The Information Technology Risk Management Guidelines (แนวปฏิบัติในการบริหารความเสี่ยงด้านเทคโนโลยี สารสนเทศ) by the Bank of Thailand (BOT) was refreshed in November 2023 to address evolving cybersecurity threats, digital transformation risks, and regulatory compliance requirements for financial institutions in Thailand. The revised Guidelines include maintaining systems that support mobile banking channels, reporting IT risk self-assessments to the BOT within 30 days, and submitting guidelines for IT risk management implementation and third-party risk management.
Banks, non-bank financial institutions, and payment service providers are supervised by the BOT.
Discover how financial institutions comply with the Information Technology Risk Management Guidelines through our comprehensive solutions and learn more about the requirements.
Thales’ Cybersecurity Solutions help financial institutions address 8 requirements in Chapter 2 – Information Technology Security by simplifying compliance and automating security with visibility and control, reducing the burden on security and compliance teams.
BOT Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks.
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Data Security
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Identity & Access Management