

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Riding the current digital wave, many companies are changing their operating processes and moving to a more digitalised environment. Along with this transition, comes a host of new cyber threats. Digital transformation and hyper-convergence also create unintentional gates for risks, vulnerabilities, and attacks.
Additionally, the COVID-19 pandemic has exposed businesses to cyber-attacks and data breaches and malicious cyber actors who exploit working models in the new normal, where many businesses operate remotely.
Companies may be unaware of and are not prepared for these events with a suitable plan in place.
Security, along with wealth and sustainability is one of the three key aspects of the Thailand 4.0 Plan. It strongly encourages businesses to alter their cyber safety strategies to implement more protective measures. Nonetheless, the Thai government remains deeply committed to cyber resilience and works closely with businesses to ensure they deploy rigorous measures.
With first-hand experience and lessons from others, organisations are becoming increasingly aware of their vulnerability to cyber-attacks that could paralyse the company or destroy IT systems permanently.
Business continuity plans could use a cyber-resilience strategy that can help to cope with disruptive cyber incidents. Typically, the plans include means to protect critical applications and data against such risks and to recover from infringement or malfunction in a controlled and measurable way.
To withstand and thrive during these numerous threats, firms have recognised that they need to do more than build a reliable infrastructure for growth and data protection. Now businesses develop holistic continuity plans that can maintain their business operations, protect data, protect the brand, retain customers – and ultimately help to lower total operating costs over the long run.
The implementation of a business continuity plan will then reduce downtime and improve business continuity, IT crisis recovery, corporate crisis management capacity, and regulatory compliance in a sustainable way.
This was the focal point of the OpenGovLive! Virtual Breakfast Insight on 2 September 2021 – a closed-door, invitation-only, interactive session with digital executives from Thailand’s top enterprise organisations. Resonating the objective of imparting the current advancements in Cyber Security which will benefit business operations in the long run.
Have the right partners for the right protection


To kickstart the session, Mohit Sagar, Group Managing Director and Editor-in-Chief, OpenGov Asia delivered the opening address.
He acknowledged that there have been numerous events involving ransomware and other cyber-attacks over the last eighteen months. Businesses have been targeted from all directions and from every angle.
How much of a business’ legacy systems have been retained as people shift – or want to shift – to hybrid models. As every organisation, agency and institution makes digital transitions, doors are being opened that create vulnerabilities without even realising it.
The question we have to ask in all this, said Mohit, is what the root causes are and how do we overcome them. At some point, he opined, a business will become a target of an adverse cyber event. It is up to the business to prepare themselves, maintain awareness and ensure business continuity plans are in place.
Businesses must continuously ask how they plan to protect themselves for the long term. For that, he firmly believes, it is important to have the right partner to assist with cyber security – the most critical aspect of business continuity.
Furthermore, having competent partners who can focus on data protection, data recovery and compliance against a wide range of cyber threats enables businesses to concentrate on their primary tasks and key deliverables.
Cyber resiliency in a VUCA environment


The next speaker, Vijay Iyer, Regional Vice President – Solutions Engineering, Claroty shared his perspective on the variety of cyber-attacks against the industry, the increasing frequency, and severity.
The most notable threat in recent times has been ransomware attacks. Although they have been around for years, they have resurfaced with renewed ferocity. In the ransomware attack on the Colonial Pipeline attack, cybercriminals seized business data from the company’s networks and held it hostage until the company paid a $5 million ransom.
Although the pipeline was only shut down for a few days, it took several days to reopen. The effects of temporarily shutting down one of the largest pipelines in the United States, which supplies the East Coast with roughly 100 million gallons of fuel per day, rippled across the economy, causing gas prices to spike to a six-year high.
According to Vijay, there is an active threat landscape with a wide range and scope of where and how assaults occur. While most organisations are undergoing necessary digital transformation – undoubtedly beneficial to the business, country and citizens – it creates greater cyber risks.
Companies that run facilities with old and new systems should be classified as brownfield. The concept commonly used in the industry describes problem areas that require the development and deployment of new software systems while legacy applications and systems are still functioning Brownfield Operational Technology poses a significant risk because these legacy components were not designed to be secure. This has been Claroty’s primary focus area to date, based on market demand.
