Realize a reliable IT society - IPA a "reliable IT society" ... and visualization of the human...
Transcript of Realize a reliable IT society - IPA a "reliable IT society" ... and visualization of the human...
Realize a “reliable IT society”
02
Tatsuo TomitaChairman
Realize a "reliable IT society"
IPA has promoted activities that play a role in IT policy since its
establishment in 2004 as a policy implementation agency under the
jurisdiction of the Ministry of Economy, Trade and Industry.
The way our society interacts with IT has been changing significantly
in recent years due to the progress of IoT, which will connect just
about everything to the Internet, the rapid improvement of big data
technologies and the rise of artificial intelligence.
We IPA look at "present" and "future" of IT society in a big picture and
we will endeavor to meet the challenges for creating safe and highly
convenient IT society and take actions for the future of IT society.
We are contributing to realize a "reliable IT Society" by approaching
three different perspectives - "IT Security", "IT Human Resources
Development" and "Development Promotion of Reliable Systems" - and
to solve the problems of IT society.
We humbly ask for your continued understanding and support.
Message from the Chairman
IPA has been established under the jurisdiction of the Ministry of Economy, Trade and Industry as an Incorporated Administrative Agency.
Incorporated Administrative Agencies are organizations that implement policy which is planned by the government and established for the purpose of implementing projects in an effective and efficient manner, which may not always be carried out when it is entrusted entirely to private sectors.
03
IPA's Missions
m i s s i o n
IT Security Development Promotion of Reliable Systems
Our Missions
A Three-Pronged Approach
Protecting Society from Cyber-attacks
Leading to Safe Security Measures
Assuring the Adequacy of Security
Developing Cybersecurity Human Resources
Making System Development and Operation of IT Systems More Efficient
Protecting the Safety and Security of Critical Infrastructure Systems
Certifying IT Knowledge and Skill
Clarifying Tasks and Skills Required for IT Work
Promoting Realization of IoT Businesses and Safe IoT Products
Exploring Possibilities of IT Innovation
Investigating and Analyzing IT Society and
Technology Trends
IT Human Resources Development
Realizing a Safe IT SocietyEnsuring Safety and Reliability of IT
Systems and Making System Development and Operation More Efficient
Assisting Businesses, Promoting Technology Development, and Developing Human Resources to
Support the IT Society of the Future
04
The convenience of IT brings us affluent life, whereas threats also exist that endanger our safety.
In order to raise the level of defense against security threats such as cyber-attacks targeting
organizations, businesses, and societal infrastructure, as well as computer viruses and unauthorized
access, IPA is promoting measures to defend organizations and businesses against cyber-attacks,
developing cybersecurity human resources, and raising public awareness of information security
measures, as well as operating policies to ensure the safety of IT products and systems.
Realizing a Safe IT Society
mission
1
Protecting Society from Cyber-attacksJ-CSIP・J-CRATJ-CSIP:Initiative for Cyber Security Information sharing Partnership of Japan
J-CRAT:Cyber Rescue and Advice Team against targeted attack of Japan
In recent years, cyber-attacks targeting organizations and businesses have become a significant threat, and in particular, countermeasures against targeted cyber-attacks have become an urgent societal issue we need to address.
IPA promotes projects called "J-CSIP" and "J-CRAT" to protect against the threat of targeted cyber-attacks against critical industries and societal infrastructure.
J-CSIP achieves early detection, deterrence and prevention of cyber-attacks against organizations by collecting actual cases and analyzing data of the attacks, and by sharing information regarding security measures.
J-CRAT assists organizations that have been suffered from cyber-attacks by analyzing the damage and supports to cope with the issue in an early stage, and prevents and reduces damage from spreading.
IPA is here to help
A targeted cyber-attacks? A virus infection?
What should I do?
All businesses and organizations in Japan
Intended for
https://www.ipa.go.jp/security/tokubetsu/
?
05
Developing Cybersecurity Human ResourcesIndustrial Cyber Security Center of Excellence
Registered Information Security Specialist (RISS) Scheme
In recent years, the risks of cyber-attacks are increasing drastically. The cyber-attacks are causing damage not only to private companies or individuals but also to the industrial infrastructures with the clear intention of threatening citizens’ lives and property.
