The next few years are going to set the battle
lines for the future cyber warfare and the part-
nerships we create today could both be our savior
and our agents of destruction. In 1969 Former US
Supreme Court Justice William Douglas predicted
“Big Brother in the form of an increasingly pow-
erful government and in an increasingly power-
ful private sector will pile the records high with
reasons why privacy should give way to national
security, to law and order [...]” -his words seem
especially chilling today.
It’s a sad commentary that in a post Snowden
world, consumers and businesses need to now
weigh whether they have more to fear from
criminal syndicates or snoops with government
badges. Quis custodiet ipsos custodes? - Who
watches the watchmen?
a ‘targeted liability” protection for companies
that share data. This means that companies that
disclose data to the government are freed from
the legal consequences of this sort of disclosure.
While the President made an excellent argument
as to why this was necessary to encourage compa-
nies to share data without fear of consequences.
The problem this creates could be bigger than the
problem it purports to solve. The tendency would
be for a company to overshare since there is no
benefit to the company in being selective in the
information it hands over. Soon a company might
default to accepting and fulfilling any requests
that the government makes. It’s not difficult to
imagine how this sort of system could be abused
and ultimately hurt businesses and their brand.
Fox in charge of the henhouse?
Probably the biggest argument against greater
cooperation with governments is that they have
not exactly proven themselves trustworthy when
it comes to respecting their citizen’s privacy. We
already know from former NSA contractor turned
whistleblower Edward Snowden that the US gov-
ernment has long sought backdoor access to data
locked away in private companies like Facebook
and Google. An informed populace might be jus-
tifiably skeptical then, about letting corporations
they trust with their data just let government
waltz in through the front door and leave with
their information
A lot more will have to be worked out before
this private/public sector partnership is ready
for primetime and many questions remain. For
example, what happens in cases of disagree-
ments? Who has final say? What if in the case of
the Sony hack, the US had tried to mandate Sony’s
response. Is it appropriate for companies to re-
spond offensively against state sponsored cyber-
attacks even if it could risk an international in-
cident? None of these questions have quite been
answered yet and they would need to be, before
companies should feel comfortable involving gov-
ernment in their response to cyber-attacks.
Tighter integration between the private/public
sectors in necessary and inevitable
While skepticism both from businesses and
consumers may be warranted, a persuasive ar-
gument could be made that Government needs
to share information fairly efficiently and im-
mediately in order to quickly respond to threats.
Especially Since these threats could cost private
corporations as well as the economy as a whole
The next few years
are going to set
the battle lines for
the future cyber
warfare and the
partnerships we
create today could
both be our savior
and our agents of
destruction.
NBCNEWS.COM
Edward Snowden
4. INDONESIA’S NO 1 BUSINESS MAGAZINE
A
A
S
I
VOLUME 9 NUMBER 4 / APRIL 2015
Singapore
Australia
Malaysia
Indonesia
Philippines
Thailand
Taiwan
Others
S$13.00
A$9.95
RM18.00
Rp50,000
P250
B210
NT$210
US$8
MICA (P) 142/10/2007
www.globeasia.com
INDONESIA
AT THE
FOREFRONT
A new regional
context is
driving change
in government,
business and
civil society
W O R L D E C O N O M I C F O R U M
A Tribute to Lee Kuan Yew, Singapore’s Founding Father
5. A Media Holdings Publication4 | GlobeAsia April 2015
Columnists
14 Oxford
Infrastructure spending boost
16 Steve Hanke
The monetary approach reigns
supreme
46 Jamil Maidan Flores
Operation Big Bird: The hunt for
the hidden Marcos wealth
50 Jason Fernandes
Cyber warfare: Can business trust
the government to protect them?
54 Wuddy Warsono
Still believe in superheroes
90 Scott Younger
Time to get to work
92 Keith Loveard
Limits to freedom
contentsVOLUME 9 NUMBER 4 / APRIL 2015
INTERVIEW
78 Safeguarding Indonesia’s maritime
sovereignty
Indroyono Soesilo is by no means a new
name in Indonesia’s maritime affairs, with
a strong background in the government
agency tasked with marine and fisheries
research.
80 Out of the east
HIPMI chairman Bahlil Lahadalia proves
that a humble upbringing does not hinder
success.
84 Indonesia seeks to strengthen ties
with India
India and Indonesia must take relations to
the next level says Indonesian ambassador
to India Rizali W. Indrakesuma.
88 Last chance to save the planet
Jeffrey Sachs is on a worldwide mission
to save the planet while also ensuring
sustainable economic growth.
EVENT
98 Mochtar Riady donates Nanotech
Center to UI
Lippo Group founder Mochtar Riady
donated a cutting-edge research center to
the University of Indonesia (UI).
Living the Good Life
108 Lost at sea
Paul Whelan of Simpson Marine yacht
brokers and dealers explains the ins and
outs of yachting in Asia and Indonesia.