Another reason for susceptibilities comes from evolving critical infrastructure. In most organisations, there are several infrastructures areas where companies need to deploy newer generations of components. Industrial IoT systems are being infused into older OT environments and, in some cases, replacing or complementing the existing infrastructure.
Businesses need to address the cybersecurity need for critical infrastructure. Industrial and commercial OT and industrial IoT are getting inseparable as they have combined security needs. This leads to an increased threat surface from cyber-attacks on both sides of the supply chain stated Vijay.
As a result of the pandemic, most organisations have shifted to hybrid or hybrid access which has resulted in significant exposure to critical infrastructure. In addressing this, clients face issues such as complex firewall configurations, slow emergency response time, too many perforations, purdue violations etc.
There are four pillars on how companies should build visibility, continuity and resiliency in industrial operations – Reveal, Protect, Detect and Connect.
Visibility, which is the most essential part for the company, includes asset visibility, network visibility and process visibility. According to Vijay, companies must understand not only the details of their assets but also how they are placed in the environment. When businesses have this granular understanding, they will be in a much better position to detect deviations and anomalies from that novel operating condition.
In the end, organisations must bring their findings and correct issues by filling the gaps and connecting them to the existing technology stack that the company has invested in. This will extend their business ROI and other technology applications that have been invested in the IT and OT areas.
Bowtie: robust cybersecurity strategy for the new normal


Digitalisation and IoT have upended the most basic assumptions about operational security, said the next speaker, Mathieu Lahierre, Principal, Application & Data Security – Cybersecurity, Technology Risk & Compliance, BHP.
Today’s industrial facilities, including mine sites, mineral processing plants and remote operation centres, are unquestionably the most vulnerable to cyber-attacks. Their operational systems can be compromised by internal and external bad actors, resulting in safety and production failures.
Today, an approach that brings together IT and engineering is required to address cyber security programmatically while also being sustainable. Businesses must be aware of the types of cyber risks they face in the primary sector, as well as the consequences of those risks. The main reason, he feels, it is difficult to secure Industrial Control Systems (ICS) is that it was not designed to be connected in the way that networks are today.
Mathieu introduced the cyber risk bowtie analysis that offers a powerful tool to effectively visualise complex IT risks. The bowtie diagram also provides a useful structure for implementing control measures and preventing incidents. The importance of an IT process for business becomes clear through this clear risk visualisation, which is easy to understand not only by IT personnel but also by all people within the organisation.
In short, using bowtie models for cybersecurity allows leaders to show employees why the IT department insists on controls that have been accused of being tedious and obstructive. They understand that greater compliance is an immediate benefit and avoiding cyber events will help the company retain control of its intellectual property, assets, market share, revenue and reputation.
Mathieu concluded that it is critical to clearly define the roles and responsibilities of every department involved, from the manager to third parties, with a single line of accountability. In his opinion, the mining industry, where traditional boundaries between corporate IT and ICS did not exist, is now autonomous, with the digitalisation of mining sectors in operation.
He stressed that businesses could begin by assisting the maturity of cyber security controls and going beyond traditional operational safety considerations by implementing a secure vision and resilience programme. BHP’s vision is to achieve operational experience by taking advantage of productivity benefits offered by the digitalised and fully integrated ICS setup within its version.
Interactive Discussion
After the informative presentations, delegates participated in interactive discussions facilitated by polling questions. This activity is designed to provide live-audience interaction, promote engagement, hear real-life experiences, and impart professional learning and development for participants.
The first poll asked about the concerns delegates have when considering the current cyber security landscape. Over half the delegates (54%) went with the Increasing incidence of ransomware, supply chain attacks and vulnerabilities. About a third (29%) said their concern was that legacy systems and lack asset visibility, lack of awareness of what to protect and how. A tenth indicated adversaries targeting OT systems to inflict cyber-physical attacks and 7% opted for increasing remote work arrangements due to COVID-19.
Delegated were asked what they rely on to check and guide the cyber security posture of their organisation. About two-thirds (67%) went with industry compliance-based controls e.g., ISO, NIST, IEC62443. About 15% said that regulatory codes of practice or guidelines passed by a regulatory authority was their go-to while 11% opted for threat-based Risk modelling e.g., Mitre ATT&CK, Lockheed Martin Kill Chain. About 7% chose supply-chain risk management e.g., accreditation schemes to rely on.
