Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
Respresenting Cyber Defense Community (cdef.id) to present and share my view on Secure DevOps / DevSecOps. Through this presentation, I shared several insights about:
1. How to balance the risk and controls in the "great shift left" paradigm (agile)
2. DevOps activities
3. How to seamlessly integrate security into DevOps
4. How to "shift left" the security"
5. Get started with Secure DevOps / DevSecOps
6. Case Study about DevSecOps implementation
For further discussion, especially how to secure digital and agile transformation in your organization, don't hesitate to contact me :)
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Presented at ISACA Indonesia Monthly Technical Meeting, 11 Dec 2019 at Telkom Landmark.
Key takeaways from my presentation:
1. Cloud customers have to understand the share responsibilities between customer and cloud provider
2. Different cloud service model (IaaS, PaaS, SaaS) has different audit methodology
3. Customer’s IT Auditor have to be trained to have the skills needed to audit the cloud service
4. Understanding IAM in Cloud is very important. Each Cloud Service Provider has different IAM mechanism
5. Understanding different type of audit logs in cloud platform is important for IT Auditor
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
Today, 1/12/17, the IT-AAC briefed the Panel on Streamlining and Codifying Acquisition Regulations (NDAA Sec 809). These recommendations are the results of an 8 year study that included the review of over 40 major studies, over 40 leadership workshops, and root cause analysis of over 40 major IT program failures.
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
Respresenting Cyber Defense Community (cdef.id) to present and share my view on Secure DevOps / DevSecOps. Through this presentation, I shared several insights about:
1. How to balance the risk and controls in the "great shift left" paradigm (agile)
2. DevOps activities
3. How to seamlessly integrate security into DevOps
4. How to "shift left" the security"
5. Get started with Secure DevOps / DevSecOps
6. Case Study about DevSecOps implementation
For further discussion, especially how to secure digital and agile transformation in your organization, don't hesitate to contact me :)
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Presented at ISACA Indonesia Monthly Technical Meeting, 11 Dec 2019 at Telkom Landmark.
Key takeaways from my presentation:
1. Cloud customers have to understand the share responsibilities between customer and cloud provider
2. Different cloud service model (IaaS, PaaS, SaaS) has different audit methodology
3. Customer’s IT Auditor have to be trained to have the skills needed to audit the cloud service
4. Understanding IAM in Cloud is very important. Each Cloud Service Provider has different IAM mechanism
5. Understanding different type of audit logs in cloud platform is important for IT Auditor
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
Today, 1/12/17, the IT-AAC briefed the Panel on Streamlining and Codifying Acquisition Regulations (NDAA Sec 809). These recommendations are the results of an 8 year study that included the review of over 40 major studies, over 40 leadership workshops, and root cause analysis of over 40 major IT program failures.
Discussion of information Security risks in current business and technology environments.
presented to ISSA Ireland conference attendees in Dublin on 12 May 2011.
California Consumer Protection Act (CCPA) is
one such law that empowers the residents of
California, United States to have enhanced
privacy rights & consumer protection. It is the
most comprehensive US state privacy law to
date.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
Today’s organizations give predominant importance to increased privacy regulations, stakeholder’s profitability demands and the ever so changing consumer privacy expectations. As a result, the emphasis on personal data is growing and the companies are facing complicated reputational, regulatory and data privacy risk environment. It’s a sad fact that the frequency of critical data breaches are increasing and as a result the management administration and the IT departments focus on safeguarding their data systems more than ever before. Our experienced and expertise data security, privacy and information governance experts in UAE helps you to reduce the risks associated with various privacy compliance frameworks along with recognizing the value of your personal data.
Hear how security pros are responding and adapting to increased attacks and breaches, including facilitating more comprehensive cyber threat management strategies and best practices and the increasing investments and resource utilization to mitigate these challenges. Listen to the webinar, based on the Cybersecurity Resource Allocation & Efficacy (CRAE) Index study for Q1 2021, from CyberRisk Alliance Business Intelligence to hear the panel of experts:
•Review survey results from CRAE Index’s Q1 global research study;
•Discuss the latest trends on proactive and reactive cybersecurity; and
•Hear insights on what lies ahead.
