By John Derrick Anchinges | Export Assistance and Business Matching Division (EABMD) | DTI-Export Marketing Bureau
11 March 2019
Published also in Business Mirror
WHETHER you are an overseas company looking to establish business relations with Philippine suppliers or a local exporter searching for buyers or clients abroad, the Department of Trade and Industry-Export Marketing Bureau (EMB) has you covered.
EMB plays an indispensable role in empowering Philippine exporters by providing them the necessary platforms and tools that enable them to be part of the global supply chain. The EMB, mandated to oversee the development and promotion of Philippine exports, ensures that all programs, resources, and initiatives offered by the government pertinent to the strategic expansion of Philippine exports are made accessible and inclusive to its stakeholders. These services include, but are not limited to, trade facilitation, business matching, export accreditation, trade complaint handling, market consultancy and export knowledge processing.
EMB’s business-matching service, in particular, provides an important opportunity in advancing the competitiveness of Philippine export products and services. The Bureau endeavors to provide professional guidance to its stakeholders in navigating the vast and intricate network of businesses across the global market and break new grounds internationally.
The EMB is single-minded in its campaign to promote the best of the Philippines to the world. It works in close collaboration with trade associations, Philippine Embassies abroad and Philippine Trade and Investment Centers (PTIC) offices overseas to make certain that trade leads and business-matching opportunities are readily available to its clients and partners.
The EMB, through its Export Assistance and Business Matching Division (EABMD), assists micro, small and medium enterprises (MSMEs) by equipping them with the requisite export knowledge and entrepreneurial insights to ensure that Philippine commodities are of first-class quality and comply with the necessary international standards and certifications.
Direct inquiries from foreign buyers and trade opportunities reported by trade representatives abroad are available for reference at the DTI-EMB office in Makati, Metro Manila.
Equally important, the Bureau, through the assistance of our PTICs and international partners, facilitate and organize trade shows, exhibits, and, outbound and inbound business missions. Business missions are focused expeditions where Philippine suppliers are set to meet with foreign buyers abroad and vice versa to negotiate and conduct business. Trade shows, meanwhile, are exhibitions where companies in specific industries demonstrate and showcase their newest products and services, explore the latest market trends and opportunities, and engage in face-to-face business-matching meetings. To signify interest in joining these missions, please contact (02) 465-3300 local 216, 228, 230.
Tradeline Philippines, a trade intelligence platform of the DTI-EMB, boasts of a real-time business-matching system where foreign buyers’ requirements are matched with Philippine suppliers online. This program equips the bureau with the essential apparatus to maintain an integrated export intelligence structure that covers all dimensions of export marketing.
To be part of our database, you can register your company as either buyer or supplier at www.businessmatching.dti.gov.ph.
For further inquiries on trade statistics and online business matching, please visit tradelinephilippines.dti.gov.ph.
The growth of connected devices has accelerated the convergence of the once separate domains of Information Technology (IT) and Operational Technology (OT), resulting in Industrial IOT (IIOT).
IT and OT are increasingly complementary, but also very different. IT exists in the virtual world, where data is stored, retrieved, transmitted and manipulated. OT, in contrast, belongs to the physical world and deals with real time processes. While IT has to safeguard every layer of the system, OT is about maintaining control of systems: on-off, closed-open, and so forth. IT is about confidentiality; OT is about availability.
All this has made cyber security intrusions and threats more difficult to detect and prevent. At the same time, tools like the IOT search engine Shodan have made it easier for hackers to pinpoint vulnerable devices in a network, whether they are refrigerators, heating systems, or IOT-enabled garage-doors. The fact is that when connected to a network, any device with weak security poses a risk to the whole organization.
Only as strong as the weakest link
Malware gives hackers an even quicker route into a network if their targets can be tricked into opening infected documents. Secret papers leaked in 2017 revealed that CIA agents regularly use malware to turn connected televisions into bugging devices. Malware currently threatening businesses and consumers includes VPN filter malware, banking Trojans and ransomware. It is also evolving. Spear phishing, for example, targets specific individuals or companies, in contrast to the random, untargeted approach of traditional phishing.
The aim of any cyber security strategy is to protect as many assets as possible; certainly the most important assets. Since it is not feasible, sensible or even efficient to try to protect everything in equal measure, it is important to identify what is valuable and needs greatest protection. The next step is to identify vulnerabilities in order to prioritize and to erect a defence-in-depth architecture that ensures business continuity.
Resilience is not achieved simply by installing secure technology. It is mostly about understanding and mitigating risks in order to apply the right protection at the appropriate points in the system. It is vital that this process is very closely aligned with organizational goals because mitigation decisions may have a serious impact on operations. Ideally, it should be based on a systems-approach that involves stakeholders from throughout the organization.
