Strengthening Cybersecurity: A Comparative Analysis of Agile Governance in Preventing Data Leakage in Indonesia and Malaysia
Keywords:
Cybersecurity Governance, Data Protection, Policy AdaptationAbstract
This research examines the implementation of Agile Governance in mitigating data breaches to strengthen cybersecurity by comparing strategies between Indonesia and Malaysia. As digital transformation accelerates, the risk of cyber threats, including data breaches, continues to increase. Using a comparative approach, this research analyzes the six key principles of Agile Governance: Good Enough Governance, Business-Driven, People-Focused, Based on Quick Wins, Systematic and Adaptive Approach, and Simple Design and Continuous Improvement. Findings show that Malaysia exhibits a more comprehensive cybersecurity framework, supported by early enacted regulations such as the Personal Data Protection Act (PDPA) of 2010, coordinated policies under the National Cyber Security Agency (NACSA), and structured response mechanisms such as MyCERT. In contrast, despite having implemented the Personal Data Protection Act (PDP Act) by 2022 and the role of the National Cyber and Crypto Agency (BSSN), Indonesia still faces regulatory gaps, weak inter-agency coordination, and inadequate infrastructure. This study highlights Malaysia's proactive stance in cybersecurity policy development and resource allocation, contrasting with Indonesia's continued improvements in digital security regulations and public awareness initiatives. The findings of this study suggest that Indonesia can adopt Malaysia's strategic regulatory approach and improve institutional coordination to enhance its cybersecurity resilience. This research contributes to the policy discussion to improve the national cybersecurity framework and calls for further studies on the effectiveness of policy implementation in reducing data breaches.
References
AD-INS. (2023). Memahami Kebocoran Data: Jenis, Penyebab & Dampaknya. AD-INS. https://www.ad-ins.com/id/our-story/kisah-adins/memahami-kebocoran-data-jenis-penyebab-dan-dampaknya/
Admin Aptika. (2022, October 13). Menkominfo: Keamanan Data Tanggung Jawab Seluruh Pemangku Kepentingan. KOMINFO. https://aptika.kominfo.go.id/2022/10/menkominfo-keamanan-data-tanggung-jawab-seluruh-pemangku-kepentingan/
Akoum, M., & Bu Hazzaa, H. (2019, October 21). A Data Governance Framework - The Foundation for Data Management Excellence. Day 2 Tue, October 22, 2019. https://doi.org/10.2118/198593-MS
Annur, C. M. (2022, September 13). Indeks Keamanan Siber Indonesia Peringkat ke-3 Terendah di Antara Negara G20. Databoks. https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/40085035d61073f/indeks-keamanan-siber-indonesia-peringkat-ke-3-terendah-di-antara-negara-g20
Azmi, I. M. A. G., & Zulhuda, S. P. W. J. S. (2012). Data leak, critical information infrastructure and the legal options: what does wikileaks teach us? International Journal of Cyber-Security and Digital Forensics, 1(3), 226–231.
Busri, Ihyani Malik, & Nur Wahid. (2023). Implementasi Agile Governance pada Reformasi Birokrasi 4.0 di Puslatbang KMP LAN Kota Makassar. Jurnal Administrasi Publik, 19(1), 85–119. https://doi.org/10.52316/jap.v19i1.134
Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). SAGE.
Dicoding Intern. (2023, May 17). Cyber Security: Pengertian, Jenis, dan Ancamannya. Dicoding. https://www.dicoding.com/blog/cyber-security-pengertian-jenis-dan-ancamannya/
digwatch. (2020, August). Malaysia Cybersecurity Strategy. Digwatch. https://dig.watch/resource/malaysia-cybersecurity-strategy
Fadli, M. R. (2021). Memahami desain metode penelitian kualitatif. HUMANIKA, 21(1), 33–54. https://doi.org/10.21831/hum.v21i1.38075
Firhansyah, M. (2021, February 15). Agile Governance dalam Perspektif Pelayanan Publik Propartif. OMBUDSMAN. https://ombudsman.go.id/artikel/r/artikel--agile-governance-dalam-perspektif-pelayanan-publik-propartif
Haris, A. (2024, June 5). 7 Fungsi CyberSecurity Malaysia. Log Masuk. https://logmasuk.my/cybersecurity-malaysia/
Harruma, I. (2022, September 16). Badan Siber dan Sandi Negara: Sejarah, Tugas dan Fungsinya. KOMPAS.Com. https://nasional.kompas.com/read/2022/09/16/05050021/badan-siber-dan-sandi-negara--sejarah-tugas-dan-fungsinya
Hidayat, R. (2020, August 11). Tiga Model Pembentukan Otoritas Independen Perlindungan Data Pribadi. Hukum Online.
