ÂŁÂŽĂˆÂ ÂźÂźÂşÂ ĂŠÂź
Board of Directors
Prof. Hiran Radeesri
Â´ÂźĂˆÂąĂŠÂ˛Â ĂŒÄłÄłĂŒÂşÄšĂ‰Â Ä˛ĂŒĂ Äš Ä˛Âź Ă–Â Ă€ĂŒÂ°ÂťÄ?Ă–Â´Ă ÂťĂŠÂ˛Â˛Â°Ä?
5NK Exclusively For Company Directors
Board Welcome CEO Reflection Cover Story Digital Disruption Managing Technology & Disruption Board Development Capital Structure, a Basic Need for the Success of a Business Board Opinion Lessons Learned from ATM Malware Attacks The lessons learnt from the recent problems of ATM machines being attacked with malware, and the preparation of future protective measures. Frequently Asked Questions â€“ Data analytics A-B-C Anti-Corruption Update Anti-Corruption in Practice Regulatory Update What Finance Executives and Audit Committees Need to Know about New Auditorâ€™s Report (Part1) Board Review Board Success Board Activities $WDBTSHUD!QHDĹ°MF$WODQHDMBDR2G@QHMF
Ă”ÂˇĂ?ĂœĂ…Ă”Â´Ä?Â˛Â ĂŠÂźĂ”ÂľÂťĂ•ÂˇÂźÄ‰Ă”Â Ă?ĂœÂťĂ€Â Ă‰ÂłÂ ĂŠÂźÂ ÄťĂŠÂ Ă‰ÂłÄ˛Ă‘Ă•ÂžÂ ĂŒÄśÂ ĂŠÂźÂ°Ă?ĂœÄ˛Ă?Ă—ĂƒÄŠÂ Ă‰ÂłĂ‚ÂşĂŠÂ§ĂŒÂ Ă‚ÂşĂŠÂŁÂşĂ‡
Ă”ÂˇĂ?ĂœĂ…Ă”Â´Ä?Â˛Â ĂŠÂźĂ”ÂľÂťĂ•ÂˇÂźÄ‰ÂĄÄŠĂ…ÂşĂ‘ÂžÂ ĂŒÄśÂ ÂźÂźÂşÂĄĂ…ÂŚĂ‚ÂşĂŠÂŁÂşĂ‚Ä‰ÂŚĂ”Ă‚ÂźĂŒÂşĂ‚ÂŻĂŠÂłĂ‰Â˛Â ÂźÂźÂşÂ ĂŠÂźÂłÂźĂŒĂ Ă‰Â°Ă˜Â°Âť
Ă—ĂƒÄŠÂ Ă‰ÂłĂ‚ÂşĂŠÂ§ĂŒÂ Ă‚ÂşĂŠÂŁÂşĂ‡
Ă”ÂˇĂ?ĂœĂ…Ă”Â´Ä?Â˛Â ĂŠÂźĂ”ÂľÂťĂ•ÂˇÂźÄ‰ÂłÂ°ÂŁĂ€ĂŠÂşĂ•ÂžĂˆÂ ĂŒÄśÂ ÂźÂźÂşÂĄĂ…ÂŚĂ‚ÂşĂŠÂŁÂşĂ—ĂƒÄŠĂ‚ÂşĂŠÂ§ĂŒÂ ÂźĂ‰ÂłÂ°ÂźĂŠÂł
Ă‚ÂźĂ?Â´Â´ÂźĂˆĂ”Ä˛Ă›Â˛Ä˛ÄŠĂŠÂ˛Â ÂŞĂƒÂşĂŠÂťÂ ÂŞÂźĂˆĂ”ÂłĂ?ÂťÂłĂ—ĂƒÂşÄ‰ĂšÂ°Ă?ĂœĂ”Â Ă?ĂœÂťĂ€ÂĄÄŠĂ…ÂŚÂ Ă‰ÂłÂ ĂŠÂźÂ°ÄťĂŠĂƒÂ˛ÄŠĂŠÂ°Ă?ĂœÂ ÂźÂźÂşÂ ĂŠÂź
Â˛ĂŠÂťĂ€Ă?ÂźĂˆÄšĂ‰Â Ä˛ĂŒĂ Ă–ÂŁĂ€Ă‚Ă?ÂźĂ‰ÄłÂ˛Ä?
Mr. Weerasak Kowsurat
Äš Ä˛Âź Ă‚Ă?ÂźÂˇÂžÂ˛ĂŒÄłĂŒĂ˜Â ÂźÂˇÄśÂ˛Ä?
Mr. Chaiwat Utaiwan
Â˛ĂŠÂťÂ´ÂźĂˆĂ‚Ă‰ÂŽĂƒÄ?Ă”Â§Ă?Ă?Ă…ÂˇĂŠÂ˛ĂŒÂ§ Â˛ĂŠÂťÂ´ÂźĂ?Ä˛Ă? Ä˛ĂŠĂ€Ä¸ĂŠÂť
Dr. Bandid Nijathaworn
Mrs. Kesara Manchusree Mrs. Tongurai Limpiti
Mrs. Nualphan Lamsam
Mr. Banchong Chittchang Mr. Prasan Chuaphanich Mr. Predee Daochai
Mr. Pailin Chuchottaworn
Mrs.Patareeya Benjapolchai Mr. Rapee Sucharitakul
ÂŁÂŽĂˆÂ ÂźÂźÂşÂ ĂŠÂź,DLADQ
Member Engagement Committee
Dr. Chatchavalit Saravari
Engagement Committee Ä˛Âź Â§Ă‰Â§Ă€ÂžĂŒÄłĂ‚ÂźĂ€ĂŠÂźĂ?
