SlideShare une entreprise Scribd logo
1  sur  3
Welcome Addressby
                            Director General of Informatic Application
                  Ministry of Communication and Information Technology




Excellencies,
Distinguished colleagues,
Ladies and gentlemen,

Assalammualaikim, Warrohmatullahi Wabarokatuh,
Good Morning and peace beupon us all,

I would like to say how delighted Ito be here today. Let me begin with a very warm
reception for participants, especially international speaker. We greatly appreciate the
long journey you made to attend this event. Welcome to Indonesia and I hope that you
have the opportunity to explore and learn the enchantment of Bandung and beyond.


Many of us have been following long series of agenda since yesterday, starting with
the Call for Paper Indonesia Information Security Forum. Therefore, I am glad to finally
be able to join with you.




We gather here today for the same interest that is to find out more on the latest
developments of global cyber security issues. I was very pleased when I found out how
Indonesia had been given the confidence to host this event.


Internet governance in Indonesia will provide unique case study to learn from. Internet
in Indonesia started from the grass root of telecommunication communities as early as
the mid of 1990s which seen the establishment of the first Internet Service Provider.
That was the period when fixed line voice telephony industry and soon the mobile
voice telephony were enjoying great deal of prosperity.
Until today, the grass root community remains important to the development of cyber
security and internet governance in Indonesia including the working relationship with
Government in the constructing of the right policies of Internet Governance for the
need of Indonesia.




Cybersecurity is a global issue requiring global solutions. Given the scale of the
threats, we can no longer rely on ad hoc solutions, or hope to survive by strengthening
our defences after a cyberattack has occurred. So we must work together to set
international policies and standards, and to build an international framework for
cybersecurity.


Having said that, looking at Indonesia’s position we are setting up cyber security legal
framework to deal with cybersecurity issues in Indonesia. By having Electronic and
information transaction act no. 11 year 2008 as well as telecommunication act no. 36
year 1999, we are also making government regulation, ministerial regulation and
ministerial circulation in terms of cyber security associated with promoting cyber
security awareness program through continuous human resource training.


In closing, cyber security dan internet governance is by nature a shared responsibility
and it is practically impossible to relinquish itto others. The future of Indonesia along
with the future of the world relies on our cooperation to make the cyberspace we
shared a secure environment. I am confident with your support we can make that
happen.




Thank you.
WassalammualaikumWarrohmatullahi Wabarokatuh,


Ashwin Sasongko
Welcome Address by Director General of Informatic Application Ministry of Communication and Information Technology

Contenu connexe

Tendances

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Cybersecurity commission-report-final-post
Cybersecurity commission-report-final-postCybersecurity commission-report-final-post
Cybersecurity commission-report-final-postRob Wilson
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladeshBank Alfalah Limited
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internetSumeet Kagwade
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent Mwando
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 

Tendances (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cybersecurity commission-report-final-post
Cybersecurity commission-report-final-postCybersecurity commission-report-final-post
Cybersecurity commission-report-final-post
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Session 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip PaulwellSession 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip Paulwell
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 

En vedette

En vedette (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sertifikat Digital - Kasubdit Teknologi Keamanan Informasi
Sertifikat Digital - Kasubdit Teknologi Keamanan InformasiSertifikat Digital - Kasubdit Teknologi Keamanan Informasi
Sertifikat Digital - Kasubdit Teknologi Keamanan Informasi
 
Persyaratan perangkat lunak 20141118_18november2014
Persyaratan perangkat lunak 20141118_18november2014Persyaratan perangkat lunak 20141118_18november2014
Persyaratan perangkat lunak 20141118_18november2014
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 
Penanganan Kasus Cybercrime
Penanganan Kasus CybercrimePenanganan Kasus Cybercrime
Penanganan Kasus Cybercrime
 
CSIRT Awareness v3_Riki Arif Gunawan
CSIRT Awareness v3_Riki Arif GunawanCSIRT Awareness v3_Riki Arif Gunawan
CSIRT Awareness v3_Riki Arif Gunawan
 
Presentasi Sinkronisasi Waktu Sistem Elektronik by Dr. Hasyim Gautama
Presentasi Sinkronisasi Waktu Sistem Elektronik by Dr. Hasyim GautamaPresentasi Sinkronisasi Waktu Sistem Elektronik by Dr. Hasyim Gautama
Presentasi Sinkronisasi Waktu Sistem Elektronik by Dr. Hasyim Gautama
 