A key concept of defence-in-depth is that security requires a set of coordinated measures. There are four steps that are essential in dealing with the risks and consequences of a cyber attack:
1. Understanding the system, what is valuable and what needs most protection
2. Understanding the known threats through threat modelling and risk assessment
3. Addressing the risks and implementing protection with the help of international standards, which are based on global best practices
4. Applying the appropriate level of conformity assessment — testing and certification — against the requirements.
ABC of cyber security
This is the ABC of cyber security:
1. for assessment
2. for best practices to address the risk
3. for conformity assessment for monitoring and maintenance
A risk-based systems-approach increases the confidence of all stakeholders by demonstrating not only the use of security measures based on best practices, but also that an organization has implemented the measures efficiently and effectively. This means combining the right standards with the right level of conformity assessment, rather than treating them as distinct areas.
The aim of the conformity assessment is to assess the components of the system, the competencies of the people designing, operating and maintaining it, and the processes and procedures used to run it. This may mean using different kinds of conformity assessment — ranging from corporate self-assessment to relying on suppliers’ declarations or independent, third-party assessment and testing — whichever seems most appropriate according to the different levels of risk.
In a world where cyber threats are becoming increasingly common, being able to apply a specific set of international standards combined with a dedicated and worldwide certification programme is a proven and highly effective approach to ensuring long-term cyber resilience.
Horizontal and vertical standards
The most robust defences rely on both "horizontal" and "vertical" standards. Horizontal standards are generic and flexible, applicable over a broad area and covering fundamental principles, concepts, definitions, terminology and similar general information. In contrast, vertical standards address application-specific areas.
Two examples of horizontal standards stand out. The ISO/IEC 27000 family helps to protect purely information systems (IT) and ensures the free flow of data in the virtual world. It provides a powerful, horizontal framework for benchmarking against best practices in the implementation, maintenance and continual improvement of controls. IEC 62443, the other horizontal standards series, is designed to keep OT systems running in the real world. It can be applied to any industrial environment, including critical infrastructure facilities, such as power utilities or nuclear plants, as well as in the health and transport sectors.
Complementing the horizontal standards are custom solutions designed to meet the needs of specific sectors. There are vertical standards covering the specific security needs of the nuclear sector, industrial communications networks, industrial automation and the maritime industry, for example.
Testing and certification
The industrial cyber security programme of the IECEE — the IEC System for Conformity Assessment Schemes for Electrotechnical Equipment and Components — tests and certifies cyber security in the industrial automation sector. The IECEE Conformity Assessment Scheme includes a programme that provides certification to standards within the IEC 62443 series.
Cyber security is a key strategic focus of both the IEC Standardization Management Board (SMB) and the IEC Conformity Assessment Board (CAB). They take a systems-approach to their coordination activities by involving all IEC stakeholders. The SMB has set up an Advisory Committee on Security (ACSEC) with a scope that includes:
• Dealing with information security and data privacy matters which are not specific to a single IEC Technical Committee
• Coordinating activities related to information security and data privacy
• Providing guidance to Technical Committees/Subcommittees (TCs/SCs) for the implementation of information security and data privacy in a general perspective and for specific sectors
The IEC CAB is working with the United Nations Economic Commission for Europe (UNECE) to create United Nations Common Regulatory Objectives Guidelines for Cybersecurity that describe a generic process integrating the four essential steps given above. It also focuses on the often-overlooked aspect of appropriate conformity assessment.
A holistic approach to cyber security
The best way to prepare for all these challenges is by implementing a holistic strategy that combines best practices with testing and certification. Holistic means addressing not only systems and processes, but also people. The rate of phishing attacks is increasing precisely because people make relatively easy targets.♦
Date of Release: 28 February 2019
International Electrotechnical Commission IEC Central Office 3, rue de Varembé, 1st floor
P.O. Box 131
CH - 1211 Geneva 20 - Switzerland
Phone : +41 22 919 02 11
Fax : +41 22 919 03 00
Contact BPS – The Philippines’ member to IEC
Bureau of Philippine Standards (BPS)
Department of Trade and Industry
3F Trade and Industry Bldg., 361 Sen. Gil Puyat Ave.,
Makati City, Philippines
Tourism is one of the world’s largest and fastest-growing economic sectors, with billions of people travelling each year – and numbers are expected to grow by 3.3 % annually until 20301. Tourist accommodation is one of the biggest players, meaning its potential impact on sustainable development is huge. New international guidance for accommodation facilities to help them improve their impact has just been published.
