

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Tell me about your role and position?
My name is Peter Reichstädter, I am the CIO of the parliament of Austria. I have been developing ICT strategies for the Prime Minister’s office for the past 12 years. There is now a need for a strategic change of the Austrian parliament, as we are moving out of our premises. The premises will be rebuilt and refurbished, we will then move back in 2020. Moving into a new building, we want to have new processes, and new ways of collaboration to be established within the parliament.
How is collaboration being driven?
Our politicians have a broad understanding of technology and the value of collaboration with a good grasp of IT. As CIO I have a considerable level of input to the topic, bringing the stakeholders together and providing value and insights to the conversation. In this way I am able to gain a better appreciation of their needs, assisting them in their understanding and how our department can add value to the final outcome. Explaining possible solutions that will enable them to better collaborate in a safe and secure manner. It’s about listening, taking the ideas and working with the stakeholders, facilitating the necessary outcomes. We focus on outcomes and results driven by the working groups which build a better understanding of the stakeholder needs.
How do you provide the technology and security that meets the needs of your stakeholders?
We follow a proven methodology that has served us over the past years for developing secure applications and services. We carry out the business analysis with the support of external consultants. We engage by using to levels of controls, that of operational and strategic. This is done from a security point of view, ensuring the highest level of security is understood and is still addressing to need to achieve an outcome.
Collaboration and security at times creates conflict. How do you enable collaboration across multiple parties and at the same time be mindful of security?
What is paramount is data classification, without this nothing can be successful. Data and information classification is carried out across our entire organisation. From this knowledge, our understanding of the different data sets in play, we are able to define the necessary security needed to facilitate collaboration. Collaboration is always presenting us with challenges, but this is a constant and we are always looking to improve our model.
Do you utilise any cloud services? If so, how are you using it?
We are working with a lot of virtualisation internally, in turn providing cloud services to our department within our own environment. When you look at legislative, administrative and executive services with the parliament, they are generally not sharing the same infrastructure. We identify the interfaces needed to work in delivering services across all systems. We want to develop a far greater level of automation and reduce the requirement of administration. The use of virtualisation will only enhance our ability to bring much of these resources together. Our use of cloud initially will be internal, but as we scale up, and where possible we will consider the offerings in the market place.
In designing your systems and infrastructure, do you design for just one department or build with the whole of government in mind?
Our architecture is defined by our existing ICT strategy for Austria. This strategy is soon to be updated and released. It will consist of demands, like our approach to mobility and BYOD. We are working within the coherence of the existing frameworks but also driven towards our parliament needs.
One of the biggest challenges with virtualisation and the cloud are legacy systems. Do you have many legacy systems, and what is your aim to manage that transformation?
Yes, we have several legacy systems. We are working through a plan of modernisation, and moving to a new architecture for the future. Our goal is to modernise those legacy systems by 2020, then by 2025 to transform them into the new architecture. This will enable us to take advantage of the new cloud services that will enable us to our future state.
What methodologies do you use to delivery your services? Are you using the traditional waterfall approach or do you use agile?
Some of our projects still use a traditional waterfall method of delivery. But more and more we are moving to an agile approach. As users demands and experiences are much more a requirement these practices are included into the development of these services.
The role of CIO traditionally was to provide technology to solve business problems. How have you found the change which is now driven predominately by the users and customer and their expectations?
This has had a considerable impact to our approach in delivering systems and services. Users are more demanding, having an understanding of what is possible. Their interaction in their daily lives and the things they can do for themselves translate back into the work environment. If they can create an email account in five minutes, then why can they not do that within their own work environment. It is all about delivering services to the end users, enabling them to work without IT. This has historically been the issue with many organisations and the creation of shadow IT. We work with our stakeholders to more closely understand their needs, delivering to their outcomes, and not pushing IT solutions.
Over the last 18 months, user experience has dramatically increased. How has this impacted in the solutions you provide?
This has had a dramatic impact in the technology, hardware and software solutions that we provide. Within the parliament we are looking to move to ultra-book, hybrid notebooks and tablets. Our solutions are having to consider the end point that it will deliver to. We don't know what, so we need to design to be endpoint independent. The advent of touch screens, smart phones all present their challenges and different methods of integration. This has led to a high level of requests for mobile solutions, enabling work anywhere and anytime. Much of our new development is being done with HTML5, so that our solutions can be responsive in design and services which are user driven.
With the speed of change within technology, how has this impacted in the skills and knowledge of your staff and their ability to deliver?
This is a resource planning task; you have to take care of your capacity building of your staff. But you cannot achieve everything inside, taking care of the data and the data sets, and the data classification still need to be managed. The application design can be done by outside, using the experience and the skills which are leaking within the organisation are possible to achieve with external sources.
AS demands on skills within IT increase, are you finding you need to engage more external resourcing?
I think it’s a mixture of those things, you don't always have the latest experience and capabilities internally, so we obtain that skill externally. You also increase within your HR plan of skill development for the foreseeable future for maintenance and the next level of development that will be done internally.
As a CIO where does your position sit within the executive structure?
I am fortunate within my position I report directly to the director of the parliament. I can see how this would present a challenge as in many organisations that is not the case. For me to deliver on the outcomes needed reporting directly enable a better alignment and understanding both ways. One in what I bring to the table and two I get the full story of what is required.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In an era of rapid digital transformation, Malaysia recognises the importance of equipping its youth with the necessary skills to thrive in the digital economy. To address this crucial need, a strategic partnership has been formed to empower the next generation through youth skills development.
This alliance brings together key stakeholders from the government, the private sector, educational institutions and industry experts to collaborate on initiatives that enhance digital competencies among Malaysian youth.
The initiative aims to bridge the digital skills gap by offering comprehensive programmes that cater to the specific needs of Malaysian youth. It focuses on equipping them with the essential digital skills required for success in the modern workforce.
By developing a strong foundation in areas such as coding, data analytics, digital marketing and emerging technologies, youth will be ready to take on the challenges and opportunities in Malaysia’s digital economy.
The plans encompass a range of strategies, such as training programmes, mentorship opportunities, industry collaborations and granting access to digital resources. They not only foster technical skills but also emphasise critical thinking, problem-solving, creativity and entrepreneurship.
Envisioning a future where Malaysian youth lead the way in innovation and contribute to the growth and competitiveness of the digital economy, the partnership strives to empower the next generation with these essential skills. By doing so, they not only aim to fulfil the career aspirations of the youth but also ensure their active participation in driving the nation’s progress.
Fostering Youth Skills in Malaysia’s Digital Economy
With a forward-thinking approach, she acknowledges the significance of embracing new paradigms and perspectives to stay relevant in an ever-evolving digital landscape. By recognising the need to adapt and equip the younger generation with the necessary skills, Malaysia is poised to nurture a workforce that can effectively contribute to the country’s digital transformation and global competitiveness.
“Currently ranked 33rd in technological advancement, Malaysia aspires to become a regional leader,” Dr Aziyati reveals. “While physical platforms have been emphasised, other factors like education integration, cultural wellness, societal maturity, and economic stability are also important.”
Malaysia acknowledges the significance of coding and technical skills but also places value on soft skills and adaptability. School programmes in the country emphasise a well-rounded approach by incorporating STEM activities, innovation competitions, and even sports to enhance social interaction and problem-solving abilities.
This holistic approach ensures that Malaysian youth not only develop technical proficiency but also cultivate essential interpersonal skills, creativity, and the ability to adapt to various challenges. By nurturing a balanced skill set, Malaysia aims to prepare its youth for the multifaceted demands of the digital era, where both technical expertise and soft skills play integral roles in success.
Dr Aziyati acknowledges the importance of coding classes in Malaysia, recognising their role in fostering skills such as planning, problem-solving, and performance evaluation. The country’s education blueprint focuses on utilising information and communication technology (ICT) to enhance the quality of learning.
This is achieved through the implementation of online classrooms, robotics competitions, and government initiatives like the Digital MakerSpace and Multimedia Super Corridor (MSC). By leveraging these platforms and programmes, Malaysia is actively promoting the integration of technology into education and empowering its youth to thrive in the digital age.
The government promotes inclusivity and equal opportunities through various initiatives that aim to provide practical platforms for knowledge and anticipate the challenges and opportunities brought by technology.
These initiatives aim for wider engagement and to create an environment where students have access to digital resources, hands-on learning experiences and opportunities to showcase their skills.
Advancements in digital technology benefit the economy by creating jobs, improving employability rates, fostering digital content creators, supporting governmental agendas and providing a return on investment.
Smart partnerships with various ministries, including the Ministry of Economy, Ministry of Communications and Digital, Ministry of Science, Technology and Innovation, and Ministry of International Trade and Industry, contribute to these benefits.
“Smart partnerships ensure the relevance of training and knowledge content, while industries are open to hiring special needs graduates, offering training tailored to their abilities,” Dr Aziyati reiterates.
In the modern world, diverse cultural values and socioeconomic achievements define our lifestyles, Dr Aziyati observes. The Malaysia Digital Economy Blueprint embraces the globalised nature of information systems, which facilitates cultural exchange and emphasises the impact of digital technology on societal resilience and the future-proofing of the economy.
Despite economic challenges, Malaysia’s resources and diversity have facilitated national transformations. The government understands that consistent and continuous investment in youth development through training and education is crucial for ensuring sustainable progress and national sustainability.
The education system and institutions play a crucial role in facilitating successful partnerships and collaborations. Both national and institutional levels are open to innovative ideas and opportunities for partnerships.
The Ministry of International Trade and Industry supports initiatives by the Ministry of Education and the Ministry of Higher Education to establish partnerships with other countries. Collaboration with education institutions from countries like the UK, USA, Australia, Germany, European nations, Asian countries and APEC nations is pursued through international knowledge exchange.
Through such partnerships, a wide array of opportunities, initiatives, incentives, and projects are being implemented to benefit the citizens. These activities span various domains, including student and cultural exchange, expert sharing, technology transfer, intellectual discourse and skill mobility.
The aim is to foster mutual growth, facilitate the transfer of knowledge and expertise and create a dynamic environment that promotes innovation and skill development among individuals. As Malaysia promotes the Fourth Industrial Revolution, it requires a highly skilled workforce and smart citizens to attract investment for a better economy.
“To facilitate execution and foster innovation in the digital economy, proper planning and provision in the areas of manpower, machinery, and methods are crucial. Some also emphasise materials and mediums,” Dr Aziyati explains. “Youth entrepreneurs can adopt these approaches to boost productivity.”
Since 2013, the Federal Government has launched various initiatives and projects, including policies on science, technology, and innovation, IoT strategy, Smart City framework, cybersecurity, and the digital economy blueprint, with implementation planned until 2025.
Dr Aziyati agrees that expanding strategic relationships with other countries becomes easier with transparency as governance is visualised through paperless documents, faster approvals, efficient repayment methods and increased output capacity.
While online application processes are already in place, information security, cybercrime, cryptography and privacy concerns must be addressed, she reveals.
Over the past five years, Malaysia has experienced political changes and evolving government institutions. Despite these fluctuations, the youth and future generations remain focused on the impact and development of the digital economy.
“To achieve successful implementation of integrated e-governance, a nation must attain key elements such as political stability, economic prosperity, social harmony, technological modernisation, environmental sustainability, and legal strength,” Dr Aziyati opines. “These factors collectively contribute to effective governance and ensure a holistic approach towards leveraging digital technology for the betterment of society.”