Making Executives Accountable for IT SecuritySeccuris Inc.
How do we make executives accountable for IT Security?
Michael outlines the general challenges, details key items of concern and discusses the focus areas that can be taken to improve the daily governance of IT security in your organization.
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
Major healthcare providers are tasked with protecting patient data and maintaining complex security compliance requirements enforced through rigorous audits. Mercy Health, a major Midwestern hospital system, became a Tripwire customer in 2013. Using Tripwire technology, they created a successful IT service by integrating their ITSM tool, streamlining their reporting process and more.
Mercy Health and Tripwire show you how to:
-Implement effective change management
-Strengthen security in Epic records systems
-Streamline the audit process
Omzig, and American information technology company that specializes in cloud technology for small and medium sized businesses (SMB).
Ōmzig (pronounced Ohm-Zigh) was founded by information technology professionals with a focus on leveraging the benefits of enterprise-class computing in order to meet the needs of your business. Once considered the domain of large corporations, the evolutions of technology has made it possible to provide robust computing power so that any business can benefit.
Clients profit from partnerships having been curated over a decade with major organizations such as Microsoft and Dell by utilizing the latest and most reliable services available.
Today’s most innovative companies are swapping stringent hierarchical systems and silos in favor of knowledge work and integrated teams. The operating model of the future will develop into a dynamic and redundant team that can respond quickly to user needs and adhere to exhaustive testing practices.
Here’s the question: Is your organization ready to make this change?
During this webinar, Crystal Miceli, Ivanti's VP Product Marketing, hosted our special guest analyst, Charlie Betz, from Forrester Research, an expert in mediating hard-to-resolve discussions around incident management, release automation and chaos engineering. He examined the challenges of older IT modeling. He’ll also shared how infrastructure and operations (I&O) professionals can build agile systems that invest in continuous learning and are compatible with modern IT service management.
This webinar will help you:
.Articulate the issues around traditional IT organization models
.Define how new processes can work in tandem with modern tech operations
.Investigate mission-driven, product-centric operating models you can adopt
.Establish a strategy for transforming your organization’s processes to meet new standards
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
IT Security Initiatives create strategic and operational value to all enterprises; however, many IT professionals do not know how to economically quantify and forecast the benefits of IT security. Additionally, the new digital business ecosystem is resulting in rapid business cycles, which require faster speed and agility in all IT areas and IT services. The new ecosystem, largely caused by the Internet-of-Things, mobility and the Cloud, create a challenge for selecting and prioritizing IT security tools and projects. This session will present an overview of principles, models, trends and best practices, which can have been adopted by individuals and organizations to get right IT security initiatives approved.
Industry 4.0 strategic alignment framework: Multilevel perspective of digital...Anjar Priandoyo
Industry 4.0 strategic alignment framework: Multilevel perspective of digital transition in Indonesia.
ICoSTA Surabaya (The International Conference on Smart Technology and Applications) 20 February 2020
Educational Philosophy and Strategy to Meet Needs of Industry 4.0Dr. Subhash Sharma
Transition from Industry 1.0 driven by steam engines to Industry 4.0 driven by search engines and Internet of Things etc. need a new strategy to meet the needs of Industry 4.0 and new challenges of Digitalization, Democratization, Decentalization and Disruption. Educational institutions should respond to these challenges to ensure future availability of trained human power for Industry 4.0
Discussion of information Security risks in current business and technology environments.
presented to ISSA Ireland conference attendees in Dublin on 12 May 2011.
California Consumer Protection Act (CCPA) is
one such law that empowers the residents of
California, United States to have enhanced
privacy rights & consumer protection. It is the
most comprehensive US state privacy law to
date.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
Today’s organizations give predominant importance to increased privacy regulations, stakeholder’s profitability demands and the ever so changing consumer privacy expectations. As a result, the emphasis on personal data is growing and the companies are facing complicated reputational, regulatory and data privacy risk environment. It’s a sad fact that the frequency of critical data breaches are increasing and as a result the management administration and the IT departments focus on safeguarding their data systems more than ever before. Our experienced and expertise data security, privacy and information governance experts in UAE helps you to reduce the risks associated with various privacy compliance frameworks along with recognizing the value of your personal data.
