

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Ransomware attacks on multiple hospitals blocking staff access to vital systems and taking weeks to clear up, a cyber attack that wreaked havoc on meal delivery and pathology results, an unencrypted drive with almost 30,000 patient records on it goes missing…all in the first three months of 2016.
It’s a tough diagnosis to accept, but the FBI’s finding that the healthcare industry “Is not technically prepared to combat against cyber criminals’ basic cyber intrusion tactics, techniques and procedures, much less against more advanced persistent threats” is borne out by the evidence, with barely a week in 2016 passing without news of a data breach or cyber attack on a healthcare organization somewhere around the world.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Unique Identification Authority of India (UIDAI) and the Society for Electronic Transactions and Security (SETS), which is a part of the Office of the Principal Scientific Adviser, plan to work together on research and development in the field of deep technology.
According to a press release, under a memorandum of understanding (MoU), the two sides will conduct collaborative research in areas like cybersecurity, Internet of Things (IoT) security, mobile device security, financial network slice security, and hardware security, among others.
The initiative aligns with the Make in India campaign, with the goal of enhancing self-sufficiency in information technology and cybersecurity, while also reducing the country’s dependence on exports. As part of this effort, experts and officials from both groups will join forces on research projects centred around artificial intelligence (AI) and blockchain technology for cybersecurity. They will also focus on developing innovations in quantum security and cryptography, including quantum random number generators, crypto API libraries, and quantum-safe cryptography.
Accordingly, officers from SETS and UIDAI will propose and implement joint research projects and create tools and products that can be utilised not only within the UIDAI ecosystem but also in other critical IT infrastructures.
Emerging technologies like AI and big data are at the core of the Digital India initiative, serving as tools for good governance and forming the foundation of India’s expansive digital public infrastructure. UIDAI is a statutory authority established under the provisions of the Aadhaar Act 2016. Aadhaar cards are 12-digit unique identification numbers linked to a citizen’s basic demographic and biometric information. The adoption of Aadhaar-based authentication transactions has been witnessing an upward trend as it has proved to be a facilitator in availing several welfare benefits and services, the government has said.
UIDAI has already issued over 1.36 billion Aadhaar numbers to residents, with more than 70 million Aadhaar-based authentication transactions taking place every day. Additionally, nearly 1,700 schemes of the central and state governments for welfare and good governance utilise Aadhaar.
As OpenGov Asia reported earlier, an in-house developed security mechanism for Aadhaar-based fingerprint authentication has been launched. It utilises a combination of finger minutia and finger image, which is powered by AI/ML. The technology enhances the liveness check of captured fingerprints, thereby making Aadhaar authentication transactions more secure and robust.
The new two-factor/layer authentication incorporates add-on checks to validate the genuineness (liveness) of the fingerprint to reduce fraud attempts. The initiative will be beneficial for the banking and financial sectors and telecom players and government agencies. The implementation of the new security mechanism will also aid individuals at the bottom of the pyramid by strengthening the Aadhaar-enabled payment system and preventing fraudulent attempts made by unscrupulous elements.
After several months of discussions and support provided by the UIDAI to its partners and user agencies, the new security mechanism for Aadhaar-based fingerprint authentication is now fully functional. The implementation of the new security mechanism has resulted in the replacement of the less secure single-factor authentication methods, which relied solely on either finger image or finger minutiae. The new system now uses a more robust two-factor authentication process, which is a positive outcome for all stakeholders involved.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
As the development and use of technology is rapidly advancing, it is becoming increasingly popular for parents to let their children use electronic devices at an early age. Unfortunately, most of the time, children do not have the skills to protect themselves in cyberspace.
A survey conducted last year on parents’ opinions regarding online safety revealed that the average age of Vietnamese children first owning a mobile phone is nine years old. However, the average age at which children are informed about information security in cyberspace is 13 years old. This means that there are about four years that children interact online without being warned about potential risks and how to deal with them.
In 2020, the Management and Sustainable Development Institute (MSD) and Save the Children conducted a nationwide survey that showed that children often use the Internet for learning (83%), entertainment (71%), making friends (71%), sharing information (23%), shopping (30%) and live streaming (6.3%). It was reported that 40% of children feel unsafe when using the Internet. More than 70% of children have had unwanted experiences such as personal information disclosure, harassing texts, and cyberbullying.
The risks become more diverse and unpredictable and do not spare anyone. Therefore, children need to be educated and equipped with the knowledge to protect themselves and take advantage of technology. In 2021, the Prime Minister approved Decision No 830, under which the “Protecting and Supporting Children to Interact Healthy and Creatively in Cyberspace” programme for the 2021-2025 period was launched.
The Deputy Head of the Information Security Department, Tran Dang Khoa, stressed that digital technology products in Vietnam must be created and applied to successfully implement the programme.
The objective of the programme is to safeguard children against online risks and empower them with digital literacy while fostering a healthy online environment. It also seeks to develop innovative Vietnamese products and applications that enable children to learn, connect, and enjoy recreational activities online.
It is the first national one in Vietnam for child protection on the Internet. Under the programme, a network to rescue and protect children on digital platforms was created. It seeks to enhance public awareness, share valuable experiences, and receive and handle reports from the community about child abuse on the Internet.
The programme outlines six principles that parents and teachers must follow to assist children in interacting with digital media. They consist of recognising a child’s right to access and use the Internet, helping children use the Internet safely as soon as possible; respecting the child’s privacy; understanding the psychology and development of children to accompany them; guiding children to access support when needed; and being available when the child is in need.
The General Director of Smart Cyber Security, Ngo Tuan Anh, said that when schools equip computer rooms with an Internet connection according to regulations, the big challenge is finding and equipping tools to help monitor and manage students. There are technology solutions that can help schools manage students on the internet conveniently, he said. The products apply the cloud computing model, allowing schools to deploy and easily use them at a reasonable monthly cost quickly. A representative of the Vietnam Cybersecurity Emergency Response Teams/Coordination Centre (VNCERT/CC) named three major technologies: protection technologies on operating systems, browsers, and applications; child protection devices and applications on terminals; the applications that support reflections and checking.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Ministry of Industry and Trade has been focusing on protecting consumer rights online amid the boom of e-commerce and the digital economy since the COVID-19 pandemic. The Ministry launched Consumer Rights Day on World Consumer Rights Day, which is marked every year on 15 March.
The Ministry has stressed the importance of consumer protection in building a healthy environment and promoting socioeconomic development. This year’s event highlighted information transparency and safe consumption.
Despite the implementation of the Law on Consumer Rights Protection on 1 July 2011, there has been a persistent prevalence of consumer rights violations across multiple levels, with a growing level of complexity. Entering the post-COVID-19 period, e-commerce, especially borderless trade, has made consumer rights protection a new focus as there were several risks consumers face online. These risks include the sale of counterfeit and substandard products, as well as the misuse of personal information for fraudulent purposes.
The Vietnam Competition and Consumer Authority is preparing to revise the Law on Protection of Consumer Rights to ensure that the legislation stays up-to-date with the evolving landscape. The proposed amendments to the law are expected to be presented for approval at the National Assembly’s meeting in May.