Asked about their top key value driver would be to address or fix cybersecurity gaps within their organisation, over half (54%) chose understanding risk with actionable response and remediation. About a third (32%) opted for detecting Threats and Vulnerabilities. The remaining delegates were equally divided (7% each) between securing how Remote Access is done and achieving complete visibility and segmented environments.
Surveyed on what the key adoption challenge within their organisation would be, about one third (36%) answered legacy systems and proprietary protocols in OT. Just over a quarter (27%) felt bridging the IT-OT divide, extending SOC technology and resources to embrace OT would be an issue. Another 27% felt that priorities in OT systems, safety and availability and hesitancy to adopt IT solutions (Cloud, MFA, key management) were considerations. A tenth went with integrating new technology in brownfield infrastructure.
The fifth question asked how they would describe the current state of their cyber security technology stack. Well over a third (39%) say that they have gaps in cyber security trained people and cybersecurity-related processes and professional services. Over a quarter (26%) are looking to better understand what they need and why they need some of the technologies they do not have. Another 26% said while they have a technology stack addressing IT parts of the enterprise, they have specialised technology for OT needs. Just under a tenth (9%) confirmed that they have all the technologies they need to achieve cyber security resiliency and desired posture.
Delegates were finally asked how they would best describe their current state of cyber security operations. To this 54% answered they have a Security Operations Centre that is already catering to IT but need to extend controls to OT. A fifth (21%) stated that they do not plan to have a Security Operations Centre and cyber team and another 21% said they do not have a Security Operations Centre yet but have gone through an assessment and have a defined program. About 4% are in the process of building a Security Operations Centre.
Conclusion
Companies are now developing holistic business continuity plans that can keep your business up and running, protect data, safeguard the brand, retain customers – and ultimately help reduce total operating costs over the long term. Having a business continuity plan in place can minimise downtime and achieve sustainable improvements in business continuity, IT disaster recovery, corporate crisis management capabilities, and regulatory compliance.
In closing, Vijay thanked the delegates for the interesting and insightful session. He gained and learned a lot in terms of how the delegates presented their perspectives on cybersecurity. He invited delegates to reach out to his team and him to explore ways they could assist their organisations on their cyber resilience journey.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Ministry of DES has recommended farmers employ more drones for a new Thailand smart farm project in Pathum Thani Province’s Pin Fah Farm region. Pinfah Farm is an intelligent farm model in Pathum Thani Province designated for agricultural eco-tourism.
Pinfah Farm employs drones to spray medications, fertiliser, and various chemicals in farmlands to reduce money and improve farmer health. Chaiwut Thanakmanusorn, Minister of Digital Economy and Society, paid a visit to the new farm and provided financial assistance.
The government allows farmers to pay half of their needs under the “half of each person” programme. The remainder of the fund will be used to assist individuals in purchasing at a reduced price to develop modern agriculture more efficiently. The financial assistance is provided in collaboration with community enterprises or farmer organisations to create a smart farm using digital agriculture technology.
Smart agriculture is a cutting-edge idea that is gaining traction around the world. It boosts output, addresses farm-related issues such as food demand, and makes farms more networked and intelligent. Precision farming, variable rate technologies, smart irrigation, and smart greenhouses are smart agriculture systems that leverage the Internet of Things (IoT).
Thailand Prime Minister General Prayut Chan-o-cha recently visited the development of the “Digital Agriculture” pilot project at Pha Mi Training Centre in Chiang Rai Province. To expand digitalisation in agriculture, smart agriculture also employed the Government Central Cloud System (GDCC) platform and 5G network.
The Pha Mi Training Centre is an education, research, and development institution for high-value commodities, including vanilla and orchid, which are among the world’s top five most lucrative products. The centre will also increase farmers’ awareness of the region and provide long-term job options. Finally, the initiative attempts to boost farm revenue and eliminate farmer poverty.
The creation of the Cloud GDCC system facilitates the integration of IoT Smart farm technologies and Big Data storage in Thailand’s agriculture sector. The cloud system is designed to support the future growth of Thai farmers and other experimental plants.
Aquaculture sectors are also included in the agricultural digitalisation initiative. The Thai government was undertaking Aquaculture 4.0 to secure the long-term growth of this essential industry and increase farmers’ sustainable farming capabilities. The Aqua-IoT is an Internet of Things-based monitoring system for water’s physical, chemical, and biological properties.