To protect against these attacks and threats, the "Industrial Cyber Security Center of Excellence" will be established within the IPA in 2017 to develop core cybersecurity human resources through public and private cooperation.
The center will develop the human resources, technologies, and know-how for managing the core cybersecurity measures for critical infrastructure and industrial bases through practical experience, including exercises using mock plants and safety verification of actual systems.
These human resources will build a network of communicating with security professionals in their own fields, other industries, and overseas, to go on to lead comprehensive security strategic planning in each of their companies.
As a result of the drastic increase in cyber-attacks recently, cybersecurity countermeasures have become more crucial, and yet there is a shortage of human resources of carrying out these sorts of security measures. For this reason, a national qualification called "Registered Information Security Specialist (RISS)" was established in October 2016 to register individuals possessing high-level practical ability in cybersecurity.
As the organization implementing this scheme, IPA is administering operations related to examination, registration, and training. By ensuring the quality of the human resources through continuous training attendance duty, and visualization of the human resources through publication of their registration information, IPA strives to develop, ensure, and promote the cybersecurity personnel required by businesses and organizations.
RISS Registration and Qualification Maintenance Flow
Actual Cases of Cyber-Attacks Targeting Critical Infrastructure and Industrial Infrastructure
Held every April and OctoberPass the "Registered
Information Security Specialist(RISS) Examination"
Take coursesOnline course
(once every year)On-site course
(once every three years)
Apply for registration (at any time)Being registered (April 1 and October 1 of each year)
Those who passed the former examinations, the "Information Security Specialist Examination" and the "Information Security Engineer Examination," can apply for registration until August 19, 2018.
Critical infrastructure operators in Japan
Examination Registration Maintenance
All businesses, organizations, and IT engineers in Japan
Realizing a Safe IT Societymission
1
Large-scale blackout due to virus intrusion into the power grid. (Ukraine, 2015)
RISS Logo
Blast furnace at steel mill damaged due to system unauthorized access. (Germany, 2014)
Oil pipeline explosion due to system unauthorized access.(Turkey, 2008)
IT Security IT Human Resources Development Development Promotion of Reliable Systems
Intended for
Intended for
06
Security Camp
Security Help Desk
IPA holds a "Security Camp" with the goal of discovering and developing outstanding young cybersecurity human resources who will support the IT society of the future.
At the Security Camp, which is run on a nationwide scale, instructors who play an active role on the front lines of the information security industries teach students of up to age 22 high-level information security technology and information ethics in a training camp environment. We also conduct security mini-camps for smaller groups at locations throughout Japan.
IT engineers in Japan
Leading to Safe Security Measures
IPA has been operating a help desk to give consultations related to computer viruses, unauthorized access, and the like.
The help desk gives analyses and advice in response to inquiries from users of Internet services, and in addition improves citizens' security literacy and promotes security measures by publishing information regarding problem trends, attack schemes, and security measures based on the problems about which inquiries are received.
All businesses, organizations, and IT users in Japan
IPA is here to help
If a problem such as a computer virus infection has
occurred
https://www.ipa.go.jp/security/anshin/index.html
Virus infection
One-click billingUnauthorized
access
Developing Cybersecurity Human Resources
Intended for
Intended for
07
All businesses, organizations, and IT users in Japan
Information Security Measure Dissemination and Awareness Raising Project
In order to use IT safely, the users themselves must raise their level of awareness of information security as well as carry out security measures.
In order to disseminate information security measures to individuals, businesses, and organizations, IPA publishes a variety of booklets summarizing information regarding security information, publishing information for training and the like, and conducting various seminars and events.
Vulnerability Countermeasures Promotion ProjectIf weakness ("vulnerability") in operating systems and software, or in the products which contain these systems is left unaddressed, it can lead to unauthorized access, virus infections, and the data leakage of personal information.
In order to encourage users to carry out vulnerability countermeasures, IPA operates a "vulnerability notification scheme" and a "vulnerability information database," and we release information regarding vulnerability countermeasures publicly.