Tran Huu Linh, General Director of the Vietnam Directorate of Market Surveillance, noted that apart from the online shopping trend, there has been an increase in trade fraud and risks to consumers, including fake and poor-quality products. According to statistics from the Ministry, over 1,660 online kiosks offering more than 6,400 products were taken down, and five e-commerce websites accused of selling counterfeit and/or uncertified products were blocked last year.
Linh emphasised that safeguarding consumer rights in the online realm was a priority for the market watch, particularly considering Vietnam’s ambition to become a frontrunner in digital economy development within the region. The government has set a goal for the digital economy to contribute 20% to the country’s GDP by 2025.
Owners of many online stores are prioritising consumer protection as one of their key business strategies. The official urged consumers to make orders from licensed platforms or official stores to ensure their rights are protected. The Deputy Director of the Vietnam Competition and Consumer Authority, Nguyen Quynh Anh, explained that consumer protection needs to have stronger and more substantive changes, which requires the active participation of businesses.
“We used to think that consumer protection was the matter of the State management agency and the consumers. Now, enterprises will be a more important subject in the consumer protection process,” Anh said. It is crucial for enterprises to recognise their responsibility in safeguarding consumer rights and ensuring that consumers have access to reasonably priced and safe products and services.
In 2020, Vietnam approved a National Digital Transformation Programme by 2025, with an orientation toward 2030. The strategy helps accelerate digital transformation through changes in awareness, enterprise strategies, and incentives toward the digitalisation of businesses, administration, and production activities.
The programme targets businesses, cooperatives, and business households that want to adopt digital transformation to improve their production, business efficiency, and competitiveness. The plan aims to have 80% of public services at level 4 online. Over 90% of work records at ministerial and provincial levels will be online while 80% of work records at the district level and 60% of work records at the commune level will be processed online.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Ministry of Information and Communications (MIC) is cracking down on telecom carriers that do not stop junk SIM cards in the market. Mobile network operators have been instructed by the Authority of Telecommunications (AOT) to ensure that all the necessary authentication information of the subscriber is provided when registering.
Telecom carriers need to update procedures and regulations on registering subscribers’ information following Decree 49/2017. In addition, mobile network operators are required to uphold their commitments with MIC and comply with the requests outlined in the legal documents issued by AOT. The agency intends to collaborate with local information and communications departments to oversee and inspect enterprises’ implementation process.
Enterprises that engage in serious violations, such as providing services to new subscribers with insufficient or inaccurate information or selling pre-entered SIM cards with activated mobile services, will be forced to halt the registration of new subscribers, the government has said.
MIC is considering strict punishment like suspending the right to register new subscribers for 3-6 months if telcos are found committing violations of regulations on mobile subscriber management. This is the first time that MIC has put in place heavy sanctions on mobile network operators.
Experts have noted that despite measures to punish violators, junk SIM cards still exist because the regulations are not respected. Despite making repeated promises to prevent the circulation of junk SIM cards, telecom carriers have failed to effectively address the issue and junk SIM cards are still in circulation.
According to MIC, Vietnam has 126 million mobile subscribers, and the market has become saturated. Annually, telecom carriers vie for 800,000 new subscribers, but they cannot alter their market share by simply competing for new subscribers. Hence, it is imperative to strengthen the registration process for new subscribers.
In Ho Chi Minh City, it is not hard to buy a pre-activated SIM card from popular carriers like state-run Viettel for only US$ 3-8.5 without the need to produce identification documents. It can be used instantly when inserted into a mobile phone. The price of a junk SIM card depends on the specific number and current promotion programmes of mobile service providers. For instance, at present, the price for a card from Viettel is US$ 6.8.
By combining junk SIM cards with popular communication apps, criminals can spread fake news or images, building their credibility and gaining the trust of their victims for future scams. The use of virtual phone numbers that are not tied to any specific location or physical device makes managing them extremely challenging. Criminals are exploiting this to activate Over-the-Top (OTT) applications with ease, which can be used for illegal activities.
After 31 March, a large number of mobile subscribers without standardised information will be deactivated. The Deputy Head of the Vietnam Telecommunications Authority explained that it is not feasible to prohibit individuals from owning multiple SIM cards as they may require them for business purposes. However, to limit the use of SIM cards for malicious activities, when an individual wants to own more than three SIM cards, they must sign a contract with the mobile carrier.
The official also highlighted that one of the key priorities of the telecoms industry for 2023 is to fully resolve the problem of SIM cards with incorrect or missing identity information of their owners. Additionally, efforts will be made to raise public awareness about the risks of using junk SIM cards.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Over the coming years, Singapore is poised to witness significant transformations in digital financial services, particularly in three key domains: the emergence of Web 3 and decentralised finance, the widespread integration of artificial intelligence (AI) and the implementation of machine learning (ML) technology.
Prioritising strong governance and compliance should be at the top of the Banking, Financial Services, and Insurance (BFSI) sector’s list of objectives. Adherence to regulations, following rules and taking responsibility can greatly enhance services, ensure safety, and enhance the client experience.
Employing a centralised data protection solution enables consumers to track and verify if and how their data is being protected data across various workloads. When clients have the ability to do so, they can be confident that their data is being adequately safeguarded. Moreover, this can ensure that recovery time objectives and IT audit compliances are met.
Combatting threats such as malware and ransomware, along with ensuring overall cybersecurity, requires a strategic approach across multiple levels. This includes actively monitoring for potential issues and regularly backing up data. Storing immutable copies of data in a secure location can prevent malware from encrypting them.
In addition, data intended for recovery should undergo scanning and cleaning by the organisation’s anti-virus solution to ensure that any potentially harmful data, also known as “dirty” data, is not inadvertently reintroduced into production systems.
Ensuring seamless operations while mitigating the risks of ransomware and other cyber-attacks can be challenging. However, modern data protection solutions have demonstrated their ability to reduce costs, enhance automation, enhance human capabilities and identify innovative ways to reuse data to generate new value.
The OpenGov Breakfast Insight on 22 March 2023 held at the Voco Orchard Singapore aimed to share insights and practical solutions to empower organisations to maximise data capability through cost-effective, secure and automated data-driven processes that adhere with current data regulations and comply with the standards of Singapore’s Banking, Financial Services and Insurance industry.
Opening Remarks


Kicking off the session, Mohit Sagar, CEO & Editor-in-Chief, explains that financial data management is a set of processes and policies, usually helped by specialised software. This approach enables an organisation to merge its financial data, adhere to accounting regulations and legal requirements, and generate comprehensive financial reports.
The regulatory body responsible for overseeing Singapore’s financial institutions and establishing guidelines for data management and protection is the Monetary Authority of Singapore (MAS). According to its regulations, financial institutions are required to implement robust policies and procedures for managing data, including appropriate classification, handling and protection.
“Financial institutions must ensure that adequate security measures are in place to mitigate the risks of data breaches and cyber threats. This could include implementing strong encryption protocols, regularly testing systems for vulnerabilities, maintaining up-to-date software and hardware and training on cybersecurity best practices,” Mohit emphasises.