They combined critical data – physical, chemical, and biological water characteristics and weather – into a single interface that enables users to comprehend the link between the data, analyse it, and make informed decisions.
Nonetheless, the Philippines has made a comparable effort. The Department of Agriculture-Bureau of Agricultural and Fisheries Engineering (DA-BAFE) visited the nation’s first established innovative greenhouse project to enhance the widespread application of smart agriculture.
The smart greenhouse is a significant advancement in precision farming. It employs sensor technologies to generate a microclimate that allows plants to develop consistently. An intelligent greenhouse modifies the environment autonomously to help plants grow to their full potential. This innovative farming method provides farmers with higher yields, higher-quality products, and the ability to cultivate crops regularly all year. This satisfies the market’s requirement for food efficiency and sufficiency.
While in Indonesia, Minister of Agriculture Syahrul Yasin Limpo urged the adoption of precision technology to boost the resilience of Indonesian cattle products and to meet domestic demands constantly. It is believed that the technology will increase the food production rate for commodities such as cattle, buffalo, purebred chicken, free-range chicken, lamb/goat, duck, and pork.
Syahrul advises strengthening regional and central government cooperation and synergy to conserve present output and increase the resilience of Indonesian cattle products. Job division and work obligations within each work unit. He suggests that the tasks of each division be specified to determine the next steps.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
All organisations that use alphanumeric Sender IDs to send SMS are now required to register with the Singapore SMS Sender ID Registry (SSIR) as part of the measures announced by the Infocomm Media Development Authority (IMDA) last October. This registration is intended to protect consumers from non-registered SMS that may be scams, a press statement has said.
Starting from 31 January, any non-registered SMS will be labelled as “Likely-SCAM”. This functions similarly to a spam filter or spam bin. Consumers might get non-registered SMS labelled as “Likely-SCAM” and are advised to exercise caution. If unsure, consumers are encouraged to check with family and friends. This will improve IMDA’s overall resilience against scams.
All organisations that use alphanumeric Sender IDs must register early with the SSIR. This is to give adequate time as non-registered SMS Sender IDs after 31 January will be labelled as “Likely-SCAM”. Organisations that have not registered their Sender IDs are advised to do so, the statement said.
As of January 2023, over 1,200 organisations have already registered with SSIR, using more than 2,600 SMS Sender IDs. These include financial institutions, e-commerce operators, logistics providers, and SMEs that send SMS to their customers who have registered with the SSIR.
In recent months, IMDA reached out to organisations through aggregators and associations such as the Singapore Business Federation, Singapore International Chamber of Commerce, and Association of Banks in Singapore, to encourage them to register with the SSIR. The mandatory SSIR regime is part of a broader effort to protect against scams, which also includes working with telecom operators to reduce the number of scam calls and SMS coming through the communication networks.
Since the implementation of the SSIR in March 2022, there has been a significant decrease in scams reported through SMS, with a 64% reduction from the last quarter of 2021 to the second quarter of 2022. Additionally, scam cases perpetrated via SMS dropped from 10% in 2021 to 8% in Q2 2022, down from 10% in 2021.
To effectively combat scams, a collective effort from society is needed. Despite implementing various measures, scammers may adapt their methods and tactics. IMDA will continue to collaborate with other stakeholders in the fight against scams, but individual vigilance and awareness are crucial. Consumers should remain vigilant and share scam prevention tips with friends and loved ones, the statement said.
IMDA leads Singapore’s digital transformation with infocomm media. To do this, IMDA is working to develop a dynamic digital economy and a cohesive digital society, driven by an exceptional infocomm media (ICM) ecosystem. It fosters talent, strengthens business capabilities, and enhances Singapore’s ICM infrastructure. IMDA also regulates the telecommunications and media sectors to safeguard consumer interests while fostering a pro-business environment and enhances Singapore’s data protection regime through the Personal Data Protection Commission.
Scams and unwanted commercial electronic messages and calls are an international problem with scammers continuing to prey on unsuspecting parties. Last year, IMDA and Australian Communications and Media Authority (ACMA) signed a Memorandum of Understanding to boost cooperation and fight scams and spam. The agreement covers cooperation in information sharing and assistance in investigations relating to scam and spam calls and short message services. The two sides also agreed to mutual exchanges of knowledge and expertise and collaboration on technical and commercially viable solutions in relation to scam and spam communications.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Thailand’s Minister of Digital Economy and Society (DES), Chaiwut Thanakmanusorn, disclosed that the Cabinet adopted the Royal Decree Measures for Prevention and Suppression of Technology Crime in principle. Accordingly, the act was assigned to the Office of the Council of State for consideration before further enforcement.