Hear how security pros are responding and adapting to increased attacks and breaches, including facilitating more comprehensive cyber threat management strategies and best practices and the increasing investments and resource utilization to mitigate these challenges. Listen to the webinar, based on the Cybersecurity Resource Allocation & Efficacy (CRAE) Index study for Q1 2021, from CyberRisk Alliance Business Intelligence to hear the panel of experts:
•Review survey results from CRAE Index’s Q1 global research study;
•Discuss the latest trends on proactive and reactive cybersecurity; and
•Hear insights on what lies ahead.
Making Executives Accountable for IT SecuritySeccuris Inc.
How do we make executives accountable for IT Security?
Michael outlines the general challenges, details key items of concern and discusses the focus areas that can be taken to improve the daily governance of IT security in your organization.
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
Major healthcare providers are tasked with protecting patient data and maintaining complex security compliance requirements enforced through rigorous audits. Mercy Health, a major Midwestern hospital system, became a Tripwire customer in 2013. Using Tripwire technology, they created a successful IT service by integrating their ITSM tool, streamlining their reporting process and more.
Mercy Health and Tripwire show you how to:
-Implement effective change management
-Strengthen security in Epic records systems
-Streamline the audit process
Omzig, and American information technology company that specializes in cloud technology for small and medium sized businesses (SMB).
Ōmzig (pronounced Ohm-Zigh) was founded by information technology professionals with a focus on leveraging the benefits of enterprise-class computing in order to meet the needs of your business. Once considered the domain of large corporations, the evolutions of technology has made it possible to provide robust computing power so that any business can benefit.
Clients profit from partnerships having been curated over a decade with major organizations such as Microsoft and Dell by utilizing the latest and most reliable services available.
Today’s most innovative companies are swapping stringent hierarchical systems and silos in favor of knowledge work and integrated teams. The operating model of the future will develop into a dynamic and redundant team that can respond quickly to user needs and adhere to exhaustive testing practices.
Here’s the question: Is your organization ready to make this change?
During this webinar, Crystal Miceli, Ivanti's VP Product Marketing, hosted our special guest analyst, Charlie Betz, from Forrester Research, an expert in mediating hard-to-resolve discussions around incident management, release automation and chaos engineering. He examined the challenges of older IT modeling. He’ll also shared how infrastructure and operations (I&O) professionals can build agile systems that invest in continuous learning and are compatible with modern IT service management.
This webinar will help you:
.Articulate the issues around traditional IT organization models
.Define how new processes can work in tandem with modern tech operations
.Investigate mission-driven, product-centric operating models you can adopt
.Establish a strategy for transforming your organization’s processes to meet new standards
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
IT Security Initiatives create strategic and operational value to all enterprises; however, many IT professionals do not know how to economically quantify and forecast the benefits of IT security. Additionally, the new digital business ecosystem is resulting in rapid business cycles, which require faster speed and agility in all IT areas and IT services. The new ecosystem, largely caused by the Internet-of-Things, mobility and the Cloud, create a challenge for selecting and prioritizing IT security tools and projects. This session will present an overview of principles, models, trends and best practices, which can have been adopted by individuals and organizations to get right IT security initiatives approved.
Industry 4.0 strategic alignment framework: Multilevel perspective of digital...Anjar Priandoyo
Industry 4.0 strategic alignment framework: Multilevel perspective of digital transition in Indonesia.
ICoSTA Surabaya (The International Conference on Smart Technology and Applications) 20 February 2020
Educational Philosophy and Strategy to Meet Needs of Industry 4.0Dr. Subhash Sharma
Transition from Industry 1.0 driven by steam engines to Industry 4.0 driven by search engines and Internet of Things etc. need a new strategy to meet the needs of Industry 4.0 and new challenges of Digitalization, Democratization, Decentalization and Disruption. Educational institutions should respond to these challenges to ensure future availability of trained human power for Industry 4.0
This presentation was conducted at the future of smart manufacturing in Sharjah event, as organized by the Science Technology and Innovation Park and the American University of Sharjah, on 15/4/2019
ACTUALIDAD DE LA INDUSTRIA 4.0 - START-UP NATION CENTRAL: FINDER INSIGHTS SERIES
ISRAEL’S INDUSTRY 4.0 SECTOR IN 2018
Si estás interesado en la Industria 4.0 y especialmente en la Robótica, compartimos con vos información de primer nivel publicada por Start-Up Nation Central :
Start-Up Nation Central is pleased to present its annual industry 4.0 sector report, Start-Up Nation Central Finder Insights Series: Israel’s Industry 4.0 Sector in 2018, which offers a comprehensive overview and analysis of the state of the Israeli high-tech innovation ecosystem in 2018.