Â˛ĂŠÂťÂŽ ÂˇÂŚĂ Ä?Ă‚Ă?ÂĄĂ‚ÂŚĂ€Â˛
ÂľÄš Ă…Â˛Ă?Â§ĂŠÄśĂŒÂ˛ÄłÂ ĂŠÂ˛Â˛Â°Ä?
Prof.Dr. Surapon Nitikraipot
Â ÂźÂźÂşÂ ĂŠÂź
Âź Äł Â° ÄšĂŒĂ€ĂˆÂźĂ‰Â Ă Ä?ÂˇĂŒÂ˛ĂŒÄśĂŠÂźÂşÂŽÄ?
Mr. Chatchai Virameteekul
President & CEO
Mr. Krik-Krai Jirapaet
Â ÂźÂźÂşÂ ĂŠÂźÂľĂ‘ÄŠĂ…ÄťĂŠÂ˛Ă€ÂťÂ ĂŠÂź
Corporate Governance Code Conference Thailandâ€™s Private Sector Collective Action "N@KHSHNM@F@HMRS"NQQTOSHNM" " "&6NQJRGNOĂ˛$MG@MBHMF&NNC Corporate Governance based on CGR Scorecardâ€? Family Business Club Dinner Welcome New Member
ÂźĂ…ÂŚÂ´ÂźĂˆÂąĂŠÂ˛Â ÂźÂźÂşÂ ĂŠÂź
Khunying Jada Wattanasiritham Chairman
Â˛ĂŠÂťÄ¸Ă‰ÄłÂźÂ§Ă‰Âť Ă€Ă?ÂźĂˆĂ”ÂşÂąĂ?Â Ă?Âž
Prof. Kovit Poshyanand
Â´ÂźĂˆÂąĂŠÂ˛Â ÂźÂźÂşÂ ĂŠÂź
Â˛ĂŠÂťĂ”Â ÂźĂŒÂ Ă˜Â ÂźÄśĂ?ÂźĂˆĂ•ÂˇÂ°ÂťÄ?
Mr. Norpong Suksanguan Mr. Teerayuth Tantraphon Ms. Pacchanya Chutimawong Mr. Wattana Laipermpoon Pol.Lt. Sivaraks Phinicharomna Asst.Prof. Anucha Chintakanond
Mr. Apiwut Pimolsaengsuriya
Ă‚ÂşĂŠÂŁÂşĂ‚Ä‰ÂŚĂ”Ă‚ÂźĂŒÂşĂ‚ÂŻĂŠÂłĂ‰Â˛Â ÂźÂźÂşÂ ĂŠÂźÂłÂźĂŒĂ Â° Ă‰ Ă˜Â°Âť
Thai Institute of Directors Association
Â Ă…ÂŚÂłÂźÂźÂŽĂŠÂąĂŒÂ ĂŠÂź
Ms. Siriporn Wutthigul
Mrs. Wilairat Nensaengtham
Mrs. Wirawan Munnapinun
Ms. Sarinee Ruangkongkiat
ĂƒÂžĂ‰Â Ă‚Ă?ĂœÂ ÂźĂ?ÂŚĂ”Â°ÂˇĂ‡
Thungsonghong, Laksi, Bangkok
6DARHSDGSSOVVV SG@H HNC BNL
$ L@HKR@QHMDDSG@H HNC BNL
$ L@HKR@QHMDDSG@H HNC BNL
6DARHSDGSSOVVV SG@H HNC BNL
Â®Â°7ZGT'C9Wg>T;CT_=;IS;9Wg-TIc9D9Z$'; _JE T aJ$_LW D b+OD T *MT9Wg _ =EW D <CV c 6 $S < $TE _L6f+LIEE'7%O*@ER<T9LC_6f+@ER=ECV;9E CMTB[ CV@GO6ZGD_6-CMV7GT:V _ <JEETCT:V<6W +S$EW;F<6V;9ELDTCV;9ET:VET-<EC;T8<@V7E ES-$TG9WgÂ¶`M*@ER<EC+S$EWI*J 7GO6ERDR_IGTÂ´Â =9Wg@ERO*'9T;9E* 'EO*ET-D@ERO*'c6@ERET-9T;a'E*$TE7T*e $ITÂ±Â©ÂÂÂa'E*$TE_@YgOD$ER6S<'ITC_=;OD[%O* =ER-T-;c9D9E**T;M;S$ODT*CVE_[ M;f6_M;YOg D6I D 'ITC_@WDECT;ROZ7LTMR_@WD*CW@ERET-=ERL*' bM = ER-T-;-TIc9Dc6 CW ' ITC_= ; OD[ 9Wg 6W %Xh ; LZ%L<TD%Xh; @ERO*'9T;9E*_=;7SIODT*b; $TE9lT'ITC6W ;X$8X*=ERaD-;LI;EICCT$$IT =ERaD-;LI ;@ERO*'CW@ERET-6lTESLbM=ER-T-; CW'ITC@O_@WD* E[' 5Z 'T%O*9ES@DT$EEO<7SIOD[ <OD'ESh*`7_M;YOOYg;b6@ERO*'9T;9E*=1V<S7V `;I@ERET-6lTEV_MGT;Sh;6ID@ERO*'_O*_@YgObM =ER-T-;c6_Mf;_%Tb+`GR_=;7SIODT*9W6g 9W 8gW $[ 7O* 6S*'lTLO;_EYOg *'ITC_@WDE9IgW T $TELET*LEE' 7;_O*$TELET*<T;_CYO*$f7TCCVb-ITLET*b; IS;_6WDI7O*b-_IGT7O*b-'ITC_@WDE7O*b- 'ITCO69;_LWDLGR`7LlT'SÂ‰9WgLZ6'YO'ITCO69; 'YOcCDO9OcCDO9Ob;LVg*9Wg6W*TCLVg*9Wg6W*TC;Sh;9lT CS;;T_<YgO <T*9W_MCYO;ITcCc6>G cC6S* 'YO6[ CS;'EX9lT6W;Wg`7%OES<EO*IT$TE9lTbM6WcC'EX7O* CW'ITCO69; _IGT%T*M;T+R_Mf;>G`;;O;b; 'ITCO69;%O*7;_O*Â¥@ER<ECETa-IT9 @ERET-9T;`$;S$_EWD;;S$JX$KT'E[`GROT+TED b;aO$TL_%T_? TQIS;9WgÂ¯Â´7ZGT'CÂ¯Â²Â®Â³Â¦ 6IDLlT;X$b;@ERCMT$EZ5T:V'Z5 ODT*MT 9WgLZ6CVc6 LCT'CL*_LEVCL8T<S;$EEC$TE<EVKS9 c9D%O; O C;l T `;I@ERET-6l T EV C Tb- b ;$TE LET*LEE' @S4;T`GRD$ER6S<$TE_=;$EEC$TE %O*<EV KS 9 c9DbM 6l T E*'*cI 6 I D'ITC8[ $ 7 O * `GRCW'Z5:EEC_@YgO'ITC$TIM;T`GRDSg*DY;%O* _JEK2$V+c9DLY<c= <EE5T:V$TE
06 | B o a r d r o o m
