This service will study the working principles of the application and test the accuracy and completeness of the input, process, and output of the application whether it complies with key elements of information security (CIA triad) and prepare a summary report of the assessment for submission to the stock exchange.
1. Auditing and reviewing documentary evidence from operations, analyzing, assessing under the framework of COSO, and giving opinions/recommendations.
2. Consultancy on internal control, risks, and governance processes.
3. Follow-up on the implementation of recommendations from the internal control system assessment.
**Depending on the duration of operation.
Consultancy on the business operation to achieve corporate goals and report.
This service is suitable for |
Advantage |
What the clients need to prepare |
---|---|---|
1. The company wishing to check the working process of the core application to ensure that the processing is correct and complete as designed. |
1. Being aware of vulnerabilities in core applications and appropriate improvements. |
1. Prepare information related to the core application for use in interviews and audits. |
1. Internal Audit
2. Enterprise Risk Management (ERM)
Ms. Kantima Humakorn 02-596-0500 ext. 327