In essence, the proposed order prescribes steps to prevent and suppress deceit in people transferring money by telephone or other means. The law also grants authorities the authority to regulate financial transactions. It prohibits opening accounts on electronic cards or wallets to bring money or property to be used in criminal acts.
The proposed Decree requires financial institutions and business operators to disclose information about their client’s accounts and transactions via a data exchange system to suspend transactions when necessary.
“The drafting of this law is a collaboration of several agencies, including the Royal Thai Police, the NBTC Office, and the Bank of Thailand. Thai Bankers Association Anti-Money Laundering Office (AMLO), etc., believe that this regulation will undoubtedly assist in eliminating the problem of ghost sims, pony accounts, and online crime problems,” Chaiwut clarified.
Procedures for halting transactions can be done when a financial institution or business operator discovers a questionable issue or is told by a competent official. They must advise financial institutions or business owners to halt transactions. The transmitting financial institution or company operator must promptly halt future transactions. They can comply with the transaction if they inspect and find no suspicious cause.
If the victim reports a fraudulent transaction, financial institutions or business operators must immediately and temporarily cease transactions and tell financial institutions or business operators receiving transfers to do the same. For the victim to file a complaint with the investigators within 48 hours, the investigators must act on that account and electronic wallet within seven days of notification. Notification of information or evidence can be sent by phone or electronically.
Furthermore, Telecommunication Service Providers have the authority to communicate information and allow the Royal Thai Police, AMLO offices, and approved agencies to view the information exchanged. At the same time, the Office of the NBTC is in charge of developing the central database for user registration information, short messages, investigation, and prevention.
The use or disclosure of personal data to prevent, detect, and deter online crime will follow personal data protection legislation. It is required to properly tackle the social media problem of fraudulent people and eliminate some legal issues that cause the integration of work between multiple agencies to be stopped or delayed in the current situation.
The act governs the usage of an account and a SIM card. It will instruct consumers to create a personal account for an electronic card or wallet. The act of opening a without the purpose of using it will be considered an infringement. Anyone who knowingly or ought to knowingly allow another individual to use or borrow their SIM card is breaking the law since criminals could use it for fraud or illegal conduct. Breaches of this law may be imprisonment for up to three years or a fine of up to 300,000 baht (US$9163.10) or both.
It is illegal for anybody to obtain, market, or post news to purchase or sell accounts, electronic cards, electronic wallets, or phone sim cards that may result in criminal activity. Anyone who breaches this will face imprisonment for 2 to 5 years and a fine ranging from 200,000 baht (US$9163.1) to 500,000 baht (US$15271.84) or both.
When aberrant behaviour is discovered or a complaint is made to the bank and enables banks and relevant organisations to reveal and exchange information about online crimes through a standard database system. Thai authorities have the authority to suspend or postpone financial transactions for an extended length of time.
Special Wisit Wisitsorn-at, Professor, the Permanent Secretary of the Ministry of Digital Economy and Society, expressed the MDES need to present the draft to the Office of the Council of State for review and consideration before the announcement goes into effect.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Digital Government Development Agency (DGA) hosted an open lecture on enterprise architecture by the Ministry of Social Development and Human Security (MSDHS). During the seminar, Dr Suphot Thienwut, Director of the Digital Government Development Agency, delivered a special session on ‘Digital Government Strategy and the Importance of Organisprational Architecture Development’.
Suda Sulong, Director of the Centre for Information and Communication Technology, MSDHS, remarked in her opening speech that the seminar was arranged to offer an overview and operational plan of the project to build knowledge and awareness for seminar participants.
With current technology, the seminar intends to assist in developing management efficiency in collaboration with all sectors. Participants at the workshop were asked to establish systematic thinking, build a partnership to avoid duplication, and give convenience and rapid services. Every effort was made to improve the quality of life for children and teens in disadvantaged homes.
Furthermore, the project encourages government officials to incorporate the construction of a service platform connected to the quality of life of children, youth, women, and families. He asked the platform to become the answer to each age group’s demands.
