SlideShare a Scribd company logo
1 of 35
Download to read offline
Cybersecurity Regulation for Thai Capital Market.
The First NIDA Business Analytics and Data Sciences Contest/Conference
วันที่ 1-2 กันยายน 2559 ณ อาคารนวมินทราธิราช สถาบันบัณฑิตพัฒนบริหารศาสตร์
https://businessanalyticsnida.wordpress.com
https://www.facebook.com/BusinessAnalyticsNIDA/
ดร.กาพล ศรธนะรัตน์ วทม. (NIDA) Ph.D.
ผู้อานวยการฝ่ายเทคโนโลยีสารสนเทศ
สานักงานคณะกรรมการกากับหลักทรัพย์และตลาดหลักทรัพย์
นวมินทราธิราช 4002 วันที่ 1 กันยายน 2559 10.15-11.15 น.
Cybersecurity Regulation for
Thai Capital Market
กำพล ศรธนะรัตน์
Kumpol Sontanarat
ICT Department Director, Thailand SEC
Board Member of Electronic Transaction Commission
Chairman of CIO16 Association
Chairman of Thailand IT Architect Association
IT GRC Framework
3
Time Line
Initial: IT , Intermediaries Policy and Development Dept,
Investment Management Supervision and Inspection Dept,
Market Supervision Dept, Broker-Dealer Supervision and Inspection Dept
AUG 2014
MAR 2015
MAR 2015
Conduct 1st public hearing on on website
Conduct public hearing :1st Focus group ->Intermediaries , SET
Publish FAQ
Conduct GAP survey : Governance , Security and Fintech issuesJUN 2016
SEP 2016 Issue new regulation with 1 year grace period
Develop guideline for examinerQ3 2016
Conduct audit program through RBAAUG 2017
4
Knowledge Background
• Risk Framework and IT Best Practices
• IOSCO Principles
• Lessons Learned
5
Knowledge Background
Risk Framework and IT Best Practices
6
Current IT Risk Framework
• Time to review?
7
8
Current IT Risk Framework
• All of risks associated with authorization, completeness
and accuracy of transactionsIntegrity risk
• Risks associated with data restriction both overly
restrictive and not adequately restrictedAccess risk
• The risk that SI does not have the IT infrastructure to
run its business efficiently or cost-effective fashion
Infrastructure
risk
• Unavailability of important information when needed
threatens the continuity of critical SI’s critical
operations
Availability risk
IT Risk : Turning Business Threats into
Competitive Advantage
• Analysis of 134
surveys
• Empirical study
• IT risk pyramid
9
IT Risk Pyramid
Agility
Accuracy
Access
Availability
Future
capability
Present
capability
Hard to
quantify
Easy to
quantify
Source: IT Risk – Turning business threats into competitive advantage – George
Westerman, Richard Hunter, Harvard Business School Press
10
11
IT Risk Pyramid (Cont.)
• Poor IT-business relations
• Poor project deliveryAgility
•Applications do not meet business requirements
•Manual data integration required
•Significant implementation under way or recently completed
Accuracy
•Data not compartmentalized
•Applications need standardization
•Lack of internal controls in applications
•Network not reliable at all locations
Access
•High IT staff turnover
•Poor backup/recovery
•Infrastructure not standardized
•Poorly understood processes and applications
Availability
IT Risk : View of IT Risk in business term + GRC
• Emphasized on core
principles
– Well-structured
(Technology)
– Well-designed
(Process)
– Risk-aware culture
(People)
Agility
Accuracy
Access
Availability
Governance of Enterprise IT
Having integrated view of IT risks in
business term
12
What part is missing?
Integrity
Infrastructure
Access
Availability
Agility
Accuracy
Access
Availability
13
Intended Outcome
Next Step
- Develop audit checklist for
SEC’s auditor
- Build up sector-based
Incidence Response Plan
Industry-wide cyberdrill test
To 4A’s IT Risk Framework (Focus more on Business-IT Alignment)
Access Availability Accuracy Agility
Change from Current IT Risk Framework (Focus on IT Risk)
Access Availability Integrity Infrastructure
14
IT Best Practices Adoption
» COBIT 5 : Control Objectives for
Information and related
Technology - mainly contributed
by:-
• ITIL – Information Technology
Infrastructure Library
• ISO/IEC 27001 (Major contributor
for our new regulation)
15
Knowledge Background (Cont.)
• IOSCO Principles
16
Require risk
control from
ourselves
Regulator
Require risk
control from
regulated
entity
POC
Law & RegulationLaw & Regulation
IT governance toolIT governance tool
COBIT (IT GRC)COBIT (IT GRC)
IT best practiceIT best practice
ITIL
(service)
ITIL
(service)
ISO27001
(security)
ISO27001
(security)
……
Enterprise risk management standardEnterprise risk management standard
COSOCOSO Thai OAGThai OAG IOSCO PrinciplesIOSCO Principles
Peer RegulatorsPeer Regulators
Organization
Conduct Gap Analysis in compliance with
IOSCO Principles
SEC FrameworkSEC Framework IOSCO / Other RegulatorsIOSCO / Other Regulators
17
List of IOSCO Principles
Principles for Intermediaries
• IOSCO : Report on securities activity on the internet III, Oct 2003
• IOSCO : High-level principles for business continuity, Aug, 2006
• IOSCO : Principles for direct electronic access to markets, Aug 2010
• IOSCO : Cyber-Crime, Securities Markets and Systemic Risk, Jul 2013
• IOSCO : Report on social media and automation of advice tools survey, Jul 2014
• IOSCO : Market intermediary business continuity and recovery planning, consultation
paper, April, 2015
Principles for Exchange
• IOSCO : High-Level Principles for Business Continuity, Aug 2006
• IOSCO : Regulatory Issues Raised by the Impact of Technological Changes on Market
Integrity and Efficiency, Oct 2011
• IOSCO : Principles of Securities Regulation, Aug 2013 (revised)
• IOSCO : Principles for Financial Market Infrastructures (PFMI), Apr 2012 + Guidance
on Cyber Resilience for FMI (2015)
• IOSCO : Mechanisms for Trading Venues to Effectively Manage Electronic Trading
Risks and Plans for Business Continuity, Apr 2015
Legally binding agreement
Cyber governance
18
Samples: IOSCO Principles’ gap assessment
item Regulators should do Regulated entities should do
Principles for
direct electronic
access to markets,
Aug 2010
Principle 1 : minimum customer standards
- บล. ควรกำหนดให้ลูกค้ำที่จะใช้บริกำร DEA ต้องผ่ำนมำตรฐำนขั้นต่ำ โดยมีฐำนะทำงกำรเงินที่แข็งแกร่ง พร้อมทั้งมีกระบวนกำรให้
มั่นใจว่ำลูกค้ำมีบุคลำกรที่เชี่ยวชำญและคุ้นเคยกับ market rules + มีควำมรู้อย่ำงเพียงพอที่จะใช้ระบบ DEA
- market authority ควรมีเกณฑ์กำหนดให้ บล. ต้องจัดให้มี min. customer standard
Principle 2 : legally binding agreement
ควรมีสัญญำระหว่ำง บล. กับลูกค้ำ ซึ่งกำหนดข้อตกลงในกำรใช้บริกำร รวมถึงเชื่อมโยงควำมรับผิดชอบ
จำก บล. ไปสู่ลูกค้ำโดยตรง ทำให้ market authority สำมำรถเอำผิดลูกค้ำโดยตรงได้
Principle 3 : Intermediary's responsibility for trades
บล. ยังคงไว้ซึ่งควำมรับผิดทั้งหมดสำหรับทุกคำสั่งที่เกิดขึ้น (ซึ่งรวมถึงกรณีที่อนุญำตให้ sub
delegate) โดย บล. ควรให้ ultimate customers ปฎิบัติตำมมำตรฐำนที่ บล. กำหนดเช่นเดียวกับ
ลูกค้ำรำยอื่น ๆ ของบริษัท และควรจัดให้ DEA customers ต้องจัดทำ legally binding
agreements กับ ultimate customers ด้วยเช่นกัน
Principle 4 : Customer Identification :
บล. ควรเปิดเผย identity ของลูกค้ำต่อ market authority เมื่อได้รับกำรร้องขอ (เพื่อ facilitate
งำน market surveillance) ซึ่งกำรเปิดเผยดังกล่ำวรวมถึงกรณี sub delegate ด้วย
Principle 5 : Pre- and Post-Trade Information :