Back Page
112 A famous Medan landmark
114
78
COMPANY
62 Dealing with the details in
the finance industry
Ratih D Item wanted to be a judge but
a tragedy pushed her in the direction
of the finance industry.
64 The future of retail
With $500 million to play with, Matahari-
Mall.com intends to reshape online retail in
the country.
66 Tony Wenas to steer RAPP
into eco-friendly future
Tony Wenas is using his vast corporate
experience to remake RAPP.
SPECIAL REPORT
68 From Aceh to Papua: Building a nation
Infrastructure has been a hot topic for more
than a decade but the question remains
whether there is really much progress.
74 Regional manpower movement
One of the biggest issues surrounding the
coming ASEAN Economic Community (AEC)
concerns manpower movement within the
region.
76 Focus on the economy first
If the economy is running well, President
Joko Widodo’s concept of a maritime axis
can happen, says an expert on maritime
defense.
108
6. 6 | GlobeAsia April 2015
A
gainst significant odds, Lee
Kuan Yew transformed
Singapore from a backwater
port to a global economic
powerhouse. His leadership style was
direct and even confrontational but
he had the nation’s interest at heart.
Lee was both visionary and
pragmatic – a rare combination. He
was not afraid to take tough decisions
and would stare down his critics and
opponents because of his convictions.
Singapore is today a modern,
developed first-world country but it
did not happen by chance. Lee Kuan
Yew was the chief architect but he had
a lot of help from his cabinet and the
people of Singapore.
His passing at the age of 91 will
leave a gaping hole in the hearts
of Singaporeans but also in the
leadership of the region. He was the
last of the founding fathers of the
Association of Southeast Asian Nations
(ASEAN) and with his departure the
baton of leadership has fully passed to
the next generation.
Lee was a true leader in every
sense. He harnessed the only two
resources Singapore had, its people
and its geographical location, to build
one of the most dynamic economies in
the world. He blended capitalism and
free markets with state-led control of
the economy.
It is no surprise that many
Singapore government-owned
enterprises are today regional and
even global companies. They are
run and managed by professionals
who adhere to global best practices.
That such large companies arose
from a tiny, resource-poor country is
testament to Lee’s leadership.
He also opened up Singapore to
foreign direct investment to create
jobs and bring in technology. As a
result, Singapore’s gross national
product (GNP) increased 15-fold
Editor’s Note
Editorial
Editor in Chief
Shoeb Kagda
Managing Editor
Yanto Soegiarto
Deputy Editors
Muhamad Al Azhari
Editor at Large
John Riady
Senior Editor
Albert W. Nonto
Denverino Dante
Contributing Editors
Farid Harianto
Steve Hanke
Scott Younger
Contributors
Suryo Bambang Sulisto
Wijayanto Samirin
Frans Winarta
Jason Fernandes
John Denton
Special Columnist
Jamil Maidan Flores
Reporters
Vanesha Manuturi
Dion Bisara
Copy Editor
Geraldine Tan
Art, Design and Layout
Gimbar Maulana
Elsid Arendra
Agustinus W. Triwibowo
Nela Realino
Wulan Tagu Dedo
Rudi Pandjaitan
Senior Photographers
M. Defrizal
Suhadi
Production
Assistant
Danang Kurniadi
GlobeAsia Magazine
BeritaSatu Plaza
9th Floor
Jl. Jendral Gatot Subroto Kav.
35-36
Jakarta 12950
Indonesia
Tel +62 21 29957500
Fax +62 21 5200072
www.globeasia.com
For sales inquiries
salesglobeasia@
beritasatumedia.com
To subscribe
circulation@globeasia.com
Tribute to a leader
between 1960 and 1980 and
Singaporeans today enjoy one of the
highest living standards in the world.
To be sure these successes were
not achieved without sacrifice and
stepping on toes. Lee was unrepentant
about going after his critics and
silencing his political opponents. He
did not brook dissent and his record
on human rights was patchy.
There is no denying, however, that
Lee Kuan Yew was, as US President
Barrack Obama noted, “a true giant of
history who will be remembered for
generations to come as the father of
modern Singapore and as one of the
great strategists of Asian affairs.”
WEF East Asia
Lee Kuan Yew’s passing comes at
a sensitive time for Singapore and
the region. Leaders from around
the world will gather in Jakarta
from April 19-21 for the World
Economic Forum East Asia meeting
to deliberate the pressing problems
facing the region and to find solutions.
Asia is at a crossroad as the region
grapples with regionalism and slowing
economic growth while having to
fulfill the aspirations of its young
population. At the core of the challenge
is rebuilding public trust in the state
and other institutions. The region
could do with Lee Kuan Yew’s wisdom
and insight at this crucial juncture.
Shoeb Kagda
Editor in Chief
shoeb@globeasia.com
GEORGEGASCON/AFPPHOTO