

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
With the onset of the pandemic, there is no doubt that agencies and companies feel a more pressing need to ramp up cybersecurity infrastructure and network security models. Cyberattacks are getting more sophisticated, driven by accelerated digital transformation – moving to cloud, rolling out new applications and e-services at lightning speed to address the needs of citizens and customers.
Combined with the surge in the use of end-point devices for remote working and the entry of new emerging technologies like IoT, cybercriminals are having a field day; creating havoc in customer records, causing huge financial and intellectual property losses in public and private sector organisations alike.
The widespread move towards remote work and the corresponding need for better remote workforce security has also spurred investment in ZeroTrust security. The ability to authenticate and monitor all traffic, regardless of its position inside or outside of an organisation’s network, promises to reduce or eliminate many security risks.
Moreover, organisations are facing challenges with cloud transformation. As cloud adoption accelerates, organisations need to recalibrate their original strategy based on the new business requirements. When large chunks of data have not yet moved to the cloud from isolated data centres, it can become harder to secure using a single security tool.
Identity and Access Management (IAM) complexities prove equally challenging for Zero Trust adoption. Teams are struggling to shift to a zero-trust approach due to the complexities of user access needs in their organisation. Beyond a doubt, security modernisation depends on the progress of user identity consolidation and cloud transformation, both complex and long-term projects.
While accelerating the delivery and quality of services, organisations need modern data protection strategies to achieve these objectives. The cybersecurity mindset has to change from trying to prevent attacks to one that assumes that an attack has already occurred – it is not a question of ‘if’ but ‘when’. However, building a robust security infrastructure has proven to be complicated, presenting organisations with a mixed bag of successes and disappointments.
In light of these critical security issues, Day 2 of the Singapore OpenGov Leadership Forum focused on data protection and resilience. It explored the different technologies, strategies and challenges involved in tackling the unavoidable issue of security.
Data protection in a post-COVID-19 world


Mohit Sagar, Group Managing Director and Editor-in-Chief, OpenGov Asia, kicked off the session with his opening address.
“When it comes to protection, most people used to think that it was about land, air and sea. But the front has shifted,” Mohit posits. “That being the case, we do have the capability of preventing and pre-empting instead of reacting in the virtual realm as well.”
There is a massive paradigm shift in the world and data is rapidly gaining prominence. In this digital landscape, Mohit has an acronym that helps highlight the pillars of transformation and success – ACDC2. ‘A’ stands for augmented intelligence, ‘C ‘stands for convergence (of the physical and virtual), ‘D’ is data, and the last ‘C’ stands for cyber resilience. The final C stands for critical events.
The pandemic drove the world to do something about security – and indeed the way we do things in general. With people going online and companies implementing remote working, cybersecurity, in general, and ransomware, in particular, is an urgent and pressing issue. “In fact, it is a national security issue for countries around the world and it will only get worse,” Mohit is convinced.
Key public sector priorities demonstrate the change well. Agencies are focused on rolling out innovative and secured digital services quickly, fostering inter-agency collaboration, and enabling a hybrid workforce.
With more organisations and agencies stopping attacks before hackers encrypt data, the percentage of successful encryptions fell from 73% to 54% in the past year. This drop indicates anti-ransomware technology adoption is paying off.
While many things have shifted because of the drastic changes wrought by the pandemic, there are foundational technologies that will be vital to surviving and thriving in the new normal. One such development is cloud. “Cloud is here to stay – it is inevitable,” Mohit contends.
Against this backdrop, it behoves us, Mohit firmly believes, to think about where our focus should lie. “Critical events may well drive what we do. So, are we focusing enough on the tech that will keep us protected in a world that is constantly and rapidly moving and changing?”
In conclusion, Mohit emphasises that more data will be created and security is of utmost priority. Organisations cannot isolate themselves forever or stall in the name of caution – they have to take the initiative and be bold. They have to take the challenges head-on.
Rethinking cybersecurity and harnessing it as a business opportunity


Gaurav Keerthi, Deputy Chief Executive (Development), Cyber Security Agency of Singapore (CSA) spoke next on ways to rethink the approach towards cybersecurity.
Many people view cybersecurity pessimistically. Cybersecurity may have an air of doom and gloom but there are two sides to the coin – an upside and a downside. In fact, Gaurav claims, doom and gloom is an upside! “Cybersecurity is a technical necessity, a business enabler and strategic opportunity.”.
COVID-19 is a nightmare and changed how we work, live and play. It has been as impactful on our lives as tech has. It has accelerated tech transformation across the board. However, because the pandemic was so unexpected, there is a technical or cybersecurity lag.
This lack is akin to “sleep deficit” where the lethargy builds up over time. Because workflows were abruptly and suddenly digitised, organisations did not have the chance to think through the risk, took what was available at the time and ran with it. With these forced risks, there is an accumulated technical debt as well as cybersecurity hazards that were adopted along the way with COVID-19 – and people have not had time to reassess everything.
This transition to digital has created an opportunity for people to rethink work. There are benefits to these transitions – it has created new models like remote working, allowing people to spend more time with family and balance work-life better.
Unfortunately, it also worked to the advantage of the “bad guys”, Gaurav contends. They are looking at all the poorly secured systems that organisations have adopted. The attack surface is wider and cybersecurity incidences have increased. In this VUCA world, cybersecurity is a technical necessity – it is something that organisations must build to protect confidential information and reduce the chances of a successful cyberattack.
CSA was formed in 2015 and the Cybersecurity Act came into effect in 2018 right after the SingHealth breach. The Act helps critical infrastructure providers that provide essential services in Singapore by requiring owners to fulfil certain cybersecurity obligations. It has, with no question, raised the baseline. However, unseen challenges have cropped up and come to light.
The first is that the definition of essential service was established in a pre-COVID-19 world. For example, buying groceries online before the pandemic would not have been considered an essential service. However, in the middle of a lockdown, that is an essential service.
The second challenge comes when companies think about cybersecurity in a compliance mindset – cybersecurity is viewed as a cost to meet a list of requirements without doing anything more.
Another issue is that the Act is limited only to CIIs, whereas, SMEs which are the vast majority of the nation’s economic landscape are still vulnerable targets. There is an upward trend in the number of ransomware cases. The impact is best understood relative to size. A big company can withstand a cybersecurity incident, but in an SME, that could be an event that is significant enough to cause a company to go down.
“Ransomware is a real pandemic in the digital world,” Gaurav claims. It was not a corporate cybersecurity issue – more of a personal, individual behavioural problem. Now there is an entire economic ecosystem around ransomware.
“Every time you squash the problem, it emerges elsewhere. The only way to win is to change the game. Be proactive about it. Identify where the gaps are,” Gaurav contends. “Ideally, If organisations can build systems to be secure by design from the get-go, they would not have to deal with gaps.”
Cybersecurity is a business enabler. Companies are hesitant to put data on the cloud until they know they can secure it well. While they want to adopt the latest in the technological space but they are not sure if they can protect it well.
Business leaders are talking about cybersecurity – about how cybersecurity is affecting stock prices. When business leaders realise that it is something that can affect profits, it no longer becomes a cost but is about unlocking the future of digitisation of the company by investing more in cybersecurity.
Companies are starting to rethink cybersecurity strategies. “This mindset shift is fast and furious,” he observes. It is pertinent to remember that good cybersecurity is not cheap and cheap cybersecurity is not good. Although for many SMEs, cheap cybersecurity is better than no cybersecurity.
He observes that executives want their CISOs to be transformational leaders, leading cross-functional teams. The digital transformation sees the CISO as part of the solution and not part of the problem. If the security team is understood as part of an organisation’s solutions, that is a massive shift.