บล. ต้องสำมำรถเข้ำถึงข้อมูล pre / post trade info. แบบ real time เพื่อให้สำมำรถนำข้อมูล
ดังกล่ำวไปใช้ในกำรติดตำม + ควบคุมกำรบริหำรควำมเสี่ยงได้อย่ำงเพียงพอเหมำะสม
19
รายการ Regulators ควรทา Regulated entities ควรทา
Principles for direct
electronic access to
markets, Aug 2010
Principle 7 : Intermediaries
บล. ควรจัดให้มีกำรควบคุม ซึ่งรวมถึงกำรมี automated pre trade control ที่สำมำรถ
ป้องกันลูกค้ำส่งคำสั่งที่เกิน existing position / credit limit อย่ำงมีนัยสำคัญ
(โดยเฉพำะพวก algo หรือ HFT)
Principle 8 : Adequacy of systems :
บล. + market infra ทั้งหมด ควรมี operational and technical capability ที่จะบริหำร
จัดกำรควำมเสี่ยงที่อำจเกิดจำก DEA ได้ โดยต้องมั่นใจได้ว่ำทุกอย่ำงทำงำน properly
/ มี capacity เพียงพอ + scalable to volume
ทั้งนี้ market authority อำจกำหนดให้ บล.
• จัดให้มี capability estimates สำหรับระบบ automated order routing and
execution / market info. / trade comparison
• จัดทำ capacity stress test ตำมโอกำส เพื่อให้ทรำบถึงรูปแบบ / พฤติกรรม
ของระบบภำยใต้สภำวะที่แตกต่ำงกัน
• จัดให้มี independent review ระบบทั้งหมดว่ำ perform ได้อย่ำงเพียงพอ
และมีควำมมั่นคงปลอดภัย
• จัดให้มีนโยบำยที่จะจัดจ้ำงหรือฝึกฝนพนักงำนที่มี technical skills
Samples: IOSCO Principles’ gap assessment
20
รายการ Regulators ควรทา Regulated entities ควรทา
Cyber-Crime,
Securities Markets
and Systemic Risk,
Jul 2013
• ปรับปรุง / ใช้บังคับหลักเกณฑ์เกี่ยวกับ cyber crime โดยร่วมมือกับ
authorities อื่น ๆ (เพื่อป้องกัน regulation gap)
• สนับสนุนให้เกิดเครือข่ำย information sharing ในประเด็นดังกล่ำว
• ทำหน้ำที่เสมือนเป็นศูนย์ควำมรู้แก่อุตสำหกรรม / ตอบปัญหำข้อซักถำม
/ นำเสนอ best practice เช่น cyber security / resilience / รวบรวมเคส
ที่เกิดขึ้น เพื่อวิเครำะห์หำจุดอ่อนของอุตสำหกรรม
Samples: IOSCO Principles’ gap assessment
21
Summary Matrix for Conducting GAP Analysis from
IOSCO Principles and Lessons Learned
IOSCO Principles IT-related areas Address by
High-Level Principles for
Business Continuity, Aug 2006
-Principle 1-7  Issue notification about
BCP
Regulatory Issues Raised by the
Impact of Technological
Changes on Market Integrity
and Efficiency, Oct 2011
-Recommendation 1-5  Issue notification about
IT security
Principles for Financial Market
Infrastructures (PFMI), Apr
2012 + Guidance on Cyber
Resilience for FMI (2015)
-Principle 2 : Governance
-Principle 3 : Managing
Risk
-Principle 8 : Settlement
-Principle 17 : Operational
risk
-Principle 20 : FMI Link
 Add governance issues in
new regulation
 Notification about
BCP+IT Security
Principles of Securities
Regulation, Aug 2013 (revised)
-Principle 33  Notification about
BCP+IT Security
Mechanisms for Trading Venues
to Effectively Manage Electronic
Trading Risks and Plans for
Business Continuity, Apr 2015
-Recommendation for
Managing Technology to
Mitigate Risk
-Recommendation for How
to Plan for Disruptions:
Business Continuity Plans
 Add governance issues in
new regulation
 Notification about BCP
22
Conduct Gap Analysis through COBIT
EDM02 Ensure Benefits Delivery
EDM03 Ensure Risk Optimization
EDM04 Ensure Resource Optimization
EDM05 Ensure Stakeholder Transparency
APO04 Manage Innovation BAI04 Manage Availability and Capacity
BAI08 Manage Knowledge
MEA01 Monitor, Evaluate and Assess
Performance and Conformance
MEA02 Monitor, Evaluate and Assess
the System of Internal Control
(5 processes)
(13 processes) (10 processes) (6 processes) (3 processes)
Room for improvement
23
Cybersecurity Regulation for Thai
Capital Market
24
Contents of Regulation
Ensure Risk Optimisation
Ensure Resource Optimisation,
Ensure Stakeholder Transparency
The System of Internal Control
Ensure Risk Optimisation
Ensure Resource Optimisation,
Ensure Stakeholder Transparency
The System of Internal Control
Cobit5
ISO27001 + cloud
Endorse Governance of Enterprise IT as
regulation
25
Security Requirements in compliance with
ISO/IEC 27001:2013
• 1. Information Security Policy and Compliance
• 2. Organization of Information Security
• 3. Human Resource Security
• 4. Asset Management
• 5. Access Control
• 6. Cryptographic Control
• 7. Physical and Environment Security
• 8. Operations Security
• 9. Communications Security
• 10. System Acquisition, Development and Maintenance
• 11. Supplier Relationship
• 12. Information Security Incident Management
• 13. Information Security Aspects of BCM
26
Cloud Computing Regulation
• Cloud policy
• Cloud provider management
• Monitor and review cloud services
27
Cloud policy
• Risk assessment
• Define critical services/applications
• Define type of services :SaaS, PaaS, IaaS
• Conduct due diligence of cloud provider, focus on CIA
• Analyze qualifications of provider: financial status,
capability to serve
• Communicate policy effectively with signed letter
• Establish data policy – data classification and how to
manage each data category
• Define users responsibilities – access policy i.e. multi-factor
authentication for administrator
• Regular audit requirement
28
Cloud Provider Management
• Data is belong to service users (regulated entities)
• Define cloud services to be adopted
• Define network security requirements i.e
– Implement DDoS, APT
– Segregate network zone
– Data encryption
– Implement defense in depth approach
– Hardening and access control
– clear SLA and responsibilities of provider
• Monitor / report / incidence handling, problem management, overall
performance
• Backup and recovery policy
• RTO and RPO (recovery time objectives and recovery point objective)
29
Cloud Provider Management (Cont.)
• Compensation when provider fails to deliver
• Information leak prevention policy from
provider
• Provider has no authority to access and
disclose information
• Provider has been certified in compliance with
latest international standard
• Required report from external auditor at least
once a year
30
Cloud Provider Management (Cont.)
• exit plan – retain and permanent destroy
policy
• Define sub contract of cloud with full
obligation of main provider
31
As Users (regulated Entity)-
Monitor and review cloud services
• Monitor to ensure provider can provide qualified
services through agreement and inline with
standards
• Assess and conduct provider capacity planning
regularly
• Review term and condition of agreement when
significant changes occur
• Review service provider regularly –financial
status, process, efficiency and capability to serve
32
33
Require more from
Regulated Entity
• Apart form security requirement, new regulation also
requires more on:
– Information security incident management
– Cyberdrill test / scenario based testing
– Conduct BIA and report to board member
– Archive report/log for auditing
– Report to regulator when system disruption, system
compromised and harm to reputation
– Conduct Penetration Test and Vulnerabilities Assessment
• 1 year grace period from September 2016-Auygust
2017
Require more from Regulator
• Initiate Sector-based Incidence Response Plan
with peer regulators and critical infrastructure
– Information sharing
– Public announcement
• Conduct Industry-wide Cyberdrill Test
34
Discussion
Q&A
Thank You
35

