CYBER SECURITY INCIDENT RESPONSE TEAM (CSIRT) JALIN
As a vital element in ensuring the company’s business continuity, PT Jalin Pembayaran Nusantara (“Jalin”), an information technology service provider, has established a Cyber Security Incident Response Team (CSIRT), known as Tim Tanggap Insiden Siber (TTIS). The team aims to safeguard the company’s business operations from various cyber threats that could disrupt the digital solutions and services it provides.
Basic information on CSIRT Jalin is signed with PGP key version 1.0, issued on October 24, 2024, and available in RFC Document 2350 (Indonesian version) . PGP Keys
VISION
To build a reliable and professional cyber resilience framework within Jalin.
MISSION
CSIRT Jalin’s mission:
- To enhance cybersecurity capacity and capabilities;
- To implement a security system that includes preventive, response, and recovery procedures against threats and attacks that cause disruptions, failures, or losses;
- To provide incident response and/or recovery mechanisms carried out by the cybersecurity incident response and recovery team.
CSIRT FUNCTIONS
- Coordinate the handling of cyber incidents at the corporate level.
- Develop technical guidelines for cyber incident handling.
- Serve as the company’s contact point and coordinate responses in the event of a cyber incident.
- Coordinate with sectoral Cyber Security Incident Response Teams or the national team if sectoral teams are unavailable.
- Ensure timely and effective incident response and recovery.
- Provide necessary assistance to service recipients.
- Conduct digital forensic activities to identify, collect, analyze, and examine digital evidence from computers or devices, which can then be used as evidence in legal cases or investigations.
- Report handled cyber incidents to the Board of Directors and, if sectoral teams are unavailable, to the national Cyber Security Incident Response Team.
- Coordinate and collaborate with other stakeholders while ensuring information confidentiality, data protection, and regulatory compliance.
TYPES OF INCIDENTS
- Distributed Denial of Service (DDoS)
- Malware
- Phishing
- Compromised Information
- Unauthorized Activity
- Brute Force Attack
- Email Spam
CONTACT US
Address:
Phone Number:
Email Address: