to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2015 1 Security IPO NDR Jan 15 2015 12:00AM 0 0 2025-01-09 2015 2 Infra IPO 3BBIF
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2015 1 Security IPO NDR Jan 15 2015 12:00AM 0 0 2025-01-09 2015 2 Infra IPO 3BBIF