More Related Content

What's hot

Power of the Run Graph
Power of the Run GraphPower of the Run Graph
Power of the Run GraphVaticle
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataDATAVERSITY
 
Hl7 Analytics for IT and Clinical Insights
Hl7 Analytics for IT and Clinical InsightsHl7 Analytics for IT and Clinical Insights
Hl7 Analytics for IT and Clinical InsightsExtraHop Networks
 
From Science to Data: Following a principled path to Data Science
From Science to Data: Following a principled path to Data ScienceFrom Science to Data: Following a principled path to Data Science
From Science to Data: Following a principled path to Data ScienceInstitute of Contemporary Sciences
 
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, Paris
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, ParisOpen Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, Paris
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, ParisOW2
 
DOG Meetup 18 November 2021 - Intro and Azumuta
DOG Meetup 18 November 2021 - Intro and AzumutaDOG Meetup 18 November 2021 - Intro and Azumuta
DOG Meetup 18 November 2021 - Intro and AzumutaDataops Ghent Meetup
 
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessAI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessDatabricks
 
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...Senturus
 
Domino and AWS: collaborative analytics and model governance at financial ser...
Domino and AWS: collaborative analytics and model governance at financial ser...Domino and AWS: collaborative analytics and model governance at financial ser...
Domino and AWS: collaborative analytics and model governance at financial ser...Domino Data Lab
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case studyNandita Nityanandam
 
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricercaJürgen Ambrosi
 
Power of SPL - Search Processing Language
Power of SPL - Search Processing LanguagePower of SPL - Search Processing Language
Power of SPL - Search Processing LanguageSplunk
 
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceGRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceAndrew Clark
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffmanBigDataExpo
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsRyan Gross
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataSaama
 
How can a quality engineering and assurance consultancy keep you ahead of others
How can a quality engineering and assurance consultancy keep you ahead of othersHow can a quality engineering and assurance consultancy keep you ahead of others
How can a quality engineering and assurance consultancy keep you ahead of othersgreyaudrina
 

What's hot (20)

Power of the Run Graph
Power of the Run GraphPower of the Run Graph
Power of the Run Graph
 
Integrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured DataIntegrating Structure and Analytics with Unstructured Data
Integrating Structure and Analytics with Unstructured Data
 
Hl7 Analytics for IT and Clinical Insights
Hl7 Analytics for IT and Clinical InsightsHl7 Analytics for IT and Clinical Insights
Hl7 Analytics for IT and Clinical Insights
 