ISO 27001 LPSE Prov. Jawa Barat_Ika Mardiah (Kepala Balai LPSE Prov. Jawa Barat)
ISO 27001 LPSE Prov. Jawa Barat_Ika Mardiah (Kepala Balai LPSE Prov. Jawa Barat)ISO 27001 LPSE Prov. Jawa Barat_Ika Mardiah (Kepala Balai LPSE Prov. Jawa Barat)
ISO 27001 LPSE Prov. Jawa Barat_Ika Mardiah (Kepala Balai LPSE Prov. Jawa Barat)
 
Keamanan Transaksi Elektronik-DR. Muhammad Mustafa Sarinanto
Keamanan Transaksi Elektronik-DR. Muhammad Mustafa SarinantoKeamanan Transaksi Elektronik-DR. Muhammad Mustafa Sarinanto
Keamanan Transaksi Elektronik-DR. Muhammad Mustafa Sarinanto
 
Pengantar Awareness ISMS_Raditya Iryandi
Pengantar Awareness ISMS_Raditya IryandiPengantar Awareness ISMS_Raditya Iryandi
Pengantar Awareness ISMS_Raditya Iryandi
 
Pemeringkatan Indeks KAMI 2014_Intan Rahayu
Pemeringkatan Indeks KAMI 2014_Intan RahayuPemeringkatan Indeks KAMI 2014_Intan Rahayu
Pemeringkatan Indeks KAMI 2014_Intan Rahayu
 
Infosec for web apps 2014_18november2014
Infosec for web apps 2014_18november2014Infosec for web apps 2014_18november2014
Infosec for web apps 2014_18november2014
 
Presentasi Metrologi LIPI_Standardisasi Waktu_by Bapak Mego
Presentasi Metrologi LIPI_Standardisasi Waktu_by Bapak MegoPresentasi Metrologi LIPI_Standardisasi Waktu_by Bapak Mego
Presentasi Metrologi LIPI_Standardisasi Waktu_by Bapak Mego
 
RPM Sistem Manajemen Pengamanan Informasi
RPM Sistem Manajemen Pengamanan InformasiRPM Sistem Manajemen Pengamanan Informasi
RPM Sistem Manajemen Pengamanan Informasi
 
Peningkatan Keamanan Informasi Layanan Publik melalui Indeks KAMI- Kasubdit B...
Peningkatan Keamanan Informasi Layanan Publik melalui Indeks KAMI- Kasubdit B...Peningkatan Keamanan Informasi Layanan Publik melalui Indeks KAMI- Kasubdit B...
Peningkatan Keamanan Informasi Layanan Publik melalui Indeks KAMI- Kasubdit B...
 
Cybersecurity Policy - Director of Information Security
Cybersecurity Policy - Director of Information SecurityCybersecurity Policy - Director of Information Security
Cybersecurity Policy - Director of Information Security
 
Panduan Kuesioner SMPI_Hasyim Gautama
Panduan Kuesioner SMPI_Hasyim GautamaPanduan Kuesioner SMPI_Hasyim Gautama
Panduan Kuesioner SMPI_Hasyim Gautama
 
Strategi dan Penerapan Manajemen Risiko Keamanan Informasi PSE Layanan Publik
Strategi dan Penerapan Manajemen Risiko Keamanan Informasi PSE Layanan PublikStrategi dan Penerapan Manajemen Risiko Keamanan Informasi PSE Layanan Publik
Strategi dan Penerapan Manajemen Risiko Keamanan Informasi PSE Layanan Publik
 
Sosialisasi Aplikasi Indeks KAMI-Intan Rahayu
Sosialisasi Aplikasi Indeks KAMI-Intan RahayuSosialisasi Aplikasi Indeks KAMI-Intan Rahayu
Sosialisasi Aplikasi Indeks KAMI-Intan Rahayu
 

Similaire à Welcome Address by Director General of Informatic Application Ministry of Communication and Information Technology

Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014IGF Indonesia
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
Internet in Bangladesh
Internet in BangladeshInternet in Bangladesh
Internet in BangladeshEmran Hossain
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of TechnologyYousef93
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeID-IGF
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)ICT Watch
 