Previously, Puchaphong Nodthaisong, Secretary-General of the National Digital Economy and Society Commission (NESDB), acknowledged programmes that encourage and support digital transformation.
“The NSTDA is devoted, determined, and ready to integrate the power of collaboration from all sectors. “To advance via the use of technology to improve the quality of life, economy, society, and Thailand’s competitiveness,” confirmed Puchpong.
The National Standardisation Council (NSC) had plans to boost potential technology utilisation, improve digital risk awareness and security, and raise knowledge, skills, and people potential by 2023. Eight critical projects must be implemented to accomplish comprehensive digital transformation by 2027 and join Phase 4: Global Digital Leadership.
To give training in approved courses, the government will construct another 70 courses or map them to more than 60 current courses in the initiative for curriculum accreditation of government organisations.
The Thailand Digital Outlook Study 2023 Project will provide statistics and instructions for digital policy for Thailand’s economy and society. They intend to increase digital economy measurement and gross product efficiency due to the digital economy, which corresponds to the direction of economic structural changes.
They offer The Digital Volunteer Network Development Project to increase digital accessibility (Volunteer Sor Sor.) People at the local level assist in promoting and expanding the ability to create revenue from new technology trends through the project.
The 5G ecosystem project is preparing the nation for commercial applications of 5G technology. The draft consists of an action plan and rules for promoting the use of 5G technology in major industrial, economic, and social sectors.
They designed the Digital Security and Infrastructure Service Development Project to strengthen government networks and cloud service activities. The goal is to transition GDCC services from infrastructure services (Infrastructure as a Service: IaaS) that serve the virtual server computer (Virtual Machine) to a platform and software services (Platform as a Service: PaaS) (Software as a Service: SaaS). Through the GDCC Marketplace, the platform will enable a broader range of services, allowing agencies to connect data effortlessly between platforms.
Phase 2 of the Digital Cultural Heritage Promotion Project intends to stimulate and build on stakeholders by promoting the transfer of national cultural treasures in digital material. The project concentrates on developing soft power that can provide revenue for the government and encourages participation from various sectors, including youth, educational institutions, community levels, and local government sectors, among others.
The Digital Economy and Society Fund has been established to provide financial assistance. The ability to build the Thai economy and society in the future will be enhanced by digital technology innovation and digital transformation. Over 600 ideas have been submitted, with 41 projects being examined for funding within a budget of 2,500 million baht (US$76.3 million).
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
DICT spokesman and Undersecretary Anna Maye Yu Lamentillo conducted the meeting with Singapore Ambassador to the Philippines Gerard Ho Wei Hong to examine future collaborative efforts and Memorandum of Understanding (MoU) implementation between the Philippines and Singapore to enhance digital partnership.
The MoU on Digital Cooperation was agreed upon by President Ferdinand R. Marcos Jr.’s state visit to Singapore last year. It was ratified by DICT Secretary Ivan John Uy and Josephine Teo, Singapore’s Minister for Communications, and Information.
“We reviewed with Ambassador Ho how to implement this MOU and which areas to focus on. Singapore has a wealth of experience in e-governance and cybersecurity, and they can share their best practices with us,” Lamentillo explained.
The MoU covers digital cooperation on digital connectivity, particularly in interoperable systems and methodologies that enable electronic records; cybersecurity, such as organising training courses and technical programmes through the ASEAN-Singapore Cybersecurity Centre of Excellence to improve and strengthen cybersecurity skills; and digital government/e-governance, including digital government strategy, digital government services, and digital government infrastructure.
It also involves exchanging knowledge, technical experience, best practices on scam calls and short messaging services, and personal data protection. It also aims to foster collaboration in emerging technologies such as artificial intelligence, 5G, cloud computing, the Internet of Things, big data, analytics, and robots.
“There will also be collaboration and knowledge exchange to boost the digital innovation ecosystem, such as connecting business owners with promising solution providers; exploring cooperation on digital capability and capacity building; and exchanging knowledge and best practices on digital infrastructure,” she added.
The Philippines has increased its digital partnership with some countries. For example, before cooperating with Singapore, the Philippines signed a memorandum of understanding (MoU) with China on electronic commerce (e-commerce).
The two countries agreed to increase trade of high-quality featured products and services; explore business interchange between MSMEs and e-commerce platforms, start-ups, and logistics service providers; and share best practices and innovative experiences in utilising e-commerce.