JVN (Japan Vulnerability Notes): a vulnerability information portal website
JVN iPedia: a vulnerability information database
MyJVN: a vulnerability information sharing framework
■Vulnerability notification scheme:We receive vulnerability notifications of software and websites, and call upon developers and managers to fix them.Information regarding software fixes is published on the "JVN" portal site.(Total notifications: over 13,000 as of February 2017)
■ Vulnerability information database:We provide not only information published on JVN, but also vulnerability information from the United States government in Japanese.(Information items held: over 65,000 as of February 2017)
All businesses, organizations, and IT users in Japan
System withvulnerabilities
Vulnerabilities of IoT devices could also be
targeted
Making system High-load / stopping services
Data deletion and system destruction
Altering web pages
Virus-spreading sites
Data leakage Virus infection
Deleted
Confidentialdata
Instructional advertisements about Password Awareness " PASSWORD - I want to protect you more strongly - "
IPA Countermeasure Guide Series
http://jvndb.jvn.jp
Realizing a Safe IT Societymission
1
Intended for
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
08
Japan Information Technology Security Evaluation and Certification Scheme
Japan Cryptographic Module Validation Program
JISEC Certificate JCMVP Certificate
Assuring the Adequacy of SecurityJISEC
JCMVP
Based on the international standard ISO/IEC 15408, IPA operates a scheme to evaluate the adequacy and reliability of the security of IT products.
When procuring government systems that handle highly confidential information, the security risk of the systems can be reduced by adopting commercial IT products that have been evaluated and certified. The evaluation results under this scheme are mutually recognized for government procurement in 27 countries (as of March 2017) which have equivalent evaluation and certification schemes.
Cryptographic functions are embedded in electronic devices such as smartphones and encrypted USB drives to prevent information from being stealthily obtained or illicitly modified.
Based on the international standard ISO/IEC 19790, IPA operates a scheme to check the suitability and reliability of the cryptographic functions implemented in electronic devices to promote the safe use of software and electronic devices.
Government agencies, municipalities, and corporate vendors
Government agencies, municipalities, and corporate vendors
Intended for
Intended for
09
Security Examine Project for Incorporated Administrative Agencies
In order to encourage independent and continuous improvement in cybersecurity in each organizations, IPA has been delegated some of the tasks from the Cybersecurity Strategic Headquarters, and is carrying out information security audits and cyber-attacks detection.
Incorporated administrative agencies and other government-related organizations
CRYPTRECEncryption technology is one of the core technologies of cybersecurity. IPA operates "CRYPTREC," a committee that researches and evaluates encryption technology, in cooperation with relevant organizations*.
CRYPTREC creates and publishes an "e-Government Recommended Cipher List" specifying encryption technologies that are recommended for system procurement and use by government agencies.
In addition, the committee creates and publishes guidelines and the like describing configuration methods that government agencies and general corporations should apply when using encryption technologies in order to promote the safe use of the technologies.
* The Ministry of Internal Affairs and Communications; the Ministry of Economy, Trade and Industry; and the National Institute of Information and Communications Technology.
Cryptography Research and Evaluation Committees
Reference: CRYPTREC website https://www.cryptrec.go.jp/english/index.html
Government agencies, and all businesses and organizations in Japan
mission
1Realizing a Safe IT Society
Intended for
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
Without sharing of knowledge Countermeasures against system failure based on sharing of knowledge
mission
Ensuring Safety and Reliability of IT Systems and Making System Development and Operation More Efficient
2
Our societal and economic infrastructure, and everyday life depend upon a wide variety of IT systems.
Therefore, these IT systems are required to be operated, without being hampered by the obstacles such
as cyber-attacks and system failures, stably and continuously under any circumstances.
Furthermore, as systems become more and more complex and diversified, more reliable and efficient
mechanisms for developing the systems themselves is required.
IPA is engaged in efforts to protect the safety and security of critical infrastructure systems, as well as
efforts to support the creation of safe and reliable systems that meet stringent requirements, and to use
IT to make dissemination of information more efficient.