To drive fast, you need a fast engine but how fast drivers are willing to go are determined by the safety system around the driver. “Brakes have a more significant impact on the outcome of the road trip than engines.” Gaurav opines.
When organisations embark on digital transformation, it is vital to ensure that cybersecurity is a consideration from the start. The security department is not simply complying with regulatory requirements but enabling the CTO to transform faster. If the CTO is making decisions without consulting the CISOs, the future would be worrying.
Gaurav posits cybersecurity as a strategic and business opportunity on the final point of his keynote address. For him, “trust and privacy is a selling point”. When a brand as big as Apple positions ‘trust’ as the big selling point, instead of storage size or pixels in the camera, to their customers, that is a huge shift.
He further emphasised this point by giving the example of Ford and Volvo. Ford’s mantra was to make an affordable car for everyone. But the ah-ha moment came to the industry in the 1950s when Volvo made the car safe, fitting seat belts, shatterproof glass, child seats etc. They shifted the conversation and focus away from money to safety.
“Tech is viable because people feel safe,” he asserts. “That is a business opportunity. If industries can transform themselves to be safe and secure, they can become key enablers of the digital economy.”
If one considers the Singapore brand proposition, people come to Singapore because of trust, safety, reliability and competence. “Trust is our brand value,” Gaurav contends. Trust is what Singapore can sell internationally. Singapore has the technical competence and the right level of paranoia to build Volvos – to think about the safety of the technology.
In conclusion, he says, cybersecurity is the next frontier. “How can organisations make it safe and secure and employ technologies so that it does not bring down the house?”
Gaurav encourages delegates to consider the unique brand that Singapore has and to see that cybersecurity is not a mere necessity but an opportunity to engage.
Being Ransomware resilient from a recovery perspective


Daniel Goh, Systems Engineering Leader – Singapore, Veritas shared how organisations can manage the ever-evolving threat of Ransomware.
“Ransomware has been on the rise for various reasons,” Daniel contends. “RaaS is increasing along with an increase in IT complexity. At the same time, bad actors are getting savvier and more sophisticated.”
Daniel observes that there is a greater number of attacks on vulnerable industries and critical infrastructure. Moreover, the increase in work-from-home opportunities opened vulnerabilities.
Offering delegates practical advice, Daniel shared the 5 phases of Ransomware Encryption:
- Phase 1 – Infection: Exploit kit, phishing attack, readily available in the dark web.
- Phase 2 – Delivery: Alter registry keys, avoid detection, self-restart. encrypt files at a later date.
- Phase 3 – Backup Attack: Ensure effectiveness, remove all shadow copies. search for backup files and remove them
- Phase 4 – Encryption: Encrypts data.
- Phase 5 – User notification/settlement and remediation: Notifies users of infection and demands for payment. After the ransom is paid, it attempts to remove evidence of its presence.
“Ransomware is a legitimate illegitimate business,” Daniel posits. “Today, ransomware has all the earmarks of a successful, albeit unlawful, industry.”
The first recorded ransomware attack was in 1989. It was a sleeping giant until recently awakened by a perfect storm of conditions, ranging from the lasting effects of the COVID-19 pandemic to companies producing and storing more business-critical data than ever before (especially in the cloud) to the fact that more companies are willing to pay ransoms.
As a result, Daniel explains, the rate at which ransomware has matured as a business model over the course of 2021 is astonishing, especially when compared to the previous 30 years. In just the first six months of 2021, there was US$ 590 million worth of suspicious activity related to ransomware. That exceeds the entire amount of $416 million observed in all of 2020.
Not only this, ransomware has evolved into a division of labour. The world is now seeing a two-tier supply chain with developers who build and sell ransomware malware and other cybercriminals who buy “ransomware as a service” kits from the developers and carry out the attacks.
Unfortunately, the cybercriminals behind today’s ransomware are smarter and more innovative than ever. Consider the Russia-linked REvil ransomware as a service provider. Earlier this year, before being forced offline through a multi-nation operation, the group started offering a two-stage extortion scheme that involved not only holding victims’ data for ransom but also automated DDoS attacks and phone calls to their business partners and journalists as a way to up the pressure to pay.
There are two scenarios that Daniel called to attention:
- Scenario 1: Attack on Primary Data
- Scenario 2: Scenario 1 + Attack on Backup Infrastructure
In the case of an attack on primary data, organisations have to rely on their backup infrastructure. Veritas value-adds are in its multiple deployment capabilities. Veritas can support automated recovery and prepare pre-tested and qualified recovery plans. Besides that, they also have a team that can swiftly step in to do bulk recovery of workloads. More importantly, Veritas can do so instantly through VM Instant Recovery and Database Instant Access.
In terms of recovery options, Daniel shares that there are various recovery options including:
- Granular file recovery
- Bare metal recovery
- Bulk/Instant recovery
- Cloud recovery
- CDP rollback
Daniel highlighted cloud recovery in particular, which can restore both physical and virtual to the cloud. Unique to Veritas, they can do this from data that have deduped to the cloud – deduped data, written to deduped storage that is immutable. That is AWS S3 object lock, deduplicated data, natively without third party steps or rehydration involved. It allows organisations to recover an entire data centre, on-demand but without having to maintain that data centre running 24/7.
The perks of utilising cloud recovery are that it is a completely automated recovery orchestration that removes human processes and errors from the equation. Apart from fast recovery direct from deduplicated data stored in the cloud, Veritas can recover an entire data centre in the cloud on-demand.
Moving on to the scenario of an attack on primary data as well as the backup infrastructure. To mitigate that, Daniel recommends several strategies:
- Harden and lock down data
- Zero-Trust
- Communication
- Processes
- Privileges
- 2 Factor Authentication
- Intrusion Prevention System (IPS)
- Encryption of Data@Rest and In-Flight
- Immutability / WORM
- Air-Gap
- Built-In Intrusion / Detection Capabilities
There are 3 areas to Veritas’ ransomware resiliency strategy: Protect, Detect, Recover.
Protection of data involves safeguarding data integrity. The first step in any ransomware resiliency plan should be ensuring complete protection. This includes making sure all parts of the environment from physical and virtual to cloud and containers are backed up to immutable storage. Critically, this universal protection must be applied intelligently and managed automatically to scale properly. Veritas provides multilayered solutions based on zero-trust principles.
The second aspect is detection. Any plan is only as strong as the weakest link. Ransomware loves to target the dark vulnerable corners of an IT environment. To close these potential gaps, universal visibility is required. Veritas can help ensure all systems are protected and anomalous behaviour is identified before it becomes a critical situation.
The final aspect is recovery – automating and orchestrating complete cross-system restoration.
This is achieved by having as many options as possible including alternate recovery sites like secondary data centres, and even standing up an entire data centre in the cloud on demand when needed from efficiently stored dormant data. We make restoring as simple as one click.
In conclusion, Daniel reiterates that Veritas has appliances that are put through multi-layered attack vector testing that they can guarantee that they can withstand any hacking or compromising attacks. With over 30 years of experience, it can provide immutable options and flexibility. Veritas can provide complete Infrastructure and data visibility and near real-time, AI-based anomaly detection and malware scanning.
Daniel encouraged delegates to reach out to him if they had any queries about how Veritas can help their organisations.
Protecting data in a post-COVID-19 world


Matthew Joseff, APAC Director of Security and ITOA Specialisation, Splunk elaborated on strategies to address sophisticated cyberattacks.
“Welcome to the data age. Data is no longer just a record of what happens. Data makes things happen,” Matthew opens his session. “Money is in data and protecting data can be said to be protecting money.”