Sustaining the momentum of digital economy efforts and utilising strengths and opportunities can lead to enhanced business, partnerships and economic growth. Transformation and readiness for change are key factors for success, along with incorporating fresh ideas from young minds and a skilled workforce.
Dr Aziyati is convinced that aside from financial assistance, Malaysia can secure long-term stability and progress by implementing a thorough and consistent transformation programme.
The Ministry of Youth and Sports in Malaysia is responsible for the supervision and advancement of eSports players. However, there are existing challenges concerning the welfare of developers within this domain. As a result, the ministry is actively seeking new policies and measures to address and strengthen this aspect, ensuring the well-being and support of young developers in the future.
In her new role overseeing Training Management for skills institutions, Dr Aziyati continues to prioritise partnerships with industry to promote digital technology advancement. To improve governmental institutions, she proposed the following:
- Increase budget allocations for youth in the digital economy
- Expand youth development programmes for mastering digital skills
- Provide more incentives to support youth in adapting to the fast-paced digital world
- Implement transformative programs in STEM, digital education, and school projects
- Foster flexible ideas for national digital improvements
- Reduce bureaucracy in project decision-making processes
- Encourage creativity by minimising organisational hierarchy limitations
- Minimise the use of paper forms
- The transition from old-school work delegations to foster flexibility through collaborative discussions and cooperative deliveries
To realise these improvements, both financial support and organisational adjustments are necessary.
The Ministry of Education has identified a concerning trend where nearly 50% of school leavers are choosing not to pursue higher education. This issue is influenced by several factors, including the high cost of education, a perceived lack of job guarantees, and the belief that courses offered may not provide sufficient marketability compared to the appeal of social media businesses and gig economy jobs.
Dr Aziyati feels it is crucial to conduct a study that examines the relevance of current school curricula, the courses offered by higher education institutions and the demands of industries. Recognising the interdependence among these entities is vital, as failure to address outdated education content and maintain the status quo could result in a substantial gap in producing high-quality graduates.
By understanding the evolving needs of industries and aligning educational programmes accordingly, Malaysia can ensure that its education system remains responsive, equipping students with the necessary skills and knowledge to meet the demands of the job market effectively.
“To inspire young people, it is important to emphasise the importance of passion and willingness to continuously learn, improve and contribute to society,” Dr Aziyati says. “Success requires effort and perseverance, as reflected in the quote: genius is 1% inspiration and 99% perspiration.”
While young people may encounter misleading information and failure, it is part of the learning process. She believes that patience, persistence, and perseverance are key in this journey if one’s pursuits are beneficial to society.
Dr Aziyati strongly believes that by consistently pursuing personal growth and making significant contributions, success and recognition will naturally follow. She feels that this journey should not solely revolve around personal improvement, but also include a commitment to leaving a positive legacy for future generations.
Additionally, it is crucial to acknowledge the inherent value of the learning process itself, which cannot be easily replaced. However, Dr Aziyati acknowledges that individuals may sometimes be influenced by the opinions of others and consequently choose paths that they are not genuinely passionate about.
While quick money-making opportunities may come and go, Dr Aziyati underscores the enduring value of education and the credentials earned through hard work. She encourages individuals to prioritise long-term gains, as the knowledge and skills acquired through education will have a lasting impact throughout their lives.
“By channelling the passion of young people towards constructive and educational endeavours that bring benefits to the nation, we can unleash their potential and make meaningful contributions to their personal and societal growth,” Dr Aziyati concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
To accomplish modernisation in the Chinese style, the 20th National Congress of China emphasised the significance of developing new growth engines and establishing a digital industrial cluster. Cloud computing has emerged as an essential technical foundation for the digital economy, fostering innovation and reshaping the global competitive landscape.
As a prominent authority in domestic cloud computing, Trusted Cloud has played a crucial role in the development of China’s cloud computing industry. The 2023 Trusted Cloud Best Practice Collection Activity was launched by the China Academy of Information and Communications Technology (CAICT) and the Cloud Computing Open-Source Industry Alliance to further promote technological innovation and improve industry service levels.
The Trusted Cloud Best Practice Collection Activity invites service providers and user companies who have undergone or are undertaking the Trusted Cloud evaluation to participate. Up to four options can be submitted by companies in various categories, divided into technology best practices, industry service best practices, and user case best practices. This all-encompassing strategy promotes innovation, knowledge exchange, and collaboration in the cloud computing industry.
The activity’s technology best practices are geared toward improving cloud services offered by service providers. It includes six categories: fundamental services, cloud-native solutions, hybrid and private clouds, software engineering, cloud management and optimisation, and security.
By emphasising best practices in these areas, Trusted Cloud intends to foster continuous improvement and provide cloud computing solutions that are dependable and secure.
Trusted Cloud also puts best practices for industry services at the top of its list. It focuses on cloud service providers in areas like government affairs, banking, transportation, energy, industry, automobiles, new retail, agriculture, entertainment, and education.
By making solutions fit the needs of certain industries, Trusted Cloud makes it possible for service providers to offer efficient cloud services that meet the specific needs of each field.
The user case best practice area shows how cloud computing has been used successfully in the past. For a cloud computing service or product to qualify, at least one of them must pass the Trusted Cloud Evaluation.
This requirement makes sure that the use cases that are shown off meet the highest standards of trustworthiness, security, and speed. This encourages others to use cloud computing technologies in the same way.
The applicant units are responsible for making sure that their application materials are real and correct. If they give false information, they will be disqualified and face other penalties. The application materials should be filled out exactly as the sponsor’s template says to, with no mistakes or gaps. Writing the materials in an official and standard way makes them clearer and more professional.
The Trusted Cloud Best Practice Collection Activity is a place for China to try new things with cloud computing. It helps Chinese-style modernisation move forward by encouraging people to work together, spreading best practices, and showing successful use cases.
The CAICT and the Cloud Computing Open-Source Industry Alliance have the final say on how this activity should be interpreted. This highlights the importance of the Trusted Cloud as a driving force in shaping the future of the cloud computing industry.
Innovation in cloud computing is essential for Chinese-style modernisation. It drives digital transformation, boosts economic growth, increases global competitiveness, facilitates technological advancements, improves government services, bolsters resilience and security, supports sustainable development, and fosters collaboration.
China can unleash the full potential of the digital age and create a prosperous, inclusive, and technologically advanced society by prioritising cloud computing innovation.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Smart Nation and Digital Government Office (SNDGO) and a major cloud computing company have announced the launch of the Artificial Intelligence Government Cloud Cluster (AGCC), a comprehensive platform designed to accelerate AI adoption in Singapore’s public sector, advance local applied AI research efforts and support the growth of the local AI startup ecosystem.
The AGCC has been implemented by SNDGO and the cloud tech company for usage by Singapore’s government agencies and the research, innovation, and enterprise (RIE) ecosystem. The AGCC is hosted in Singapore in a specialised cloud computing environment.
Agencies can use the AGCC to build and deploy scalable and impactful AI applications rapidly, safely, ethically, and cost-effectively by leveraging an AI technology stack and a vast partner ecosystem of software-as-a-service firms, consultancies, and AI startups. AI technology stack capabilities include:
First, an AI-optimised infrastructure. High-performance A2 supercomputers powered by NVIDIA’s A100 GPUs and hosted in an open, scalable, secure, and energy-efficient infrastructure. This enables cloud developers to train computationally complex AI models at fast speeds while minimising costs and environmental impact.
Customisable first-party, third-party, and open-source AI models follow. A central repository enabling AI practitioners to access pre-trained generative AI models, with built-in features to assist users in customising these models for specific requirements.
The repository contains a wide range of first-party, third-party, and open-source models designed for certain needs. These include models for summarising and translating text in different languages, sustaining an ongoing discussion, converting audio to text, producing, and modifying software code, and generating and repairing written descriptions.
International AI businesses interested in making their foundation models available to Singapore government departments can collaborate with the Cloud computing company to store these models in the repository.
Another category is no-code AI development tools. A Generative AI App Builder enabling developers (especially those with limited technical expertise) to swiftly construct and seamlessly embed chatbots and enterprise search experiences driven by Cloud’s generative AI models.
Finally, there are explainable AI and data governance toolkits. A set of built-in technologies that can assist government agencies in using AI in a secure and responsible manner. This includes features for access control and content moderation, as well as novel mechanisms for incorporating human feedback to improve model performance and the ability to audit the sources of AI model outputs to detect and resolve potential bias and ensure that model behaviour is compliant with regulations.
The Government Technology Agency (GovTech) is Singapore’s first public-sector organisation to use the AGCC. Its Open Government Products (OGP) team has integrated with Vertex AI and is investigating the use of its models in Pair, which are large language model-powered assistants that civil servants can use to help them boost productivity while maintaining the confidentiality of government information.
To help government agencies deploy AI applications as effectively and responsibly as possible, the Cloud tech company will collaborate with GovTech to design and run whole-of-government Digital Academy programmes that will assist agencies in developing in-house data science and AI expertise, developing AI innovation strategies, and implementing data governance best practices.
The programmes will be delivered in a variety of specialised formats to 150,000 public servants from 16 ministries and over 50 statutory boards.
Government agencies in Singapore will be able to use the AGCC and other authorised services through the Government on Commercial Cloud (GCC) 2.0 platform beginning in June 2023. The GCC platform, developed by GovTech, offers agencies a standardised and regulated means to implement commercial cloud solutions.
GCC 2.0, the platform’s second generation, is integrated with cloud-native capabilities and cloud security practices, enabling agencies to access into a larger ecosystem of services and people to accelerate the development of new digital applications.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In today’s dynamic business landscape, companies need to adapt to changing market conditions, evolving consumer expectations, and technological advancements to remain competitive and successful.
Cloud computing and modern applications provide organisations with on-demand access to computing resources, data, and applications, empowering them to utilise these resources whenever required.
An organisation’s IT infrastructure acts as the backbone, providing the necessary computational power and storage to execute programmes and store data effectively.
The availability of adaptable, secure and scalable design options for modern IT infrastructure empowers businesses to respond to shifting demands and requirements effectively. Currently, organisations have the flexibility to host their infrastructure on-site, in the cloud, or adopt a hybrid approach combining both options to meet their specific needs and preferences.
Citizen participation is a vital element of digital transformation, enabling governments and organisations to engage with constituents and better understand their needs to deliver improved services and outcomes.
Digital tools such as social media, smartphone apps and chatbots provide effective means to engage citizens, offering relevant information and services while facilitating convenient and interactive communication channels.
In today’s rapidly evolving business world, agility is essential. Businesses must be able to react swiftly to shifting consumer demands, shifting market conditions and new technological developments. This calls for a culture of creativity, cooperation, and ongoing improvement in addition to the ability to quickly adopt new technology.
In the era of digital transformation, ensuring security is paramount to protect sensitive data from unauthorised access, theft, or loss. With the exponential growth in data generation and processing, robust security measures are essential to mitigate risks and safeguard valuable information.
To ensure the confidentiality, integrity and availability of data and applications, businesses need robust security policies and technologies that provide strong protection against threats and vulnerabilities. Implementing effective security measures is crucial in safeguarding valuable assets and maintaining the trust of customers and stakeholders.
These are all essential components of a successful digital transformation because they help organisations become more adaptable, creative and responsive to the needs of their stakeholders and customers.
On the first day of the 8th Annual Singapore OpenGov Leadership Forum 2023 held on 10-11 May 2023 at Sands Expo and Convention Centre, Singapore, technology leaders tackled the Cloud, IT Infrastructure, Modern Applications, Citizen Engagement, Agility, Security, Productivity and Operational Transformation that will help boost the efficiency of the different sectors.
Opening Remarks