The Finder Insights Series provides an overview of the Industry 4.0 ecosystem in Israel, its history, and global context, highlighting financial trends (investments, M&As, IPOs) and details of the various players that constitute the sector (companies, MNCs and hubs).
Learn more about:
How the global market for Industry 4.0 solutions are expected to grow annually by 20% for the next five years.
The crucial role that technology plays in the adoption of Industry 4.0 solutions.
How the Israel Industry 4.0 sector is third in the world in attracting VC funding.
Click here to download your copy of the Start-Up Nation Central Finder Insights Series: Israel’s Industry 4.0 Sector in 2018.
Industry 4.0 – Gear Up for Next Revolution Workshop by TetrahedronSagar Sangam Sahu
Industry 4.0 and advanced manufacturing both are topics of high international relevance. They are currently the topic of intense debate both in the academic literature and in the practical context as 4th Industrial Revolution.
Industry 4.0 training, Industrie 4.0 crash course : Tonex TrainingBryan Len
Price: $1,899.00
Length: 2 Days
Industry 4.0 Training course covers key ideas of future "savvy production lines", the cyber-physical systems and physical procedures inside these manufacturing plants, and the virtualization systems and canny basic leadership abilities which would bolster administrators and in driving these activities.
Industry 4.0 is an elective term utilized for the German expression “Industrie 4.0" initially restored in 2011 at the Hannover Fair, Germany with usage and proposals started by the German government. Recognized as one of 10 the "Future Projects" for the German government's High-Tech Strategy 2020, with gigantic potential effect on assembling biological communities and associated undertakings.
You'll Walk Away with:
The program expects to enable members to imagine and lead key and specialized components of Industry 4.0-based hierarchical changes. The course will:
Demystify key Industry 4.0 and the biological community of partners included.
Audit test guides for this present reality use of Industry 4.0 over a scope of associations, and its business and mechanical effects.
Associate its members with pioneers and supervisors from differing jobs and associations and comprehend their chances and difficulties.
Give utilize instances of fruitful Industry 4.0 executions on a continuous premise.
Interface its graduated class with one another in network, at their alternative.
Affirmation of coursework and training gotten by one of the world's driving training establishments.
Course Modules:
Demystifying Industry 4.0
Leading Industry 4.0
Leadership Industry 4.0 Capabilities
Key Industry 4.0 Technologies
Aligning Industry 4.0 and Strategies
The Automation Pyramid and New Business Models in Industry 4.0
The Building Blocks of Industry 4.0: Cyber Physical Systems
Industry 4.0 and Technologies
Industry 4.0 Design Principles
Optional Workshop: TONEX Industry 4.0 Roadmaps for Your Organization
Request more information. Visit Tonex course link below
https://www.tonex.com/training-courses/industry-4-0-training-industries-4-0-crash-course/
Similar to Industry 4.0 : How to Build Relevant IT Skills (20)
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
UU No 27 Tahun 2022 tentang Pelindungan Data Pribadi (“UU PDP”) telah disahkan pada bulan Oktober 2022 dan saat ini telah memasuki masa tenggang. Ketiadaan peraturan teknis / turunan membuat banyak organisasi masih ragu dalam menetapkan arah dan mengimplementasikan UU PDP sesuai dengan peraturan perundang-undangan yang berlaku. Salah satu aspek penting dalam UU PDP adalah terkait penunjukan Pejabat/Petugas yang melaksanakan fungsi Pelindungan Data Pribadi (PPDP) atau Data Protection Officer (DPO) seperti yang diamanatkan oleh UU PDP Pasal 53 dan 54.