Using the analogy of walking down the street, Matthew makes a point that though a simple activity, walking down the street involves using multiple senses – hearing, sight, direction, geo-spatial dimensions. “Yet companies are running multi-billion organisations on one sense along – sight!”
For the governments, the situation is far more vital – lives are at stake in terms of how data is interpreted.
By understanding data, people are creating ways to recreate a brain within the internet. Machine learning comes into the picture to organise data. If networks are designed with expected outcomes, people will be able to reduce the noise. “How do you measure human behaviour? How is that measured online?” Matthew asks.
People are using machine learning to spot outliers. While people love to think of themselves as individuals, they behave in surprisingly similar fashions. With every mouse click and every keyboard stroke, people are generating ones and zeros. With Splunk, they are doing the math to group those desired behaviours and make the undesired ones stand out.
“Data defines reality,” Matthew asserts. “What information people can ascertain will decide how they will behave in reality.”
He makes a note that there will always be risks – people will never be 100% free from fraud or completely safe – it is a journey. Matthew offers some suggestions for organisations embarking on the journey of “turning data into doing.”
- Collect and normalise
- Access Points
- Egress and Ingress Data
- Enrich
- Automate and orchestrate
- Machine learning
“Start with the simple question of knowing how ‘doors’ are there to your data,” Matthew suggests. In an office building, there are access points – the gantry, turnstiles, card access. People secure these access points through control. In the same way, knowing how many doors there are to an organisation’s network is where people can start.
In conclusion, Matthew shared that the Splunk Security Operations Suite enables their customers throughout their SOC maturity journey and that they have a solution for every step in the journey and they customers can start anywhere with us and grow over time. At Splunk, teams are there to guide our customers on this complete security data maturity journey for their SOC.
Organisations of all sizes, maturity levels and security approaches are finding value from Splunk’s Security solutions. He invited delegates to reach out to his colleagues should to explore ways they could collaborate.
Polling Results for Morning Session
Throughout the session, delegates were polled on different topics.
In the first poll, delegates were asked what their organisation’s expectations on recovery time and recovery points are should there be a cyberattack, disruption, corruption or disaster. Nearly half
On their level of confidence in recovering within SLA after an outage, incident, or ransomware attack, a significant number (40%) were unsure, just under a third (30%) were not confident and the others (30%) were very confident.
Asked to vote on the impact of downtime on their organisations, almost half (48%) selected reputational damage as the main impact, followed by loss of citizen and customer confidence (40%) and regulatory action (12%).
On the area of interest they value the most, delegates were relatively evenly split between tools that can deliver automation in areas like compliance and data availability (29%), delivering business resiliency through highly available applications and workloads (25%), ease of doing business through simplified technology consumption model (25%) and visibility into cross-system data and infrastructure to identify unexpected changes and potential risks (21%).
Regarding the biggest challenge faced by delegates when it comes to data management, over a third (37%) went with real-time insights and the ability to analyse data in real-time as the main challenge. Others expressed that data loss prevention (27%), regulatory compliance (20%) and fast accessibility in being able to get the data quickly (17%) are their main challenges.
When polled about concerns delegates have when considering the current landscape of their organisations, more than half (54%) indicated legacy systems and lack of asset visibility and the lack of awareness of what to protect as the main concerns. The other delegates indicated the increasing incidence of ransomware, supply chain attacks and vulnerabilities (29%), adversaries targeting OT systems to inflict cyber-physical attacks (8%) and increasing remote work arrangements due to COVID-19 (8%).
Inquiring asked the key drivers to address cybersecurity gaps within their organisation, more than half of the delegates (57%) indicated that understanding risk with actionable response and remediation was critical. This was followed by achieving complete visibility and segmented environments (24%) and detecting threats and vulnerabilities (19%).
In the poll on the organisation’s biggest challenge when faced with a ransomware attack, the majority (46%) indicated reputational damage as the biggest challenge. The rest opted for a long time required to recover data from backup (29%) and backup copy being compromised (25%).
In the final poll for the morning session, delegates were asked what they would spend on if they had an unlimited budget. The majority (43%) would spend on updating legacy tech, followed by improving security and compliance (22%), integrating disparate systems (13%), spending on resources to improve delivery timeline (13%), and staff training / upskilling (9%).
Afternoon Session
Understanding security from the perspective of people
Due to the pandemic, people have been enjoying the freedom and flexibility of working from home. More than 75% of the delegates in the morning session indicated that they want to continue to work from home. However, as an appointment holder or overseeing security, working from home has increased the attack surface of the organisation. While people in the past are sitting behind the network that is protected, most are no longer protected by firewalls and protection when they work from home.
Two problems have emerged from this trend. The first is that threat actors have direct access to the users – they do not need to go through the firewall and defence to get to the user. Secondly, as users are no longer behind the network, their behaviour changes. More than 50% of the users who work from home share their devices with their friends and family – they allow people to use their laptops for e-commerce. “Insider threats are organisations’ biggest cybersecurity risk,” Philip observes.
In the simplest terms, the 44% increase in insider-driven data breaches translates to one very basic summary: insider threats, whether careless users, malicious users or compromised accounts is a serious problem!
According to Philip, there are three types of insider threats:
- Negligent or careless insiders – Such behaviours include using popular passwords everywhere, sharing credentials between users, using unknown USBs, leaving systems unprotected, etc. People who have forgotten or didn’t pay attention to or skirted rules to get their job done quicker are identified as the “Careless insiders.” The big difference between a careless insider and a malicious insider is that their actions are not done out of malicious or intent to harm. Though careless insiders are the most common at 56%, their mistakes are usually less impactful.
- Malicious insiders – Malicious insiders, as the name implies, are out to harm the organisation and can include nation-state influence. Though malicious insiders make the most headlines, they comprise just 26% of insider threat incidents but can cause significant harm to an organisation. An average cost of a malicious insider incident is US$ 648 K per incident.
- Credential insiders – The most harmful insider threat type is the credential insider. Though comprising only 18% of insider threat risks, this has almost doubled in number since 2020. When employee credentials are stolen, external criminals or hackers will use those credentials to harm the organization from within. They usually target privileged users or important people’s credentials, like the C-suite or senior leaders, to cause the greatest damage. They typically cost UIS$ 805 K per incident.
Introducing Proofpoint, Philip claims that they are the leader in protecting people from advanced threats and compliance risks. They are also ranked number 1 most deployed solution for Fortune 100, Fortune 1000 and Global 2000. They are the only cybersecurity company focused on protecting people.
Data is not lost on its own – it is caused by people sharing and downloading information or installing software. Proofpoint understands and mitigates user risks in three ways:
- Content: Identifying sensitive or regulated This includes data classification, labelling/tagging, exact data matching.
- Threat: Identify compromised accounts and phished users. This means generating threat intel and insights across cloud and email telemetry.
- Behaviour: Identify user activity, intent, and access context. Understanding user across channels, file source and destination, device, network, role, watchlist.
The truth is that organisations should be looking at people who are exposed to the attacker. To protect and prevent the loss of your data, organisations need a people-centric view that combines telemetry across these 3 areas. Proofpoint captures a comprehensive set of data needed to understand activity and behaviour relevant to digital interactions.
A prominent use case for Proofpoint is its deployment by a US Defense Contractor. The challenges they faced were as follows:
- Avoid exfiltration of sensitive intellectual property and data, including by nation-state actors infiltrating their ranks
- Enrich alerts from other security tools to build context and speed up investigations
- Improve security speed and performance without sacrificing context
- Meet requirements of a highly regulated industry
The results include gaining visibility into risky events to assemble a more complete picture, mitigating insider threats before they spread and put the organisation at risk, providing the security team with the ability to explain what happened during an incident and facilitating faster investigations with rapid contextualisation.