The Personal Data Protection Commission (PDPC) serves as the data protection authority in Singapore, responsible for enforcing compliance with the Personal Data Protection Act (PDPA). The Act sets a baseline level of data protection that must be followed by all sectors operating in Singapore.
Additionally, the PDPA also mandates that organisations obtain individuals’ consent before collecting, using, or sharing their personal information. The PDPC is empowered to investigate any breaches of the PDPA and impose penalties for non-compliance.
Data recovery refers to the process of getting lost, deleted, corrupted or inaccessible data back from storage media like hard disk drives, solid-state drives, USB drives, or other types of data storage devices. Several companies in Singapore offer data recovery services that specialise in getting data back from different types of storage media used by financial institutions.
“It’s important to remember that data recovery services can be expensive, and it’s always best to have a full data backup and disaster recovery plan in place to minimise the risk of losing data,” is Mohit’s caveat. “Establishing a robust backup and recovery system can help avoid the need for expensive data recovery services and ensure business continuity in the event of a data loss incident.”
The protection of sensitive financial data from unauthorised access, theft and cyberattacks is a top priority for Singapore’s financial institutions. To achieve this, they employ a range of security measures, including encryption, access controls, firewalls, regular updates and patches, employee training and awareness programs, penetration testing, and incident response planning.
These safeguards work together to create a comprehensive data security framework that helps to prevent data breaches and protect the integrity and confidentiality of financial data.
“Under the PDPA, financial institutions must obtain the consent of individuals before collecting, using, or disclosing their personal information,” Mohit reiterates. “But while this is the norm, there are exceptions to this rule.”
Concessions are allowed under certain circumstances, such as legal obligations or the prevention of criminal activity. As an example, financial institutions may disclose personal information to law enforcement agencies to comply with legal requirements or to prevent potential criminal activity.
Mohit understands that risk mitigation is a crucial component of risk management in Singapore’s financial sector, and financial institutions employ a range of strategies and tools to identify, evaluate and reduce the risks they face.
Diversification, risk transfer, risk avoidance, risk monitoring and reporting, contingency planning, and strong governance and compliance frameworks are examples of risk mitigation strategies utilised by financial institutions in Singapore.
Financial institutions consider the development of a data exit strategy and recovery plan as an essential part of their risk management. The process involves identifying crucial data, anticipating exit scenarios, creating a recovery plan, establishing data backup procedures, testing the recovery plan, and maintaining the plan by updating, reviewing, and monitoring it regularly.
“By adhering to these steps, financial institutions can establish a robust data exit strategy and recovery plan that ensures the protection and recovery of vital data in the event of a data breach or system failure,” Mohit ends.
Welcome Address



According to Raymond Goh, Veeam’s Vice President of Sales Engineering for APJ, the banking, financial services and insurance (BFSI) industry has experienced significant changes over time and has had to contend with various challenges such as regulatory compliance, cybersecurity threats, and the need to innovate to stay competitive.
The pandemic has accelerated the industry’s digital transformation, resulting in a greater demand for digital banking services. However, it has also introduced new challenges, such as physical branch disruptions and an increased risk of cyberattacks.
“Despite the challenges, the industry can provide value to its customers by leveraging new technologies and innovative strategies.” Raymond is convinced “To effectively manage risks, BFSI institutions must continue to invest in digital infrastructure, cybersecurity measures, and advanced analytics.”
The FSI journey from 1866 to the present has been remarkable; from brick-and-mortar establishments to the current digitised systems, payment apps, digital wallets, contactless payments, crowdfunding platforms, and many others.
Financial systems can be affected by various disruptions, including funding and liquidity issues, asset price declines, contagion effects and heightened credit risk. The impact of a crisis on the financial sector is largely determined by the sector’s ability to mitigate four risks: market risks, liquidity risks, credit risks, and earnings risks.
“The rise of FinTech and non-bank startups are altering the competitive landscape in financial services, forcing traditional institutions to reconsider their business practices,” Raymond reiterates. “Old school processes and legacy systems are no longer relevant in the digital world, and indeed, can be a hindrance.”
Financial institutions must foster an innovative culture that promotes innovation and utilises technology to streamline existing processes and procedures for optimal efficiency. This cultural shift towards a technology-centric mindset mirrors the broader industry acceptance of digital transformation.
Raymond recognises that today’s consumers are more knowledgeable, sophisticated and informed than ever, and they demand a high degree of customisation, personalisation and convenience from their banking services.
It is predicted that future generations, starting with Generation Z, will have an even greater preference for omnichannel banking and be more technologically savvy than Millennials.
Organisations using obsolete business management software or siloed systems will be unable to compete in this increasingly digital-first environment. Without a solid, futuristic technological foundation, businesses will miss out on crucial business evolution.
“In other words, digital transformation is no longer merely a good idea, but a necessity for survival,” Raymond states.
Financial service organisations that use cutting-edge business technology, particularly cloud applications, have a significant advantage in the digital transformation race as they can innovate more quickly. The agility and scalability of cloud technology are its strengths. Without the constraints of system hardware, cloud technology allows systems to evolve in tandem with the business.
Raymond agrees that banking is being reshaped as regulations tighten and consumers adopt new technologies and demand 24/7 access to their most sensitive data, regardless of device.
As a result of a string of high-profile breaches in recent years, security is one of the leading challenges facing the banking industry and a major concern for bank and credit union customers. Financial institutions must invest in the most advanced technologically driven security measures, such as Authentication, End-to-End Encryption (E2EE) and Address Verification Services (AVS), to protect customers.
Financial services are increasingly confronted with issues related to auditing as the frequency of data breaches and privacy concerns continue to increase. This has led to more stringent regulatory and compliance requirements.
Compliance with financial data protection standards is subject to strict regulations and audits entail some of the most rigorous requirements in modern business, often involving the need to manage highly complex IT infrastructures.
Adhering to and conducting annual disaster recovery (DR) testing regularly can be both expensive and resource-intensive.
From a financial standpoint, any amount of downtime is unacceptable, and banks may face significant penalties for revealing confidential information. The centralisation of remote or branch offices (ROBO) can exhaust an organisation’s resources and bandwidth.
Businesses around the world were heavily impacted by the pandemic, causing considerable disruption and presenting numerous challenges. These challenges demand innovation, the necessity for enhanced employee engagement, rapid market changes and quality improvement.
In this scenario, FinTech and its underpinning technology will be major disruptors. Blockchain will shake things up; digital will become mainstream; customer intelligence will be the most significant predictor of revenue growth and profitability; the public cloud will become the dominant infrastructure model; and regulators will also turn to technology.
The common theme among these is resilience, trust and data agility.
Over the last two years, the Financial Services Industry has placed significant importance on specific issues. Some key initiatives are modernising the IT operating model to adapt to the new normal, simplifying legacy systems to decrease costs, enhancing the technological capabilities to better understand customer requirements, preparing the architecture to facilitate connections with any device or location and prioritising cybersecurity measures.
FSI organisations face distinct challenges due to their strong customer relationships, financial accountability and regulatory oversight. These challenges include effectively managing regulatory and capital costs, improving operations and customer experiences to meet modern standards, safeguarding against cyber threats and ransomware attacks and ensuring data and privacy security.