From Science to Data: Following a principled path to Data Science
From Science to Data: Following a principled path to Data ScienceFrom Science to Data: Following a principled path to Data Science
From Science to Data: Following a principled path to Data Science
 
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, Paris
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, ParisOpen Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, Paris
Open Source and Data-Driven Economy, OW2con'18, June 7-8, 2018, Paris
 
Building up a Data Science Team from Scratch
Building up a Data Science Team from ScratchBuilding up a Data Science Team from Scratch
Building up a Data Science Team from Scratch
 
DOG Meetup 18 November 2021 - Intro and Azumuta
DOG Meetup 18 November 2021 - Intro and AzumutaDOG Meetup 18 November 2021 - Intro and Azumuta
DOG Meetup 18 November 2021 - Intro and Azumuta
 
AI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for SuccessAI Data Acquisition and Governance: Considerations for Success
AI Data Acquisition and Governance: Considerations for Success
 
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
 
Domino and AWS: collaborative analytics and model governance at financial ser...
Domino and AWS: collaborative analytics and model governance at financial ser...Domino and AWS: collaborative analytics and model governance at financial ser...
Domino and AWS: collaborative analytics and model governance at financial ser...
 
PatSnap for RD
PatSnap for RDPatSnap for RD
PatSnap for RD
 
Global IT Outsourcing case study
Global IT Outsourcing case studyGlobal IT Outsourcing case study
Global IT Outsourcing case study
 
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
4° Sessione - Telemetria e internet delle cose nell'ambito della ricerca
 
AWS for Auditors
AWS for AuditorsAWS for Auditors
AWS for Auditors
 
Power of SPL - Search Processing Language
Power of SPL - Search Processing LanguagePower of SPL - Search Processing Language
Power of SPL - Search Processing Language
 
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceGRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffman
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data ops
 
Five steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World DataFive steps to getting maximum value from Real World Data
Five steps to getting maximum value from Real World Data
 
How can a quality engineering and assurance consultancy keep you ahead of others
How can a quality engineering and assurance consultancy keep you ahead of othersHow can a quality engineering and assurance consultancy keep you ahead of others
How can a quality engineering and assurance consultancy keep you ahead of others
 

Viewers also liked

ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...BAINIDA
 
พ.อ.ดร.เศรษฐพงค์ นโยบาย Cyber security ไร้ทิศทาง
พ.อ.ดร.เศรษฐพงค์   นโยบาย Cyber security ไร้ทิศทางพ.อ.ดร.เศรษฐพงค์   นโยบาย Cyber security ไร้ทิศทาง
พ.อ.ดร.เศรษฐพงค์ นโยบาย Cyber security ไร้ทิศทางSettapong_CyberSecurity
 
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.Prachyanun Nilsook
 
ICT and Social Media in Thailand Education
ICT and Social Media in Thailand EducationICT and Social Media in Thailand Education
ICT and Social Media in Thailand EducationDenpong Soodphakdee
 
The potential impact of advanced video technology on education & educatio...
The potential impact of advanced video technology on education & educatio...The potential impact of advanced video technology on education & educatio...
The potential impact of advanced video technology on education & educatio...Soranit Siltharm
 
Virtual reality of modern education: The experience of distance learning in T...
Virtual reality of modern education: The experience of distance learning in T...Virtual reality of modern education: The experience of distance learning in T...
Virtual reality of modern education: The experience of distance learning in T...Vorasuang (Michael) Duangchinda (Ph.D.)
 
ICT in School Education
ICT in School EducationICT in School Education
ICT in School EducationVasudha Kamat
 
Nida event oracle business analytics 1 sep2016
Nida event   oracle business analytics 1 sep2016Nida event   oracle business analytics 1 sep2016
Nida event oracle business analytics 1 sep2016BAINIDA
 
About Python
About PythonAbout Python
About PythonNattapon
 
Second prize data analysis @ the First NIDA business analytics and data scie...
Second prize data analysis @ the First NIDA  business analytics and data scie...Second prize data analysis @ the First NIDA  business analytics and data scie...
Second prize data analysis @ the First NIDA business analytics and data scie...BAINIDA
 
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...BAINIDA
 
Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Nawanan Theera-Ampornpunt
 
Oracle Enterprise Performance Management
Oracle Enterprise Performance ManagementOracle Enterprise Performance Management
Oracle Enterprise Performance ManagementBAINIDA
 
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรChapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรAkkadate.Com
 
Tableau for statistical graphic and data visualization
Tableau for statistical graphic and data visualizationTableau for statistical graphic and data visualization
Tableau for statistical graphic and data visualizationBAINIDA
 
Second prize business plan @ the First NIDA business analytics and data scien...
Second prize business plan @ the First NIDA business analytics and data scien...Second prize business plan @ the First NIDA business analytics and data scien...
Second prize business plan @ the First NIDA business analytics and data scien...BAINIDA
 
Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsBee Lalita
 

Viewers also liked (20)

ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
 
พ.อ.ดร.เศรษฐพงค์ นโยบาย Cyber security ไร้ทิศทาง
พ.อ.ดร.เศรษฐพงค์   นโยบาย Cyber security ไร้ทิศทางพ.อ.ดร.เศรษฐพงค์   นโยบาย Cyber security ไร้ทิศทาง
พ.อ.ดร.เศรษฐพงค์ นโยบาย Cyber security ไร้ทิศทาง
 
Thailand Cyber University
Thailand Cyber UniversityThailand Cyber University
Thailand Cyber University
 
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.
ICT for Education คณะครุศาสตร์อุตสาหกรรม มจพ.
 
ICT and Social Media in Thailand Education
ICT and Social Media in Thailand EducationICT and Social Media in Thailand Education
ICT and Social Media in Thailand Education
 
The potential impact of advanced video technology on education & educatio...
The potential impact of advanced video technology on education & educatio...The potential impact of advanced video technology on education & educatio...
The potential impact of advanced video technology on education & educatio...
 
Virtual reality of modern education: The experience of distance learning in T...
Virtual reality of modern education: The experience of distance learning in T...Virtual reality of modern education: The experience of distance learning in T...
Virtual reality of modern education: The experience of distance learning in T...
 