Melalui Keputusan Menteri Ketenagakerjaan Republik Indonesia Nomor 103 Tahun 2023 tentang Penetapan Standar Kompetensi Kerja Nasional Indonesia Kategori Informasi dan Komunikasi Golongan Pokok Aktivitas Pemrograman, Konsultasi Komputer dan Kegiatan yang Berhubungan dengan Itu (YBDI) Bidang Keahlian Pelindungan Data Pribadi yang ditetapkan pada tanggal 23 Juni 2023, maka standar kompetensi PPDP/DPO telah sah untuk dapat dijadikan rujukan dalam menentukan kompetensi SDM, kebutuhan rekrutmen, pelatihan, dan sertifikasi terkait dengan Pelindungan Data Pribadi.
Ringkasan Standar Kompentensi / SKKNI Pelindungan Data Pribadi ini disusun untuk memudahkan masyarakat dalam memahami secara ringkas 4 Fungsi Kunci, 8 Fungsi Utama, dan 19 Fungsi Dasar yang telah disusun oleh Tim Perumus dan Kementerian Komunikasi dan Informatika Republik Indonesia, serta disahkan oleh Menteri Ketenagakerjaan Republik Indonesia. Semoga ringkasan SKKNI PDP ini dapat bermanfaat dan memberikan panduan secara ringkas tidak hanya perihal kompetensi PPDP/DPO, namun juga hal-hal yang dapat dilakukan oleh organisasi dalam menerapkan Program Pelindungan Data Pribadi.
Salam,
Eryk Budi Pratama, CIPM, CIPP/E, FIP
Chairman - Institute of Digital Trust Indonesia (IODTI)
Tim Perumus SKKNI Pelindungan Data Pribadi
Tim Perumus Rancangan Peraturan Pemerintah Pelindungan Data Pribadi (“RPP PDP”)
eryk@digitaltrustid.org
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Eryk Budi Pratama
Sosialisasi UU Pelindungan Data Pribadi untuk sektor kesehatan.
Webinar Serial TIK I-2022
Diselenggarakan oleh:
*INDOHCF - KREKI - IODTI - FORKOMTIKNAS - Z-COURSE*
TOPIK:
*Implikasi UU PDP (Perlindungan Data Pribadi) Terhadap Tata Kelola Data di Sektor Kesehatan*
Rancangan Undang - Undang (RUU) Perlindungan Data Pribadi (PDP) telah resmi disahkan menjadi Undang-Undang (UU) dalam Rapat Paripurna DPR RI pada tanggal 20 Sept 2022. Sambil menunggu peraturan pelaksanaannya, maka perlu lebih mencermati isi regulasi tsb dan mendiskusikan bagaimana implikasinya bagi sektor kesehatan baik Faskes, BPJS, Masyarakat dan stakeholder kesehatan lainnya
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
Presented at CDEF 16th Meetup at 18 August 2022.
Title:
Privacy-ready Data Protection Program Implementation
Topics:
- Why data protection is important
- Data Privacy Program Domain
- Operationalize Data Privacy Program
- Privacy-aligned Information Security Framework
- Roadmap to Protect Personal Data
- Privacy Management Technology
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
Presented at Online ITIL Indonesia Webinar #5.
Content:
> Setting up the context
> Understanding holistic IT Management point of view
> IT Service Management Transformation
> Key Performance Indicator (KPI)
> IT Service Catalogue
> IT Sourcing
> Agile Incident Management
Presented at National Webinar of ISACA Student Group, Universitas Kristen Satya Wacana, indonesia.
Title: Cyber Resilience: Post COVID-19 - Welcoming New Normal
2 July 2020
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
Presented at Absolut Data Event, 17 Dec 2019, at GoWork Kuningan.
Event URL: https://www.eventbrite.com/e/panel-discussion-what-will-you-prepare-with-data-in-2020-tickets-84851546259
My presentation summarized the two of KPMG publication related to Trust in Data & Analytics. The focus of this event was panel discussion.