Protecting the Safety and Security of Critical Infrastructure SystemsProject to Disseminate Techniques for Analyzing Risks and Evaluation in Critical Infrastructure Systems, and to Share Information on System Failures
When critical infrastructure stops functioning due to cyber-attacks, system failures, and the like, it has a tremendous impact on our society.
IPA is striving to disseminate techniques and know-how for analyzing and evaluating security risks in critical infrastructure control systems.
Moreover, in order to decrease the risk of system failures and reduce the impact that such failures have, we are collecting and analyzing actual cases of system failure, and promoting the construction of mechanisms for sharing the results widely across industries and fields.
10
Before After
Company A Company B Company C
Cause analysis Countermeasure
investigation
Action
Failure
Company A
Corporate vendors, corporate users, and critical infrastructure operators in Japan
Cause analysis Countermeasure
investigation
Action
Failure
Company B
Action
Failure
Company C
Cause analysis Countermeasure
investigation
Action
Failure
Action Action
Perform cause analysis of system failure and investigationof countermeasures, and create and share the generalized,
abstracted, and normalized knowledge (as a knowledge base)
Intended for
11
Making System Development and Operation of IT Systems More Efficient
Lack of harmonization and unification of related fields
Uncertainties about risks and requirements are increasing due to the growth of system complexity
[STAMP/STPA]Analyze risks using a simple conceptual design model
[Upstream Process Strengthening in System Construction]Encourage system construction based on mutual recognition of risks and requirements by corporate users and vendors
[Systems Engineering]Lead systems that blend a variety of fields to a successful conclusion
Project to Encourage Introducing Systematic Methods and Popularize Mechanisms for Realizing High Reliability Systems
There has been an increase in complex systems "SoS (System of Systems)" in which independent systems form interrelationships to provide value in recent years, and there has been a trend toward components with greater capabilities and more diversified coordination.
In order to develop systems that can support these characteristics, IPA works on encouraging system development that is based on the concept of "systems engineering."
More specifically, within systems engineering we are focusing on "system safety assurance" and "upstream processes in system construction," and we are also working to popularize "STAMP (Systems-Theoretic Accident Model and Processes)," which models accidents and failures in complex systems, and "STPA (Systems-Theoretic Process Analysis)," a technique for identifying risks and devising countermeasures. In addition, in light of the fact that insufficient agreement on upstream process requirements between corporate users and vendors is thought to be the cause of most project failures and operational problems, we are striving toward realizing highly reliable systems by publishing guidebooks about strengthening upstream processes.
A technology innovation giving rise to more complex, more diversified, more sophisticated systems
Energy systems
Automotive systems (automatic operation)
Smart houses
Aviation systems
Railway systems
Factory systems
ITS(Intelligent Traffic Systems)
Difficulties of predicting system failures and problems
Ensuring Safety and Reliability of IT Systems and M
aking System
Developm
ent and Operation M
ore Efficientmission
2
Corporate vendors, corporate users, and IT engineers in Japan
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
Making System Development and Operation of IT Systems More Efficient
12
Standardization of Common Vocabulary
When requesting relief supplies, the term "water" that was utilized in the systems did not have a unified definition, which resulted in delays in providing the supplies
Efficient communication without misunderstanding between different systems.
Standardized vocabulary with "attributes" and
"definitions"
Disaster-struck municipality Municipality A
Municipality A
Municipality B
Municipality C
Common Vocabulary Standardization Project
Character Information (Moji-Joho) Project
One of the topics related to encouraging the use of public data ("open data") held by governments and municipalities is "standardization of vocabulary." Even if terms are easy for a human being to understand, machines have difficulty comprehending the meaning of terms by themselves if their expression and structure differ due to the particular systems and circumstances, which results in an obstacle to communicate between systems and the secondary use of data.
In order to solve this problem, IPA promotes a "Common Vocabulary Standardization Project" in which the definitions of terms used in data are standardized by attaching "attributes" and "meanings" to them.
In administrative affairs that involves handling family registration information, approximately 60,000 characters are used in order to render peoples’ names accurately. Of these, characters that are not part of the international standard are time-consuming and costly to communicate between differing systems.