ICT in School Education
ICT in School EducationICT in School Education
ICT in School Education
 
Nida event oracle business analytics 1 sep2016
Nida event   oracle business analytics 1 sep2016Nida event   oracle business analytics 1 sep2016
Nida event oracle business analytics 1 sep2016
 
Social network security
Social network securitySocial network security
Social network security
 
Network designmkp
Network designmkpNetwork designmkp
Network designmkp
 
About Python
About PythonAbout Python
About Python
 
Second prize data analysis @ the First NIDA business analytics and data scie...
Second prize data analysis @ the First NIDA  business analytics and data scie...Second prize data analysis @ the First NIDA  business analytics and data scie...
Second prize data analysis @ the First NIDA business analytics and data scie...
 
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...
R Tool for Visual Studio และการทำงานร่วมกันเป็นทีม โดย เฉลิมวงศ์ วิจิตรปิยะกุ...
 
Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)
 
Oracle Enterprise Performance Management
Oracle Enterprise Performance ManagementOracle Enterprise Performance Management
Oracle Enterprise Performance Management
 
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรChapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
 
Tableau for statistical graphic and data visualization
Tableau for statistical graphic and data visualizationTableau for statistical graphic and data visualization
Tableau for statistical graphic and data visualization
 
Second prize business plan @ the First NIDA business analytics and data scien...
Second prize business plan @ the First NIDA business analytics and data scien...Second prize business plan @ the First NIDA business analytics and data scien...
Second prize business plan @ the First NIDA business analytics and data scien...
 
Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 

Similar to cybersecurity regulation for thai capital market ดร.กำพล ศรธนะรัตน์ ผู้อำนวยการฝ่ายเทคโนโลยีสารสนเทศ สำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์

Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTheAnfieldGroup
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
Euro cacs2019 169
Euro cacs2019 169Euro cacs2019 169
Euro cacs2019 169Nigel King
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsBarcoding, Inc.
 
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyQuEST Forum
 
Announcing DA.PO Augury Data Visualisation Services - may 2013
Announcing DA.PO Augury Data Visualisation Services - may 2013Announcing DA.PO Augury Data Visualisation Services - may 2013
Announcing DA.PO Augury Data Visualisation Services - may 2013Meng Choon Tan
 
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxDIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxGeorgeDiamandis11
 
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.pptPPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.pptKumarNatarajan24
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDVishnu Murali
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceValue Amplify Consulting
 
Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllAmbrose Nwadike
 
Artificial Intelligence Application in Oil and Gas
Artificial Intelligence Application in Oil and GasArtificial Intelligence Application in Oil and Gas
Artificial Intelligence Application in Oil and GasSparkCognition
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2Pankaj Gupta
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017sandhibhide
 

Similar to cybersecurity regulation for thai capital market ดร.กำพล ศรธนะรัตน์ ผู้อำนวยการฝ่ายเทคโนโลยีสารสนเทศ สำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ (20)

Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
Homeland Security C4I Pragati Maidan
Homeland Security C4I Pragati MaidanHomeland Security C4I Pragati Maidan
Homeland Security C4I Pragati Maidan
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Euro cacs2019 169
Euro cacs2019 169Euro cacs2019 169
Euro cacs2019 169
 
IT4IT BCS
IT4IT BCSIT4IT BCS
IT4IT BCS
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
ERP-02
ERP-02ERP-02
ERP-02
 
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
 
Announcing DA.PO Augury Data Visualisation Services - may 2013
Announcing DA.PO Augury Data Visualisation Services - may 2013Announcing DA.PO Augury Data Visualisation Services - may 2013
Announcing DA.PO Augury Data Visualisation Services - may 2013
 
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptxDIGITAL TRANSFORMATION AND STRATEGY_final.pptx
DIGITAL TRANSFORMATION AND STRATEGY_final.pptx
 
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.pptPPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
COBIT
COBITCOBIT
COBIT
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATED
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and Governance
 
Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_All
 
Artificial Intelligence Application in Oil and Gas
Artificial Intelligence Application in Oil and GasArtificial Intelligence Application in Oil and Gas
Artificial Intelligence Application in Oil and Gas
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
 

More from BAINIDA

Mixed methods in social and behavioral sciences
Mixed methods in social and behavioral sciencesMixed methods in social and behavioral sciences
Mixed methods in social and behavioral sciencesBAINIDA
 
Advanced quantitative research methods in political science and pa
Advanced quantitative  research methods in political science and paAdvanced quantitative  research methods in political science and pa
Advanced quantitative research methods in political science and paBAINIDA
 
Latest thailand election2019report
Latest thailand election2019reportLatest thailand election2019report
Latest thailand election2019reportBAINIDA
 
Data science in medicine
Data science in medicineData science in medicine
Data science in medicineBAINIDA
 
Nursing data science
Nursing data scienceNursing data science
Nursing data scienceBAINIDA
 
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...BAINIDA
 
Statistics and big data for justice and fairness
Statistics and big data for justice and fairnessStatistics and big data for justice and fairness
Statistics and big data for justice and fairnessBAINIDA
 
Data science and big data for business and industrial application
Data science and big data  for business and industrial applicationData science and big data  for business and industrial application
Data science and big data for business and industrial applicationBAINIDA
 
Update trend: Free digital marketing metrics for start-up
Update trend: Free digital marketing metrics for start-upUpdate trend: Free digital marketing metrics for start-up
Update trend: Free digital marketing metrics for start-upBAINIDA
 
Advent of ds and stat adjustment
Advent of ds and stat adjustmentAdvent of ds and stat adjustment
Advent of ds and stat adjustmentBAINIDA
 
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร BAINIDA
 
Data visualization. map
Data visualization. map Data visualization. map
Data visualization. map BAINIDA
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechBAINIDA
 
Deepcut Thai word Segmentation @ NIDA
Deepcut Thai word Segmentation @ NIDADeepcut Thai word Segmentation @ NIDA
Deepcut Thai word Segmentation @ NIDABAINIDA
 
Professionals and wanna be in Business Analytics and Data Science
Professionals and wanna be in Business Analytics and Data ScienceProfessionals and wanna be in Business Analytics and Data Science
Professionals and wanna be in Business Analytics and Data ScienceBAINIDA
 
Deep learning and image analytics using Python by Dr Sanparit
Deep learning and image analytics using Python by Dr SanparitDeep learning and image analytics using Python by Dr Sanparit
Deep learning and image analytics using Python by Dr SanparitBAINIDA
 