Id-SIRTII/CC. (2018). Sejarah Id-SIRTII/CC. Id-SIRTII/CC. https://idsirtii.or.id/halaman/tentang/sejarah-id-sirtii-cc.html#:~:text=Menteri%20Komunikasi%20dan%20Informatika%20dalam%20hal%20ini%20menunjuk,melakukan%20pengawasan%20keamanan%20jaringan%20telekomunikasi%20berbasis%20protokol%20internet.
Indonesia.Go.Id. (2024, September 13). Masa Depan Ekonomi Digital Indonesia, Strategi Menuju 2030. Indonesia.Go.Id. https://indonesia.go.id/kategori/editorial/8497/masa-depan-ekonomi-digital-indonesia-strategi-menuju-2030?lang=1
JDIH BPK. (2022). Undang-undang (UU) Nomor 27 Tahun 2022 Tentang Pelindungan Data Pribadi. https://peraturan.bpk.go.id/Details/229798/uu-no-27-tahun-2022
Kementrian Digital Malaysia. (2010). UU Malaysia PDP 2010 • Perlindungan Data Pribadi. https://www.pdp.gov.my/ppdpv1/en/akta/pdp-act-2010/
Kurniawan, D. I., Maulana, A., & Wicaksono, I. (2021). AGILE GOVERNANCE SEBAGAI BENTUK TRANSFORMASI INOVASI PEMERINTAH DAERAH. Repository UNMUH Jember, 1–9. http://repository.unmuhjember.ac.id/9842/10/10.%20Artikel.pdf
Limanseto, H. (2023, December 4). Siapkan Guideline bagi Transformasi Digital, Pemerintah Segera Luncurkan Buku Putih Strategi Nasional Pengembangan Ekonomi Digital Indonesia 2030. KEMENTERIAN KOORDINATOR BIDANG PEREKONOMIAN REPUBLIK INDONESIA. https://www.ekon.go.id/publikasi/detail/5531/siapkan-guideline-bagi-transformasi-digital-pemerintah-segera-luncurkan-buku-putih-strategi-nasional-pengembangan-ekonomi-digital-indonesia-2030
Loviana, K. (2022). Cybersecurity and Cyber Resilience in Indonesia: Challenges and Opportunities. Center for Digital Society (CfDS), 1–5. https://cfds.fisipol.ugm.ac.id/wp-content/uploads/sites/1423/2022/05/Commentaries-Cybersecurity-and-Cyber-Resilience-in-Indonesia-English-2.pdf
Luna, A. J. H. de O., Kruchten, P., & Moura, H. (2015). Agile Governance Theory: conceptual development. 12th International Conference on Management of Technology and Information, 1–22. https://www.researchgate.net/publication/277141416_Agile_Governance_Theory_conceptual_development
Majlis Keselamatan Negara. (2020, October 19). Kerajaan lancar Strategi Keselamatan Siber Malaysia RM1.8 bilion. Majlis Keselamatan Negara. https://www.mkn.gov.my/web/ms/2020/10/19/kerajaan-lancar-strategi-keselamatan-siber-malaysia-rm1-8-bilion/
Muhamad, N. (2023, November 29). Indeks Keamanan Siber Indonesia Tertinggi ke-5 di ASEAN 2023. Databoks. https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/5bf8dbfb3998ee8/indeks-keamanan-siber-indonesia-tertinggi-ke-5-di-asean-2023#:~:text=Sementara%20itu%2C%20Malaysia%20dikukuhkan%20sebagai,peringkat%20ke%2D22%20secara%20global
Muñoz, J. L. R., Ojeda, F. M., Jurado, D. L. A., Peña, P. F. P., Carranza, C. P. M., Berríos, H. Q., Molina, S. U., Farfan, A. R. M., Arias-Gonzáles, J. L., & Vasquez-Pauca, M. J. (2022). Systematic Review of Adaptive Learning Technology for Learning in Higher Education. Eurasian Journal of Educational Research, 2022(98), 221–233. https://doi.org/10.14689/ejer.2022.98.014
Mutiarin, D., Wahdania C.S, N., & Misran. (2022). Formulation of e-Participation design in realizing agile government based on technology and information: A case study in Indonesia. International Conference on Public Organization (ICONPO 2021), 209 (Iconpo 2021), 207–214. https://www.atlantis-press.com/proceedings/iconpo-21/125970944
MyCERT. (2025). MyCERT: Peranan dan Tanggungjawab. MyCERT. https://www.mycert.org.my/portal/full?id=d8032294-04b2-4ba0-9e46-62c898bb4983
mydx.my. (2025). Department of Personal Data Protection. Mydx.My. https://mydx.my/directory/view/department-of-personal-data-protection#:~:text=Jabatan%20Perlindungan%20Data%20Peribadi%20%28JPDP%29%20is%20Malaysia%27s%20independent,Protection%20Act%202010%20%28PDPA%29%20and%20its%20associated%20regulations.