With the passing of His Majesty King Bhumibol Adulyadej, the ninth King of the Chakri Dynasty, the 13th of October was a day filled with deep sorrow for all Thais. Throughout His Majestyâ€™s 70 year reign, the King worked tirelessly and diligently, pioneering more than 4,000 royally initiated projects with the aim of improving the overall standard of living and well-being of the people of Thailand. His Majestyâ€™s was the ultimate role model in doing good deeds and in thinking more about the common good than His own personal interest. He spoke frequently about and promoted the philosophy of becoming self-sufficient and the need to recognize the value of the surrounding natural resources. However, above all else, His Majesty personally practiced this philosophy and set a positive example, so that the people of Thailand would see for themselves and understand its significance. For example, His instructions on being diligent and acting with self-perseverance: â€œWhether developing yourself or developing the nation, it cannot be achieved in one day. It takes time and requires much diligence, perseverance,
self-sacrifice and sustained efforts. Above all, by perseverance and endurance, means not giving up and not forsaking goodness. Achieving such goodness and positive activities may often seem boring, hard to achieve and not well-recognized. Such good deeds may seem out of fashion. But let me assure you, such positive actions are not outmoded; but require a great deal of endurance and much effort. And, in the end, future benefits will be gained through such self-perseverance. (Royal address given to an audience graciously granted to a group of students and teachers on October 27, 1973). With a sense of humble gratitude and deepest appreciation for His Majestyâ€™s boundless concerns and good deeds that are matchless, the Thai Institute of Directors Association (IOD) will implement, as well as put into practice His Majestyâ€™s philosophy and instructions towards creating, developing and enhancing the role of Board Directors in Thai companies so as to preserve the standards of correctness and moral behavior for the further positive and sustainable development of the Thai economy. The Editor
4G=.K4 L=W5?O_<3X5?"G"W1Y3Y?<O Board and technological change .=4K-+N/3N#0LA= ©×§ÆÓÉÎÉ³ÎÏÆÙÍÆÜÔ×Ó President & CEO
@S4;T$TE%O*6V+7V OG_9'a;aGDW`GR>G$ER9< CW7O$TE9lT:ZE$V+=++Z<S;CW`7';@[68X*_@ETR_=; _EYgO*9Wg$lTGS*_$V6%Xh;`GRCW>G$ER9<7O:ZE$V+CT$ 7SIODT*_-;:ZE$V+$TE_*V;9WgbM<EV$TEG[$'TETDDOD 9Wg CW $ TEbM < EV $ TE9T*$TE_*V ; bMC 9Wg b - 6V +V 7 OG _9'a;aGDW+;CWJS@9$TE_*V;bMCeCT$CTDbM_ET c6DV;_-;Ãæëñâàå©¿æñàìæë©¿éìàèàåÞæë`GRÍââï ñìÍââïÉâëáæëä9Sh*MC6_=;$TEb-_9'a;aGDWLg CSD bMCbM_$V6$TEbM<EV$TE9T*$TE_*V;`$G$[ 'T_MCYO; 9WgL8T<S;$TE_*V;9lT `7b;7;9Z;9Wg7lT_ $IT `GRbM =ERL<$TE5$TEb-<EV$TE7O>[<EVaB'9Wg=ER9S<b+ $IT_@ETREI6_EfI=GO6BSD`GR`CDlT+;LET* >G$ER9<LSg;'GO;¥áæðïòíñ¦7O$TE6lTE*OD[%O* :ZE$V+=++Z<S;9lTbM:ZE$V+$TE_*V;7O*=ES<7SI7O* ;lT_9'a;aGDWgbMCeCT=ERDZ$7b-b;$TEbM<EV$TE $TE_*V;%O*7;_@YgOES$KT2T;G[$'T`GRES$KT 'ITCLTCTE8b;$TE`%*%S;=++Z<S;;O$+T$:ZE$V+ $TE_*V;`GI:ZE$V+MGTD=ER_B9$f8[$$ER9<_-;$S; cCIT +Rb;BT'$TE>GV76T;<EV$TE6T;LT:TE5LZ% EIC8X*$TEbM<EV$TELI;<Z''G9lTbM:ZE$V+b;_$YO< 9Z$OZ7LTM$EEC%5R;WhLTCTE88[$LSg;'GO;c6+T$ >G$ER9<%O*_9'a;aGDWg _CYOg 7;_6YO;;Wh 9T*L8T<S;ÆÌÁc6+6S _LI;T _EYOg *;Wbh ;MSI%OÊÞëÞäæëäÑâàåëìéìäö£Áæðïòíñæìë .Xg*c6ES<$TE7O<ES<+T$LCT-V$CT$ CW$EEC$TE LCT-V$_%TCTEIC*T;$IT ®´ '; .Xg*=ER_6f;
8 | Boardroom