Mohit Sagar, the CEO and Editor-in-Chief of OpenGov Asia, acknowledges the importance of leveraging technology to enhance the lives of citizens but emphasises the need for efficient, reliable, and secure IT systems.
He further observes a change in the priorities of organisations seeking CIOs in recent times. “Companies are currently seeking IT leaders who can effectively deliver fundamental aspects like uptime, security, and cost optimisation, rather than focusing solely on innovators who can push the envelope and are capable of driving significant change.”
There has been a significant disparity in investment allocation between customer-facing services and products, which receive substantial funding for innovation, and middle and back-office core system updates, which receive comparatively fewer financial resources.
This lopsided approach can often lead to a situation where organisations prioritise new customer experiences and neglect the necessary updates and improvements to their internal systems. There is a growing need to address this gap and allocate adequate funding and attention to ensure the reliability, efficiency and modernisation of core systems that support the overall business operations.
This new paradigm can be attributed to tighter budgets, reduced risk appetite, and the realisation that organisations may have neglected to keep an eye on their foundational IT investments. As a result, there is a greater emphasis on effective continuity rather than pursuing extravagant innovations.
Organisations must find a balance between keeping the lights on and investing in new solutions to address evolving business needs. No doubt they should allocate resources towards innovation and development to stay competitive and meet future challenges effectively but first must ensure operational stability and efficiency and maintain the smooth functioning of current infrastructure.
Mohit cited the case of an airline that experienced a major breakdown in their crew-scheduling technology, resulting in the stranding of thousands of passengers during a peak travel period. This incident served as a clear example of the consequences that can arise from a lack of investment in fundamental infrastructure.
It underscores the importance of allocating resources to maintain and enhance the core technological foundations that support efficient operations and customer satisfaction.
“Recent market developments have raised awareness of the importance of fundamentals that may have been disregarded in the past,” says Mohit. “This is because there is less opportunity for failure in a tighter economy. It may be necessary to readjust the focus towards prioritising the reliability and currency of core operations and underlying digital investments.”
Nations are facing similar challenges as they make substantial investments in areas such as education, healthcare, sustainability, and transportation.
While these areas are critical for improving citizens’ lives, governments should not overlook the importance of solid IT strategy and maintaining the underlying foundational systems. Without these core mechanisms, the idea of a truly smart nation may not be realised.
“The country must balance its priorities between continuity and innovation to ensure the success of its smart nation vision,” Mohit concludes.
Technology Case Study: Analytics Everywhere, For Everyone: Democratising and Simplifying AI and Machine Learning Into Actionable Insights Through a Reimagined Cloud-native Architecture


According to Jason Loh, Head of Technology Futures at SAS, the growing utilisation of online services by citizens and customers, coupled with the accelerated adoption of digital transformation by enterprises, has given rise to new goals and expectations. This shift necessitates organisations to adapt and meet the evolving needs of their digital-savvy stakeholders.
By leveraging an analytics platform that supports a low-code/no-code approach, organisations can involve a broader range of individuals, foster ongoing innovation and accelerate digital transformation. As analytics and machine learning gain prominence, such a platform facilitates the adoption and implementation of these technologies across the entire company.
SAS, a leading provider of analytics and business intelligence software, attributes its success to key factors such as a comprehensive product portfolio, expertise in advanced analytics, and a robust network of strategic partners. These attributes contribute to SAS’s position as a trusted and influential player in the industry.
“One of SAS’s significant advantages is its long-standing market presence and trusted brand, which has earned the company much customer respect,” reveals Jason. “SAS is chosen by businesses due to its enterprise-grade platform capabilities and comprehensive analytics life cycle support.”
SAS sets itself apart with its Viya platform, empowering clients to scale and operationalise AI pipelines while integrating analytics directly into decision-making processes. This capability enhances the effectiveness and efficiency of organisations in leveraging data-driven insights.
The platform enables efficient analysis and identification of fraudulent activities, resulting in significant cost savings for these budget-intensive portfolios. In areas of government oversight, it can be difficult to quantify the return on investment for improved audits, inceptions and investigations.
Government agencies leveraging SAS Viya for investigations across various mandates, such as health, tax, and social benefit programmes, can easily quantify the financial gains achieved through fraud detection and prevention, minimising waste and misuse of funds.
A concrete example is SAS and the US FDA establishing a partnership that goes beyond the foundational or submission environment. They are utilising the advanced capabilities of SAS Viya for three innovative use cases: Adverse Event (AE) Reporting, Manufacturing Site Surveillance and Drug Repurposing. These initiatives are driving the digital transformation at the FDA, enhancing their processes and enabling more efficient and effective operations in these critical areas.
This significant investment from US FDA demonstrates the continued trust in SAS not only today but also for the future to come.
Technology Case Study: Journey to Intelligent Data Management for the Multi-Cloud World


Raymond Goh, Vice President of Sales Engineering, APJ, Veeam recognises that data availability and resiliency have reached new levels of expectation in the current data-driven world. As organisations heavily rely on data, ensuring its accessibility and resilience has become increasingly crucial for meeting the demands of today’s business landscape.
“Data must move to a new state of intelligence, able to automatically anticipate threats, needs and meet demand. Data must securely move across multi-cloud infrastructures,” he is convinced.
Moreover, data must meet the expectations of the mobile and always-on world. Intelligent Data Management brings new insights from data and rapid productivity increases to speed the pace of innovation and delivery of new digital services and experiences that improve how people live and work.
Raymond shared the 5 Stages of Intelligent Data Management:
Protection: Protect all workloads using backups, complemented by snapshots and replication where appropriate, to ensure they are always recoverable and available in the event of outages, cyber threats, accidental loss or theft.
Mobility: Provides easy portability and fast recovery of ANY on-premises or cloud-based workloads to maintain Business Continuity and Availability across hybrid cloud environments.
Observability: View the full breadth of your data, accompanied by the infrastructure that it passes through and resides on so that you can pivot from reactive to proactive management for better business decisions including proactive measures to defend against cyber threats.
- Orchestration: Optimise data utilisation across multi-cloud environments with workflows that ensure consistent execution of otherwise manual and complex backup, recovery, and data management tasks.
- Automation: Data becomes self-managing by learning to protect itself with appropriate SLAs, methods, locations and cyberthreat-aware to meet business objectives or comply with broader IT initiatives.
The Data Domain Group, encompassing data governance, architecture, protection, sharing and storage, aims to ensure that agencies put in place effective data management practices to utilise and safeguard data in all stages of its lifecycle.
This sets out the requirements for the access and distribution, and exploitation of data, which is necessary for sharing of data, organised into the following domains: Data Classification, Data Protection (Data Security), Data Acquisition, Data Processing and Fusion, and Data Access and Distribution.
Recovering from ransomware can be a messy process and most solutions aren’t designed to provide recovery at the scale created by ransomware.
“At Veeam, we know every environment is different and you need a solution that allows you to recover your data. That’s why we’re talking after all. And that’s really what makes us different – choice,” Raymond concludes.
Technology Case Study: Why Zero Trust CDR is the Only Way Forward?


Daniel Turner, VP and General Manager, Deep Secure Business Unit, Forcepoint, emphasises that in today’s digital age, organisations rely heavily on digital content to communicate, work together and share information.
Digital information encompasses a wide range of electronic data, including files, documents, images, videos, music, and more. It refers to any data that is utilised, transmitted or stored in digital form. Regrettably, cybercriminals can exploit digital information to gain unauthorised access to systems and data, causing harm and potential damage, Daniel explains.
One of the most advanced and targeted kinds of cyberattacks is called a “zero-day” cyberattack. These intrusions represent highly sophisticated and targeted methods that exploit undiscovered vulnerabilities in software, apps, or systems, exploiting them before any patch or fix can be developed and deployed.
These insidious attacks pose significant challenges as they often conceal themselves within everyday digital files, documents, and images that are commonly found within an organisation’s systems, making them difficult to detect and defend against.
Normal measures do not contain or thwart such attacks. Firewalls, antivirus software and intrusion detection systems, for example, are not always effective against zero-day cyberattacks. They rely on known threats and signatures, which zero-day assaults lack. This means that organisations must take a more proactive and comprehensive approach to cybersecurity.
“Adopting a zero-trust security model, which implies that all content is potentially hazardous and cannot be trusted, is one answer,” Daniel believes. “This method entails validating every person, device and application that connects to the organisation’s systems and data.”
Advanced threat detection and response systems that use machine learning and artificial intelligence to detect and respond to zero-day assaults can also be deployed by organisations.
Forcepoint ONE, an all-in-one cloud platform, is designed to safeguard a hybrid workforce’s access to information on the web, in the cloud and in private applications.
“Unlike other cloud-based security solutions that combine disparate product portfolios, we designed Forcepoint ONE to integrate Zero Trust and Security Service Edge (SSE) technologies into a single cloud platform,” Daniel explains. “This integration allows organisations to manage a single set of policies in a single console connected to a single endpoint agent.”
The fact is that digital content is critical to any organisation’s success, but it can also be the chosen carrier for today’s sophisticated zero-day cyberattacks, Daniel reiterates. Traditional detection-based defences are no longer sufficient to protect organisations against these threats.
To proactively protect against these threats, organisations should implement a zero-trust security strategy as well as advanced threat detection and response solutions, like Forcepoint ONE.
In Conversation With: The Evolving Role of Data Sovereignty: Transforming Compliance to a Key Market Driver
Data sovereignty implies that data is subject to the laws and regulations of the country where it resides, ensuring compliance with local governance and data protection policies. With the continuous growth of data generation and retention, data sovereignty has emerged as a critically important concern for multinational organizations.
The growing importance of data sovereignty is transforming compliance from being solely a regulatory burden to becoming a significant driving force for businesses. Organisations that can negotiate the complicated terrain of data sovereignty legislation and demonstrate a commitment to data privacy and compliance will do well in today’s global marketplace.


Kenny Seah, Head of IAM & Security Consulting at Adnovum Singapore, emphasises the importance for organisations to have a clear understanding of their technology requirements. This ensures that technology investments align with business goals, enhance efficiency and productivity, reduce costs, foster innovation and competitiveness, manage risks effectively, enable scalable growth and meet stakeholder expectations.
“By figuring out what they need, organisations can make smart choices, choose the right technologies, and use technology as a strategic tool to help them succeed,” Kenny explains.
While security controls may vary between on-premises and cloud environments, it is essential to recognise that the core objectives and principles remain unchanged. Regardless of the setting, the primary goals are to safeguard data, systems and infrastructure against security risks.
He is of the view that organisations should assess their unique security requirements, consider the shared responsibility model in the cloud (where the cloud provider and the organisation have distinct security responsibilities) and implement appropriate security controls. This approach helps mitigate risks and ensures a secure computing environment, irrespective of the chosen deployment model.
“Cybersecurity is an important part of how an organisation runs, and it can’t be given to just anyone,” says Kenny.”It’s important to think carefully about and choose trusted partners or service providers who have the knowledge and skills to deal with cybersecurity issues.”
Even though outsourcing cybersecurity can bring benefits like access to specialised knowledge and lower costs, organisations should still keep a close eye on what’s going on and make sure they maintain a strong company cybersecurity posture.
Setting up clear contracts, checking the provider’s performance regularly and retaining a strong internal security programme will help make sure that cybersecurity is a top priority for organisations.
Data protection and privacy have become significant concerns for organisations across industries in today’s digital landscape. As customers and stakeholders become increasingly aware of the value of their personal data, they are seeking reassurance that organisations are taking the necessary precautions to protect and safeguard it.
Consequently, businesses recognise the importance of differentiating themselves by demonstrating a strong commitment to data security and privacy.
Organisations can demonstrate their commitment to data protection and privacy through various means, including the implementation of robust security measures, adherence to privacy-by-design principles, regular audits and risk assessments, transparent data handling practices, and effective communication of privacy policies to stakeholders.
These actions collectively demonstrate a strong commitment to safeguarding data and respecting privacy concerns. They not only assist organisations in meeting legal requirements but build a culture of trust and accountability in data handling, distinguishing them from competitors.
Deploying a multi-layered security strategy is critical for organisations to safeguard their data from unauthorised access, and breaches, and to maintain regulatory compliance. Strong Identity and Access Management (IAM), Encryption, Access Controls, Compliance and Governance, Security Monitoring and Incident Response, and Employee Awareness and Training are some essential security techniques and procedures that organisations can implement.
Security is a continuous process, and organisations must constantly assess and improve their security procedures to handle evolving threats and weaknesses. Collaboration with security professionals and maintaining current industry best practices can assist organisations in staying ahead of potential security problems and protecting their important data assets.
Organisations can use tools and techniques such as Data Classification and Policy Enforcement, Monitoring and Auditing Tools, Access Control and Privilege Management to create a balance between data protection and accessibility.


Melvin Koh, Head of Sales Engineering, ASEAN Thales reiterates that classifying data is important for data organisation, security, compliance, control, analysis, allocating resources, and collaboration.
“Classification offers a structured approach to managing data, enabling organisations to leverage its value while ensuring proper protection and appropriate usage,” he notes.
To keep data safe in on-premise and multi-cloud settings, organisations need to take both technical and organisational steps. Data Classification, Encryption, Access Controls, Data Loss Prevention (DLP), Data Governance and Policies, Backup and Disaster Recovery and other measures are all important to consider.
“Remember that protecting data is a process that never ends,” Melvin warns. “Review and change your security methods often so you can keep up with new threats and technologies. Stay up to date on the latest best practices and security frameworks to protect your data in both on-premise and multi-cloud settings.”
From his perspective, centralised solutions for data security involve the management and protection of an organisation’s data through a single platform or system. This approach ensures a consolidated and secure environment for data management.
These systems offer a unified way to protect data, making it possible to control, monitor and enforce security measures from one place.
When adopting centralised solutions, it’s important to make sure they meet the security needs, compliance standards and data protection policies of the organisation. They must take into consideration issues like scalability, integration and vendor support.
“Regular monitoring, updates, and audits are needed to make sure these methods work and to deal with new security issues as they come up,” Melvin points out. “It’s important to remember that having encryption keys in a safe place comes with responsibilities.”
Maintaining a secure data environment requires regular monitoring, auditing and ongoing enhancement of security procedures. It is critical to tailor the approach to each organisation’s unique demands and regulatory constraints.
In addition, organisations must strike a balance between data security and accessibility by utilising appropriate technologies and strategies.
By leveraging cutting-edge technologies, agencies and organisations have the opportunity to establish robust data sovereignty rules that prioritise the security and privacy of their data. This proactive approach helps build trust and confidence among individuals and consumers, demonstrating a commitment to protecting their sensitive information.
Some effective strategies for ensuring data security include implementing strong encryption techniques, adopting privacy-enhancing technologies, conducting regular audits and compliance assessments, seeking independent audits and certifications, implementing proactive data security measures, and embracing a zero-trust architecture. These measures collectively contribute to safeguarding data and maintaining a robust security posture.
Agencies and organisations can demonstrate their commitment to data sovereignty, security, and privacy by deploying these cutting-edge technologies and tactics. This, in turn, contributes to the development of trust among people and customers, establishing better relationships and encouraging the proper use of data.
Power Talk: Are You a Future-Ready Organisation?: Modernising Digital Infrastructure for Agility, Security, Scalability and Sustainability
Modernising digital infrastructure can ultimately assist organisations in remaining competitive, enhancing efficiency, minimising risk and promoting sustainability and responsible resource management.
To upgrade digital infrastructure, organisations must take a comprehensive approach that includes evaluating their current infrastructure, identifying areas for development and implementing a modernisation road map. This could entail investing in new technologies, migrating to the cloud and/or implementing new development methodologies and security procedures.


For Arjun Chib, Managing Director of Standard Chartered Bank, it’s critical to understand the organisation’s objectives, evaluate its needs, and, most difficult of all, come up with viable options. Solutions must be quick to implement, secure, scalable and cost-effective.
Integrating data can pose challenges for organisations due to its inherent complexity. It requires consolidating data from multiple sources, ensuring consistent formatting, and conducting thorough checks for quality and reliability.
To effectively manage and minimise the impact of security incidents, organisations must promptly address issues such as breaches, Arjun explained. Additionally, data backups play a crucial role in enabling efficient incident response and facilitating recovery processes.
Achieving harmony and synergy between social progress, environmental preservation, sustainability and economic growth is essential. This equilibrium is a crucial component of making ethical decisions and helps to create a future that is sustainable for both people and the environment.
“Organisations must prioritise minimising their environmental impact, conserving resources and actively contributing to a more sustainable future by modernising digital infrastructure,” Arjun furthers. “Adopting sustainable practices can also result in financial savings, increased operational effectiveness, and improved reputation.”
Banks have the opportunity to capitalise on the growing market demand for sustainable goods and services by integrating sustainability into their business plans and product offerings. They can enhance their long-term financial viability through the creation of new revenue streams while simultaneously fostering positive environmental and social impacts.
By aligning their operations with sustainable practices, banks can attract environmentally conscious customers, meet regulatory requirements and contribute to the development of a greener economy. This strategic approach not only benefits the environment but also enhances the bank’s reputation and strengthens its position in a market that increasingly values sustainability.
On the other hand, public-private partnerships (PPPs) provide a collaborative framework that leverages the skills and resources of both the public and private sectors to drive infrastructure modernisation efforts forward. By joining forces, these partnerships maximise the potential for success and effectively utilise the collective expertise and assets of each sector.
“PPPs can provide durable and significant infrastructure projects that benefit societies and contribute to economic development by combining public sector oversight, policy frameworks, and accountability with private sector efficiency, innovation, and investment,” Arjun believes.


Hwai Siang Khor, Senior Director Solutions Engineering at NCS, recognises the long-standing reliability and functionality of certain well-established systems that have served organisations effectively over many years of operation.
“Some legacy systems have been running for many years and may well need upgrading. However, I believe the most important thing is to determine what kind of goals you want to achieve while trying to modernise your applications.”
It is essential for organisations to clearly define their key objectives for cloud adoption and align them with their overall business strategy. This will guide the cloud adoption process, including selecting the appropriate cloud service model and the right cloud provider that best meets their specific needs and objectives.
“Most of the time, when we engage with a client, the first question we ask is whether or not they have a holistic data security and governance framework, as this underpins how they execute the plan in terms of securing their cloud or on-premises industry infrastructure and how they will mitigate in the event of an incident,” Hwai Siang elaborates.
Hwai Siang consistently advises clients to prioritise evaluating their data security framework, including data encryption methods and handling protocols for different data classifications, before delving into solution implementation.
Organisations need to consider the sustainability implications of AI adoption and ensure that AI solutions align with their sustainability goals. This includes assessing the environmental impact of AI infrastructure, considering the social consequences of AI-driven decisions and promoting ethical AI practices.
By intentionally integrating sustainability into AI initiatives, organisations can leverage the power of AI while minimising negative environmental and social effects, ultimately driving positive change and contributing to a more sustainable future.
Hwai Siang acknowledges that cloud providers have made commendable progress in effectively managing the carbon footprint within their data centres. Through proactive management, cloud providers make a meaningful contribution to global sustainability endeavours while offering businesses and organisations environmentally responsible solutions.
He believes it is important for organisations to assess their specific needs, consider the benefits and potential challenges of cloud adoption and evaluate the suitability of cloud services for their particular use cases.
The adoption of cloud computing brings notable benefits in terms of scalability, cost efficiency, agility, reliability and security. However, to ensure successful implementation, careful planning and consideration of factors such as data privacy, vendor lock-in, and integration requirements are of utmost importance.