Philip shares that people usually see security as a cost, although security helps to cut down costs. Successful implementation of security infrastructure can help to costs:
- Reduce insider risks: Prevent risks before they become incidents
- Accelerate insider threat response: Reduce direct costs
- Increase Team Efficiency: Reduce indirect costs
In conclusion, Philip encouraged delegates to rethink the way they understand security – not as a cost but as a cost-saving strategy that can augment the organisation’s mission. He encouraged delegates to attend a webinar that Proofpoint will be conducting or to reach out to him should they wish to ask more questions and find out how they can better secure their organisation’s networks.
Zero Trust Security through an integrated platform


Ian Lim, Field Chief Security Officer – JAPAC, Palo Alto Networks delved into the intricacies of deploying zero-trust security.
Emerging from unprecedented world events, Singaporean leaders are dramatically accelerating their digital transformations – it underpins the priority of positioning itself as a leader not only in technology but in cyberspace.
Palo Alto Networks customers around the world are accelerating and even expanding on their organisations’ transformation journeys. Enterprises everywhere are fundamentally reshaping the ways they operate and innovate to connect with the people they serve. Globally, enterprises are leveraging technology to ensure business continuity and advantage and ultimately to make things better for the people they serve.
But the risks in the COVID-era are more significant than ever. The attack surface has grown dramatically:
- More remote users, devices and data mean more targets for cyberattacks
- Rapid cloud deployments are accelerating faster than digital enterprises’ security
- Advanced cybercriminals are taking advantage of world events and advanced technology.
For Ian, to enable comprehensive security, leaders today must:
- Protect data, devices, and users without slowing down innovation.
- Deliver an effective, coordinated defence while managing cost and complexity.
- Stay ahead of sophisticated attacks without becoming overwhelmed.
Point solutions are not a way forward—coordination is vital and requires a platform approach.
Palo Alto Networks stands out from the crowd because of the focus on platforms, Ian shares. To deliver cybersecurity that stays ahead of threats, rather than just react to them, Palo Alto Networks brings Zero Trust with the right platform to future proof organisations.
Palo Alto Networks’ strategy removes implicit trust and builds on continuous validation. With them, the best-in-breed capabilities are connected where needed for the greatest visibility, control and efficiency. By bringing those elements together, they can help organisations become future proof, freeing them up to operate and innovate with speed and safety.
Further, Palo Alto Networks integrate their products and ensure the products integrate with organisations’ legacy architecture, so that people do not have to choose between being efficient or having the visibility they need. They are also automated so that organisations can put their teams on what matters, to respond and scale.
For Ian, the platform approach means that securing your whole enterprise can be simpler – from the data centre to the cloud to endpoints.
“The foundational tenet of the Zero Trust Model is that no actor, system, network or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access,” Ian asserts.
Palo Alto Networks promises to protect data, devices and users without slowing down innovation. Their Zero Trust capabilities are as follows:
- Comprehensive Visibility: The ability to gain end-to-end visibility of all user, IoT and application interactions is foundational to Zero Trust.
- AI Profiling and Correlation: Since trust is not implied, digital interactions must be accurately and efficiently profiled through AI.
- Integrated Control: Dynamic and seamless integration between AI profiling and access controls allows for suspicious interactions to be appropriately challenged or stopped. It also allows for policies to be uniformly applied across on-premise, cloud and endpoints.
- Automated Defense: Alerting mechanisms should also be triggered when the anomaly happens to launch manual or automated verification processes.
Palo Alto Networks has delivered best-in-class enterprise IoT Security that is effortless to deploy with just a simple SW subscription on an existing next-generation firewall.
- Their flexible deployment model is available on all physical, virtual, and cloud form factors. It easily scales out using the unlimited resources of our cloud-based machine learning pipeline to quickly identify new devices, assess their risk and keep up with device sprawl.
- It seamlessly integrates with other attached security subscriptions to deliver native inline enforcement and threat prevention.
- Scale horizontally with multi-tenancy cloud infrastructure – identifying any number of IoT devices and scale deployment as your business increases
- Leverage prevention from existing subscriptions to provide complete coverage to protect IoT. and native enforcement with Device-ID and NGFW policies.
- Rich set of 3rd party integrations for asset inventory, logging and enforcement.
They can offer visibility and integrated control of any cloud, any stack, for the full lifecycle; visibility and integrated control of remote access (users and branch); offer AI profiling and threat correlation; and automated defence. Palo Alto Networks allows organisations to “do more with less” to deliver an effective, coordinated defence while managing cost and complexity.
With an integrated platform, they will be able to offer:
- Consolidated Security Posture: Reduce architectural complexity while maintaining or improving the security posture
- Operational Efficiency: Streamline security vendors, integration and maintenance, reducing efforts
- Flexibility on Usage: Enterprise License Agreement allows flexibility on usage models or even changes in product lines to meet business needs
- Reduced TCO: Opportunity to reduce the overall TCO through product consolidation & architecture optimisation; also driving improved cybersecurity.
Further, central management increases operational efficiency and reduces the total cost of ownership.
- Reduced complexity and better integration than disparate point solutions
- Improved learning curve for security staff
- Consistent policies across on-premise and cloud
- Foundation for automation and orchestration
- Gain economy-of-scale for quantifiable savings
- Enterprise agreement allows for stronger partnership, better access to expertise and flexibility in license arrangements
In conclusion, Ian reiterates that the recent waves of supply chain and ransomware attacks highlight the need for a new security paradigm. Point security solutions are fragmented and incur high licensing and administrative costs. There there are countless benefits to be reaped from Zero Trust and bringing it together on a platform. A Zero Trust strategy coupled with a platform approach provides cost-effective and cohesive defence-in-depth for on-premise and cloud architectures.
Polling Results for Afternoon Session
Throughout the session, delegates were polled on different topics.
In the first poll, delegates were asked what their organisation’s expectations on recovery time and recovery points are should there be a cyberattack, disruption, corruption, disaster. Nearly half of
On their level of confidence in recovering within SLA after an outage, incident, or ransomware attack, a majority of the delegates were very confident (43%), followed by unsure (33%) and not confident (24%).
Queried on the impact of downtime on their organisations, 42% selected reputational damage as the main damage, followed by loss of citizen and customer confidence (32%) and regulatory action (26%).
On the areas of interest they value the most, delegates were concerned in visibility into cross-system data and infrastructure to identify unexpected changes and potential risks (45%), tools that can deliver automation in areas like compliance and data availability (32%), ease of doing business through simplified technology consumption model (12%) and delivering business resiliency through highly available applications and workloads (9%).
Regarding the biggest challenge faced by delegates when it comes to data management, most (45%) oped for data loss prevention, followed by the ability to analyse data in real-time (27%), regulatory compliance (23%) and fast accessibility in being able to get the data quickly (5%).
On the concerns that delegates have when considering the current landscape of their organisations, over half (56%) indicated legacy systems and lack of asset visibility, lack of awareness of what to protect as the primary concern. The other delegates indicated the increasing incidence of ransomware, supply chain attacks and vulnerabilities (39%) and adversaries targeting OT systems to inflict cyber-physical attacks (6%) as their considerations.
When asked about the key driver to address cybersecurity gaps within their organisation, 44% indicated that understanding risk with actionable response and remediation to be a key driver, followed by achieving complete visibility and segmented environments (39%) and detecting threats and vulnerabilities (17%).
With regards to an organisation’s biggest challenge when faced with a ransomware attack, more than half of the delegates (55%) indicated reputational damage as the biggest challenge. This was followed by the backup copy being compromised (27%) and the long time required to recover data from backup (18%).