According to Raymond, Veeam plays a major role in addressing all these areas and can offer unique solutions to the various opportunities and challenges that FSI organisations may encounter. Veeam’s solutions encompass streamlining and automating operations, facilitating cloud migration and modern application development, ensuring data immutability, and effectively managing privacy, risk, and compliance.
“By embracing digital transformation, utilising big data analytics, forming strategic partnerships, having strong compliance and cybersecurity frameworks and investing in talent development programmes, FSI organisations can take advantage of opportunities and address challenges,” Raymond believes.
End-user Insight


Luis C Cruz, Executive Director, Head of Automation, Infrastructure for DBS Big Data, AI and Analytics, DBS Bank Ltd is convinced that by aligning IT initiatives with the company’s overall business objectives, a comprehensive IT strategy can help businesses deliver long-term shareholder value.
“This strategy entails identifying the company’s current and future technology requirements, evaluating potential technology solutions, and developing a plan for implementing those solutions,” Luis explains.
By doing so, the company can ensure that its IT investments support business growth and profitability while reducing costs and boosting efficiency. In addition, a comprehensive IT strategy can help the business gain a competitive advantage by leveraging emerging technologies and optimising the IT infrastructure.
A comprehensive IT strategy can generate long-term shareholder value by enabling organisations to make informed decisions about technology investments and leverage technology to achieve business goals.
A robust IT strategy:
- Aligns with organisation goals and governance
- Adapts to the marketplace and changes how our employees work
- Is focused and consistent
- Honestly identify challenges
- Would be authentic, clear and understood
- Is memorable with a compelling tagline and value proposition
- Has to be actionable towards a goal
- Shows where to play and how to win
Providing foundational infrastructure capabilities that support business objectives and delivering applications and solutions to aid employees in achieving their desired business outcomes are examples of company strategies that are enabled by IT.
“The concept of SMAC or Social, Mobile, Analytics and Cloud stack, is an example of a technology strategy that is widely used throughout the industry and by IT leaders,” Luis reveals. “It all comes down to the customer experience.”
Determining the optimal approach, timing and speed (the how, when and pace) of SMAC implementation is crucial as it forms the basis for leveraging big data in corporations. As IT leaders, Luis anticipates the need to stay up-to-date on SMAC trends and implications relevant to their roles. A perfect example of a company that effectively leverages SMAC-stack infrastructure is an online streaming service provider website.
To generate sustainable shareholder value, businesses must cultivate strategic and functional IT competencies, enhance tools that improve the IT function and promote a customer-centric culture. These efforts will fortify the organisation’s internal processes and enable the development of an efficient decision support system, as well as the delivery of transformational applications.
In addition to benefiting the company, these efforts will also benefit customers by enabling enterprises to provide consistent, high-quality IT services and innovative IT solutions to business units. This will allow organisations to optimise IT efficiency and enhance its impact on enterprise outcomes, ultimately driving long-term investor value.
“IT strategy is influenced by several internal and external factors,” ends Luis. “And understanding these is critical for developing a successful IT strategy that aligns with the organisation’s overall goals and objectives.”
Closing Remarks
Raymond acknowledges the significance of data backup as a critical aspect of maintaining data resilience and availability but emphasises that it is only one aspect of a comprehensive strategy.
Data backup is a single component of ensuring data availability and resilience in hybrid cloud environments. In addition to backup solutions, it’s essential to consider other factors that can affect data resiliency and availability, such as infrastructure and data proximity, Raymond opines.
“Data proximity, the physical location of data in relation to its applications, is a crucial factor to consider when designing hybrid cloud environments. These factors must be taken into account to ensure that hybrid cloud environments are designed optimally to meet the needs of applications and data requirements.”
By adopting solutions such as edge computing or hybrid cloud architectures, organisations can ensure data proximity. These solutions enable data to be stored and processed closer to where it is required, which can improve application performance and ensure data resiliency and availability.
This involves ensuring that there are adequate computing, storage, and networking resources available to support the workload, as well as having a highly available and resilient infrastructure to mitigate the risk of outages.
“Veeam provides data resiliency through secure backup and fast, dependable recovery solutions for the hybrid cloud of the organisation,” Raymond explains. “Our solutions are intended to safeguard critical data and applications, prevent data loss and enable rapid and dependable recovery in the event of a disaster or outage.”
Veeam offers solutions designed to help organisations achieve their business continuity and disaster recovery goals by ensuring data resiliency and availability in their hybrid cloud environments.
Mohit concurs that with the increasing volume of data being produced and stored every day, data protection has become increasingly crucial. Businesses are adopting techniques that allow for data restoration in the event of loss or corruption.
“As organisations continue to produce and store more data, it is becoming increasingly difficult to ensure the security and protection of that data,” Mohit observes.
In this VUCA landscape, technology can provide significant benefits to organisations in protecting their data. Implementing technological solutions helps businesses to secure their data from loss, theft and unauthorised access. It also ensures quick data restoration in emergency or outage situations.
“In essence, the purpose of technology partnerships is to assist businesses in implementing and improving their technical systems,” Mohit believes. “There is no doubt: collaboration in technology promotes growth, eases processes and reduces timelines.”
Two heads are better than one when it comes to implementing established technology systems. But while a technology partnership can effectively deliver technical expertise, it is important not to underestimate the value business acumen offers in return.
“Ultimately, collaborating and pooling resources can prove to be a highly effective approach in propelling both parties towards progress and innovative solutions,” Mohit concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Singapura memiliki peran kuat dalam perkembangan finansial di Asia. Otoritas Keuangan Singapura (Monetary Authority of Singapore/ MAS) memperkirakan sektor ini akan tumbuh 4%-5% pertahun pada 2021-2025 dan rata-rata membuka 3-4 ribu lapangan pekerjaan baru tiap tahun. Untuk itu, Kemenkeu Singapura mengeluarkan Peta Transformasi Industri Finansial (Industry Transformation Map/ ITM) 2025 pada September 2022, agar industri finansial Singapura menjadi yang terdepan.
Namun, di balik angka pertumbuhan yang menarik itu, ancaman keamanan siber di Singapura pun kian meningkat. Berdasarkan laporan Badan Keamanan Siber Singapura (Cyber Security Agency of Singapore/CSA) pada Agustus 2022, ransomware, phising, command and control server, dan kejahatan siber meningkat di Kota Singa ini.
Keamanan siber menjadi hal yang tak bisa ditawar bagi perusahaan perbankan, finansial, dan asuransi. Sebab, aset data yang mereka kelola dan kepercayaan pelanggan merupakan urat nadi perusahaan agar bisa terus hidup dan bertumbuh. Sekali terjadi, insiden keamanan siber akan menodai reputasi perusahaan dan menjauhkan mereka dari sumber utama penggerak bisnis: kepercayaan pelanggan.
Serangan ransomware diperkirakan akan makin meningkat di tahun mendatang. Data Veeam menunjukkan 50% perusahaan menjadi lumpuh akibat serangan ransomware, sebanyak 76% perusahaan setidaknya terkena sekali serangan ransomware, dan 38% perusahaan tidak bisa mengembalikan data yang terkena serangan ransomware.