LlT'S7T*e9Wgc6+T$*T;CW$TELEZ=cIb;<9'ITC 9Wg=ET$0OD[b;<OE6E[C,<S<;Wh LlTMES<>C_O* 'V6 ITCWLTC=ER_6f;9Wg_=;%O'V69WgLlT'S_$WgDI$S<LVg*9Wg $lTGS*_$V6%Xh;
_=;LI;M;Xg*b;$TE$lTM;6DZ9:JTL7E%O*<EVKS9 ;l T c=L[ $ TE7S 6 LV ; b+b;=ER_6f ; 9Wg 7 O *=ES < 7S I 9WgOT+7O*G*9Z;6T;_9'a;aGDW_@VgC _@YgO_@VgC =ERLV9:VBT@`GRLET*'ITCLTCTE8b;$TE`%*%S; OS;;W_h =;M;T9Wag 6D7E*%O*<OE69Wg7O*7V67TC`GR =ER_6f;`E$'YO@S4;T$TE6T;_9'a;aGDW b-BTIR>[;lT%O*'5R$EEC$TE@V+TE5T 9Wg_$V6%Xh;MCTD8X*$TE=1VIS7VER<<_JEK2$V+_%TL[ aG$bMC%O*áæäæñÞéâàìëìêöMEYO_JEK2$V+DZ' =ER_6f;9WgLTC$f'YO_EYgO*<Z'GT$E9Sh*b;ER6S< 6V+V7OG 9Wg_9'a;aGDW6V+V7OG8[$;lTCTb-CT$CTD %O*<OE69Wg+R7O*CW$EEC$TE9Wg@O+RbM'lT`;R;lT b;ER<<_JEK2$V+ 9Sh*6T;$TE>GV7 $TE<EVaB' 7O<OE6c6b;_EYgO*_9'a;aGDW '5R$EEC$TE_O*$f `GRb;-WIV7=ER+lTIS;_=;LVg*9Wg$lTGS*_$V6%Xh;`GR 7O*=ES<7SI_@YgO_@VgC@[;'ITCE[ 'ITC_%Tb+%O* ;S<IS;+RCWCT$%Xh;e9lTbMIV:W$TE9lT:ZE$V+7GO6 '5R$EEC$TEb;_EYgO*_9'a;aGDW _@YgO;lTc=L[$TE +;E[ = `<<$TEb- -W IV 7 `GR$TE<EV a B'b;LS * 'C 7S6LV;b+9W'g EO<'GZC`GRCW_M7ZC>W Gb;+Z6;Wh $TELEEMT _JEK2$V+aG$+R_=GWgD;c= _=;$TE_=GWgD;`=G*9Wg $EEC$TE9WCg 9W $S KR6S*$GTICT_LEVC+R_=;9T*OO$ MGW$_GWgD*cCc6 `GR+RCW>GODT*LlT'S7O$TE9lT M;Xg*$TEb-'5R9Wg=EX$KT9WgCW'ITCE[6T;_9'a;aGDW :ZE$V+%O*9Z$<EVKS9cC-T$f_EfI $f_=;OW$9T*OO$M;X*g `7;O$+T$'5R$EEC$TE`GI <Z'GT$EER6S<<EVMTE$fLlT'S9Wg7O *CW'ITCE[ 'ITC =ER_6f;9WgLO* 'YO :ZE$V+7O*7ERM;S$`GR _%Tb+b;_EYOg *_9'a;aGDWEIC8X*$TELET*'ITCLTCTE8 _% T b+b;>G$ER9<9Wg O T+CW 7 O <EV KS 9 +T$$TE bM<Z'GT$E%O*O*'$ECW'ITCE[`GR9S$KRCT$%Xh; @S4;T_9'a;aGDW9Wg_$V6%Xh;LlTMES<<OE6<EVMTE7O* b;_EYgO*_9'a;aGDW _@YgObM<EVKS9MEYO9Sh*O*'$E _%Tb+IT$TE@S4;T6T;_9'a;aGDW9Wg_$V6%Xh; cCb- LTCTE8=ES<7SI7O$TE_=GWgD;`=G*%O*_9'a;aGDW _=;_EYgO*ÆÑMEYO_=;=ER_6f;ÆÑ9Wg_=;=MT%O* c6 LVg*_MGT;Wh+R_$V6%Xh;c6$f7O*CT+T$BTIR>[;lT >[<EVMTE`7_=;_EYgO*%O*$TE<EVMTE'ITC_LWgD*9Wg %O*'5R$EEC$TE9Wg7O*-Wh;lT`GR;lT@TO*'$Ec= +RCW7gO:ZE$V+%O*<EVKS99Sh*b;`*g=ERLV9:VBT@ L[$TE=ES<7SI`GRc=L[ER6S<'ITCLTCTE89WgL[*%Xh;9Wg $TE`%*%S;`GR'ITC=GO6BS D b;$TE9l T :Z E $V + +Rb-=ERaD-;+T$_9'a;aGDWb;$TE9lT:ZE$V+ <EV<9_MGT;Wh_=;LVg*9Wg'5R$EEC$TE7O*7ERM;S$ `GR7O*;lT=ER_6f;6T;_9'a;aGDWCT@V+TE5TbM $fMIS*IT>[OT;`GR$EEC$TELCT-V$'*+R L;Z$`GRc6LTER+T$;V7DLTE<OE6E[C,<S<;Wh
The development of digital technology and its impact on businesses is a popular topic of discussion because it is happening now and significantly affecting businesses. For example, in the financial sector, new on-line services at the retail level have given rise to numerous terms, such as Fintech, Bitcoin, Blockchain, and Peer to Peer Lending. These are a result of the application of digital technology, providing the same services as those of traditional financial institutions, albeit at lower costs. The customers are generally satisfied with the services on account of swiftness, safety, and accuracy, posing an existential threat to the traditional establishments. These are under pressure to adopt the digital technology so as to maintain their customer base and competitiveness. The impact of the digital technology is not limited to the financial sector alone. Other businesses, such as manufacturing, services, public health, and personal services, are also being similarly affected.