In the final poll for the session, delegates were asked what they would spend on if they had an unlimited budget. Well over a third (38%) would spend on improving security and compliance, updating legacy technologies (24%) and integrating disparate systems (24%). The remaining delegates would invest in staff training / upskilling (10%) and resources to improve delivery timelines (5%).
Closing
To conclude the day, Mohit emphasised the importance of getting started on the journey of securing data, information and the organisation. It is the only way to stay relevant in face of changing realities.
He echoed what Gaurav said about reframing the way cybersecurity is to be approached – as a strategic opportunity rather than a cost. Trust is a brand value that organisations can and should be leveraged to build customer or citizen confidence.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Having robust, effective, and easily accessible healthcare is essential for enhancing the standard of living, achieving better treatment results and increasing lifespan. Tech-enabled progress made in the field of medicine has been a boon, with groundbreaking innovations and discoveries paving the future of healthcare.
The healthcare sector is witnessing a rapid transformation, with the emergence of new technologies that promise to tackle the most pressing global healthcare challenges. MedTech has become increasingly crucial in this context and has opened up a plethora of possibilities for healthcare professionals to advance their skills and knowledge and expand their reach to underserved regions.
The advent of innovative healthcare technology has empowered doctors to provide better care to a greater number of people, irrespective of their geographical location and help prevent and combat emerging diseases effectively.
Technological advancements offer more effective medication, more accurate diagnostics and improved drug delivery systems giving hope for better patient care and prognoses. Integrating healthcare components through technology can also lead to more efficient and accessible healthcare services while lowering costs.
The healthcare industry hugely benefits from technology, which has been the driving force behind the significant progress made thus far. Technology will continue to play a crucial role in catalysing further advancements in healthcare, enabling healthcare professionals to provide better care, develop innovative treatments and improve patient outcomes.
The Impact of Digital Technology on Healthcare
“The outbreak has brought about a significant transformation in the digital healthcare landscape. With social distancing measures in place, teleconsultations have become increasingly prevalent, and patients, as well as healthcare providers, have had to adjust to this new format of healthcare delivery,” Prof Lawrence explains.
While the adoption of teleconsultations has seen a good uptake, other digital systems such as digital identification for tracking hospital entry and exit have encountered hurdles during implementation.
Prof Lawrence has identified the lack of an integrated healthcare ecosystem as a major challenge to the successful implementation of telemedicine. While video consultations are prevalent, the scarcity of examination tools and delays in medication delivery remain major obstacles. The limited access to medical information and the inability to provide detailed explanations or drawings further impede the progress of telemedicine.
Additionally, elderly patients, and other segments of society, may have difficulty using technology. Moreover, telemedicine cannot replicate the nonverbal and emotional aspects of in-person interaction. To overcome these obstacles, he feels, telemedicine in healthcare consultations and visits must be refined and expanded.
Prof Lawrence emphasises the need for the medical industry to evolve and improve its diagnostic and treatment capability. Current diagnostic techniques are limited to the five senses but there is a significant potential to collect more accurate and comprehensive patient data through the integration of sensors and artificial intelligence (AI) technology. This could lead to more precise diagnoses and tailored treatment plans, ultimately improving patient outcomes.
“Telemedicine may have some advantages, such as reduced travel time and longer appointments, but it will only be successful if patients see it as a viable alternative to face-to-face consultations,” Prof Lawrence reiterates. “It is important to have a gradual evolution and improvement in the medical industry, as opposed to dramatic changes driven by hype.”
He believes current medical developments primarily focus on the developers and creators rather than the end-users. This approach needs to be reoriented towards a more user-centric model for future medical development, including its cost-effectiveness.
Systems should be developed that take into account the specific needs and preferences of patients, healthcare providers and other stakeholders. This would ensure that healthcare development is better aligned with the needs and goals of those who will ultimately benefit from it
Academia should be incentivised to look out for interests outside of its own research driven solely by academic interests such as self-serving publications and ranking are no longer practical nor justifiable by public funding. There is a growing consensus that the focus of research should shift towards the development of practical applications.
In addition, he stresses the importance of investors in promoting innovation and addressing gaps within the healthcare ecosystem. He suggests that investors should prioritise addressing population-level issues, rather than focusing solely on niche areas.
As people’s lifespans continue to extend, addressing the requirements of an ageing population has become increasingly critical. It is crucial for startups to thoroughly explore this market and develop innovations specifically tailored to the needs of this demographic.
Drawing on the example of Singapore, which has implemented technology to support its elderly population, he suggests investors consider this increasingly important and growing segment when evaluating potential startups for investment.
“To effectively address the complexity national healthcare poses, a systems approach to problem-solving is necessary, where sustainability and equality take precedence over profits,” advocates Prof Lawrence. “Rather than focusing on building more structures, it is important to prioritise addressing issues of affordability and inequality through technology.”
Urban Ideas and Solutions Through LKYGBPC
The Lee Kuan Yew Global Business Plan Competition (LKYGBPC), which began in 2001, is a biennial global university start-up competition hosted in Singapore. Organised by Singapore Management University’s Institute of Innovation and Entrepreneurship, focuses on urban ideas and solutions developed by student founders and early-stage start-ups.
Prof Lawrence, who serves as a member of the judging panel, believes assigning mentors to teams based on their area of expertise can offer valuable guidance and support. This is just one of the many initiatives undertaken by the panel to foster, encourage, and sustain the entrepreneurial drive of the LKYGBPC participants.
In his view, when discussing the fundamental contrast between innovation and entrepreneurship, he feels that innovation involves tackling issues with fresh perspectives and novel ways, while entrepreneurship requires both discipline and adaptability in managing growth.
“Many people fail in business because they lack discipline and work independently,” says Prof Lawrence. “Cultivating a larger community of individuals who are adaptable and capable of working as part of a team is critical to entrepreneurship success.”
He considers seeking advice and collaborating with others crucial to surmount obstacles in innovation and entrepreneurship. Innovators should be willing to seek the assistance and counsel of others, particularly those with expertise in areas such as regulation or commercialisation.
People must understand that there are unique challenges at each stage of the process and bringing them to the right people to help solve them is important. Moreover, entrepreneurship demands financial discipline that benefits from the guidance and mentorship of multiple individuals.
Singapore’s drive to remain competitive in the global arena is a case in point. The country, he says, serves as a springboard, connecting people and providing access to other countries. To attract and retain talent and expand into new markets, he recommends leveraging Singapore’s strengths, such as its robust education system and its position as a hub for the Asian ecosystem.
Prof Lawrence co-invented the revolutionary Master and Slave Transluminal Endoscopic Robot (MASTER), which has now been incorporated into Endomaster.
He has mentored three startups in the fields of photonics and medical technology to identify potential failures and early warning signs through his own experiences.
Prof Lawrence has served as co-chair for the Gut & Obesity in Asia (Go Asia) Workgroup, which investigates the correlation between obesity and gastrointestinal and liver ailments in Asia.
In summation, he stresses the importance of perseverance in the face of adversity, as it enables individuals to learn and prepare for future challenges.
“Those who have never failed or struggled in the trenches may not be able to achieve long-term success,” Prof Lawrence concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Kemajuan teknologi dan sains telah membawa efektivitas dan efisiensi industri kesehatan sehingga bisa menjangkau lebih banyak orang di pelosok wilayah. Kemudahan akses pada layanan perawatan kesehatan ini diharapkan bisa meningkatkan kualitas hidup dan umur warga.