Visualizing for impact final
Visualizing for impact finalVisualizing for impact final
Visualizing for impact finalBAINIDA
 
Python programming workshop
Python programming workshopPython programming workshop
Python programming workshopBAINIDA
 
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...BAINIDA
 
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...BAINIDA
 

More from BAINIDA (20)

Mixed methods in social and behavioral sciences
Mixed methods in social and behavioral sciencesMixed methods in social and behavioral sciences
Mixed methods in social and behavioral sciences
 
Advanced quantitative research methods in political science and pa
Advanced quantitative  research methods in political science and paAdvanced quantitative  research methods in political science and pa
Advanced quantitative research methods in political science and pa
 
Latest thailand election2019report
Latest thailand election2019reportLatest thailand election2019report
Latest thailand election2019report
 
Data science in medicine
Data science in medicineData science in medicine
Data science in medicine
 
Nursing data science
Nursing data scienceNursing data science
Nursing data science
 
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
 
Statistics and big data for justice and fairness
Statistics and big data for justice and fairnessStatistics and big data for justice and fairness
Statistics and big data for justice and fairness
 
Data science and big data for business and industrial application
Data science and big data  for business and industrial applicationData science and big data  for business and industrial application
Data science and big data for business and industrial application
 
Update trend: Free digital marketing metrics for start-up
Update trend: Free digital marketing metrics for start-upUpdate trend: Free digital marketing metrics for start-up
Update trend: Free digital marketing metrics for start-up
 
Advent of ds and stat adjustment
Advent of ds and stat adjustmentAdvent of ds and stat adjustment
Advent of ds and stat adjustment
 
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
 
Data visualization. map
Data visualization. map Data visualization. map
Data visualization. map
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
 
Deepcut Thai word Segmentation @ NIDA
Deepcut Thai word Segmentation @ NIDADeepcut Thai word Segmentation @ NIDA
Deepcut Thai word Segmentation @ NIDA
 
Professionals and wanna be in Business Analytics and Data Science
Professionals and wanna be in Business Analytics and Data ScienceProfessionals and wanna be in Business Analytics and Data Science
Professionals and wanna be in Business Analytics and Data Science
 
Deep learning and image analytics using Python by Dr Sanparit
Deep learning and image analytics using Python by Dr SanparitDeep learning and image analytics using Python by Dr Sanparit
Deep learning and image analytics using Python by Dr Sanparit
 
Visualizing for impact final
Visualizing for impact finalVisualizing for impact final
Visualizing for impact final
 
Python programming workshop
Python programming workshopPython programming workshop
Python programming workshop
 
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...
แผนธุรกิจ ของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analytics and Dat...
 
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...
ผลการวิเคราะห์ข้อมูลของทีมที่ได้รางวัลชนะเลิศ The First NIDA Business Analyti...
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

cybersecurity regulation for thai capital market ดร.กำพล ศรธนะรัตน์ ผู้อำนวยการฝ่ายเทคโนโลยีสารสนเทศ สำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์