NACSA. (2024a). CYBER SECURITY ACT 2024 (ACT 854). NACSA. https://www.nacsa.gov.my/act854.php
NACSA. (2024b). National Cyber Security Agency (NACSA), Malaysia. Kementrian Digital Malaysia. https://www.nacsa.gov.my/
National Security Council. (2020). Malaysia Cyber Security Strategy 2020-2024. https://asset.mkn.gov.my/web/wp-content/uploads/sites/3/2019/08/MalaysiaCyberSecurityStrategy2020-2024Compressed.pdf
Oluwatoyin, F. A., & Adesola, O. A. (2024). Advancing Cybersecurity Governance: Adaptive Resilience and Strategic Third-Party Risk Management in Financial Services. World Journal of Advanced Research and Reviews, 24(2), 293–302. https://doi.org/10.30574/wjarr.2024.24.2.3312
Pillay, L., & Gowindasamy, M. (2024). People, processes, and technology in cybersecurity: Malaysian insights. In Recent Research in Management, Accounting and Economics (RRMAE) (pp. 633–635). Routledge. https://doi.org/10.4324/9781003606642-139
Prem, K. T. (2025). Implementing Adaptive Data Governance: A Technical Perspective. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(1), 454–462. https://doi.org/10.32628/CSEIT25111244
Razi, F., Tuasikal, H., & Pratiwi Markus, D. (2024). Implementation and Challenges of the Personal Data Protection Law in Indonesia. Jurnal Indonesia Sosial Teknologi, 5(12), 6015–6021. https://doi.org/10.59141/jist.v5i12.1285
Rizkil, M., Herawati, A. R., & Santoso, S. (2024). Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack. Journal La Sociale, 5(2), 471–478. https://doi.org/10.37899/journal-la-sociale.v5i2.1132
Rochman, F. (2024, January 8). Kemenkominfo latih lebih 24 juta orang tentang literasi digital. ANTARA. https://www.antaranews.com/berita/3905859/kemenkominfo-latih-lebih-24-juta-orang-tentang-literasi-digital#google_vignette
Shahul Ikram, N. A. H. (2024). DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS. Malaysian Journal of Syariah and Law, 12(1), 135–147. https://doi.org/10.33102/mjsl.vol12no1.458
Sodiq, M. D., Supono, S., Hendri, F., & Ningsih, E. M. (2024). Kebijakan dan Regulasi Spionase Siber di Indonesia. Ideas: Jurnal Pendidikan, Sosial, Dan Budaya, 10(4), 1183. https://doi.org/10.32884/ideas.v10i4.1909
Suprastiyo, A., Warsono, H., & Astuti, R. S. (2023). Agile Governance Aplikasi Dalam Pelayanan Publik (N. Rismawati, Ed.). Widina Bhakti Persada. https://repository.penerbitwidina.com/media/publications/560156-agile-governance-aplikasi-dalam-pelayana-54702dbc.pdf
Surfshark. (2025, January 28). Data Breach Statistics Globally. https://surfshark.com/research/data-breach-monitoring
SWA. (2025, February 25). Bermitra dengan Komdigi dan BSSN, Platform Pencegahan Kejahatan Siber Resmi Diluncurkan. SWA. https://swa.co.id/read/456877/bermitra-dengan-komdigi-dan-bssn-platform-pencegahan-kejahatan-siber-resmi-diluncurkan
Vania, H. F. (2022, April 13). Kenalan Yuk dengan 4 Pilar Literasi Digital. Katadata.Co.Id. https://katadata.co.id/infografik/625689fbd47ce/kenalan-yuk-dengan-4-pilar-literasi-digital
Yogar, B. N. A., Mutiarin, D., & Eko Saputro, M. N. C. (2023). Jogja Smart Service as a Digital Public Services: Based on Agile Governance Perspective. INFOTECH : Jurnal Informatika & Teknologi, 4(1), 105–113. https://doi.org/10.37373/infotech.v4i1.562
Zaydi, M., Maleh, Y., Zaydi, H., Khourdifi, Y., Nassereddine, B., & Bakouri, Z. (2024). Agile security and compliance integration. In Agile Security in the Digital Era (pp. 68–91). CRC Press. https://doi.org/10.1201/9781003478676-4