Telemedicine menjadi salah satu perkembangan terbaru di industri ini yang populer imbas pandemi COVID-19. Saat itu, telemedicine berhasil membantu pasien untuk berkonsultasi dengan dokter, melakukan diagnosis, dan pengobatan dari jarak jauh.
Perkembangan kecerdasan buatan (AI) ikut berkontribusi memodernisasi layanan kesehatan. AI berpotensi membantu dokter untuk membuat diagnosis yang lebih cepat dan akurat, memprediksi hasil kesehatan, dan melakukan asistensi rencana perawatan. Layanan berbasis AI seperti chatbots dan asisten virtual, juga bisa dimanfaatkan untuk menjembatani komunikasi layanan kesehatan dengan pasien.
Pengobatan yang efektif, teknik diagnostik yang lebih akurat, dan sistem pemberian obat yang lebih baik diarahkan untuk memperbaiki sistem perawatan, pengobatan, dan prognosis pasien. Selain itu, kemajuan teknologi juga diharapkan bisa mengurangi biaya perawatan kesehatan lantaran operasional yang makin efisien.
Menggali potensi dari celah di teknologi kesehatan
“Jika Anda menggunakan konsultasi video, Anda hanya dapat melihat tapi Anda tidak dapat memeriksa. Tentu saja pemeriksaan adalah hal yang penting. Semestinya kita bisa memiliki kemampuan yang sama serupa dengan pertemuan tatap muka. Menurut saya, alat pengujian untuk melakukan diagnosa masih kurang pada layanan telemedicine,” jelas Lawrence dalam wawancara dengan CEO & Pemimpin Redaksi OpenGov Asia, Mohit Sagar.
Kedua, layanan telemedicine masih harus mematangkan ekosistem pendukung, salah satunya terkait dengan pengantaran obat. Di Singapura, layanan pengantaran obat bisa dikirim dalam satu minggu. Hal ini tentu akan menghambat proses pengobatan ketimbang langsung datang dan diberi obat ketika melakukan kunjungan tatap muka.
Meski demikian, Lawrence menyebut layanan telemedicine masih dilakukan di masa setelah COVID-19 untuk pasien yang kondisinya sudah cukup stabil di rumah. Sementara sebagian besar pasien sudah kembali melakukan kunjungan tatap muka seperti biasa.
Selain itu, penjelasan yang bisa dilakukan lewat telemedicine menurut Lawrence masih terbatas. Ia merasa kesulitan jika harus melakukan penjelasan dengan tambahan gambar yang dengan mudah dilakukan dalam pertemuan tatap muka secara langsung.
Selain itu, ia pun menaruh perhatian pada kesulitan akses teknologi yang dialami oleh pasien lanjut usia. Telemedicine sulit untuk membaca dan menyampaikan aspek nonverbal dan emosional dari interaksi langsung.
Ia menekankan industri medis perlu mengembangkan dan meningkatkan metode untuk mendiagnosis dan merawat pasien. Ia berharap telemedicine bisa mendukung diagnosis dengan memanfaatkan sejumlah panca indera untuk memeriksa gejala. Dalam pertemuan tatap muka, dokter bisa langsung mengukur detak jantung dengan stetoskop, merasakan dengan sentuhan jari, pendengaran, atau diagnosis sensoris lain untuk mendapat data dari pasien. Kesamaan proses diagnosis seperti inilah yang perlu dikembangkan untuk layanan telemedicine ke depan.
Untuk memperbaiki layanan perawatan medis jarak jauh, semua kekurangan itu perlu ditambal. Tambahan sensor, metaverse dan kecerdasan buatan (AI) dapat dimungkinkan untuk melakukan hal ini dan membantu menganalisa data pasien yang lebih akurat dan komprehensif. Ia optimis kemajuan teknologi bisa mengatasi semua kelemahan itu karena saat ini kita sedang berevolusi untuk meningkatkan layanan telemedicine secara bertahap.
Sebagai seorang investor, menurut Lawrence, inovasi itu menjadi pendorong inovasi yang cukup besar. Namun, agar bisa lebih berdampak, menurutnya baik inovator, akademisi, dan startup mesti benar-benar menyentuh permasalahan di akar rumput. Selama ini, penelitian-penelitian yang dilakukan para edukator kurang peka dengan kebutuhan masyarakat. Mereka melupakan mengapa mereka ada di institusi akademis yang semestinya menelurkan solusi bagi masyarakat. Begitupula dengan para investor. Mereka pun mesti memiliki visi untuk melayani dan menyelesaikan masalah di masyarakat terlebih dulu sebelum menajamkan sasaran ke ceruk pasar yang lebih sempit.
LKYGBPC untuk majukan entrepreneurship
Bagi Lawrence, inovasi berangkat dari inisiatif untuk menyelesaikan masalah dan mengeksekusi ide solusi itu dengan kedisiplinan. Disiplin dalam memperbaiki produk, mengelola konsumen, membangun tim dan organisasi, serta mengelola keuangan. Lawrence menganggap kompetisi bisnis internasional seperti LKYGBPC bisa memberikan kesempatan bagi para pebisnis muda untuk melakukan ekspansi pasar ke negara lain.
Prof Lawrence menjadi investor di tiga startup. Pertama adalah Master and Slave Transluminal Endoscopic Robot (MASTER). MASTER kini telah diintegrasikan menjadi Endomaster, startup MedTech yang paling banyak mendapat kucuran dana di Asia pada 2017. Ia pun mendanai startup di bidang fotonik dan bioteknologi yang mengembangkan peringatan dini dibidang kesehatan.
Berdasarkan pengalaman memiliki tiga startup teknologi kesehatan, Lawrance menyarankan agar startup perlu fleksibel dan membuka diri. Mereka mesti bersedia menerima masukan dari konsumen, tim, dan mereka yang lebih ahli. “Saya merasa bahwa beberapa inovator sangat protektif terhadap produk mereka sendiri, mereka pikir ini adalah bayi mereka.”
Sebab, dari berbagai masukan itu, founder dan tim bisa memetakan dengan cepat berbagai tantangan yang mungkin mereka hadapi di sepanjang jalan. Setelah itu, mereka mesti menemukan orang yang tepat untuk memecahkan tantangan tersebut.
Mereka pun harus berjuang untuk mewujudkan apa yang mereka janjikan dari konsep yang diajukan. Menurut Lawrence, beberapa orang lebih jago menuliskan ide mereka di kertas dan Power Point ketimbang terjun langsung ke lapangan.
“Para pejuang kertas dan Power Point sangat sulit untuk berhasil. Anda harus benar-benar melakukannya hingga berdarah-darah, hingga Anda menguasai dan memenangkan pertempuran,” tegasnya.
Tantangan berikutnya untuk startup kesehatan adalah soal regulasi. Startup perlu menemukan ahli untuk membantu merancang uji klinis agar lolos berbagai uji klinis dan regulasi.
Tantangan yang terakhir adalah masalah komersialisasi produk. Bagaimana menghasilkan pendapatan dari produk yang akan dijual.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Singapore University of Technology and Design (SUTD) and an online delivery company have formed a three-year partnership to provide students with the digital skills they will need in the future. This collaboration, which is part of SUTD and Ecole 42’s collaboration programme, will give SUTD’s 42 Singapore students access to the online delivery firm’s mentorship and internship opportunities, with the goal of providing tech talent with a launchpad to enter the tech industry once they graduate.
This collaboration is part of the online delivery firm’s PowerUp! Tech Academy, which includes programmes and partnerships to expand the tech talent pool and strengthen the tech ecosystem.
With a SG$600,000 contribution to SUTD’s 42 Singapore programme, the company reaffirmed its commitment to the partnership. This is Singapore’s first tuition-free, no-instructor programme. The funds will be allocated over a three-year period, from 2022 to 2024, and will be used to organise skill-development initiatives such as workshops and events.