Second, it is important that companies recognize and understand the potential impact, the sooner the better. We are not talking about the IT issue, which is management-related, but about risk management of the business of companies, in terms of efficiency, security and competitiveness. In these contexts, the board must be aware and consider technology as an integral component of its corporate strategy, as a basis of its decision making with regard to any adjustment that needs to be made, e.g. whether or not to increase investment in technological investment to enhance efficiency and competitiveness. Such responsibility falls directly on the board.
Third, personnel issue, at the board and other levels, at the board level whether or not there is a board member who can advise the board on technological matters. The board itself must keep improving its knowledge of its digital technology, so that they can make informed decisions. Hiring experts or consults is one option. In addition, key managers should also have a good grasp of Earlier this month, the IOD held a seminar on Managing Technology & Disruption. The seminar technological knowledge and visions, to facilitate the process of adjustment. received huge interest from our members, with over 170 attendees. Key issues discussed at the event are summarized in the articles in the current I hope the readers and IOD members enjoy issue of The Boardroom. Three issues are note- reading this issue of Boardroom and find its content useful. worthy. First, the on-going digital technological development indicates we are at the threshold of a new digital economy. The application of the digital technology to the economic system, be it manufacturing, consumption, and other aspects of daily life, is set to increase. The technological change will inevitably have a profound impact on the way we do business, live, and consume. All companies will be impacted sooner or later.
Boardroom | 9
C o v e r S t o ry
B o a r d r o o m | 11
C o v e r S t o ry
DIGITAL ©®¸·ºµ¹®´³ _CYgO$TI_%TL[DZ'9WgLVg*%O*b;-WIV7=ER+lTIS; LTCTE8_-YgOC7O`GRLYgOLTE$S;c6>T;_'EYO%TD OV;_9OE_;f7MEYO_EWD$LS;h eITDZ'ÆëñâïëâñìãÑåæëäð _9'a;aGDW_%TCTCW<9<T9LlT'S$S<-WIV7=ER+lTIS; %O*_ETCT$%Xh; _9'a;aGDWLET*'ITC7Yg;7T7Yg;b+ OlT;ID'ITCLR6I$L<TD EI6_EfIbM$<S >[b -<EV$TE `GRDS * LTCTE8_-Yg O C7 O % O C[ G +T$9Sg I aG$cI b ; OZ=$E5%;T6_Gf$_@WD*? TCYO 9lTbM_ET_%T8X*%OC[G _=6aG$$IT*6ID'Tb-+T D_@WD*;OD;V6'Z5=ERaD-; 9WgCT$CTD;WhGI;`O<`?*'ITC;T$GSIOD[c C;O D-I * 9W>g T ;CT MGTD:ZE$V+_7V<a7@S4;T ;lT_OT_9'a;aGDW _%TCTb-b;$TE6lT_;V;:ZE$V+ 9lTbM7SI_G%ETDc6 %O*`7GR`M*@Z* L[*%X;h +;_=;9W;g T @Ob+`7O$W 6T; $GS<@<ITCW'ITC_LWgD*MGTD=ER$TE9Wg_$V6+T$ $TE;lT_9'a;aGDWCTb- cCIT+R_=;$TEa+E$EEC %OC[G¥Àößâï¾ññÞàè¦MEYO$TE=GOC`=G*_@YgO MGO$_OT%OC[G¥ÀìêêâïàæÞéÀïæêâ¦a6D$TE= O*$S; 9Wg_7EWDCES<CYOcI$GS<cC_@WD*@O b;7T*=ER_9JCW$TE7Yg;7SI_EYgO*$TEES<CYO = O*$S;'ITC_LWDg *7T*e 9WOg T++R_$V6%X;h +T$$TE;lT _9'a;aGDWCTb-*T;OD[cC;OD a6D_CYgO7;_6YO; $S;DTD;9Wg>T;CT 9T* ¿ìÞïáïììê c6CWaO$TL EIC*T;LSCC;TÐÆÁÁæïâàñìïðÀìëãâïâëàâ¯®³ .Xg *_=f; *T;LSCC;T=ER+l T=W%O*ÆÌÁ=ER_9J LV*'a=Eb;MSI%OÁæäæñÞéÁæðïòíñæìë6ID9T*>[+S6 ;lT_L;OCZCCO*9WgITaG$:ZE$V+c6@GV$a,C ¥Áæðïòíñ¦ c=ODT*EI6_EfI6ID_9'a;aGDWCW'ITC7Y;g _7;MIYOMIT _MCYO;$TE_G;_$CL LVg*9WgCWb;IS;;Wh @EZ*;WhOT++R cCc6_=;ODT*9Wg'T6'V6cI`GI$f_=;c6 b;2T;R $EEC$TE9Wg 7 O *$ T ID T *9 T C$GT*$TE6l T _;V ; :ZE$V+<;aG$6V+V7OG +R7O*'lT;X*8X*$TE@GV$a,C ¥Áæðïòíñæìë¦9T*_9'a;aGDW9CgW >W G7O$TE6lT_;V;:ZE$V+ `GR7O*'lT;X*IT+R7O* Áæðïòíñ $TE9lT*T;%O* '5R$EEC$TEODT*cE_@YgO+R6[`G`GR$lT$S<$V+$TE bM<EVKS9LTCTE8;lT@GS*%O*_9'a;aGDWbMCeCT 12 | B o a r d r o o m
