Indonesia Cyber Security Market

Similar documents
Cyber Security Strategy

COUNTRY PROFILE. Malaysia

COUNTRY PROFILE. Croatia

COUNTRY PROFILE. Estonia

COUNTRY PROFILE. Qatar

The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative

COUNTRY PROFILE. Mexico

COUNTRY PROFILE. Ukraine

COUNTRY PROFILE. Colombia

COUNTRY PROFILE AUSTRALIA

COUNTRY PROFILE. Philippines

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

COUNTRY PROFILE. Iceland

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

COUNTRY PROFILE. Russia

Yokohama Partnership of Resources and Technologies (Y-PORT)

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

COUNTRY PROFILE. Italy

COUNTRY PROFILE. Korea Republic

COUNTRY PROFILE. Bulgaria

Critical Information Infrastructure Protection Law

COUNTRY PROFILE. Ireland

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Japan s Cyber Diplomacy

COUNTRY PROFILE. Brazil

COUNTRY PROFILE. Taiwan

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Draft Resolution for Committee Consideration and Recommendation

G7 Bar Associations and Councils

Cyber Security Roadmap

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

OPPORTUNITIES IN THE KENYAN SECURITY SECTOR

HEALTH CARE AND CYBER SECURITY:

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Commonwealth Cyber Declaration

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

The APEC Model. Global Partnership through Regional Initiatives

IT Policy and Public Demand for IT in Vietnam

Israel and ICS Cyber Security

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Inter-regional South-South Cooperation for

DATA FOR DEVELOPMENT June 13, 2017

Building Bridges to Prosperity with Canada First Stephan Wasylko, Minister Counselor U.S. Embassy Ottawa, Canada

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Security in India: Enabling a New Connected Era

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Inter-American Port Security Cooperation Plan

Connecting the Connectivities Symposium 11 June Thailand

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

2017 Aid for Trade - South-South Questionnaire SurveyMonkey. Q2: About you Jully Paruhum Tambunan Director of Multilateral Negotiation

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

GLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Package of initiatives on Cybersecurity

Digital Single Market Strategy for Europe

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Turning Risk into Advantage

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

The UNISDR Private Sector Alliance for Disaster Resilient Societies

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Towards a European Cloud Computing Strategy

GREEN BUILDINGS MARKET INTELLIGENCE GHANA COUNTRY PROFILE

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

Satellite Industry Statistics

Session 3:Funding and Financing of Air Cargo Infrastructure and Mobile Equipment. June 27, 2017

PwC Medical Technology Innovation Scorecard. Update June 2010

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Environment Report,

QBPC s Mission and Objectives

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Singapore: Your Gateway to ASEAN*

Alternative Fuel Vehicles in State Energy Assurance Planning

Integrating Climate Change and Sustainable Development in Development Planning and Budgeting

Data Protection Regulations and International Data Flows: Implications for Trade and Development

UAE and the NRI A brief introduction. December 2016

Cyber Security and Cyber Fraud

ASEAN s Cyber Confidence Building Measures

General Framework for Secure IoT Systems

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT

Emergency Management Response and Recovery. Mark Merritt, President September 2011

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

The CERT Top 10 List for Winning the Battle Against Insider Threats

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018

2017/SOM3/DIA/007 Digital Trade Building Blocks

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Data Security and Privacy at Handshake

8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

Surabaya, 19 April 2013 Jane Drake-Brockman

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

COMMENTS BY THE CONFEDERATION OF SWEDISH ENTERPRISE ON:

Transcription:

Indonesia Cyber Security Market

EXECUTIVE SUMMARY: Indonesia offers abundant demand for cyber security exports. Defense spending is modest, totaling $8 billion, but is expected to increase. Increase in defense spending partnered with the estimated $10 billion in losses from cyber crime annually, will translate into increased cyber security spending in future years. The political environment is relatively young, but appears stable. Moreover, the economy is expanding rapidly and is expected to become one the largest economies by 2030. US support has augmented Indonesian security policies, helping US defense firms access the market. Indonesia has recognized the importance of cyber security, but has only implemented patchwork solutions. IT build out, infrastructure enhancement, security management and human resource training offer the greatest areas of opportunity.

POLITICAL & ECONOMIC ENVIRONMENT Indonesia has implemented democratic reforms for more than ten years, and developed a free market economy. Following a series of terrorist attacks in early 2000s, Indonesia pursued augmented enforcement measures resulting in enhanced stability. US-Indonesian relations are improving. Indonesia is also engaged in 64 international organizations. In recent years, GDP has grown at an average rate of nearly six percent. Trade accounts for 47 percent of GDP.

CYBER SECURITY MARKET Indonesia is the number one source for cyber attacks. Last year there were 36 million incidents of hacking against the government. Online hacktivism is also rampant, despite limited internet access. Indonesia s current and proposed cyber security framework: Implemented Policies IT Monitoring Team National Cyber Security Organization Proposed Policies Cyber Defense Group New Regulations CIP Human Resource Training International Cooperation US Led Policies Comprehensive Partnership - Security Working Group

MARKET ACCESS Import burdens and costs are relatively low; however, there are some restrictions on imports of electronic products. Indonesia is a member of the ASEAN Free Trade Agreement, and also maintains agreements with the US, China and Japan. Also party to the WTO GPA. Government contracts may be listed as public tender, limited tender, direct selection of direct appointment. Foreign firms must partner with local companies, unless the contract is related to defense exports. US defense firms should employ a local agent to enter the market. Because of cultural norms, foreign firms are advised to visit their target market and agent regularly.

MARKET SIZE & GROWTH Military spending increased 163% in past six years, but totals $6.9 billion annually. Spending expected to increase in upcoming years. IT infrastructure spending is higher, reaching $13.1 billion in 2012, and expected to reach $21.4 billion by 2017. US and Indonesia maintain Defense Framework to collaborate on security policy. US provided $56 million in military funding from 2006 to 2009. There is an opportunity to build cyber defense from ground up. Key areas for export include: human resources; CIP enhancement, data control, network security, and basic IT.

PRACTICAL CONSIDERATIONS Indonesia has a weak IP framework. The 2008 Information and Electronic Transaction Law passed new reforms, but has been implemented slowly. Foreign firms should be aware of the boundaries of Indonesia s legal system. Socio-cultural issues include: Attitudes toward the military Nationalism Weak enforcement Corruption and labor laws impact labor market

PRIVATE SECTOR DEMAND: Most of the private sector is occupied by SOEs. Indonesia is projected to become a developed nation by 2025, so opportunity could be on the horizon. Indonesia regularly engages local companies in PPPs to develop infrastructure. US defense firms could market to these companies.