According to the SUTD provost, Professor Phoon Kok Kwang, as Singapore strives to realise the full potential of its digital economy, they are eager to collaborate with the online delivery company. Their timely support and collaboration with 42 Singapore programmes enable SUTD to provide a transformative digital skills development path for future tech talent.
SUTD’s mission is to equip and continuously shape socially conscious, adaptable, and responsible talent who will have rewarding careers and catalyse positive change in a world that is rapidly changing.
By bringing together students with aspirations and mentors who share the same passion, the company is committed to creating an inclusive tech ecosystem that they believe will help drive and advance digitalisation not only in Singapore but throughout Asia.
Recent research indicates that Singapore’s Internet economy has the potential to increase by 19% and reach USD 22 billion by 2025, with the highest proportion of digital consumers in the region. Therefore, merchants are more likely to expand their use of digital services.
Therefore, this partnership is essential for the development of a robust tech talent pipeline to support the imminent expansion of Singapore’s digital economy. The three-year partnership encompasses the following:
- Internship opportunities: The online delivery firm will offer 42 Singaporean students internship opportunities in its tech teams over the course of three years. This will allow aspiring talent to gain professional working experience within a world-class technology team and learn how to apply their knowledge to real-world scenarios.
- Mentorship programmes: Students will be able to enrol in the online delivery firm’s mentorship programme, which will provide them with direct access to the tech team’s resources and executives. The firm’s one-on-one interactions with senior leaders aim to not only equip them with the necessary digital skills but also to inspire talent.
- Employment opportunities: The online delivery firm will give those who finish the programme first consideration for jobs if there are any that match their qualifications. This makes it possible for the firm to grow its community and give the next generation the technical skills that will be valuable in a world that is becoming more digital.
- Industry guidance: A Chief Technology Officer (CTO) of the online delivery firm will join the Advisory Board of 42 Singapore, offering advice on key industry trends and advocating for other businesses to support the programme. His direction will also ensure that SUTD’s programmes are relevant and valuable to students and the broader tech community.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
There has been extensive usage of AI technology in the service of helping humanity. In the health sector, AI has been used to identify new illnesses and epidemics that have become a concern when they appear in different parts of the world. Therefore, it was decided to develop the necessary tools to assist the country in dealing with any future pandemic in Indonesia at the suggestion of Indonesia’s National Research and Innovation Agency (BRIN).
Given Indonesia’s limited infrastructure and medical workforce, a well-thought-out plan was crucial for overcoming such an emergency. As a result, the healthcare infrastructure in Indonesia, including hospitals, physicians, health workers, and the government, could be ready for any future pandemic.
Outbreaks can be identified using AI by extracting morphometric information from microscopy images. Anto Satriyo Nugroho, Director of BRIN’s Centre for Artificial Intelligence Research and Cybersecurity (PR KAKS), said that AI can greatly aid Indonesian healthcare workers in hot spots, for instance, malaria epidemics. The algorithm could determine whether a person has caught malaria based on whether their blood sample tested positive for the parasite outbreak.
“Artificial intelligence applications can also detect epidemics with high precision. With AI, we can get an accurate forecast 77.14% of the time, with a sensitivity of 84.37% and an F1 accuracy of 80.60%,” he revealed.
To promote such initiatives, the National Research, and Innovation Agency (BRIN) hosted a webinar with the topic “Utilising AI in Health”. A panel discussion with a resource person, the Director of the BRIN Institute’s Centre for Artificial Intelligence Research and Cybersecurity (PR KAKS), followed the webinar activity. Prof. Indi Dharmayanti, Head of the BRIN Health Research Organisation, and Alexander Svinin, Russian Trade Attache for Indonesia, shared some opening comments during this webinar.
Experts in artificial intelligence technology include Anto Satriyo Nugroho, Director of the Center for Artificial Intelligence at Innopolis University Russia Ramil Kuleev, and researcher from the Astutiati Nurhasanah National Agency for Research on Vaccines and Drugs Research Centre, Ruslan Lukin.
Meanwhile, Russian Trade Attaché Alexander Svinin has voiced his approval of the work being done in Indonesia in artificial intelligence, “When it comes to the use of AI in medicine, we will be extremely receptive to new ideas and findings. This will open the door for cooperation among many groups.”
Professor and Head of the Russian University of Innopolis’s Institute of AI According to Ramil Kuleev, artificial intelligence has been used in various spheres of Russian society, most notably the medical field, where it has been used to diagnose illnesses based on radiological examinations.
Indonesian organisations like the Metaverse Research & Experience Centre (MREC) and the Indonesia Metaverse Collaboration supports the metaverse effort alongside AI development. Denny Setiawan, Director of resource management for the Ministry of Communication and Information’s Directorate General of Resources and Equipment of Post and Information Technology, said this would be a crucial step in hastening the country’s digital transition.
The mission of the Metaverse Research and Education Consortium (MREC), a public-private partnership, is to foster these very activities inside the realm of the technological metaverse. The Metaverse Research and Experience Centre (MREC) may be in the middle of the action on the Telkom University Campus. The building will serve as a hub for metaverse technology-related R&D, engagement with industry, and capability development.
Academics, researchers, connectivity service providers, industry partnerships, and policymakers can all work together and build connections with the help of MREC’s resources. Launching MREC is a big deal for Indonesia’s digital economy since it shows the country is serious about capitalising on the rising international interest in metaverse technology.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Hong Kong Polytechnic University (PolyU) has formed a strategic partnership with a venture capital investment company to promote the integration of the university’s scientific research with innovative industries. The collaboration’s main objective is to support PolyU research teams and start-ups with high potential, while also advancing the practical application of scientific research and the commercialisation of technology. The partnership is expected to contribute to the innovation and technology (I&T) development of Hong Kong and the Greater Bay Area.
The signing of the Memorandum of Understanding (MoU) was witnessed by the Secretary for Innovation, Technology and Industry; the President of PolyU; and the Founding Partner of a global private equity firm. The Executive Vice President of PolyU and a partner at the global private equity firm signed the MoU.
During the same event, the Innovation & Investment Connect Panel Session was conducted. It gathered industry leaders and I&T stakeholders to participate in a stimulating panel discussion titled “How to facilitate research commercialisation from policymaker and investor perspectives.”
The panellists deliberated on the opportunities and challenges associated with the commercialisation of scientific research. Furthermore, two parallel thematic sessions were organised, where PolyU scholars and representatives from six investees at the venture capital investment company engaged in roundtable discussions on biomedical and sustainable innovation. The discussions highlighted the opportunities in the biomedical innovation ecosystem in Hong Kong, as well as the development trends in clean energy technologies and related industries.
According to the Hong Kong Innovation Activities Statistics 2021, Innovation plays a crucial role in promoting economic growth and development. It encompasses not only research and development (R&D) but also product and business process innovation, which are vital in enhancing competitiveness and business performance.
The Census and Statistics Department (C&SD) has been gathering various statistical indicators to measure the progress of innovation activities in Hong Kong. Among these indicators, the most significant ones are related to R&D activities.
Hong Kong’s gross domestic expenditure on research and development (GERD) in 2021, which includes total spending on in-house R&D activities performed locally in the business, higher education, and government sectors (including public technology support organisations), amounted to HK$27,827 million. This represents a 5% increase compared to 2020. During the same period, the Gross Domestic Product (GDP) increased by 7%. The GERD to GDP ratio slightly decreased from 0.99% in 2020 to 0.97% in 2021.
In recent years, the total spending on in-house R&D activities in the higher education sector has been consistently increasing. In 2021, the total expenditure on such activities in the higher education sector amounted to HK$14,735 million, representing a 4% increase compared to 2020.
