, being attentive to impacts of domestic and global economic situations, as well as supporting their growth and opportunities, led by the government’s economic stimulus measures and other factors. Along
THAILAND CORPORATE ESG DISCLOSURE LISTED COMPANIES AND RECOMMENDATIONS FOR POLICY DEVELOPMENT Prepared by Robert Black, Dr Rory Sullivan, Ella Harvey and Chup Priovashini (Chronos Sustainability) May 2022 THAILAND CORPORATE ESG DISCLOSURE Contents Foreword from SEC Thailand ..................................................................................................................... 3 Foreword from World Bank ...................................................................................
Services During the third quarter of 2017, KBank and K Companies continued to adhere to our “Customer Centricity” strategy, being attentive to the linkage of domestic and global economic circumstances
During the first quarter of 2019, KBank continued to adhere to our “Customer Centricity” strategy, being attentive to the uncertainties of the domestic and global economy, sustaining our customers
second quarter of 2019, KBank continued to adhere to our “Customer Centricity” strategy, being attentive to the uncertainties of the domestic and global economy, sustaining our customers’ business and
continued to adhere to our “Customer Centricity” strategy, being attentive to the impact of domestic and global economic circumstances, sustaining our customers’ business and financial standing, as well as
% and 2%, respectively. Whereas, Q3/2018 was under a low season period with middling usage of automobiles and minuscule tourism outings, due to the persistent rainfall which lasted throughout the quarter
persistent threat (APT), the network segregation, the application-to-application encryption, defense-in-depth and the network hardening; (4) define a clear set of controls including access control, monitoring
ลักษณะ DDoS (distributed denial of service) การป้องกันการบุกรุกจากโปรแกรมไม่ประสงค์ดี การป้องกันภัยคุกคามในรูปแบบใหม่ (advanced persistent threat) การแบ่งแยกเครือข่าย การเข้ารหัสระหว่างแอพพลิเคชั่น
persistent threat (APT), the network segregation, the application-to-application encryption, defense-in-depth and the network hardening; (4) define a clear set of controls including access control, monitoring