to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company
deployment of critical technologies and adaptation strategies as well as changing market and consumer behaviours. Changing magnitude and nonlinear dynamics Climate-related risks may manifest at different
. - Please describe the criteria used to assess the level of identified quality risk in a "risk matrix" format, comprising relevant factors such as the likelihood and magnitude. - For each factor used to
search criteria Security Type --- Select Security Type --- Common share Warrant-Preferred share Real Estate Investment Trust (REIT) Common share (LiVEx) DR-Common share Depositary Receipt DR-Convertible
Please enter search criteria Security Type --- Select Security Type --- Debenture Note Derivative Warrants Securitization Debenture Bond Basel Convertible Debenture IC Bond SUKUK Structured Debenture