LET*'ITCc6_=EWD<b;$TE`%*%S;`GR_7V<a77Oc= b;O;T'7a6D9Wg<EVKS9cC8[$áæðïòíñâác=_LWD$O; 9Sh*;Wh $TE9lTM;T9Wg%O*$EEC$TEc6ODT*8[$7O* LC<[E5b;DZ';Wh7O*CW'ITC7Yg;7SI9T*_9'a;aGDW 7 O *CO*bM _ Mf ; 8X * =ERaD-; % O*_9'a;aGDW b ; _-V*$GDZ9:%5R_6WDI$S;7O*'lT;X*8X*'ITC=GO6BSD _@WD*@O_-;'ITC_LWDg *b;_EYOg *$TEESIg cMG%O*%OC[G LlT'Sb;$TE=ER-ZCÀìëãâïâëàâÀÞééMEYO$TEb- OW_CG`+*%OC[G%TILTELlT'S`9;$TEb-+6MCTD =6>;X$9Wg_=;GTDGS$K5OS$KE _=;7; LVg*_MGT;Wh GI;7O*'lT;X*8X*`GRIT*ER<<= O*$S;cI`7_;Vg;e ;O$+T$;Wh9T*>[+S6*T;;lT_L;OIT_9'a;aGDW CW9Sh*6T;CY6¥ÁÞïèðæáâ¦`GR6T;LIT*¥¿ïæäåñðæáâ¦ @EOC$S<+S6_LI;T_@YgO@[6'ZD$S;b; MSI%OÀößâï ÑïâÞñ·ÑåâÁÞïèðæáâìãÑâàåëìéìäöITMGTDO*'$E 9Z C 9Z ; c=$S < $TELE T *ER<<= O *$S ; $TEa+C7W 9T*c._<OE `7MGTD'ESh*9Wg$TE= O*$S;6[_MCYO; cC_=;>GODT*9Wg'V6cI>[EIC_LI;TODT*_-;Êï«¿æéé ÀåÞëä©ÀÂÌìãÄïìòíÂëñâïíïæðâ©ÐæëäñâéMEYO Êï«ÁÞóæáÈìå©ÀåæâãÂõâàòñæóâ©ÀößâïÐâàòïæñö ¾äâëàöìãÐæëäÞíìïâ bM`;I'V6IT;O$+T$+R 'lT;X*8X*IV:W$TE= O*$S;$TEa+C7W`GI 'IE'lT;X*8X* IV:W$TEES<CYO`GR+S6$TE$S<'ITC_LWDMTD9Wg7TCCT +T$$TEa+C7W6I D_@ETR$TEES<CYO9Wcg CC=W ERLV9:VBT@ OT+L*>G$ER9<7O'ITC_-YgOCSg;%O*<EVKS9c6CT$ DVg*$IT$TE8[$a+C7W
OS;;lTCTL[$ TE<EV$TE9W7g O<L;O*'ITC7O*$TE%O* >[<EVaB'c6_=;ODT*6W`GROW$=ER_6f;9Wg;TL;b+ 9Wg >[ E I C_LI;TbM _ L;OcI 'Y O E[ = `<<$TE6l T _;V ; :ZE$V+`<<bMC;Wh 8YO_=;$GDZ9:b;DZ'6V+V7OG6ID 'lT$GTI9WgITËìðòàåñåæëäÞðÁæäæñÞéÐñïÞñâäö© ìëéöðñïÞñâäöæëáæäæñÞéÞäâ LlTMES<=ER_9Jc9D$ER`L7O<ES<DZ'6V+7V OG CWCT$%Xh;_EYgODe$TEbM<EV$TE>T;OV;_7OE_;f7 'EO<'GZC9Z$=ER_B9$TE<EV$TE CW:ZE$V+_$V6bMC MGTD=ER_B9MEYO9Wg_EWD$$S;ITÐñÞïñòíOD[9Z$IS; `CIT+RCWMGTD:ZE$V+9Wg7O*=67SIc=ODT*EI6_EfI `7MGTD:ZE$V+$f=ERL<'ITCLlT_Ef+ $TI>T;+T$ ER6S<.WELgW _O¥Ðâïæâð¾¦%X;h L[E R6S<D[;'V OE;¥Òëæàìïë¦ $fCWCT$ ODT*_-; Ììèßââ© ÔìëäëÞæ© ÄïÞß© Òßâï _=;7; `GR+T$$TELlTEI+@F7V$EEC>[b- OV;_9OE_;f7b;=ER_9Jc9D = ¯²²¶ ¥ÑåÞæéÞëá ÆëñâïëâñÒðâïÍïìãæéâ¯®³¦%O*LlT;S$*T;@S4;T :ZE$EEC9T*OV_Gf$9EO;V$L¥O*'$TECMT-;¦¥L@:O«¦ MEYOÂÑÁ¾@<IT+lT;I;-SgIaC*$TEb-OV;_9OE_;f7 b;BT@EIC9Sh * > T ;OZ = $E5 _ 'GYg O ;9Wg ` GR 'OC@VI_7OEa6D_,GWgDOD[9Wg±²«-C«¬LS=6TMMEYO 'V6_=;ERDR_IGT$TEb-*T;_,GWgD³«±-C«¬IS;a6D $V+$EECDO6;VDC² OS;6S<`E$9Wg>[b-OV;_9OE_;f7 ;VDC9lT>T;OZ=$E5_'GYgO;9Wgc6`$$TE@[6'ZD>T; ÐìàæÞéËâñôìïè¥µ³«µ¢¦EO*G*CT_=;$TE6[IV6WaO >T;ÖìòÑòßâ¥³³«³¢¦©$TEOT;M;S*LYOOV_Gf$9EO;V$L ¥²²«´¢¦©$TE';MT%OC[G¥²±«´¢¦`GR$TE9lT:ZE$EEC 9T*$TE_*V;¥±²«¶¢¦7TCGlT6S<+T$%OC[G_MGT;Wh @O+R9l T bM _ Mf ; c6 I T = + +Z <S ; =ER-T$Ec9Db- OV;_7OE_;7b;ER6S<9WgL[*9W_6WDI`GR@EOC7O<ES< :ZE$V+bMCe9W7g O<L;O*7O'ITC7O*$TEc6CT$9WLg 6Z
`GROW$MSI%O9W;g T L;b+'YOÁæäæñÞéÑïÞëðãìïêÞñæìë· Ñåâ¿ïæäåñÐæáâìãÑâàåëìéìäö9WgCW>[EICOBV=ETD OT9VÊï«ÅâéæòðÄòæêÞïÞâð©ÄâëâïÞéÊÞëÞäâï© Âëñâïíïæðâ¾àåæñâàåòïâ£ÂêâïäæëäÑâàåëìéìäæâð© ÏæìÑæëñì©Êï«ÐàìññÄæßðìë©ÄïìòíÂõâàòñæóâ© ÁæäæñÞéÍïÞàñæàâ©ÁæêâëðæìëÁÞñÞMEYOÊï«ÇòéæÞë ;O$+T$;Wh9T*ÂÑÁ¾c6bM%OLS*_$7IT'; ÍâïðÞòá©ÏâäæìëÞéÁæïâàñìï©¾ðæÞÍÞàæãæà©¾æïßëß c9DOT+8[$%aCD%OC[GLI;<Z''G'O;%T**TD`GR c6`L6*'ITC_Mf;IT_9'a;aGDW$O bM_$V6$TE`%*%S; CW'ITC_=;c=c6'O;%T*L[*9Wg+R$ObM_$V6=MT