Untuk itu, membangun benteng yang cerdas untuk memerangi ancaman seperti malware, ransomware, dan kejahatan siber lain menjadi sangat krusial bagi berbagai bisnis. Sebuah solusi keamanan data terpusat bisa menjadi jawaban untuk memastikan keamanan siber terpantau secara keseluruhan.
Perusahaan bisa mencegah potensi serangan siber seperti ransomware dengan melakukan pencadangan data secara teratur. Untuk menambah lapisan keamanan, salinan ini bisa dilengkapi dengan replikasi dan foto. Proses klasifikasi data yang harus disimpan sesuai dengan prioritasnya juga diperlukan sebagai langkah mitigasi ancaman siber. Langkah mitigasi selanjutnya adalah memindahkan salinan data ke lokasi penyimpanan yang lebih aman untuk mencegah dokumen itu terenkripsi oleh malware. Dengan demikian, data tetap tersedia meski sistem kehilangan pasokan listrik, serangan siber, atau insiden lain.
Solusi keamanan siber terpusat diperlukan untuk memberi kemudahan bagi pengawas untuk melacak dan memverifikasi apa dan bagaimana perlindungan data di berbagai lini. Solusi yang bisa dapat memberikan peringatan jika terjadi indikasi penyusupan ransomware atau serangan lain ke sistem juga amat dibutuhkan. Pengawasan terpusat pun menambah keyakinan bahwa data telah terlindung secara maksimal, meringankan pekerjaan dengan bantuan automasi, kecerdasan buatan, kemampuan mengolah ulang data untuk mendapat insight baru, dan mengurangi biaya operasional.
OpenGov Breakfast Insight akan berbagi wawasan dan solusi praktis mengenai automasi dan arsitektur aplikasi. Acara yang diselenggarakan pada 22 Maret 2023 di Voco Orchard Singapura akan meningkatkan kemampuan proteksi data Industri Perbankan, Jasa Keuangan dan Asuransi (BFSI) Singapura.
Pembuka



Entitas bisnis privat perlu memiliki strategi pemulihan terhadap serangan siber, kegagalan sistem, atau bencana alam. Perusahaan perlu menyiapkan beberapa hal terkait rencana pemulihan, mulai dari identifikasi data yang perlu dilindungi, prosedur pencadangan data, rencana memulihkan data penting, serta pengujian, pembaruan dan audit atas rencana pemulihan data.
Pencadangan dan pemulihan data perlu dilakukan karena kelalaian menjaga data pelanggan bisa berimbas pada mahalnya biaya pemulihan, denda, dan mencoreng reputasi perusahaan ketika terjadi bencana.
Karena itu, sangat disarankan bagi perusahaan untuk memiliki cadangan data yang komprehensif dan rencana pemulihan bencana untuk meminimalkan risiko kehilangan data.
“Rencana pemulihan harus menjadi salah satu pertimbangan utama, sebab ini yang akan menjadi penyelamat ketika terjadi serangan,” jelas Mohit Sagar, CEO dan Pemimpin Redaksi, OpenGov Asia.
Selain itu, mereka pun mesti taat pada aturan yang ditetapkan pemerintah untuk menjaga berbagai kemungkinan kegagalan sistem layanan finansial. Dari sisi pemerintah, mereka menetapkan regulasi bagi lembaga keuangan, perbankan dan asuransi.
Aturan Pedoman MAS mensyaratkan lembaga keuangan untuk memiliki kebijakan dan prosedur manajemen data yang kuat.
Lembaga keuangan diharuskan melakukan klasifikasi, penanganan, dan perlindungan dan keamanan data yang tepat. Selain itu, Personal Data Protection Commission (PDPC) mensyaratkan organisasi untuk patuh dengan aturan data pribadi (Personal Data Protection Act/ PDPA).
Sambutan



Perubahan masif layanan digital dalam lima hingga sepuluh tahun terakhir telah mengubah proses bisnis dan ekspektasi pada industri finansial. Perusahaan diharapkan bisa memiliki strategi untuk menangani berbagai tantangan digitalisasi, mulai dari privasi, keamanan data, hingga serangan siber harus ditangani.
Raymond Goh, VP Sales Engineering, Veeam APJ menyebutkan empat tantangan utama industri finansial; risiko pasar, likuiditas, kredit, dan pendapatan. Untuk menghadapi tantangan pasar, perusahaan finansial perlu terus melakukan inovasi. Salah satunya adalah lewat automasi untuk efisiensi proses dan tetap memenangkan pasar. Berinvestasi pada automasi membuat perusahaan bisa mengubah pekerjaan, proses, dan prosedur manual.
“Di era digital, tidak ada ruang untuk proses dan sistem manual. Oleh karena itu, penting bagi lembaga keuangan untuk mempromosikan budaya inovasi, di mana teknologi dimanfaatkan untuk efisiensi proses dan prosedur,” tandas Goh.
Perusahaan finansial mesti makin gesit untuk menghadapi tantangan persaingan dari industri fintech yang menjadi pesaing kredit layanan perbankan tradisional. Apalagi konsumen saat ini makin cerdas dan mengharapkan layanan perbankan yang lebih praktis dan terpersonalisasi.
“Selain itu, pasca COVID-19, sejumlah perubahan pada sistem bisnis juga terjadi,” lanjut Goh.
Bertambahnya kecepatan perubahan bisnis menjadi salah satu bagian dari tantangan itu. Bisnis berubah untuk mengikuti ekspektasi pasar yang makin banyak tuntutan. Perusahaan pun diminta untuk terus melakukan inovasi sebagai jurus adaptasi terhadap pasar. Automasi bisa membantu mempercepat proses dengan menggantikan proses yang diolah manusia untuk mempercepat proses dan menghindari human error.
Seiring dengan digitalisasi yang terus menjadi arus utama, inovasi seperti fintech dan blockchain tidak dapat terhindari sebagai persaingan yang harus dihadapi. Untuk memenangkan persaingan, perusahaan finansial dan perbankan mesti memanfaatkan analisis data untuk mengenali pelanggan lebih dalam. Sebab, bisnis yang mampu menebak dengan tepat keinginan pelanggan akan menghasilkan solusi yang meningkatkan pendapatan, mendongkrak pertumbuhan, dan menimbun keuntungan.
Sementara untuk menjaga risiko pendapatan, keamanan siber dan modernisasi jaringan menjadi tantangan berikutnya. Perusahaan finansial merupakan sasaran empuk bagi para penjahat siber. Tidak heran jika tingkat serangan siber makin meningkat dari tahun ke tahun dan industri pun perlu makin waspada dan mempertebal tembok keamanan mereka.
Komputerisasi di perbankan sudah dimulai cukup lama, sehingga tak heran jika sejumlah pemain perbankan terkemuka masih menggunakan aplikasi dan sistem lawas. Namun, sistem kuno ini tidak bisa akan mampu mengimbangi kecepatan dunia digital, sehingga, modernisasi sistem-sistem ini mutlak diperlukan untuk mengimbangi permintaan konsumen dan memajukan bisnis.