Joseph Yang, Managing Director, Hewlett Packard Enterprise, Singapore feels that it is important for organisations to assess their current IT landscape, identify areas that need modernisation, and develop a strategic implementation plan.
Modernisation should be driven by specific business objectives and aligned with overall organisational goals. It requires careful planning, resource allocation and collaboration between IT teams and business stakeholders to ensure successful adoption and achieve the desired outcomes.
“We need to know the value of any change we make, whether it’s increased speed, better security or greater adaptability,” Joseph says emphatically.
While there are differences between academic and enterprise computing, there are also areas of overlap, such as the use of cloud computing, data analytics and security practices. Both domains can learn from each other and adopt best practices to improve their computing environments and achieve their respective objectives.
“Maintaining control over the security of academic materials to prevent unauthorised leaks, while simultaneously providing researchers and students with necessary access, is of utmost importance.” Joseph elaborates. “Balancing these requirements within the dynamic framework of cloud technology introduces intriguing challenges.”
He agrees sustainability is a fundamental component of accountable corporate and personal behaviour, encompassing environmental stewardship, social responsibility, and economic viability. It plays a crucial role in addressing the pressing challenges facing the planet and ensuring a sustainable future for generations to come.
“By embracing technological sustainability, organisations can contribute to a more sustainable and equitable future while reaping the benefits of efficient and responsible technology usage,” Joseph concludes.
Technology Case Study: Staying Competitive in the Digital Age: Leveraging Observability and AIOps for Better IT Resilience


Taylor Chan, as the Head of Sales Engineering at SolarWinds in South East Asia, understands the importance of resilient IT infrastructure in the modern digital era.
Cutting-edge technology comes with a plethora of advantages but is accompanied by a host of inherent dangers.
Generative AI has grown in prominence in recent years due to its capacity to produce realistic and high-quality content that is difficult to tell apart from human-generated content. It can create novel and distinctive data, such as photographs, videos, and text, that closely resemble existing data.
“As businesses adopt advanced, complex technologies to remain competitive and relevant in the current digital era, it can be difficult to obtain insights and effectively manage the resulting complexity,” Taylor believes.
Organisations must possess the ability to swiftly adjust their IT systems to meet evolving business requirements and customer expectations to retain their competitive edge.
Observability and AIOps are two key technologies that can help organisations attain greater IT resilience.
According to Taylor, these technologies can help organisations improve their IT operations and strength. IT AIOps refers to the use of software to automate and improve IT operations using analytics and machine learning (ML).
AIOps are commonly employed to optimise operations and gain valuable insights into performance. End-user experience management, proactive, predictive performance, trend analysis and root cause analysis are all common use cases for AIOps and observability.
Observability brings several key additional benefits including the detection of the root cause of problems and providing a clear understanding of their impact on the system or service. It helps in efficiently resolving identified issues and implementing appropriate remedies.
Observability promotes transparency by providing visibility into the inner workings of the service or system. It also extends its reach beyond the boundaries of the service or system, offering visibility into interconnected components and dependencies and facilitating a holistic understanding of the ecosystem.
Taylor defines business transformation as the process of driving significant change in an organisation’s operations, culture and customer experience via the use of technology, innovation and new ways of working.
Change has advantages but can challenge operational resiliency, the ability to endure and recover from unexpected disruptions in operations. Careful planning and mitigation strategies are crucial to maintaining resilience during transitions.
Taylor highlighted several instances where business transformation acceleration poses challenges to operational resiliency:
- Complexity, security and productivity challenges
- Issues with remote work – which is likely to remain in some shape
- IT budgets and resource constraints
- Modernisation of operations, apps and databases
- Multi-cloud deployments
- Flexible consumption models
To sustain good operational resiliency, organisations must develop from monitoring to observability to autonomous operations.
The SolarWinds Platform is a great solution. It is meant to interface with important business services and provide flexibility, visibility, and control – anywhere the environment is and wherever it is going. It offers simplicity, with deployment strategies that support clients today and tomorrow, on-premises and cloud-native SaaS solutions, Taylor concludes.
Technology Case Study: Building and Securing Modern Applications Consistently Across Hybrid Cloud


According to Kelvin Loh, Senior Manager, Solution Architecture, ASEAN, Red Hat, numerous organisations are delving into hybrid and multi-cloud architectures as they embark on their application modernisation endeavours.
Nonetheless, organisations have expressed concerns regarding several key aspects, including security and compliance, data sovereignty, as well as the scarcity of cloud-based skills and platforms across multiple environments.
Against this backdrop, aligning processes and resources through the adoption of Automation and GitOps best practices can enable companies to achieve a secure zero-trust Software Supply Chain. By embracing infrastructure and policies as code, they can effectively meet regulatory requirements while ensuring a robust and secure environment.
Sovereign Cloud offers the ability to exercise control over the location, access and processing of data within a cloud environment, addressing emerging industry standards and compliance requirements specific to certain nations or industries. This approach empowers organisations to maintain sovereignty over their data while adhering to relevant regulations and industry guidelines.
Red Hat® Advanced Cluster Management for Kubernetes offers centralised management for clusters and applications through a single console, while also integrating security policies. This solution from Red Hat ensures compliance, monitors resource utilisation and maintains uniformity across the environment.
With Advanced Cluster Management, organisations can effectively manage their Kubernetes infrastructure, enhance security measures, achieve regulatory compliance and ensure consistent operational efficiency.
“Red Hat Advanced Cluster Management for Kubernetes is bundled with Red Hat OpenShift Platform Plus, a comprehensive suite of optimised, potent tools for securing, protecting, and managing the applications,” Kelvin explains.
GitOps is a practice that leverages Git repositories as the authoritative source of truth for delivering infrastructure as code. It provides a standardised methodology for application development, offering several benefits to organisations.
It enhances security by enabling the definition of application requirements in advance, ensuring that security measures are integrated into the development process from the start. GitOps improves reliability by providing visibility and version control through Git repositories.
Additionally, it ensures consistency across various environments, whether it’s any cluster, any cloud, or any on-premises setup.
On the other hand, the Policy-as-Code enables teams to automate the policy decision-making process by codifying them using declarative language. When deployed, the tool will continuously monitor and simulates the policy-checking decisions that previously would have required manual checks.
According to Kelvin, managing and securing the cloud can be simplified through the following:
- Manageable at scale across multiple clouds. It enables the organisation to define the locality of their applications and data based on the security classification or even consumption cost;
- Codification ensures consistency and repeatability. It enables security at runtime and reduces manual checks and avoids human errors
- Establishing a delivery pipeline with inherent security capabilities and guardrails while automating the delivery of applications.
“These will result in reducing cost, increasing security, increasing efficiency and increasing predictability,” says Kelvin. He added that building and securing modern applications consistently across hybrid cloud environments is important as it allows organisations to take advantage of the benefits of cloud computing while minimising risk and maximising value.
Fireside Chat: Empowering Citizen-led Innovation: Maximising Citizen Experience with Low-Code Development Tools


Raymond Wong, the Singapore Country Manager, ServiceNow, describes low-code development tools as software platforms that empower users to build applications with minimal coding or development expertise.
These platforms can be used to rapidly develop and deploy custom applications, helping organisations to improve their digital capabilities and deliver better services to citizens.
“Low-code development tools can help organisations to maximise citizen experience by enabling rapid application development, customisation, integration, agility and cost-effectiveness,” Raymond emphasises. “By leveraging these tools, organisations can improve their digital capabilities and deliver better services to citizens, while also reducing the cost and complexity of development.”
Low-code development tools have indeed emerged as a powerful solution to address challenges and empower non-technical users, often referred to as citizen developers, to create applications quickly and easily. These tools allow citizen developers to contribute to the application development process. This democratisation of app development enables faster innovation, reduces the IT backlog, fosters collaboration, and empowers business users to create applications aligned with their specific needs.
However, it is important to establish appropriate governance and oversight to ensure the quality, scalability, and security of applications developed using low-code platforms.
Raymond also highlights the significance of citizen development, which involves the creation of software applications or solutions by non-professional developers. This process allows individuals without extensive programming experience to contribute to software development initiatives.
Low-code development tools empower non-technical users to create or modify applications according to their specific needs, enhancing business processes without the need for extensive coding knowledge or expertise. This enables individuals to customise applications and streamline workflows in a user-friendly and efficient manner.
Software development has traditionally been the purview of professional programmers and IT divisions. Citizen development, on the other hand, leverages low-code or no-code platforms and tools to enable users with limited computing skills to build applications via visual interfaces, drag-and-drop components, and pre-built templates.
Citizen development requires platforms to execute their jobs – systems that allow them to standardise everything from management to reporting.
Citizen development offers several benefits:
- Empowerment: It allows non-technical users to take control of their software needs and create solutions independently, reducing reliance on IT departments and enabling faster response to changing requirements.
- Agility: Citizen developers can quickly prototype and iterate on applications, accelerating the development process and facilitating rapid innovation.
- Cost savings: By eliminating the need for dedicated development resources, citizen development can reduce costs associated with outsourcing or hiring professional developers.
- Increased productivity: Non-technical users can build applications tailored to their specific needs, improving efficiency and productivity within their teams or organisations.
- Collaboration: Citizen development often encourages collaboration between business users and IT professionals, fostering better communication and understanding of requirements.
However, citizen development requires certain considerations:
- Governance and control: It’s important to establish governance frameworks and guidelines to ensure the security, quality, and compliance of citizen-developed applications.
- Training and support: Providing adequate training and support is essential to help citizen developers understand the tools, best practices, and potential limitations.
- Integration and scalability: Citizen-developed applications may need to integrate with existing systems or scale to accommodate growing demands, requiring technical expertise or collaboration with IT teams.
- Maintenance and updates: Ongoing maintenance and updates of citizen-developed applications need to be considered to ensure their longevity and compatibility with evolving technologies.
Citizen development democratises the software development process by permitting a broader range of individuals to contribute to application creation and customisation, resulting in increased organisational agility, productivity and innovation.
Raymond suggests the establishment of a Centre of Excellence (CoE) as an initiative to promote a shared understanding of objectives and desired outcomes within an organization. With a focus on agility and adaptability, a CoE cultivates a culture that is responsive and flexible in the face of changing market or environmental conditions. This enables the organisation to proactively adapt and stay competitive in dynamic landscapes.
“CoE provides techniques to ensure that everyone understands what citizen development entails and what they expect to accomplish, also known as agility or the capacity to adapt,” Ramond elaborates. “Before defining the policies, specify the expected boundary and explain the innovation explicitly.”
A shortage of technical resources and talent, he continued, is one of the most significant obstacles to accelerating digital transformation. In many organisations, the demand for competent IT professionals exceeds the available supply, resulting in a talent gap.
By automating processes and streamlining interactions with citizens, businesses can improve the overall citizen experience, reduce manual effort, increase efficiency, and provide citizens with quicker and more accurate services.
“Fostering a culture of innovation that embraces both technological and non-technical aspects can drive positive change within an organization,” Raymond concludes.
Technology Case Study: Preventing Your Organisation From Becoming a Breach Statistic


