The service will study the company's operations and review documents related to personal data protection, analyze facts and assess current performance, operational risks, and make appropriate recommendations for the organization to comply with the requirements of the Cybersecurity Act and the NIST Cybersecurity Framework.
1. Auditing and reviewing documentary evidence from operations, analyzing, assessing under the framework of COSO, and giving opinions/recommendations.
2. Consultancy on internal control, risks, and governance processes.
3. Follow-up on the implementation of recommendations from the internal control system assessment.
** Depending on the size of the organization
Consultancy on the business operation to achieve corporate goals and report.
This service is suitable for |
Advantage |
What the clients need to prepare |
---|---|---|
1. The companies wishing to prepare for compliance with the Cyber Security Act B.E. 2562 |
1. Know the weaknesses of the company's network to prevent, cope and mitigate risks and the impact of cyber threats. |
1. Prepare company network-related information for interviews and audits. |
1. Internal Audit
2. Enterprise Risk Management (ERM)
Ms. Kantima Humakorn 02-596-0500 ext. 327