Untuk itu, Goh menyampaikan bahwa saat ini organisasi jasa keuangan banyak yang mengalihkan sebagian sistem mereka ke cloud untuk mempercepat proses bisnis. Tentu, keandalan teknologi cloud adalah kelincahan dan fleksibilitas dalam memperbesar atau memperkecil kapasitas sistem yang dibutuhkan (skalabilitas).
Berdasarkan riset yang dilakukan Veeam, sebanyak 50% beban kerja akan dilakukan di komputasi awan (cloud) pada 2023. Sementara 65% perusahaan akan menggunakan layanan komputasi awan untuk strategi perlindungan data mereka.
“Tuntutan lain bagi industri perbankan adalah mesti tersedianya sistem tanpa jeda selama 24 jam, 7 hari seminggu. Tidak ada toleransi untuk downtime dan kebocoran data rahasia bisa menyebabkan sanksi denda yang bisa menghancurkan bisnis perbankan.”
Saat ini, perusahaan tak lagi punya cukup waktu untuk pemulihan data. Jika dulu downtime bisa dilakukan dalam hitungan dua hingga tiga hari, saat ini toleransi terhadap downtime kian menipis. Kegagalan sistem selama 30 menit atau dalam hitungan jam saja akan sangat berpengaruh pada kepuasan pelanggan.
Bank perlu mempersiapkan sistem mitigasi dan cadangan sebaik mungkin untuk data-data paling sensitif mereka. Selain itu, kemampuan sistem untuk mampu memulihkan seluruh data tepat waktu juga menjadi tantangan. Goh menyebut 9 dari 10 pelanggan tidak bisa lolos dari ketentuan ini.
Insight Pengguna


Perusahaan perlu memastikan investasi TI yang dilakukan bisa mendukung bisnis mendulang pendapatan dan profitabilitas bisnis, mengurangi biaya, dan meningkatkan efisiensi. Selain itu, strategi TI dengan memanfaatkan teknologi baru juga membantu bisnis memiliki keunggulan kompetitif.
Untuk itu, Luis C Cruz, Direktur Eksekutif, Kepala Automasi, Infrastrutktur untuk Big Data, AI, dan Analisa DBS, percaya bahwa kemampuan untuk terus belajar menjadi fondasi untuk strategi TI yang komprehensif dan kompetitif.
Pencadangan data saat ini tidak semata digunakan untuk menyiapkan backup semata, tapi sekaligus sebagai bagian dari perlindungan data. Ia menyampaikan konsep “SMAC” (Social, Mobile, Analitic, dan Cloud) sebagai basis penggunaan big data di perusahaan besar.
“Konsep “SMAC” digunakan secara luas di seluruh industri dan oleh para CIO/pimpinan TI untuk melakukan transformasi proses bisnis dan meningkatkan pengalaman pelanggan,” jelas Luis.
SMAC merupakan model baru bagi tim TI perusahaan agar organisasi lebih terkoneksi, kolaboratif, dan produktif. SMAC bisa memengaruhi seluruh “ekosistem” perbankan mulai dari pelanggan, karyawan, dan mitra.
“Harapan saya adalah kita, sebagai pemimpin TI, tetap mengikuti tren dan implikasi dalam SMAC karena sangat berkaitan dengan peran kita. Situs penyedia layanan streaming online mungkin adalah contoh terbaik dari perusahaan yang memanfaatkan infrastruktur tumpukan SMAC dengan sebaik-baiknya.”
Luis mengutip bahwa untuk mendorong nilai pemegang saham jangka panjang, bisnis harus mengembangkan kompetensi TI yang strategis dan fungsional, meningkatkan alat TI yang meningkatkan fungsi TI, dan menumbuhkan budaya yang berpusat pada peningkatan kepuasan pelanggan. Proses ini akan memperkuat proses internal organisasi, yang dapat mengarah pada pengembangan sistem pendukung keputusan yang efisien dan penyampaian aplikasi transformasional.
Hal ini juga akan menguntungkan pelanggan, karena perusahaan akan dapat memberikan layanan TI yang konsisten dan berkualitas serta solusi TI yang inovatif untuk unit bisnis. Dengan ini, organisasi akan mengoptimalkan efisiensi TI dan meningkatkan dampak TI pada hasil perusahaan, sehingga mendorong nilai pemegang saham jangka panjang.
Penutup
Raymond Goh: Menjawab tantangan digitalisasi dengan automasi, cloud, pengelolaan data, dan kekekalan data untuk memperkuat ketahanan siber
Organisasi FSI memiliki kombinasi tantangan unik karena bisnis ini berkaitan erat dengan kepercayaan pelanggan, beban tanggung jawab yang besar lantaran mengurus keuangan, hingga peraturan yang ketat. Ancaman serangan siber dan ransomware juga terus menghantui. Untuk itu, perusahaan perlu melakukan investasi untuk mengamankan sistem, menjaga operasional, sekaligus berinovasi agar layanan bisa terus menyesuaikan dengan ekspektasi pelanggan yang makin digital.
Menurut Goh, seluruh tuntutan itu bisa diringankan dengan solusi Veeam. Solusi automasi bisa digunakan untuk merampingkan dan mengotomatisasi operasional. Sehingga, sumber daya manusia bisa dialihkan untuk berkonsentrasi pada inovasi dan hal lain yang berkontribusi langsung pada pertumbuhan perusahaan ketimbang hanya memelihara sistem lama.
“Dengan beralih ke perlindungan data modern, Anda menghilangkan beban besar dari manajemen lama sekaligus memberikan perlindungan dan pengawasan yang lebih besar terhadap data sensitif Anda,” terang Goh.
Selain itu, automasi juga menghemat anggaran perusahaan. Pemulihan data otomatis, pelanggan Veeam berhasil mengurangi biaya pencadangan dan pemulihan 55% lebih efisien dan mengurangi biaya pencadangan dan perlindungan data hingga 50%.
Veeam membantu perusahaan untuk melakukan migrasi ke cloud dan pengembang aplikasi modern. Perpindahan ini membutuhkan keahlian untuk mengubah data yang terjebak disistem lama ke komputasi awan (cloud) yang fleksibel. Dengan data yang lebih fleksibel, pelanggan bisa mengolah ulang data mereka dan membuahkan insight yang berguna bagi perusahaan. Pelanggan Veeam yang menggunakan kembali data mereka untuk mendorong pengembangan dan pengujian aplikasi modern berhasil meningkatkan produktivitas hingga 11%.
Perlindungan data dari serangan malware dan ransomware menjadi keharusan. Untuk itu, Veeam menawarkan solusi kekekalan data (data immutability). Konsep ini memberi garansi dan mengatasi celah antara jaringan produksi dan pencadangan data. Jadi, meski terjadi serangan, data cadangan tertap 100% terlindungi. Sebanyak 95% pelanggan Veeam yang menggunakan cadangan permanen tidak terpengaruh atau hanya sedikit terdampak dari ransomware.