Ref 1 : https://assets.kpmg/content/dam/kpmg/xx/pdf/2016/10/building-trust-in-analytics.pdf
Ref 2: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
Presented at Indonesia Honeynet Project (IHP) meetup. This presentation covering:
1. Overview of Industry 4.0
2. IoT Security Model
3. How to Secure IoT
4. Research in IoT
Other emerging technology risk area that will be covered in my professional services:
1. Cloud
2. Mobile
3. Artificial Intelligence / Intelligent Automation
4. Data & Analytics
IT Governance - Capability Assessment using COBIT 5Eryk Budi Pratama
(re-upload)
Capability assessment of IT Governance using COBIT 5 Process Assessment Model (PAM). Presented for Information System Department, Universitas Bakrie - Indonesia
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
1. Overhype of Industry 4.0
How to Avoid Misunderstanding and Build Relevant IT Skills
Eryk Budi Pratama, S.Kom, M.Kom, MM
IT Talkshow Universitas Pertamina | 7 September 2019
2. WHO AM I?
• IT Transformation & Community Enthusiast
• IT Advisory Professional, Global Consulting Firm
• Cyber Security, IT Audit, Governance, Risk, &
Compliance
• Knowledge Hunter
• https://www.slideshare.net/proferyk
6. Top 10 “Making Indonesia 4.0”
Source: Ministry of Industry & AT Kearny
•Enhance domestic upstream material production; e.g.
50% of petrochemical is imported
Reform Material Flow
•Build a single nationwide industry zoning roadmap;
resolve zoning inconsistency challenges
Redesign Industrial Zones
•Grab opportunities under global sustainability trend;
e.g. EV, biofuel, renewables
Embrace sustainability
•Empower 3.7 million SMEs by technologies; e.g.
build SME e-commerce, technology bank
Empower SMEs
•Advance network and digital platform; e.g. 4G to 5G,
Fiber speed 1Gbps, Data center and Cloud
Build Nationwide Digital Infrastructure
•Engage top global manufacturers with attractive offer
and accelerate technology transfer
Attract Foreign Investments
•Redesign education curriculum under 4IR era
•Create professional talent mobility program
Upgrade Human Capital
•Enhance R&D centers by government, private sector
and universities
Establish Innovation Ecosystem
•Introduce tax exemption/subsidies for technology
adoption and support funding
Incentivize Technology Investment
•Build more coherent policies/regulations by cross-
ministry collaborations
Reoptimize Regulations & Policies
7. Key Technologies for Industry 4.0
Source: AT Kearny; Kementerian Perindustrian & Business Sweden
Focused Technologies in
Indonesia Industry 4.0
Roadmap
8. Video – Banking Agent Augmentation
https://www.youtube.com/watch?v=V14uthYsYhA
9. Key Challenges in I4.0 adoption
Source: KPMG Industry 4.0 Report
Cost & Technical Issues
▪ Lack of adequate infrastructure:
physical and digital
▪ Cyber security
▪ High cost of digital technologies
Skill and Talent Issues
▪ Leadership skill gap – Tradition Leadership versus
Leadership 4.0
▪ Workforce skill gap
“The right set of talent will be the key to success”
10. Skills Required for Industry 4.0 Era
Source: KPMG Industry 4.0 Report
Leadership in 4.0 Era
Skills in 4.0 Era
▪ Ability to use automated systems
▪ Knowledge of new-age technologies such as IoT,
AR/VR, machine learning, big data and analytics
▪ Knowledge of cyber security and data protection
▪ Statistical knowledge and ability to analyze data
generated from machines
▪ Understanding of cross-functional processes
▪ Focus on client needs and industry trends
▪ Expertise in working under ambiguous and changing
environments
▪ Honing soft skills such as collaboration, emotional
intelligence, decision making and up-skilling
mind-sets.
Digital knowledge and ability to work with data Cross-functional expertise and soft skills
Agility
▪ Quickly adapt to
business changes
▪ Enable fast
technology adoption
Digital Leadership
▪ Ability to understand
technology
▪ Enable digital
transformation
Focus on People
▪ People leader
▪ Identify core skill-
sets for up-skilling
employees
Traditional Leadership
▪ Motivational
▪ Inspirational
▪ Lead by example
▪ Domain knowledge