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri LankaAPNIC
 
Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)ICT Watch
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefFAIR PLAY AD / @VeronicaRRSouza
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report IGF Indonesia
 
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
National ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryNational ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryICT Watch
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Digital Citizenship vsGlobal Citizenship
Digital Citizenship vsGlobal CitizenshipDigital Citizenship vsGlobal Citizenship
Digital Citizenship vsGlobal CitizenshipMicoOlivar
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pagesAgidigba
 

Similaire à Welcome Address by Director General of Informatic Application Ministry of Communication and Information Technology (20)

Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
 
Internet in Bangladesh
Internet in BangladeshInternet in Bangladesh
Internet in Bangladesh
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of Technology
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue Resume
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)
 
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report
 
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
 
National ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryNational ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 Summary
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Digital Citizenship vsGlobal Citizenship
Digital Citizenship vsGlobal CitizenshipDigital Citizenship vsGlobal Citizenship
Digital Citizenship vsGlobal Citizenship
 
1st Congress Speech Final
1st Congress Speech Final1st Congress Speech Final
1st Congress Speech Final
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pages
 

Plus de Directorate of Information Security | Ditjen Aptika

Plus de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
Pengamanan Jaringan dengan Honeynet-Charles Lim
Pengamanan Jaringan dengan Honeynet-Charles LimPengamanan Jaringan dengan Honeynet-Charles Lim
Pengamanan Jaringan dengan Honeynet-Charles Lim
 
Menyusun Manajemen Risiko_Hadi Cahyono
Menyusun Manajemen Risiko_Hadi CahyonoMenyusun Manajemen Risiko_Hadi Cahyono
Menyusun Manajemen Risiko_Hadi Cahyono
 
ISMS Awareness_Intan Rahayu
ISMS Awareness_Intan RahayuISMS Awareness_Intan Rahayu
ISMS Awareness_Intan Rahayu
 

Welcome Address by Director General of Informatic Application Ministry of Communication and Information Technology

  • 1. Welcome Addressby Director General of Informatic Application Ministry of Communication and Information Technology Excellencies, Distinguished colleagues, Ladies and gentlemen, Assalammualaikim, Warrohmatullahi Wabarokatuh, Good Morning and peace beupon us all, I would like to say how delighted Ito be here today. Let me begin with a very warm reception for participants, especially international speaker. We greatly appreciate the long journey you made to attend this event. Welcome to Indonesia and I hope that you have the opportunity to explore and learn the enchantment of Bandung and beyond. Many of us have been following long series of agenda since yesterday, starting with the Call for Paper Indonesia Information Security Forum. Therefore, I am glad to finally be able to join with you. We gather here today for the same interest that is to find out more on the latest developments of global cyber security issues. I was very pleased when I found out how Indonesia had been given the confidence to host this event. Internet governance in Indonesia will provide unique case study to learn from. Internet in Indonesia started from the grass root of telecommunication communities as early as the mid of 1990s which seen the establishment of the first Internet Service Provider. That was the period when fixed line voice telephony industry and soon the mobile voice telephony were enjoying great deal of prosperity.
  • 2. Until today, the grass root community remains important to the development of cyber security and internet governance in Indonesia including the working relationship with Government in the constructing of the right policies of Internet Governance for the need of Indonesia. Cybersecurity is a global issue requiring global solutions. Given the scale of the threats, we can no longer rely on ad hoc solutions, or hope to survive by strengthening our defences after a cyberattack has occurred. So we must work together to set international policies and standards, and to build an international framework for cybersecurity. Having said that, looking at Indonesia’s position we are setting up cyber security legal framework to deal with cybersecurity issues in Indonesia. By having Electronic and information transaction act no. 11 year 2008 as well as telecommunication act no. 36 year 1999, we are also making government regulation, ministerial regulation and ministerial circulation in terms of cyber security associated with promoting cyber security awareness program through continuous human resource training. In closing, cyber security dan internet governance is by nature a shared responsibility and it is practically impossible to relinquish itto others. The future of Indonesia along with the future of the world relies on our cooperation to make the cyberspace we shared a secure environment. I am confident with your support we can make that happen. Thank you. WassalammualaikumWarrohmatullahi Wabarokatuh, Ashwin Sasongko