Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
4 ร้อยละของมูลค่าธุรกรรมของลูกค้ารายย่อย https://publish.sec.or.th/nrs/9645p.xlsx securities-ITchecklist.xlsx security) (2) การบริหารจัดการบุคลากร และบุคคลภายนอก (3) การบริหารจัดการทรัพย์สินด้าน IT
regulations specified by the SEC and arrange for IT security audit and a penetration test by a knowledgeable and skilled auditor who is independent from the responsible IT Unit before commencing service
following and inquiring about cybersecurity measures and data security from your service providers, including cooperating with them to ensure that your data and assets are safe.” In addition, the SEC
Computing (8) Digital Inclusion (9) Data Centres (10) Information Security (11) Service Innovation (12) Information Management (13) Green Government (14) Business Process (15) Government Transformation of
Cloud Computing 1ISO/IEC 27017-2015 : Code of practice for information security controls based on ISO/IEC 27002 for cloud services NIST: National Institute of Standards and Technology : Guidelines on
", "institutional investors", "executives", "controlling person", "short- term bonds" and "structured notes" shall have the meaning given to them under the Notification of the Securities and Exchange Commission on
. In addition, this framework adopts a four-pillar approach, structured around how organizations operate, which are governance, strategy, risk and impact management, and metrics and targets. On 20