Adam Biviano, Director, Sales Engineering APAC, ForgeRock believes that implementing Open Finance services is a good solution for financial organisations looking to expand their business.
Open Finance is the next step in the growth of open banking. If Open Banking allows customers access to bank transaction data on various products and services, Open Finance offers customers access to broader data that may be used to personalise financial solutions.
“To guarantee this, it is imperative to have a well-prepared Digital Identity solution in place as a crucial supporting element within the Open Finance ecosystem,” Adam elaborates. “In the face of severe personal data protection rules in numerous nations and growing cyber assaults, data protection through Digital Identity is urgently needed.”
Approximately 82% of organisations encountered at least one data breach due to digital transformation, with an expected 90% of B2C organisations competing based on customer UX by 2024. Additionally, between 2019 and 2021, there was a threefold increase (307%) in account takeover fraud. In the United States alone, the recorded number of data breaches in 2021 reached 4.7 billion, showing a notable 37% rise compared to the previous year.
Such cybersecurity breaches and hacks do not come cheap. The average cost of a security breach in the U.S. increased from US$ 8.2 million to US$ 9.5 million. Moreover, the risk of loss increases from US$ 8.6 million to US$ 10.6 million if the company offers a remote working policy.
“The cost of this violation arises due to the need for detection and escalation, notification to related parties and potential lost business. Not to mention the cost of recovering reputation damage which is difficult to calculate,” Adam explains.
Unauthorised access abuse stands out as one of the most prevalent entry points for this series of hacks and breaches.
Unauthorised access is accomplished through brute-force attacks, phishing, password spraying or other attack methods. This breach allows attackers to find and steal valuable data, such as customer records, intellectual property or financial information.
The top three violations that led to hacks, according to Adam are:
- Unauthorised access. It has been the leading cause of hacking in the U.S. for the fourth year in a row with a 45% increase in 2020
- This is another powerful method that has grown by 24%
- Supply Chain Attacks. Breaches in the distribution chain (supply chain) and third parties are up 22%. Violations of this model seem to be increasingly popular because they have grown 297%, from previously only 126 cases to 500 cases in 2020.
These various intrusions have caused a significant decline in consumer confidence, with more than 82% expressing concerns about how companies collect and utilise their data. This heightened awareness of data privacy has resonated with 74% of U.S. adults, who highly value the security of their personal information.
ForgeRock offers software to secure and personalise user data with various AI-enabled authentication options. ForgeRock Identity Platform helps financial services organisations implement Strong Customer Authentication (SCA) by leveraging contextual signals, such as location, IP address, device type, operating system and browser to trigger SCA at the right time.
“This service eliminates friction when a customer needs to authenticate multiple services at once,” confirms Adam. “ForgeRock Trust Network enables access to a variety of pre-integrated third-party authentication, to address risk/fraud management, behavioural biometrics and identity check solutions (eKYC).”
Power Talk: Reimagining the Future of Smart Nation Citizen Services Through Intelligent Automation
Intelligent automation refers to the convergence of artificial intelligence (AI) and automation technologies, such as robotic process automation (RPA). This powerful combination enables the streamlining and automation of repetitive tasks and processes, enhancing operational efficiency and productivity.
Reimagining the future of Smart Nation citizen services through intelligent automation has the potential to significantly improve service delivery and citizen experience. AI and automation technologies, help personalise services, improve efficiency, provide 24/7 availability, reduce costs and make data-driven decisions to improve service delivery.


Peter Forbes, Group Chief Digital Officer of the National University Health System (NUHS), spoke about their work in this field. “Our organisation is working with dedicated resources from trusted partners who develop and implement these RPA processes.”
During the development phase, a strong focus is placed on comprehensive documentation of the processes. Working closely with their trusted partner, the organisation ensures that the implemented processes are comprehensively compliant. This collaborative approach instils confidence in the organisation, knowing that the automation processes align with the necessary regulatory guidelines, policies and standards.
NUHS initiated the implementation of robotic process automation (RPA) by identifying appropriate use cases within the organisation. The initial emphasis was on the finance department, where RPA was deployed to tackle laborious and time-consuming tasks.
This approach proved particularly valuable in overcoming manpower constraints during the challenging circumstances of the COVID-19 pandemic. By leveraging RPA technology, NUHS achieved notable improvements in operational efficiency and effectively addressed resource limitations in a rapidly changing environment.
Automation facilitated tasks such as data input into systems and enabled the timely completion of essential operations that would have otherwise been challenging to accomplish within the given timeframe.
Peter further highlighted that the automation initiatives at NUHS extended beyond the finance department and encompassed various operational areas. An example is the automation of home delivery processes in the pharmacy department. The manual effort and overtime work required for home deliveries were alleviated through automation, resulting in positive feedback from pharmacy staff who no longer had to work extended hours.
The organisation faced challenges related to budgeting, as the annual budgeting process required planning automation projects a year in advance, Peter shared. To address this, a central budget pool was established in collaboration with the IT office. This allowed users to draw from the central pool and allocate the funds to their department budgets, providing more agility in funding automation initiatives.
The organisation is interested in learning about similar experiences and strategies employed by other customers.
Implementing automation within an organisation helps alleviate high workloads and maintain service quality for patients or customers. By automating repetitive tasks, employees can focus on more meaningful interactions, such as patient care.
Automation fills gaps in the workforce and improves efficiency. For instance, in materials management, automation handles tasks like tracking inventory, reordering, and invoicing, reducing human involvement and streamlining the process.
Spreading automation successes helps promote its benefits and recognises staff involvement. It is important to continuously promote and reward automation efforts, overcoming the challenge of busy schedules and ensuring commitment to automation initiatives.
“Our organisation values showcasing good automation practices to provide recognition and incentivise further investment,” Peter concludes.