On the other hand, the total expenditure on in-house R&D activities in the government sector, which mainly includes public technology support organisations, was HK$1,392 million in 2021, showing a 1% increase when compared with 2020.
The majority of in-house R&D activities in the business sector were focused on information technology and engineering technology. Specifically, computer software technology, information system and technology, and electrical and electronics engineering technology areas accounted for 21%, 17%, and 16% of the total expenditure on in-house R&D activities in the business sector, respectively.
Rather than being a significant performer of R&D activities, the government primarily serves a facilitative role in driving the economy’s technology and innovation advancement. This is achieved through the provision of funding support and technological infrastructure.
In 2021, the government sector, which primarily includes public technology support organisations, spent a total of HK$1,392 million on R&D activities. This amount represents a 1% increase compared to 2020. Additionally, the ratio of this expenditure to GDP remained the same at 0.05% in 2021.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The government held a conference to review the first phase of the programme on the transition to Internet Protocol version 6 for state agencies (IPv6 for Gov) and discuss the implementation of the second phase of the plan.
The initial stage of the IPv6 for Gov initiative carried out between 2021 and 2022, centred around state agencies. During this period, approximately fifty per cent of the involved ministries, agencies, and localities planned transitional strategies to shift towards IPv6 for their portals. All of them are expected to roll out the plans in the second phase in 2022-2025.
In Vietnam, the IPv6 transition in networks, services, applications, and software will ensure there are Internet resources capacity and security requirements to support digital transformation and the development of e-government and smart city services. IPv6 is expected to meet Vietnam’s demand to offer new and quality services such as the Internet of Things (IoT), 4G-LTE, and 5G networks, contributing to digital transformation and digital government building.
To guarantee the effective execution of the program, the Ministry of Information and Communications (MIC) has collaborated closely with pertinent ministries, sectors, and localities. According to statistics from the Vietnam Internet Network Information Centre (VNNIC), as of December 2022, Vietnam’s IPv6 usage reached 53%, ranking 10th globally with more than 65 million Internet subscribers using IPv6 services. According to an official, the IPv6 for Gov programme has exceeded its set goals in the first phase as 94% of ministries, sectors and localities have issued IPv6 transition plans.
So far, as many as 78% of stakeholders have successfully converted to IPv6 for their portals and public services. More than 1,300 staff and experts have been trained on IPv6, 2.6 times higher than the training target for five years.
This year, the country’s IPv6 usage rate is expected to reach 60-70%. In the second phase of 2023 – 2025, VNNIC set a goal to convert the national Internet network into IPv6. By 2025, it wants 100% of Internet subscribers to use the IPv6 service, and all IDC, cloud, and hosting businesses to provide services on IPv6 platforms.
Pham Duc Long, the Deputy Minister of Information and Communication, has urged stakeholders to hasten the transition to IPv6. VNNIC was tasked with boosting communication and training initiatives and providing support and oversight during the transition phase.
The country’s quality of Internet service has also improved following directives issued by MIC. Globally, Vietnam ranks 39th in terms of fixed Internet. As OpenGov Asia reported, the average broadband download speed in Vietnam in February was 89,73 Mpps, up 4.6% over January. Among the centrally run cities, Ho Chi Minh City had the highest fixed broadband download speed (96.55Mbps). The average fixed broadband upload speed of the whole country was 88.71 Mbps (up 4.7%).
The figures from both domestic and international sources indicated that there has been a significant improvement in Vietnam’s fixed Internet speed in February, a considerable achievement considering the several incidents surrounding the submarine fibre optic cables since late 2022. As a solution, MIC has directed telecom carriers to promptly apply measures to fix the problems to ensure smooth international Internet connection. Under the instructions of the Authority of Telecommunications (AOT), mobile network operators have negotiated to buy more mainland optical fibre capacity and share capacity with each other to overcome the crisis.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Flattr
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The BRIGHT/AHI algorithm, funded as part of the Australian federal government’s Smartsat CRC Bushfire initiative, was developed by a team of researchers from the former Natural Hazards CRC and Natural Hazards Research Australia.
It uses images from the Himawari-8 satellite of the Japanese Meteorological Agency to provide automated, near-continuous, and near-real-time surveillance of potential fire activity across Australia. Previously, polar-orbiting earth observation satellites could only provide one or two images per day, limiting the detection of potential hotspots. However, with the addition of geostationary satellites, new opportunities have emerged for persistent continental monitoring of fires, improving the ability to observe fire in the landscape from space.
Fire detection algorithms typically identify hotspots by comparing the temperature of a candidate pixel to a reference value. Traditional fire detection methods compare the candidate pixel to its surrounding pixels, using fixed threshold values to trigger a detection.
However, this technique can be problematic, especially when fires occur in complex landscapes or when cloud and/or smoke obscures or partially obscures pixel values. In a country as large and diverse in fire regimes as Australia, these challenges are further compounded.
The BRIGHT/AHI algorithm adopts a novel approach to detect fire activity from earth observation data. By leveraging the AHI Himawari-8 geostationary imager that captures images of Australia every ten minutes, day and night, the algorithm calculates bioregion-specific control values and associated thresholds based on a pixel’s temperature history. This history covers a 30-day period, and the values are optimised to minimise errors of omission in near-real-time. Upon receiving the satellite imagery, the algorithm processes the entire continent of Australia in less than 45 seconds, providing timely and accurate bushfire information. The algorithm’s detections have been compared to those of existing polar-orbiting, satellite-based fire detection products (Chatzopoulos-Vouzoglanis et al., 2022).
The release of the new BRIGHT/AHI hotspot product to Australian fire management agencies and the public is timely, given that two polar-orbiting fire detection products, namely the Moderate Resolution Imaging Spectrometer (MODIS) and the Visible Infrared Imaging Radiometer Suite (VIIRS), are approaching the end of their operational lifecycles.
The MODIS instruments were launched in 1999 (Terra satellite) and 2002 (Aqua satellite), and both have exceeded their designed operational lifetimes of six years. While the Suomi NPP VIIRS maintains the continuity of earth observations, this was recently compromised when the satellite went into safe mode in July 2022 and only recently came back online.
The BRIGHT/AHI algorithm, together with geostationary satellites, represents a new generation of near-real-time earth observation products that are revolutionising our ability to understand fire activity, regimes, impacts, and recovery in a systematic and replicable way for Australia.
Recent developments and testing have led to the inclusion of Fire Radiative Power (FRP) estimate alongside hotspots, with associated products of fire severity and combustion completeness being developed by the RMIT team. However, the challenge of persistent surveillance and tracking of wildfires across Australia is complex and requires a suite of technologies and techniques.
While no single technology or solution can provide us with robust answers to every question, BRIGHT/AHI contributes significantly to this ongoing challenge through the provision of hotspots for Australia via the Geoscience Australia Digital Earth Australia Hotspots website.
The Australian federal government’s Smartsat CRC now funds this research via its Real-time Fire Analytics research programme.
The aim of this project is to develop a comprehensive satellite system that combines geostationary, polar-orbiting, and aerial-based sensors to enable real-time attribution of fires across landscapes. The project will design and implement a data and platform ecosystem that allows for the autonomous detection, processing, and delivery of real-time fire information to end users.
The project comprises two key elements:
- The design and implementation of a data and platform ecosystem that can enable real-time fire surveillance using geostationary, polar-orbiting, and aerial sensors. This “system of systems” approach will ensure that the best available information is always provided.
- The project aims to develop autonomous AI algorithms for real-time fire surveillance and attribution, such as burn severity and FRP.