IPA is involved in a "Character Information Infrastructure Creation Project" in which the approximately 60,000 characters are prepared and internationally standardized so that character information that is outside the range of particular systems can be communicated smoothly.
Problems Actually Encountered in Large Scale Disasters
Problems that occur in administrative affairs
Supply request: "water"
Supply request: "water"
槗本 一郎
槗 槗はしもと いちろう
?
?
?
External character 槗本 一郎
□本 一郎
□本 一郎
Disadvantage of external characters
● Due to reliance on the system environment, the range of character information that can be shared is limited
● Creation and handling are time-consuming and costly
Organizations deal with characters that are not available in typical computers by creating custom characters ("external characters") which may not display correctly on different systems.
IMIInfrastructure for Multi-layer Interoperability
https://imi.go.jp/
Do you request"tap water",
"drinking water", or"mineral water"?
You need"mineral water"
Ensuring Safety and Reliability of IT Systems and M
aking System
Developm
ent and Operation M
ore Efficient
mission
2
Municipalities and all businesses, organizations, and IT users in Japan
Disaster-struck municipality Municipality A
Municipalities and all businesses, organizations, and IT users in Japan
Intended for
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
13
mission
Assisting Businesses, Promoting Technology Development, and Developing Human Resources to Support the IT Society of the Future
3
In order to build a safe and affluent IT society, it will be important to create new value based on IT, and to
develop human resources with high-level IT expertise.
Moreover, as IoT continues to permeate throughout society, the needs for leading-edge businesses that
utilize IoT, as well as needs to develop safer and more sophisticated IoT products, will surely increase.
In anticipation of the IT society of the future, IPA promotes projects that support the creation of
businesses that will contribute to this industry, to promote technology development, and to develop IT
human resources.
Exploring Possibilities of IT InnovationThe MITOU Project In Japanese, MITOU means "frontier" or "area no one has ever set foot in."
The "MITOU Project" being conducted by IPA is geared toward developing talented IT human resources as well as creating new markets in the IT field. We gather together young IT creators with unique ideas and outstanding technological skills and train their talents and ideas through development projects conducted with the support of Project Managers.
Many start-up companies and groundbreaking development projects involving big data technologies, AI, and robotics have taken shape as a result of this project.
IT engineers in Japan
Public Participation and choose
Major past accomplishments
Development (Training for human resources through project development)
Evaluation (Certificating the persons have remarkable talent as "The Super Creators")
"Ontenna": a new user interface where you can experience sound through strands of hair
"Sight": a "seeing by ear" device for expanding spatial perception
"Phenox": a palm-sized flying robot that combines hobbyist and
practical aspects
Intended for
14
Certifying IT Knowledge and SkillInformation Technology Engineers Examination (ITEE) Scheme
Information Technology Engineers Examination in Asia
ITEE is a Japanese national examination in which the Ministry of Economy, Trade and Industry certifies individuals as having knowledge and expertise as information technology engineers that meet or exceed certain standard. IPA administers the ITEE and the Registered Information Security Specialist (RISS) Examination, under the "Act on Facilitation of Information Processing."
ITEE is used by a wide variety of organizations, from IT vendors to IT users and educational institutions, as a consistent, objective index for evaluating IT knowledge and technical ability by applicant type (IT engineer or IT user), level, and field of expertise.
*Number of applicants in fiscal year 2015: 450,000
In order to support IT human resource development in the Asian region, "ITPEC Examination" is currently conducted in 7 countries. The examination is implemented based on the Information Technology Engineers Examination in Japan, and IPA supports the ITPEC Examination. Three examination categories equivalent to IPA’s "IT Passport Examination" - "Fundamental Information Technology Engineer Examination," and "Applied Information Technology Engineer Examination" - are conducted in the 7 ITPEC countries.
IPA is also promoting mutual recognition with unique national IT examinations in other Asian countries for the mobility of IT human resources.