Dan Ternes, Chief Technology Officer, SS&C Blue Prism acknowledges that legacy systems pose a significant challenge in organisations, as the expectation of replacing them with new digital systems often proves unrealistic.
“Despite the initial belief that legacy systems would be phased out within a few years, the reality is that many organisations still have a backlog of these outdated applications,” Dan says. “Replacing systems such as patient records, immigration systems, or core banking systems is not feasible within a short timeframe.”
However, the need for process improvements and digital advancements remains. Automation serves as a solution to bridge the gap between legacy systems and digital transformation. It enables organisations to make improvements and automate processes within the existing infrastructure, even if the underlying systems are outdated. Automation provides a practical approach to achieving efficiency and digitalisation despite the presence of legacy systems.
Change for the sake of change or changes that personally affect individuals is often met with resistance. However, people are generally open to change, provided that the change is beneficial to them. It is important to demonstrate how the change will positively impact individuals and their jobs. While people appreciate meaningful and engaging work, they also value job security and stability.
While the pandemic forced transformation, or at least accelerated pre-existing plans, most organisations had strategies in place. It is pertinent to note that there were advocates for automation and digital transformation even before COVID-19.
“Many people were initially sceptical and hesitant to take risks, but the pandemic forced organisations to adopt automation as a necessity,” says Dan.
The crisis opened their eyes to the effectiveness and scalability of automation, leading to the emergence of champions who recognise its value. COVID-19 accelerated the adoption of automation and created opportunities for growth and improvement.
Intelligent automation offers two significant value propositions: operational excellence and innovation. Operational excellence focuses on improving existing processes, while innovation involves exploring new possibilities and creating new products or services.
Organisations often prioritise cost reduction, but they also appreciate business cases that demonstrate new revenue streams, citizen engagement and enhanced customer experiences. Examples of automation success include call centre optimisation and streamlining onboarding processes through OCR and system updates.
Organisations typically progress from automating finance processes to more mission-critical ones and then explore AI integration for transformative purposes. While automation can prove successful in small-scale labs, scaling up to serve millions of customers poses challenges.
The volume of data and the organisation’s capacity to handle it effectively becomes a crucial factor. Digital workers play a significant role in addressing these challenges and facilitating the management of increased workloads.
Dan emphasised that the primary focus of automation initiatives is to automate processes that have a direct impact on consumers and enhance their overall experience. This underscores the organisation’s commitment to prioritising consumer-centricity in automation efforts.
By placing citizens and clients at the forefront, organisations ensure that automation initiatives are aimed at delivering tangible benefits and improving services for the individuals they serve. This approach reflects a strong dedication to enhancing the overall satisfaction and experience of citizens and clients through the strategic implementation of automation technologies.
“Automation offers an opportunity to bridge the gap between legacy systems and digital applications, serving as a temporary solution until system upgrades can be implemented. Hence, organisations recognise the need to solve present-day problems while preparing for future digital transformation,” Dan concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Digital technologies have had a positive impact on manufacturing in terms of productivity, efficiency, and inventiveness. Manufacturers are increasingly embracing IoT-enabled digitalisation and integration throughout their facilities and supply chains to maintain a competitive advantage in the global market.
However, as the Internet of Things (IoT) and remotely connected devices become more common in industrial settings, safety is at risk as there are more opportunities for cyber intrusions with a larger surface area to attack.
Moreover, the increased adoption of digital technologies in manufacturing has raised the risk of cyber threats, which can potentially compromise sensitive manufacturing data and disrupt production processes.
In light of these challenges, digital resilience has become a top priority for manufacturers as they seek to safeguard their operations against possible intrusions. Most companies are designing more robust strategies or are looking to bolster existing measures.
Cybersecurity threats to the manufacturing sector include phishing, ransomware, malware, supply chain disruptions and insider threats. Manufacturers must create a thorough cybersecurity plan that considers both operational technology (OT) and information technology (IT) systems to effectively tackle these dangers.
Given that many OT systems were developed without taking security precautions into account, manufacturers are extremely vulnerable to cyber threats. This is a matter of great concern, as it leaves their systems open to cyberattacks and increases the likelihood of their production processes being compromised.
The impact of cyber breaches on manufacturing operations
“One of the challenges is that manufacturing is not designed to focus on security but rather functionality. Secondly, Operation Technology (OT) devices are designed and developed for specific purposes by third-party vendors. Thirdly, people are trained to deliver results from an engineering perspective, but not to address cybersecurity challenges,” Jagathesh elaborates.
He recognises that the supply chain in the manufacturing industry involves multiple suppliers throughout the entire product lifecycle, from raw material suppliers to end consumers. A risk-based approach should be taken to safeguard it, with critical vendors identified and prioritised for attention.
The importance of managing cybersecurity risks in the supply chain, especially with external vendors, cannot be understated. Moreover, emerging regulatory expectations require businesses to report any cyber incidents within a specific period.
From an external perspective, businesses need to ensure that they have a well-thought-out system to manage the risks and enforce contract clauses related to data security and cybersecurity.
Internally, measures need to be put in place to mitigate inadvertent or malicious exposures to attacks. Account takeovers and Business Email Compromises (BEC) are commonly employed by hackers as means to breach systems. The attackers look at the extended nature of the OT network and IT interface and find the weakest link to get into the (Operational Technology) OT network.
“To address the entire spectrum of possibilities and issues, businesses need to focus on both inside-out and outside-in approaches,” Jagathesh suggests. “Overall, the goal is to ensure that the end-to-end supply chain is secure from a risk and cybersecurity perspective.”
The inside-out approach requires businesses to focus on their suppliers and ensure that they comply with cybersecurity requirements. The outside-in approach requires businesses to evaluate the cybersecurity practices of their vendors and the access they have to critical systems.
From Jagathesh’s observations, the current operating environment of the manufacturing industry has evolved from a people-centric to a process-centric to an automation-centric approach by leveraging data and technological advancements. Moving towards connected interfaces, the adoption of new technologies and IoT devices for automation and integration is inevitable in the near future.
However, the manufacturing industry challenges include, identifying critical assets, classifying IoT devices & understanding the business impacts with a legacy environment are considered significant security risks. Often, Emerging technological devices are deployed without being added to asset inventories and lack risk assessment, leading to unknown security risks. It is important to consider security from a device’s operational, security & Business impact standpoint.
To mitigate this, companies can collaborate closely with their business units to understand their needs and requirements, ensure that devices meet baseline security requirements from third-party vendors, and appropriately inventory the devices with the right security tools installed. Furthermore, automation capabilities can be utilised to address cybersecurity concerns, with visibility provided by a security operation centre (SOC).
Jagathesh agrees that there is a need to identify key risks before looking at ways to address them. Risks can be classified as known knowns, known unknowns and unknown unknowns. “The biggest challenge is the unknown unknowns, as many manufacturing systems were not designed with security in mind and may not be able to cope with the sophisticated attacks.”
He recommends a three-step approach: first, gain visibility of the environment; second, collect data and filter it into a data-centric model; and third, use a risk-based approach to develop mitigation strategies. Without these steps, it can be difficult to know where to focus efforts and what risks to address.
The financial performance and impact of a cyber-attack on a manufacturing company can be significant. Manufacturing availability is crucial, and a successful cyber-attack can disrupt the supply chain, leading to financial impacts on the business, and other economic, and environmental issues.
The regulatory environment and emerging reporting scrutiny expect organisations and responsible individuals to be prepared for a cyber event and predict and plan for how to manage a crisis. Most importantly the resilient nature of the business mitigates productivity loss and prevents supply chain destruction in the entire supply chain ecosystem.
The cybersecurity imperative for manufacturing companies
Jagathesh acknowledges the crucial role of network service providers in the digitally connected world and notes that attacks on them can result in the complete disruption of communication. He cited real-time examples of successful Distributed Denial of Service (DDoS) attacks on telco providers.
The manufacturing industry faces challenges in terms of cybersecurity and legal frameworks are still in the learning and evolving stage. “There are emerging legal/regulatory frameworks, but existing standards (ISO, IEC) and zero trust models can provide guidelines. Strong industry partnerships, consensus on baseline security and public-private partnerships are some evolving themes to address emerging cybersecurity trends,” Jagathesh is convinced.
Singapore has taken the lead in developing cybersecurity OT competency frameworks and cybersecurity master plans for the Critical Information Infrastructure, while other APAC countries are catching up. Some countries are leading the maturity focus in this area, while Europe and APAC are trying to address challenges through discussions and building capabilities.
The manufacturing industry is transforming from Industry 3.0 to 4.0, with strategic initiatives focused on dealing with the consequences of not incorporating security in innovation. The implications of failing to account for risk and cybersecurity can result in supply chain interruptions, reputation, and revenue loss.
Cybersecurity practitioners in the manufacturing industry must prioritise worker safety, reliability, and security. By leveraging technology, they can drive innovation and generate new business ideas while securing a disruption-free supply chain. Therefore, comprehending the manufacturing ecosystem and appropriate prioritisation is crucial.
The journey so far and the road ahead
Jagathesh has been in the IT industry for 20 years and has always had a focus on Risk management, information security and cybersecurity. He recounts his career path, which began with a focus on risk management and security in his initial job. He quickly realised the importance of cybersecurity and dedicated himself to developing his skills and understanding the various security products and technologies. He builds his Cyber career from a multi-dimensional perspective which includes technology, regulatory framework, consulting, and business skills to provide a trusted advisory solution to the enterprise.
His experience working in diverse industries such as Banking and Financial Services Industry (BFSI), Webhosting and Healthcare verticals with a razor-sharp focus on stakeholder engagement, program management, Enterprise Application Integration (EAI), Audit and regulatory engagement gave him an appreciation of the interdependence of cyber and risk management.
He was approached by headhunters who were looking for someone who can bring transferable skills in the areas of technology and translate tech jargon into business understanding language. Build relationships with internal and external stakeholders to strategise the risk and Cybersecurity program. He transitioned from banking and financial service industries (BFSI) to healthcare and manufacturing security, with a focus on building strong capabilities in critical information infrastructure.
The transition from BFSI to manufacturing and healthcare posed some challenges, but his transferable skills and new learning helped in shifting priorities. Indeed, his diverse experience has given him a wider and deeper appreciation of cyber resilience.
He explains that in the banking and financial industry, the focus is on a data-centric approach, while in the manufacturing and healthcare industries, safety is the primary concern followed by availability and security.
As a cybersecurity practitioner, he always prioritises the three fundamental principles of confidentiality, integrity, and availability. He also follows a three-pronged approach, which includes understanding the business, identifying how cybersecurity and risk management capabilities bring value to the business and understanding external factors like emerging trends, regulations, and cross-border issues impacting the business.
The manufacturing sector is a critical industry that operates continuously 24/7/365 days a year. The key challenge in manufacturing cybersecurity is to ensure that the business keeps running without downtime, while also addressing cyber threats like email compromises, PLC attacks, supply chain disruptions and account takeovers.
Jagathesh thinks the approach to cybersecurity in the manufacturing industry has evolved from a people-centric to a process-centric to a machine-centric model in the past. Moving forward the focus is on data-centric to autonomous models with the key focus on the automation capabilities. Building resilience is a multi-faceted methodology that requires addressing cybersecurity risks from a people-centric, process and technology-centric perspective.
A comprehensive paradigm that incorporates new technologies, process improvement, regulatory compliance and cybersecurity awareness can help organisations to develop and maintain a secure and efficient manufacturing operation.