_-;9Wg=ET$1bM_Mf;OD[<OD'ESh*%OC[GLI;<Z''G 8[$%aCDc6*TDCT$ 9Sh*9WgbM_O*`GR`-E%OC[G 7T*e.Xg*$TE7Sh*'lT8TC9WgCW-Sh;'ITCGS<_@YgO_%TL[ EMSL>T;<T*'ESh*$f'T6_6Tc6+T$%OC[G7T*e9Wg 7SI_+T%O*_=6_>D_O* =Â‰MT_EYgO*$TE6[`G%OC[G L I ;<Z ' 'G.Xg * CT'[ $S < $TEOO$$0MCTD% O C[ G LI;<Z''G+X*_=;LVg*9WgES2<TGMEYO$ER9EI*cO.W9W bM'ITCL;b+_=;@V_JK `GROD[E RMIT*$TE>GS$6S; `GROW$M;Xg*_EYgO*9WgLlT'SÂ‰cCDVg*MDO;c=$IT$S;'YO _EYg O*$TE8[$MGO$<;aG$OO;cG;k.Xg*9Sh*LO* _EYgO*;Wh';c9DcCL;b+CT$;S$ `CIT$TE= O*$S; +R_=;M;T9Wg%O*9Sh*BT'ES2BT':ZE$V+`GIIV:W9Wg LTCTE8= O*$S;c6*T D9WLg 6Z 'YO7SI>[b -*T;_O*9W+g R 7O*7ERM;S$`GR_%Tb+8X*'ITCcC=GO6BSD9Wg OT++R_$V6%Xh; ODg T*cE$f7TC b;2T;R$EEC$TE+RCW IV:W= O*$S;`GRES<CYOODT*cELlTMES<_EYgO*'ITC =GO6BSD+T$aG$c._<OE;S<_=;_EYgO*9Wg9T9TDOD[ cC;O DĂ†ĂŒĂ +X*c6+6S *T;ĂŠĂžĂŤĂžĂ¤ĂŚĂŤĂ¤Ă‘Ă˘Ă ĂĽĂŤĂŹĂŠĂŹĂ¤ĂśÂŁ Ă ĂŚĂ°ĂŻĂ˛ĂĂąĂŚĂŹĂŤ %Xh; a6DCW;S$IV-T$TE6T;_9'a;aGDW ;S$:ZE$V+CYO9O*<;aG$OO;cG; `GR>[_-WgDI-TÂ‰ +T$`I6I*=ER$S;BSD CTEIC_LI;Tb;-I*=GTD _6YO;$S;DTD;9Wg>T;CTb;<EEDT$TJ`<<_GTL[ $S;A* 9lTbM$EEC$TE9W_g %TEIC*T;MGTD9T;c6 ES<9ET<`GR7ERM;S$8X*'ITC_LWgD*9WgOT+R_$V6%Xh; @EOCIV:W= O*$S;9WgLTCTE8-IDG6'ITC_LWgD*c6 a6DETDGR_OW D 6*T;LTCTE87V 6 7TCc6 b ; 'OGSC;8S6c= In the digital age, objects in our routine life can be easily connected and communicated through the Internet network or the so called â€œInternet of thingsâ€?. Technology is playing a more important role in our daily life. It entertains the users, as well as helps them carry out their daily activities. It also can connect data worldwide in a device as small as your palm, which gives the user access to data from around the world for a very low cost. However, these benefits come with many hidden horrors. In recent years, many businesses have adopted new technology for their operations, which has helped them considerably boost their income. However, there are many risks associated with technology adaptation, including cyber-attacks or commercial crime and insufficient prevention. Globally, users are more aware about coping with and preventing the risks from technology adaptation. In September, Boardroom attended the SID Directorsâ€™ Conference 2016, an annual seminar organized by the Singapore Institute of Director.
The topic for this yearâ€™s conference was digital disruption. The conference was organized from a new perspective, namely that the business world is being disrupted by the new technology. It included interesting interactions, such as playing games, and a discussion on how quickly the latest technology can become obsolete. Directors who conduct business in the digital world must consider potential disruption stemming from technology that may adversely affect their business. In addition, they need to find the best approach for delegating the supervision of adapting new technology that enhances the competitiveness and growth of the company to the Board of Directors so that it does not disrupt business operations. To carry out this function, the directors need to have a thorough understanding about the new technology to be used. They must understand the benefits of the technology in the companyâ€™s overall strategy, and take into consideration the risk of the technology, such as leakage of important information from conference calls or using e-mail instead of a closed letter. These issues must be considered and accounted for in advance of implementing the technology.
