information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may
and fair to all stakeholders. Ethic, Requirements and Procedures to Usage of Computers and Communication System of the SEC Office consists of guidelines for IT security protection, storage and
about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may
่ 22 มีนาคม 2567 Thai Activities (sec.or.th) 12 2.4 ความรวมมือเพื่อความปลอดภัยทางไซเบอร ก.ล.ต. จัดงานสัมมนา Cyber Armor : Navigating the Information Security Landscape ก.ล.ต. จัดงานสัมมนา Cybersecurity
cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by
(Public Management), Suan Dusit University Master of Political Science (Public Administration), Thammasat University Master of Business Administration (Finance), College of Notre Dame, USA Bachelor of
detailed information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility
สารสนเทศ (IT Audit) งานด้านความปลอดภัย ทางเทคโนโลยีสารสนเทศ (Cyber Security) และงานที่เกี่ยวข้องกับเทคโนโลยีใหม่ ๆ เช่น FinTech ICO STO Blockchain เป็นต้น งานด้าน Data Analytics ให้มีประกาศนียบัตรรับรอง