“Building resilience requires addressing cybersecurity risks from both a people-centric and technology-centric approach. This means not only implementing technical controls such as firewalls and encryption but also training employees on cybersecurity best practices and creating a culture of security awareness,” Jagathesh concludes.
(Disclaimer: This interview is based on Jagathesh Rajavasagam’s personal views and has nothing to do with his current organisation)
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Incorporating technology and innovative solutions in agriculture and healthcare can address global challenges and issues such as inadequate food supplies, undernourishment and the spread of infectious diseases.
Precision agriculture, plant biotechnology, digital health, genomics and personalised medicine are just some of the innovative solutions that are transforming these sectors. By embracing these advancements, industries and governments can enhance food security, nutrition and public health while promoting a more sustainable future for everyone.
In addition, breakthroughs with global impact have the potential to improve the lives of people in developing and developed countries alike. They can also extend beyond their primary applications, giving rise to novel discoveries and advancements.
It is not surprising that discoveries with global impact frequently stem from collaboration and cross-disciplinary endeavours. Scientists, engineers, and entrepreneurs from different countries and domains come together to tackle complex challenges and develop solutions that benefit society.
Such collaboration can spark new technologies, products and services that exert a profound effect on the global economy and environment.
World-Changing Innovations
The rapid uptake of technology, not limited to the medical field but across diverse industries, has been spurred on by the pandemic. Gene therapy and digital technologies have emerged as two key areas driving change and transformation within the healthcare sector.
“While the cost of innovation, including gene therapy and digital technologies, has been a concern, progress is being made and as more companies enter the market, there is a potential to drive down the costs,” PeiSze explains.
She believes that the outbreak has hastened the adoption of digital technologies in the healthcare industry, such as telemedicine and remote monitoring. These innovations have the potential to increase the affordability and accessibility of healthcare, particularly in large countries where ease of access to medical services may be limited.
The use of data collected from these technologies can help clinicians make better decisions, reduce hospitalisations, and in return lower healthcare costs. However, challenges such as data privacy, cybersecurity and reimbursement for digital solutions still need to be addressed to ensure widespread adoption and acceptance.
Food security, nutrition and sustainability are critical areas that require support in today’s world. Addressing these challenges will necessitate the deployment of innovative technological solutions in agriculture to ensure equitable distribution of and better accessibility to nutrition.
“Digital farming has the potential to improve efficiency, sustainability and productivity in the agriculture industry,” PeiSze is convinced.
She emphasises the importance of smart farming, which leverages digital technology and data management to enhance agriculture yield. Potential advantages include increased productivity and decreased costs through the optimisation of resources such as fertilizers and pesticides.
For instance, sensors can be used to monitor soil nutrient levels, providing farmers with information on the appropriate type and amount of fertilizers and pesticides needed. This can lead to more sustainable agriculture practices and better environmental outcomes.
Additionally, technologies such as drones can help reduce labour costs and increase productivity, especially in the context of an ageing population, urbanisation, climate change and other planet concerns. Sustainable farming practices and advising farmers on crop selection have a substantial impact on productivity and livelihoods.
Despite the potential benefits of digitalisation and mechanisation in agriculture, several challenges remain. These include the need for adequate infrastructure and internet connectivity, the costs associated with adopting new technologies and the necessity for a mindset change among traditional farmers.
PeiSze suggests that government and farming cooperatives can play a role in facilitating awareness and driving change towards more sustainable farming practices. Advances in technology and science can be applied to both healthcare and agriculture, she says, citing gene editing as an example.
“Gene editing can be used to treat human diseases and the same technology when applied to agriculture can help to increase crop productivity such as the introduction of drought-resistant genes in plants. Biological tools can be applied to tackle various challenges across multiple disciplines.”
With regard to the adoption of technologies by rural communities, PeiSze cited two key topics accessibility and affordability. While internet connectivity and smartphones have improved accessibility, affordability remains a complex issue that requires collaboration between public and private sectors, regulators and other stakeholders.
She is excited about breakthroughs made in the life sciences but it is important for these developments to be scaled and adopted globally. Advancements in technology and its increased uptake can lead to better medicines and improved food production with the ultimate goal to improve human lives and livelihoods.
Urban Ideas and Solutions Through LKYGBPC
The Lee Kuan Yew Global Business Plan Competition (LKYGBPC), which began in 2001, is a biennial global university start-up competition hosted in Singapore. Organised by Singapore Management University’s Institute of Innovation and Entrepreneurship, it focuses on urban ideas and solutions developed by student founders and early-stage start-ups.
PeiSze applauds an ‘all hands-on deck’ approach to stimulate innovation among youth and entrepreneurs. She recognises that it can be a challenging path and underscores the significance of providing support through competitions, mentorship programmes, networking events and other initiatives to assist them in succeeding.
She is a strong believer that “activities that foster innovation in young people and entrepreneurs should be supported but mentorship, engagement with industry expertise and networking bring greater value to entrepreneurs than money.”
Mentorship is critical to the success of an entrepreneur and relationships established through mentorship should be enduring. She opined that pitch competitions that provide mentorship opportunities and access to a network of individuals who can support entrepreneurs throughout their journey are of high value
PeiSze Ng has a passion for science and technology and has been working in the healthcare industry for almost two decades. She is currently exploring opportunities in agriculture in Asia and finds it fascinating how science and technology can be applied in healthcare and agriculture to enhance people’s lives. Additionally, she enjoys meeting innovative entrepreneurs who are working on various projects, such as financing smallholder farmers.
Reflecting on the rapid pace of innovation and regulatory approvals during the pandemic, PeiSze hopes that this level of urgency and collaboration will continue in the future. She acknowledges the importance of closer collaboration between regulatory bodies, governments and industries such as pharma and agriculture.
Such cooperation can be a powerful tool for addressing challenges and advancing innovation in the future while balancing safety and efficacy.
In addition to technological advancements, PeiSze Ng acknowledges the importance of raising awareness and providing education to address concerns and issues surrounding technologies such as gene editing in agriculture and mRNA vaccines in healthcare.
She realises that there may be misconceptions and fears around these technologies and believes that education and mindset adjustment are crucial in promoting their safe and effective use. By providing accurate information and encouraging open dialogue, she hopes to foster greater acceptance and understanding of these technologies in society.
Paradigm shifts and cultural adaptations can be challenging when it comes to implementing organisational or societal transformations. However, she views them as a natural aspect of life and not necessarily an impediment but rather an opportunity for development and positive transformation.
PeiSze recognizes the potential of breakthroughs in the life sciences field to advance progress in human health and agriculture. However, she acknowledges that resistance to change can impede progress and development.
“People are generally averse to change and new technologies as a result of societal norms and upbringing, but it is important to recognise that adaption to change is critical for growth and future development in the creation of a better world,” PeiSze concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Teknologi telah mengubah wajah layanan kesehatan dan pertanian. Pertanian presisi, bioteknologi, layanan kesehatan digital, genomik, dan obat-obatan yang dipersonalisasi merupakan sebagian dari teknologi inovatif yang mengubah sektor-sektor ini.
Menggabungkan teknologi dan solusi inovatif di bidang pertanian dan perawatan kesehatan dapat mengatasi tantangan dan masalah global seperti pasokan makanan yang tidak memadai, kekurangan gizi, dan penyebaran penyakit menular.
Dengan berbagai kemajuan ini, industri kesehatan dan pertanian terus berevolusi untuk meningkatkan ketahanan pangan, nutrisi, dan kesehatan masyarakat. Kemajuan ini juga bertujuan untuk mempromosikan masa depan industri pertanian dan kesehatan yang lebih berkelanjutan.
Kemajuan teknologi ini tak lepas dari kolaborasi dan upaya lintas disiplin. Ilmuwan, insinyur, dan pengusaha dari berbagai negara dan domain berkumpul untuk mengatasi tantangan kompleks dan mengembangkan solusi yang bermanfaat bagi masyarakat secara menyeluruh.
Kolaborasi semacam itu dapat memicu teknologi, produk, dan layanan baru yang memberikan pengaruh mendalam pada ekonomi dan lingkungan global. Dengan akses kesehatan yang makin mudah dan hasil pertanian yang lebih berlimpah, tentu akan membantu meningkatkan taraf hidup masyarakat.
Teknologi untuk industri yang lestari
Terapi gen dapat dilakukan dengan sejumlah cara; mengganti gen penyebab penyakit dengan salinan gen yang sehat, menonaktifkan gen penyebab penyakit yang tidak berfungsi dengan baik, atau memperkenalkan gen baru atau yang dimodifikasi ke dalam tubuh untuk membantu mengobati penyakit. Terapi ini sedang dipelajari untuk mengobati penyakit termasuk kanker, penyakit genetik, dan penyakit menular.
“Dari perspektif industri perawatan kesehatan untuk menyembuhkan penyakit, terapi gen menjadi perubahan yang paling dramatis. Karena Anda beralih dari mengobati gejala penyakit menjadi benar-benar menyembuhkan penyakit,” tuturnya dalam wawancara dengan CEO dan Pemimpin Redaksi OpenGov Asia.
Pei bertanggung jawab untuk melakukan investasi tahap awal di perusahaan-perusahaan di China dan kawasan Asia-Pasifik. Sebagai pemimpin pemodal ventura Bayer, Pei mengakui bahwa biaya yang diperlukan untuk membuat inovasi memang tidak sedikit. Namun, begitu inovasi tersebut berhasil, semua orang akan mengikuti terobosan baru itu.
Selain fokus pada produk kesehatan, Bayer juga berbisnis di sektor agrikultur. Terkait dengan pertanian digital, kini industri sudah mulai mengembangkan sensor dengan teknologi IoT seperti untuk mengukur tingkat nutrisi di tanah. Data ini bisa digunakan petani untuk menentukan seberapa banyak pupuk atau pestisida dan mendukung industri pertanian yang lebih ramah lingkungan dan berkelanjutan.
“Jadi, akan lebih sedikit bahan pencemar dan kimia yang digunakan di lahan pertanian. Anda bisa memberikan bahan kimia dengan takaran yang dibutuhkan.”
Selain itu, digitalisasi di sektor pertanian juga menjadi jawaban untuk berkurangnya ketersediaan tenaga kerja. Dengan masifnya urbanisasi, membuat tenaga kerja pertanian di desa makin berkurang. Penggunaan teknologi seperti drone untuk membantu menyemprot pupuk dan pestisida bisa membantu mengurangi kebutuhan tenaga kerja, meningkatkan produktivitas, dan menghemat biaya.
Namun, semua kebutuhan ini tentu membutuhkan dukungan infrastruktur, “karena ketika kita berbicara tentang digital dan teknologi, Anda harus memiliki konektivitas internet, perlu memberikan pendidikan untuk mengubah pola pikir petani, dan kedua hal tersebut membutuhkan biaya yang tak sedikit. Jadi, saya pikir, di situlah sebenarnya pemerintah dan koperasi tani dapat benar-benar berperan dalam mencoba membawa perubahan.”
Menurut Pei, internet juga memudahkan akses layanan kesehatan di daerah terpencil. Tak cuma di bidang kesehatan, tapi internet juga bisa menghubungkan petani langsung dengan konsumen.
Ia pun sepakat kalau pandemi COVID-19 memang memaksa berbagai organisasi untuk berinovasi dan bergerak lebih cepat, mulai dari peneliti vaksin hingga proses persetujuan pemerintah. Pandemi juga membuat layanan telemedicine jadi lumrah dilakukan. Selain itu, penggunaan dan analisis data kesehatan pun telah membantu dokter membuat keputusan yang lebih baik dan mengurangi rawat inap dan biaya perawatan kesehatan.
“Saya pikir, memerangi COVID-19 untuk industri perawatan kesehatan adalah pencapaian yang sangat luar biasa dengan kecepatan yang dilakukan. Segala sesuatunya bisa bergerak jauh lebih cepat dari biasanya. Bahkan, pemerintah bekerja jauh lebih cepat dalam hal persetujuan peraturan. Lalu mereka pun mesti mendistribusikan vaksin-vaksin ini ke berbagai lokasi dengan cepat. Itu sangat menakjubkan.”
Ia berharap revolusi yang terjadi saat pandemi di industri kesehatan juga bisa memicu revolusi di pertanian. Misal terkait dengan teknik penyuntingan gen yang hingga saat ini selalu menjadi topik yang kontroversial. Meski cara ini bisa meningkatkan produktivitas hasil pertanian, namun kekhawatiran warga membuat hal ini sulit terlaksana.
Menurut Pei, untuk meminimalkan ketakutan, perlu sosialisasi edukasi atas teknik penyuntingan gen. Sama seperti edukasi terkait vaksin mRNA yang membuat sejumlah orang khawatir kalau vaksin ini bisa mengubah penerima vaksin. “Jadi saya pikir semua aspek teknologi baru ini lebih tentang pendidikan dan perubahan pola pikir.”
Menumbuhkan inovasi lewat LKYGBPC
Dengan berbagai tantangan yang harus diselesaikan di industri pertanian dan kesehatan, Pei menyebut perlu ditumbuhkan talenta-talenta wirausahawan. Inovator-inovator ini perlu mendapat dukungan, bantuan dan bimbingan agar bisa bertumbuh. Hal itu bisa terbantu lewat acara kompetisi dan berjejaring seperti yang dilakukan Singapore Management University (SMU) lewat The Lee Kuan Yew Global Business Plan Competition (LKYGBPC).
“Berkompetisi dan menjadi pengusaha bukan semata tentang uang, tetapi lebih tentang bimbingan atau mendapatkan pengalaman dari orang-orang. Ini menjadi ajang untuk mempertajam ide, membangun produk, atau membangun bisnis. Jejaring ini penting bagi pengusaha untuk menghadapi perjalanan yang menantang ke depan,” terangnya.
Pei sendiri selalu tertarik dengan tren dalam sains dan teknologi. Ia selalu tertarik untuk menjadikan tren teknologi terbaru itu agar bisa diterapkan dalam perawatan kesehatan dan pertanian untuk meningkatkan kehidupan masyarakat.
Perubahan yang dibawa oleh inovasi para pengusaha menurutnya sangat menarik. Namun, ia mengakui akan selalu ada tantangan dan hambatan ketika membuat sebuah perubahan. Hal ini menjadi salah satu tantangan bagi para wirausahawan dan akan membawa pada perubahan yang baik.