The agreement will facilitate the exchange of experiences, best practices, critical information, and trade and e-commerce policies. Both countries will prepare measurements to promote consumer and business protection, intellectual property, data security, and privacy rules. It also contributes to the ability of local businesses to compete in the modernising business sector. The Memorandum of Understanding is in keeping with the E-Commerce Philippine 2022 Roadmap agenda, which aims to promote cross-border partnership and market access through trade agreements and engagement programmes with key e-commerce trading partners.
While Singapore has undertaken a similar digitisation initiative with China. Singapore’s Minister of Communications and Information (MCI) and the Infocomm Media Development Authority (IMDA) announced the signing of eight (8) Memoranda of Understanding (MoU) and the unveiling of fourteen (14) new joint projects as part of the Singapore-China (Shenzhen) Smart City Initiative in November (SCI).
As they build economic recovery and resilience, Singapore and Shenzhen will actively establish a conducive business climate for firms to innovate and conduct cross-border transactions safely and smoothly. As the SCI began its third year of operation, the meeting noted that the number of new cooperative ventures doubled compared to the previous year.
Aside from that, on the 7th UK Singapore Financial Dialogue, dubbed Fintech Bridge, Singapore and the United Kingdom reaffirmed their commitment to expanding their financial ties. The FinTech Bridge will capitalise on fintech players’ active interest in payments, regulatory technologies, and wealth management. It will also provide structured participation that will aid in developing policy measures, improve evaluations of future challenges such as the development of distributed ledger technologies and data exchange, and facilitate trade and investment flow between different markets.
Additionally, both governments discussed recent innovations in the fintech sector, such as advances in crypto-assets, and agreed on significant areas for future collaboration. They examined their progress in tightening consumer protection legislation and implementing stable coin regulations. Both parties agreed that there is an urgent need to assist in the safe development of a digital assets ecosystem while ensuring that digital asset risks are constantly handled.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The National Cyber and Crypto Agency (BSSN) worked with the National Narcotics Agency (BNN) to oversee illegal drug sales and investigate illegal drug dealing on the dark web. To support the endeavour, both agencies elaborate on the e-Mindik application 2.0.
Golose hopes that in the future, all investigative administration exercises, from revealing narcotics cases, and money laundering, to uncovering cases in 2022, will be able to use the BNN’s e-Mindik application, allowing for the realisation of an Information Technology-based Integrated Criminal Justice System that is incorporated with ministries or other organisations.
“BNN has completed the construction and development of the BNN e-Mindik application version 2.0, which is one of the supporting components of the electronic-based government system (SPBE) authorised in the national strategy programme for eradicating corruption to promote the incorporation of the criminal justice system, which is applied through the expansion of a Judicial System database. Integrated Crime Based on Information Technology (SPPT-TI), “Pol. Petrus Reinhard Golose, Head of BNN Komjen, said in Jakarta.
The collaboration is an attempt to carry out the duties and functions of imposing the country’s defence and security sector in digital space, one of which is by using electronic certificates to speed up distribution while preserving the security of information related to cross-institutional narcotics cases.
Meanwhile, BNN and the BSSN signed a Memorandum of Understanding (MoU) on using electronic certificates to strengthen cyber security resilience. Hinsa Siburian, the head of BSSN, imparted information about the amount of danger of security threats that have risen in tandem with the level of use of information and communication technology.
“It needs an adaptable and sophisticated cyber security effort to defend all layers of the cyber world, including the information assets stored therein, from cyber threats and attacks of both technical and behavioural character,” Hinsa explained.
Hinsa also emphasises information about the amount of risk of security hazards that has developed in tandem with the level of use of information and communication technology. As a result, authorities must engage in an adaptive and inventive cyber security effort to defend all layers of cyberspace, including the information assets housed within, from cyber threats and attacks of both technical and social character.
Hinsa stated that social cyber-attacks use manufactured information to target ideas, choices, opinions, emotions, behaviour, opinions, and motivations to modify the way of thinking, belief systems, and human behaviour. The BSSN Cyber Threat Intelligence Team conducts cybersecurity patrols/monitoring on the dark web for unlawful operations, such as data theft, drug purchasing and selling, and sexual offences.