Dengan banyaknya aturan yang mengikat institusi finansial, Veeam bisa membantu mengelola privasi, risiko, dan kepatuhan data. Sistem perlindungan data modern memastikan penyimpanan dan perlindungan data bisa mengikuti aturan-aturan yang bisa berubah sewaktu-waktu. Pelanggan yang menggunakan Veeam untuk regulasi dan privasi secara aktif berhasil mengurangi 45% kegagalan audit dan kepatuhan.
Mohit menambahkan bahwa organisasi dapat memperoleh manfaat besar dari penggunaan solusi teknologi untuk melindungi data mereka. Dengan menerapkan solusi ini, bisnis dapat memastikan bahwa data mereka aman dari kehilangan, pencurian, dan akses tidak sah serta dapat dipulihkan dengan cepat jika terjadi keadaan darurat atau gangguan.
“Intinya, tujuan kemitraan teknologi adalah untuk membantu bisnis dalam menerapkan dan meningkatkan sistem teknis mereka,” tegas Mohit.
Dia percaya bahwa kolaborasi teknologi bisa mendorong ekspansi bisnis perusahaan. Menurutnya, dua kepala lebih baik daripada satu ketika menerapkan sistem teknologi. Hal ini serupa dengan kemitraan teknologi yang dapat memberikan asistensi dan pengetahuan teknis apa pun secara efisien.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Thailand has made significant progress in enhancing its governance systems for data protection in recent years. However, to guarantee that citizens are empowered to exercise their rights and simultaneously hold corporations accountable for their data practices, it is essential to increase public knowledge and education on data protection.
Process optimisation for data governance and management is a key component of Thailand’s digital transformation. In recent years, the nation has made enormous strides in the digital sphere, and the continued success of this transformation will rely on efficient data governance and management systems.
Effective data management is only one aspect of data governance. It also relies heavily on the development of terms and guidelines for data rights, obligations and principles. These are the basic tenets of sound governance that inspire confidence in the generation, collection, processing and use of data by corporations and governments.
To unlock the full potential of data, it is crucial to establish the necessary infrastructure, regulations and standards through collaboration between public sector organisations, non-governmental actors and other relevant stakeholders.
Institutions and stakeholders within the data governance ecosystem must possess the skills, resources and incentives to carry out their duties effectively and to maximise the value of their data.
Robust information and data governance is crucial to ensure that data is accurate, reliable, secure and accessible when needed. This is especially important in low- and middle-income countries where data literacy levels may be low, and the quality of data may be poor.
In any context, however, public trust is crucial in using any derived insights to spur civic change. Confidence can be gained by developing and implementing clear policies and regulations around data collection, storage, sharing and usage. Agencies must also respect privacy, provide transparency and ensure accountability around these processes.
The OpenGov Breakfast Insight on 16 March 2023 held at Amari Watergate Bangkok delivered current information on the right technologies, data governance policies, regulations and frameworks to drive the quality, accuracy and availability of insights for Thailand’s public sector organisations.
Opening Remarks



Kicking off the session, Mohit Sagar, CEO & Editor-in-Chief, OpenGov Asia acknowledges that with the proper data governance, an organisation can rest assured that its data is being managed effectively and used in accordance with all regulations and standards.
“The effective management of data ensures its consistency and reliability and prevents misuse. This is becoming increasingly crucial for businesses, as they are subject to new data privacy regulations and rely heavily on data analytics to enhance efficiency and make informed strategic decisions,” he believes.
Good data governance enables improved access to information and better decision-making by both government officials and the public. This is achieved through the transparent, responsible and secure management of data.
“If government agencies are going to work together effectively, they need data governance policies that will make sure their information is shared in a way that is secure, appropriate and legal,” Mohit asserts.
Data governance is the systematic process of managing the availability, usability, integrity and security of data in enterprise systems, based on internal data standards and usage policies in line with government regulations. The process ensures that data is reliable, consistent and not abused.
“As organisations content with new data privacy regulations and rely on data analytics to optimise operations and drive business decisions, robust data strategy with sound governance is crucial,” Mohit says. “Using a collaborative process, this assists in dismantling data silos and harmonising data from various systems.”
Effective oversight is vital to ensuring the proper use of data and preventing the potential misuse of sensitive information, like customer data. Effective data governance enhances business decision-making by supplying better information, resulting in competitive advantages, increased revenue, and increased profits.
Self-service data solutions reduce reliance on IT staff and promote quicker and more informed decision-making across the entire organisation by allowing non-technical users to freely access, modify and analyse data.
To implement data governance, organisations must establish rules, processes and standards for managing data. This includes defining roles and responsibilities, ensuring data quality and addressing privacy and security concerns.
Data governance and cybersecurity are closely related as cybersecurity plays a crucial role in protecting sensitive information from unauthorised access. It helps to maintain data privacy and confidentiality while reducing the risk of cyberattacks or data breaches that could potentially compromise the functioning of government systems and erode the trust of citizens. Therefore, cybersecurity is an essential component of data governance.
In the end, implementing data governance can have several benefits, including improving the speed, agility and precision of decision-making while maintaining privacy and security. Moreover, it can also assist organisations in maximising the value of their data assets.
Welcome Address


Pawasut Seewirot, Software Country Leader at IBM Thailand, delivered a welcome address to the attendees where she acknowledged their crucial role in promoting an understanding of data governance concepts, such as privacy and security.
The field of intelligent automation mainly comprises advanced technologies, including artificial intelligence, business process management, and robotic process automation. It leverages cutting-edge tools such as analytics, machine learning, deep learning, and natural language processing to accomplish its objectives.
“Combining these technologies has enabled intelligent automation to produce some of the most cutting-edge solutions utilised by contemporary business leaders,” Pawasut observes.
Digital transformation, however, can often come at a high cost. The proliferation of vendors can create a bottleneck for IT staff, with disparate vendors, tools, and processes required to obtain support for expanding data centres.
IBM Technology helps businesses and CIOs solve these issues. As organisations rapidly undergo digital transformation and change, utilising global technology lifecycle support and services for IBM Systems products will benefit the organisations.
“Our organisation provides global technology lifecycle support and services. As a world-class provider, we are committed to providing an outstanding client experience, as evidenced by our Net Promoter Scores,” Pawasut claims.
As organisations continue to rely more heavily on digital technology to gain a competitive edge, safety becomes a growing concern. A strong cybersecurity strategy includes multiple layers of defence to combat cybercrime, such as cyber-attacks that attempt to access, change, or destroy data, extort money from users or the organisation, or disrupt normal business operations.
Security system complexity can increase costs due to contrasting technologies and a lack of in-house expertise. However, organisations can effectively combat cyber threats and reduce the lifecycle and impact of breaches by implementing a comprehensive cybersecurity strategy that adheres to best practices and is automated using advanced analytics, artificial intelligence, and machine learning.
Pawasut stresses the importance of a data platform which is a set of technologies that function collectively to meet an organisation’s end-to-end data needs. It allows organisations to acquire, store, prepare, deliver and govern their data, as well as provide a security layer for users and applications.
“A data platform is essential for maximising the value of your data,” says Pawasut. “A modern data platform attempts to solve numerous problems. It is a collection of interoperable, scalable, and replaceable technologies that work together to meet the complete data requirements of an enterprise while ensuring its security.”