Not only is tourism growing by the day, it is an industry that promotes understanding and peace between countries and cultures, provides millions of jobs and is ideally placed to contribute directly to many of the United Nations’ 17 sustainability goals.
Accommodation facilities are central to any tourism activity and therefore hold immense potential for improving their impact on the environment, promoting social exchange and contributing to local economies in a positive way. But despite the many sustainable tourism programmes in existence worldwide, put forth by travel operators or other organizations with commercial interests, there has never been a truly impartial International Standard dedicated to accommodation. Until now.
ISO 21401, Tourism and related services – Sustainability management system for accommodation establishments – Requirements, specifies the environmental, social and economic requirements for implementing a sustainability management system in tourist accommodation. It addresses issues such as human rights, health and safety for employees and guests, environmental protection, water and energy consumption, waste generation and the development of the local economy.
Manuel Otero, Chair of the ISO technical committee that created the standard, said there are many initiatives in the market that accommodation providers could use to help them improve their environmental practices, but none that integrate the social and economic aspects as well, or are free from commercial interests.
“The fact that there are many schemes for sustainable accommodation from different countries and organizations can make it difficult for such facilities to know what is useful and reliable and how to meet their requirements,” he said.
“This internationally agreed standard provides clarity in a confusing market, applies to all types of accommodation and can serve as a tool to improve sustainable management. It will also help to stimulate the market for more sustainability in both the accommodation sector and the tourism industry as a whole.”
Convenor of the working group involved in the standard’s development, Alexandre Garrido added that those that implement a sustainability management system based on ISO 21401 will be able to attest to their guests and to the whole market that they are sustainable businesses.
“ISO 21401 will benefit accommodation facilities by strengthening their management and improving their reputation, while providing better-quality services to clients and improving relationships with suppliers, employees and the local community.”
ISO 21401 was developed by ISO technical committee ISO/TC 228, Tourism and related services, whose secretariat is held jointly by UNE, ISO’s member for Spain, and INNORPI, ISO’s member for Tunisia. It is available from your national ISO member or through the ISO Store.♦
Date of Release: 27 February 2019
5G is on everyone’s hot topic radar in 2019 and was certainly one of the most talked about technologies at the recent CES technology show in Las Vegas.
It is expected to provide greater capacity, as well as download speeds of 1Gbps, which is a 100 times faster than the current 4G networks. That would mean loading the HD version of the Avengers: Infinity War movie in a few seconds, rather than minutes it currently takes.
“5G is set to revolutionize wireless communications and play a major role in our future connected society and facilitate the road towards a more advanced Internet of Things,” says Mike Wood, who chairs IEC Technical Committee (TC) 106, which prepares International Standards on measurement and calculation methods to assess human exposure to electric, magnetic and electromagnetic fields.
When fully deployed, the technology promises not only to increase downloading and uploading speeds over the mobile network, but also to reduce latency, which is the time taken by networks to respond. That will drastically lessen the annoyance of time spent buffering.
Currently, 5G field tests are underway around the world and several operators have already announced plans for commercial rollout later this year. 5G will serve as the communications backbone necessary for the large growth in data and connectivity of today’s modern society, from the IoT with billions of connected devices, to self-driving cars and smart cities.
With worldwide rollout planning underway, the IEC is well advanced in the development of standards for human safety and device compliance. TC 106 is playing a key role.
IEC 62232, issued by TC 106, provides methods for determining the radio-frequency field strength near the radio-communication base stations with the intention of evaluating human exposure. This Standard takes into account the mmWave frequencies to be used for 5G networks.
For devices, TC 106, together with the IEEE, has established a new joint working group to develop international standards for 5G device testing by 2020 and is developing a Technical Report for publication in the first quarter of 2019.
“Knowing the importance of 5G and wireless communications on a global scale drives our experts who dedicate many hours, including significant personal time, to work on international standardization,” says Wood.♦
Date of Release: 27 February 2019
|Department of Trade and Industry Secretary Ramon M. Lopez, together with DTI VI Regional Director Rebecca M. Rascon and DTI Aklan OIC-Provincial Director Ma. Carmen I. Iturralde, checks on the product exhibit at the Casa Pilar in Boracay Island, Malay, Aklan on February 12, 2019. Eight (8) micro, small and medium enterprises (MSMEs) from Boracay Island joined the fair, along with 17 MSMEs from mainland Aklan. The products include hand-painted garments, bags, customized slippers, embellishments, among others. The exhibitors were those assisted by the DTI during the temporary closure of the island from May to October last year, as part of DTI’s program under the Boracay Rehabilitation.|
This is a Dummy Article!