  • 1. Cybersecurity Regulation for Thai Capital Market. The First NIDA Business Analytics and Data Sciences Contest/Conference วันที่ 1-2 กันยายน 2559 ณ อาคารนวมินทราธิราช สถาบันบัณฑิตพัฒนบริหารศาสตร์ https://businessanalyticsnida.wordpress.com https://www.facebook.com/BusinessAnalyticsNIDA/ ดร.กาพล ศรธนะรัตน์ วทม. (NIDA) Ph.D. ผู้อานวยการฝ่ายเทคโนโลยีสารสนเทศ สานักงานคณะกรรมการกากับหลักทรัพย์และตลาดหลักทรัพย์ นวมินทราธิราช 4002 วันที่ 1 กันยายน 2559 10.15-11.15 น.
  • 2. Cybersecurity Regulation for Thai Capital Market กำพล ศรธนะรัตน์ Kumpol Sontanarat ICT Department Director, Thailand SEC Board Member of Electronic Transaction Commission Chairman of CIO16 Association Chairman of Thailand IT Architect Association
  • 4. Time Line Initial: IT , Intermediaries Policy and Development Dept, Investment Management Supervision and Inspection Dept, Market Supervision Dept, Broker-Dealer Supervision and Inspection Dept AUG 2014 MAR 2015 MAR 2015 Conduct 1st public hearing on on website Conduct public hearing :1st Focus group ->Intermediaries , SET Publish FAQ Conduct GAP survey : Governance , Security and Fintech issuesJUN 2016 SEP 2016 Issue new regulation with 1 year grace period Develop guideline for examinerQ3 2016 Conduct audit program through RBAAUG 2017 4
  • 5. Knowledge Background • Risk Framework and IT Best Practices • IOSCO Principles • Lessons Learned 5
  • 6. Knowledge Background Risk Framework and IT Best Practices 6
  • 7. Current IT Risk Framework • Time to review? 7
  • 8. 8 Current IT Risk Framework • All of risks associated with authorization, completeness and accuracy of transactionsIntegrity risk • Risks associated with data restriction both overly restrictive and not adequately restrictedAccess risk • The risk that SI does not have the IT infrastructure to run its business efficiently or cost-effective fashion Infrastructure risk • Unavailability of important information when needed threatens the continuity of critical SI’s critical operations Availability risk
  • 9. IT Risk : Turning Business Threats into Competitive Advantage • Analysis of 134 surveys • Empirical study • IT risk pyramid 9
  • 10. IT Risk Pyramid Agility Accuracy Access Availability Future capability Present capability Hard to quantify Easy to quantify Source: IT Risk – Turning business threats into competitive advantage – George Westerman, Richard Hunter, Harvard Business School Press 10
  • 11. 11 IT Risk Pyramid (Cont.) • Poor IT-business relations • Poor project deliveryAgility •Applications do not meet business requirements •Manual data integration required •Significant implementation under way or recently completed Accuracy •Data not compartmentalized •Applications need standardization •Lack of internal controls in applications •Network not reliable at all locations Access •High IT staff turnover •Poor backup/recovery •Infrastructure not standardized •Poorly understood processes and applications Availability
  • 12. IT Risk : View of IT Risk in business term + GRC • Emphasized on core principles – Well-structured (Technology) – Well-designed (Process) – Risk-aware culture (People) Agility Accuracy Access Availability Governance of Enterprise IT Having integrated view of IT risks in business term 12
  • 13. What part is missing? Integrity Infrastructure Access Availability Agility Accuracy Access Availability 13
  • 14. Intended Outcome Next Step - Develop audit checklist for SEC’s auditor - Build up sector-based Incidence Response Plan Industry-wide cyberdrill test To 4A’s IT Risk Framework (Focus more on Business-IT Alignment) Access Availability Accuracy Agility Change from Current IT Risk Framework (Focus on IT Risk) Access Availability Integrity Infrastructure 14
  • 15. IT Best Practices Adoption » COBIT 5 : Control Objectives for Information and related Technology - mainly contributed by:- • ITIL – Information Technology Infrastructure Library • ISO/IEC 27001 (Major contributor for our new regulation) 15
  • 16. Knowledge Background (Cont.) • IOSCO Principles 16
  • 17. Require risk control from ourselves Regulator Require risk control from regulated entity POC Law & RegulationLaw & Regulation IT governance toolIT governance tool COBIT (IT GRC)COBIT (IT GRC) IT best practiceIT best practice ITIL (service) ITIL (service) ISO27001 (security) ISO27001 (security) …… Enterprise risk management standardEnterprise risk management standard COSOCOSO Thai OAGThai OAG IOSCO PrinciplesIOSCO Principles Peer RegulatorsPeer Regulators Organization Conduct Gap Analysis in compliance with IOSCO Principles SEC FrameworkSEC Framework IOSCO / Other RegulatorsIOSCO / Other Regulators 17
  • 18. List of IOSCO Principles Principles for Intermediaries • IOSCO : Report on securities activity on the internet III, Oct 2003 • IOSCO : High-level principles for business continuity, Aug, 2006 • IOSCO : Principles for direct electronic access to markets, Aug 2010 • IOSCO : Cyber-Crime, Securities Markets and Systemic Risk, Jul 2013 • IOSCO : Report on social media and automation of advice tools survey, Jul 2014 • IOSCO : Market intermediary business continuity and recovery planning, consultation paper, April, 2015 Principles for Exchange • IOSCO : High-Level Principles for Business Continuity, Aug 2006 • IOSCO : Regulatory Issues Raised by the Impact of Technological Changes on Market Integrity and Efficiency, Oct 2011 • IOSCO : Principles of Securities Regulation, Aug 2013 (revised) • IOSCO : Principles for Financial Market Infrastructures (PFMI), Apr 2012 + Guidance on Cyber Resilience for FMI (2015) • IOSCO : Mechanisms for Trading Venues to Effectively Manage Electronic Trading Risks and Plans for Business Continuity, Apr 2015 Legally binding agreement Cyber governance 18
  • 19. Samples: IOSCO Principles’ gap assessment item Regulators should do Regulated entities should do Principles for direct electronic access to markets, Aug 2010 Principle 1 : minimum customer standards - บล. ควรกำหนดให้ลูกค้ำที่จะใช้บริกำร DEA ต้องผ่ำนมำตรฐำนขั้นต่ำ โดยมีฐำนะทำงกำรเงินที่แข็งแกร่ง พร้อมทั้งมีกระบวนกำรให้ มั่นใจว่ำลูกค้ำมีบุคลำกรที่เชี่ยวชำญและคุ้นเคยกับ market rules + มีควำมรู้อย่ำงเพียงพอที่จะใช้ระบบ DEA - market authority ควรมีเกณฑ์กำหนดให้ บล. ต้องจัดให้มี min. customer standard Principle 2 : legally binding agreement ควรมีสัญญำระหว่ำง บล. กับลูกค้ำ ซึ่งกำหนดข้อตกลงในกำรใช้บริกำร รวมถึงเชื่อมโยงควำมรับผิดชอบ จำก บล. ไปสู่ลูกค้ำโดยตรง ทำให้ market authority สำมำรถเอำผิดลูกค้ำโดยตรงได้ Principle 3 : Intermediary's responsibility for trades บล. ยังคงไว้ซึ่งควำมรับผิดทั้งหมดสำหรับทุกคำสั่งที่เกิดขึ้น (ซึ่งรวมถึงกรณีที่อนุญำตให้ sub delegate) โดย บล. ควรให้ ultimate customers ปฎิบัติตำมมำตรฐำนที่ บล. กำหนดเช่นเดียวกับ ลูกค้ำรำยอื่น ๆ ของบริษัท และควรจัดให้ DEA customers ต้องจัดทำ legally binding agreements กับ ultimate customers ด้วยเช่นกัน Principle 4 : Customer Identification : บล. ควรเปิดเผย identity ของลูกค้ำต่อ market authority เมื่อได้รับกำรร้องขอ (เพื่อ facilitate งำน market surveillance) ซึ่งกำรเปิดเผยดังกล่ำวรวมถึงกรณี sub delegate ด้วย Principle 5 : Pre- and Post-Trade Information : บล. ต้องสำมำรถเข้ำถึงข้อมูล pre / post trade info. แบบ real time เพื่อให้สำมำรถนำข้อมูล ดังกล่ำวไปใช้ในกำรติดตำม + ควบคุมกำรบริหำรควำมเสี่ยงได้อย่ำงเพียงพอเหมำะสม 19