Technology Insight


While the world has been disrupted by various events, Kieran Hagan, Data, AI, and Automation Principle Technical Sales Manager (ASEANZK), IBM recognises that digital transformation remains a significant driving force for change.
“The pandemic has hastened the adoption of digital solutions to keep up with the ever-changing requirements of their customers,” Kieran observes.
As technology advances and consumers rely more heavily on digital channels, the trend toward digital transformation is expected to continue, creating a greater need for easily accessible and understandable data. As a result, there is a greater demand for consumable data – information that is easily accessible and understandable – from which people can make informed decisions.
To improve service delivery, Kieran emphasises the importance of engaging citizens and providing them with personalised, integrated experiences across government services. This is essential for any government seeking to improve citizens’ trust, satisfaction, and overall experience by making it easier for them to access and benefit from the services they require.
Sonoma County is an excellent example of a government that prioritised strengthening its safety net and reformed its approach to meeting the needs of its most vulnerable individuals and families.
Kieran emphasised the need to digitally modernise workflows and operations, maintain regulatory compliance and foster innovation while reducing costs. DataOps is emerging as the optimal strategy for managing data to enhance the agility and effectiveness of organisations.
DataOps, like its predecessor DevOps, emphasises software development collaboration, automation, and continuous delivery. It also aims to eliminate the silos between teams involved in data management, such as data engineers, data scientists, and business analysts.
According to Kieran, the advent of DataOps represents a significant shift in the way that organisations manage and leverage data and by adopting a more agile and collaborative approach to data management, organisations can make better use of their data, respond more quickly to changing business needs, and gain a competitive advantage in their respective markets.
Kieran cited the efforts of the Government of Odisha (India), which worked to combat welfare fraud and ensure that the most vulnerable members of the population received the necessary assistance.
The government of Odisha (India) used IBM Analytics tools to combat welfare fraud, identifying approximately 500,000 false beneficiaries. The government was able to ensure that resources were delivered equitably and tax rupees were used more efficiently by leveraging available insights on citizens. This effort aided the government in providing appropriate assistance to those in need while also eradicating fraudulent activities that siphoned off valuable resources.
Securing and protecting people, the nation, and infrastructure while mitigating data collaboration risks across hybrid cloud environments is of the utmost importance in the current digital era. The proliferation of cloud computing and hybrid cloud environments, as well as the accompanying cyber security challenges, now necessitate that governments strike a balance between securing their data and infrastructure and ensuring that essential information is accessible to those who require it.
To mitigate risks associated with data collaboration in hybrid cloud environments, businesses should implement a comprehensive security strategy that combines technologies, processes, and policies. Hence, artificial intelligence (AI) is a valuable tool.
“Artificial intelligence is being incorporated into daily life, business, government, and other fields. IBM assists individuals and businesses in securely adopting AI,” Kieran shares. “Only by incorporating ethical standards into AI applications and processes can build a trustworthy system.”
A holistic approach with strong security measures, transparency, accountability, and secure technology design is highly recommended, according to Kieran. Thus, the effectiveness of the strategy is enhanced by a continuous drive for information and education.
Fireside Chat


Dr Supot Tiarawut, President & CEO, Digital Government Development Agency, Thailand, is of the opinion that organisations’ failure to implement effective data management and governance strategies hinders their ability to fully leverage their enterprise data.
Such strategies are necessary for laying a strong data foundation. Strong fundamental data can offer critical insights for a wide range of applications, including understanding public behaviour and making critical decisions.
Some countries have given particular attention to the strategic value of understanding and interpreting data as well as the unrealised economic potential of underutilised data.
“Establishing a data foundation has specific challenges, but if organisations fully understand these challenges, they will be able to overcome them and benefit from efficient master data management,” Dr Supot believes.
Data governance is the practice of understanding where the data is, how it is used, and whether it is adequately protected. Good data governance ensures the integrity and consistency of data.
Effective data governance creates a governed data foundation for insights, secures data privacy, and simplifies data management by establishing policies and regulatory compliance. Public sector staff must have the knowledge and skills to effectively and safely manage and use data.
“The lack of data literacy in government agencies emphasises the importance of effective data governance policies,” Dr Supot furthers.
Inconsistencies in various systems across an organisation may remain unresolved in the absence of effective data governance. Using data governance best practices allows organisations to maximise their data while avoiding operational or analytic issues caused by data disparity.
“We should have a good definition of what data governance is,” says Dr Supot. “It encourages all government agencies to utilise their data and use it efficiently as well as integrate their data to make good decisions.”
In Thailand, there is a growing understanding that instead of solely mandating government agencies to implement data policies strictly according to established guidelines, it may be more effective to first align these policies with the agencies’ goals or purposes, and then provide them with specific steps that can help them get started.
The government in Thailand is planning to ask each agency to identify the type of data they are utilising, and once they have this information, they will inquire about the data’s processing and how it will be protected. This approach will enable the government to better understand the data management practices of each agency and identify any potential issues that need to be addressed.
“As a result, we can ensure sufficient data security so that no information leaks occur,” Dr Supot is confident.
Standardising data definitions across an enterprise or agency is a common objective of data governance, but there may be other objectives and goals that depend on the specific focus of a data governance program.
To establish an effective data governance framework, it is important to develop principles that are appropriate for the specific environment in which the organisation operates. These principles should guide the overall approach to data governance and help ensure that data is managed in a way that is consistent, reliable, and aligned with the goals and objectives.
Collaboration between the government and the private sector is essential for effective data governance. Among the key principles of data governance are public integrity, transparency, accountability, auditability, and standardisation. By adhering to these principles, data is managed in a way that is consistent, trustworthy and compliant with relevant regulations and standards.
Closing Remarks
Pawasut stressed the growing need for skilled professionals in data management as businesses increasingly look to data for competitive advantage. She believes that by addressing the data management skills gap, organisations can help individuals advance in their careers and organisations realise the full potential of their data.
Changing an organisation’s innovation culture is a challenging and time-consuming endeavour that requires sustained efforts over time. Pawasut invited interested delegates to get in touch with them to arrange an innovation workshop.
These workshops are valuable because they help foster originality, teamwork, knowledge acquisition and participant involvement. They provide a platform to generate new ideas, solve complex problems and learn from the experiences, insights and perspectives of others.
Innovation workshops can also boost morale and commitment to the company’s success and can be a useful tool for organisations that want to foster innovation and maintain competitiveness in a dynamic market.
Mohit is convinced that the success of developments in data governance depends on the effectiveness of collaboration.
“Integral to ensuring that an organisation’s information management procedures and policies are effective, streamlined, and company-wide adopted is bringing together diverse stakeholders, each with their own distinct perspectives and skills.”
There is an opportunity for corporate IT departments to build trust around enterprise data stores, allowing employees to work with IT to improve data quality, governance and security. This transition may be challenging for some organisations as it may require changes in culture, processes and technology, but it is essential for organisations that want to maximise the value of their data assets.
“Ultimately, a digital partnership’s objective is to generate a competitive advantage. Businesses can leverage one another’s strengths to better serve customers and expand,” Mohit concludes.