Aside from that, the National Cyber and Crypto Agency (BSSN) undertook competency testing activities to improve the agency’s ability to deal with cyber security threats. The BSSN Human Resources Development Centre (Pusbang SDM) in Depok, West Java, offers three certification programmes (Security Operation Centre, Information Security Auditor Assistant, and Junior Penetration Test).
According to Muhammad Iqro, Director of BSSN Cybersecurity and Password Human Resource Policy, human resource professional certification is highly essential since it is a form of acknowledgement of competence in cybersecurity within the national scope. The competencies become a critical component in understanding parts of information and communication technology, which is essential to anticipating the dynamics of the global and regional strategic environments, which evolve at a rapid and competitive pace.
Ikro noted that one of BSSN’s measures towards satisfying cyber and cypher security human resources effectively and efficiently was to construct a certification infrastructure in the cyber and cypher security sector by establishing the BSSN Professional Certification Agency (LSP).
Ikro believes that the BSSN HR who participate in the qualification test activities may mould and create LSP BSSN graduates with the work capabilities required in cybersecurity and receive national and international recognition for their competencies.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Chaiwut Thanakmanusorn, Minister of Digital Economy and Society (DES), evaluated the effectiveness of the country’s efforts to prevent online crime. He directed Wetan Phuangsub, Deputy Permanent Secretary of the Ministry of Digital Economy and Society, to continue cracking down on illicit cross-border internet use, ghost SIM fixation, and the suppression of fraudulent accounts.
“The problem of cybercrime impacts many persons’ lives and possessions. The NBTC office dealt with many SIM owners who had not yet registered officially, thanks to the collaboration of the AMLO Office and the Banking Association in resolving the false account situation. Including the illicit use of the Internet throughout the nation and the Royal Thai Police, which hastens the prosecution of offenders,” Chaiwut praised.
Meanwhile, Thepsu Bowonchotdara, Deputy Secretary-General of the AMLO Office; Pol. Maj. Gen. Niwet Apawasin, Technology Crime Investigation Bureau; and Suthisak Tantayothin, Deputy Secretary-General of the NBTC Office, provided reports on progress in combating online crime.
To address ghost SIM issues, the NBTC has mandated that about 8,000 users with more than 100 SIM cards prove their identification by January 23. In addition, in the case of illicit cross-border internet trafficking, the NBTC has directed telecommunications service providers to investigate the use of cross-border internet services. The agency has also collaborated with necessary legal officials to check and locate the crime site and the perpetrator.
Meanwhile, the AMLO Office has issued a notification to resolve bogus accounts and suspected accounts used for unlawful activity. When a criterion for determining or revising the list of high-risk individuals arises, the notice alerts. The suspicious performance will be continuously monitored following that, in compliance with the Ministerial Regulation on Customer Fact-Awareness. Furthermore, the AMLO has notified financial institutions of around 1,000 identities of offenders. The financial institution will continue to take appropriate steps.
Aside from that, Thailand is increasing efforts to raise citizen awareness of cybercrime. The Electronic Transactions Development Agency (ETDA) and the Ministry of Digital Economy and Society have launched a programme to help people strengthen their online literacy abilities.
Chaiwut agrees that as Thailand enters the digital era, cyber dangers have intensified, with technology and online transactions driving practically all activity. With 59,794 online complaints, ETDA recorded an increase in online scams 348 times in 2022 (January – November 2022). In comparison, only 54 interactions were made in 2021.
The information was gathered via the online complaint-handling service of the 1212ETDA Online Help and Problem Management Centre. The contact centre observed that the most common internet scam is still online trading problems, followed by unlawful websites, call centre gangs, SMS fraud, etc.
Furthermore, the government has established an application to help safeguard individuals against internet scammers, fake news, and financial fraud, which are significant concerns in Thailand. The Ministry of Digital worked with the state-owned Krung Thai Bank to establish “Pao Tang,” an online scam and disinformation warning system.
The app will not only provide financial services, but it will also serve as another avenue for disseminating information, as confirmed by government organisations. The apps will issue warnings about internet fraud and fake news associated with financial fraud or financial crime. As a result, consumers can keep up with the current situation and manage the new complexity that has caused significant damage.
The technology will connect data from the Anti-Fake News Centre (AFNC) databases at the Ministry of Digital Affairs to service providers. Furthermore, the wallet software sends warnings regarding financial fraud and erroneous information in various formats.