  • 20. รายการ Regulators ควรทา Regulated entities ควรทา Principles for direct electronic access to markets, Aug 2010 Principle 7 : Intermediaries บล. ควรจัดให้มีกำรควบคุม ซึ่งรวมถึงกำรมี automated pre trade control ที่สำมำรถ ป้องกันลูกค้ำส่งคำสั่งที่เกิน existing position / credit limit อย่ำงมีนัยสำคัญ (โดยเฉพำะพวก algo หรือ HFT) Principle 8 : Adequacy of systems : บล. + market infra ทั้งหมด ควรมี operational and technical capability ที่จะบริหำร จัดกำรควำมเสี่ยงที่อำจเกิดจำก DEA ได้ โดยต้องมั่นใจได้ว่ำทุกอย่ำงทำงำน properly / มี capacity เพียงพอ + scalable to volume ทั้งนี้ market authority อำจกำหนดให้ บล. • จัดให้มี capability estimates สำหรับระบบ automated order routing and execution / market info. / trade comparison • จัดทำ capacity stress test ตำมโอกำส เพื่อให้ทรำบถึงรูปแบบ / พฤติกรรม ของระบบภำยใต้สภำวะที่แตกต่ำงกัน • จัดให้มี independent review ระบบทั้งหมดว่ำ perform ได้อย่ำงเพียงพอ และมีควำมมั่นคงปลอดภัย • จัดให้มีนโยบำยที่จะจัดจ้ำงหรือฝึกฝนพนักงำนที่มี technical skills Samples: IOSCO Principles’ gap assessment 20
  • 21. รายการ Regulators ควรทา Regulated entities ควรทา Cyber-Crime, Securities Markets and Systemic Risk, Jul 2013 • ปรับปรุง / ใช้บังคับหลักเกณฑ์เกี่ยวกับ cyber crime โดยร่วมมือกับ authorities อื่น ๆ (เพื่อป้องกัน regulation gap) • สนับสนุนให้เกิดเครือข่ำย information sharing ในประเด็นดังกล่ำว • ทำหน้ำที่เสมือนเป็นศูนย์ควำมรู้แก่อุตสำหกรรม / ตอบปัญหำข้อซักถำม / นำเสนอ best practice เช่น cyber security / resilience / รวบรวมเคส ที่เกิดขึ้น เพื่อวิเครำะห์หำจุดอ่อนของอุตสำหกรรม Samples: IOSCO Principles’ gap assessment 21
  • 22. Summary Matrix for Conducting GAP Analysis from IOSCO Principles and Lessons Learned IOSCO Principles IT-related areas Address by High-Level Principles for Business Continuity, Aug 2006 -Principle 1-7  Issue notification about BCP Regulatory Issues Raised by the Impact of Technological Changes on Market Integrity and Efficiency, Oct 2011 -Recommendation 1-5  Issue notification about IT security Principles for Financial Market Infrastructures (PFMI), Apr 2012 + Guidance on Cyber Resilience for FMI (2015) -Principle 2 : Governance -Principle 3 : Managing Risk -Principle 8 : Settlement -Principle 17 : Operational risk -Principle 20 : FMI Link  Add governance issues in new regulation  Notification about BCP+IT Security Principles of Securities Regulation, Aug 2013 (revised) -Principle 33  Notification about BCP+IT Security Mechanisms for Trading Venues to Effectively Manage Electronic Trading Risks and Plans for Business Continuity, Apr 2015 -Recommendation for Managing Technology to Mitigate Risk -Recommendation for How to Plan for Disruptions: Business Continuity Plans  Add governance issues in new regulation  Notification about BCP 22
  • 23. Conduct Gap Analysis through COBIT EDM02 Ensure Benefits Delivery EDM03 Ensure Risk Optimization EDM04 Ensure Resource Optimization EDM05 Ensure Stakeholder Transparency APO04 Manage Innovation BAI04 Manage Availability and Capacity BAI08 Manage Knowledge MEA01 Monitor, Evaluate and Assess Performance and Conformance MEA02 Monitor, Evaluate and Assess the System of Internal Control (5 processes) (13 processes) (10 processes) (6 processes) (3 processes) Room for improvement 23
  • 24. Cybersecurity Regulation for Thai Capital Market 24
  • 25. Contents of Regulation Ensure Risk Optimisation Ensure Resource Optimisation, Ensure Stakeholder Transparency The System of Internal Control Ensure Risk Optimisation Ensure Resource Optimisation, Ensure Stakeholder Transparency The System of Internal Control Cobit5 ISO27001 + cloud Endorse Governance of Enterprise IT as regulation 25
  • 26. Security Requirements in compliance with ISO/IEC 27001:2013 • 1. Information Security Policy and Compliance • 2. Organization of Information Security • 3. Human Resource Security • 4. Asset Management • 5. Access Control • 6. Cryptographic Control • 7. Physical and Environment Security • 8. Operations Security • 9. Communications Security • 10. System Acquisition, Development and Maintenance • 11. Supplier Relationship • 12. Information Security Incident Management • 13. Information Security Aspects of BCM 26
  • 27. Cloud Computing Regulation • Cloud policy • Cloud provider management • Monitor and review cloud services 27
  • 28. Cloud policy • Risk assessment • Define critical services/applications • Define type of services :SaaS, PaaS, IaaS • Conduct due diligence of cloud provider, focus on CIA • Analyze qualifications of provider: financial status, capability to serve • Communicate policy effectively with signed letter • Establish data policy – data classification and how to manage each data category • Define users responsibilities – access policy i.e. multi-factor authentication for administrator • Regular audit requirement 28
  • 29. Cloud Provider Management • Data is belong to service users (regulated entities) • Define cloud services to be adopted • Define network security requirements i.e – Implement DDoS, APT – Segregate network zone – Data encryption – Implement defense in depth approach – Hardening and access control – clear SLA and responsibilities of provider • Monitor / report / incidence handling, problem management, overall performance • Backup and recovery policy • RTO and RPO (recovery time objectives and recovery point objective) 29
  • 30. Cloud Provider Management (Cont.) • Compensation when provider fails to deliver • Information leak prevention policy from provider • Provider has no authority to access and disclose information • Provider has been certified in compliance with latest international standard • Required report from external auditor at least once a year 30
  • 31. Cloud Provider Management (Cont.) • exit plan – retain and permanent destroy policy • Define sub contract of cloud with full obligation of main provider 31
  • 32. As Users (regulated Entity)- Monitor and review cloud services • Monitor to ensure provider can provide qualified services through agreement and inline with standards • Assess and conduct provider capacity planning regularly • Review term and condition of agreement when significant changes occur • Review service provider regularly –financial status, process, efficiency and capability to serve 32
  • 33. 33 Require more from Regulated Entity • Apart form security requirement, new regulation also requires more on: – Information security incident management – Cyberdrill test / scenario based testing – Conduct BIA and report to board member – Archive report/log for auditing – Report to regulator when system disruption, system compromised and harm to reputation – Conduct Penetration Test and Vulnerabilities Assessment • 1 year grace period from September 2016-Auygust 2017
  • 34. Require more from Regulator • Initiate Sector-based Incidence Response Plan with peer regulators and critical infrastructure – Information sharing – Public announcement • Conduct Industry-wide Cyberdrill Test 34