IT Engineer
Fundamental Knowledge /
Skill
Applied Knowledge /
SkillAdvanced Knowledge / Skill
Fundamental Information Technology
Engineer Examination
(FE)
Applied Information Technology
Engineer Examination
(AP)
IT Strategist Examination (ST)
Systems Architect Examination (SA)
Project Manager Examination (PM)
Network Specialist Examination (NW)
Database Specialist Examination (DB)
Embedded Systems Specialist Examination (ES)
IT Service Manager Examination (SM)
Systems Auditor Examination (AU)
All persons who promote
the safe utilization of IT
Fundamental knowledge and skills for promoting the safe
utilization of IT
Information Security Management Examination (SG)
RISS
Knowledge and skills related to information security, to design, develop, and operate a safe information system
Registered Information Security Specialist Examination (SC)
All persons who utilize IT
All business persons
Common and basic knowledge for utilizing IT
IT Passport Examination (IP)
Information Technology Engineers Examination (ITEE)Registered Information Security Specialist (RISS) Examination
India
China
South Korea
Philippines
Taiwan
Myanmar
Singapore
Thailand
Malaysia
Vietnam
Bangladesh
■Countries where the ITPEC Examination is conducted
■Countries/regions with which mutual examination agreements are concluded
Philippines, Thailand, Vietnam, Myanmar
Malaysia, Mongolia, Bangladesh
India, Singapore, Taiwan, China, South Korea (as of March 2017)
Mongolia
IT engineers and IT users in Japan
IT engineers and IT users in AsiaTarget
Intended for
Intended for
15
Promoting Realization of IoT Businesses and Safe IoT Products
All businesses, organizations, and IT users
Clarifying Tasks and Skills Required for IT Worki Competency Dictionary
Project to Support New IoT Business Creation
Information Technology Engineers Examination in Asia
IPA publishes the "i Competency Dictionary (iCD)" a content for developing human resources to meet the increasingly diversifying needs of the IT society.
iCD provides tasks and skills required for IT industries systematically, identifying potential organizational problems and their solutions, thus facilitating objectives-oriented human resource development.
Through a variety of collaborations in the United States, Europe, and Asia, iCD is currently expanding globally, and is being used in more than 10 countries around the world.
IPA is engaged in the "Project to Support New IoT Business Creation" with the goal of creating new business models for IoT, big data technologies, and AI.
By deploying instructors (mentors) to give guidance and advice to projects involving software development or technologies that utilize IT, this project strives to accelerate innovation and revitalize the IT industry, with a focus on entrepreneurs and IT creators.
The project is also engaged in lending a hand in regional revitalization by supporting new business creation activities and solving regional problems through "IoT Acceleration Lab, Regional Edition" groups organized to focus on local municipalities throughout Japan.
Task Dictionary Skill Dictionary
Task List Skill List
Roles Professions
Data Examples
Data Examples
Linkage
Information Technology Engineers Examination (ITEE)
Registered Information Security Specialist (RISS) Examination
Covers the "Range of Questions in the Information Technology Engineers Examination (ITEE) and Registered Information Security Specialist (RISS) Examination" October 2016 edition
Registered Information Security Specialist (RISS) Examination
Assisting Businesses, Prom
oting Technology Developm
ent, and D
eveloping Hum
an Resources to Support the IT Society of the Futuremission
3
Corporate vendors, municipalities, IT engineers, and managers in Japan
Intended for
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
16
Project to Promote Safe and Reliable IoT Products and System Development
IPA has established, and is striving to set and popularize development guidelines presenting a comprehensive view of problems that should be identified during system development, including IoT-specific risks and the failures associated with them.
We have also created and are promoting reports and manuals presenting collections of threat analyses, countermeasure investigations, and responses to vulnerabilities for security designers.
Internet
月極
Products of various fields (businesses)
Products of various fields (businesses)
Connecting
Unexpected risks of failure and accident
Security risks
Manuals for development of IoT products and systems
Promoting Realization of IoT Businesses and Safe IoT Products
Assisting Businesses, Prom
oting Technology Developm
ent, and D
eveloping Hum
an Resources to Support the IT Society of the Future
mission
3
Corporate vendors and IT engineers in Japan
Intended for
17
Investigating and Analyzing IT Society and Technology TrendsInvestigation and Analysis of Information Security Threats and Countermeasure Implementation
Investigating and Analyzing IT Human Resource Trends
Investigating and Analyzing System Development Project Trends
As the IT environment progresses day by day along with the use of IoT, AI, and the like, security threats are also growing. IPA investigates and analyzes security threat trends, IT users' awareness of the threats, and status of the countermeasure implementation status.
Also we are striving to promote the safe use of IT by organizing the results of investigation and analysis into "Information Security White Papers" and research reports, and by establishing guidelines.
IPA is investigating and analyzing the trends in the IT industry and IT human resources given the changes in the environment surrounding IT human resources and IT work style diversity.
With the aim to make current IT human resource trends clear, we provide information that can be utilized for development of IT human resources and formulation of IT human resource development policies.
IPA considers quantitative project management based on the analysis of data obtained from examples of actual development to be valuable in developing high-quality software. In light of this, we continuously collect and accumulate software development project data from a variety of industries, and publish our analysis methods and results.
All businesses, organizations, and IT users in Japan
All businesses, organizations, and IT engineers in Japan
The Japanese Government, Business managers, Human resource Departments, IT engineers in Japan
Intended for
Intended for
Intended for
IT Security IT Human Resources Development Development Promotion of Reliable Systems
18
●Name
Information-technology Promotion Agency, Japan
Established: January 5, 2004(Its predecessor "IPA Special Law Entity" was established on October 1, 1970.)
●Address
Bunkyo Green Court Center Office 15/16/18F(General Reception 13F)2-28-8 Honkomagome, Bunkyo-ku,Tokyo, Japan 113-6591
TEL: +81-3-5978-7501
FAX: +81-3-5978-7510
●Executives
Chairman: Tatsuo Tomita
Vice Chairman: Tatsushi Kawaura
Vice Chairman: Yutaka Hayami
Auditor: Kouji Yamada
Auditor: Atsuko Miyaji (part time)
(As of March 2017)
Chairman Auditors
Technology Headquarters
Industrial Cyber Security Center of Excellence
IT Human Resources Development Headquarters
Audit Office
Internal Audit Office
IT Security Center
Execution Department
Promotion Department
Center for Innovative Human Resources
Open Standards Promotion Center
Japan Information Technology Engineers Examination Center
Software Reliability Enhancement Center
Planning and Management Department
Center for Human Resources Development Initiative
IT Human Resources Development Planning Department
Finance Department
●Organization Chart
Nearest stationToei Mita Line Sengoku Station (A1 or A3 exit), 4 minutes' walk
Tokyo Metro Namboku Line, Komagome Station (A1 or A2 exit), 9 minutes' walk
JR Yamanote Line Komagome Station, 10 minutes' walk
JR Yamanote Line Sugamo Station, 12 minutes' walk
Contact: +81-3-5978-7543
Contact: +81-3-5978-7544
Contact: +81-3-5978-7507
Contact: +81-3-5978-7600
Contact: +81-3-5978-7550
Contact: +81-3-5978-7506
Contact: +81-3-5978-7536
Contact: +81-3-5978-7502
Contact: +81-3-5978-7554
Contact: +81-3-5978-7554
Contact: +81-3-5978-7554
Vice Chairman
Outline of the Organization
General Affairs DepartmentContact: +81-3-5978-7501
Strategic Planning DepartmentContact: +81-3-5978-7503
19
[Mail News]http://www.ipa.go.jp/about/mail/
[ IPA Channel]https://www.youtube.com/ipajp
[Twitter]https://twitter.com/IPAjp
[Facebook]https://www.facebook.com/ipaprjp/
http://www.ipa.go.jp/
http://www.ipa.go.jp/about/ipa_news/
We are publishing information and news regarding the projects in which IPA is involved.
We are updating IPA news and content.
A bimonthly public relations magazine published by IPA.It presents the month-to-month activities of IPA
IPA website
Mail NewsSocial Media Overview
IPA NEWS
About Us
2017.8.25