that respond very well to the needs of consumers. Another interesting issue presented by the panelists was the business strategy for digital age based on the proverb â€œNo such thing as Digital Strategy, only strategy in the digital ageâ€?
The Singapore Institute of Directors also organized a seminar on the dark side and bright side of technology. The topic of the seminar â€œCyber Treat: The Dark side of Technologyâ€? was selected because many organizations had invested in setting a system to prevent cyberattacks, which failed to work as expected. Two of the panelists at the seminar were Mr. Bill Chang, CEO of Group Enterprise, Singtel, and Mr. David Koh, Chief Executive, Cyber Security Agency of Singapore. They suggested that businesses consider, along with installing a preventive system, setting measures to cope with damages from a cyber-attack because an ineffective management after the attack might have a greater impact on the company than the attack itself.
In addition, ETDA also noted that the personal information of Thai Internet users could easily be hacked and that there was a high possibility that this could become a serious problem. Personal information can easily be stolen by giving or sharing information. Sometimes, a question for a password could be figured out from the information that the accountholder has shared on the Internet. The problem of personal information is being dealt with through a personal information law, which has become a priority of the government and the Ministry of ICT. Another important issue is scams online. Thais tend to not take this issue seriously. Although, the public and business sectors are responsible for preventing the problem, users also could protect themselves by being more cognizant of the risk.
Another interesting topic at the seminar was â€œDigital Transformation: The Bright Side of Technologyâ€? Among the panelists for this discussion were Mr. Helius Guimaraes, General Manager, Enterprise Architecture & Emerging Technologies, Rio Tinto, Mr. Scott Gibson, Group Executive, Digital Practice, Dimension Data, and Mr. Julian Persaud, Regional Director, Asia Pacific, Airbnb. They expressed the view that technology had helped make the business environment more competitive and services
Dealing with security in the cyber world is a challenge for directors. This prompted IOD to organize a seminar entitled â€œManaging Technology & Disruptionâ€? in September. For this event, IOD invited a technology expert, an online businessman and an expert from the insurance sector to speak in an informal manner at the seminar. Many directors that attended the seminar became aware of the risks and preventive measures that could reduce the risks. Details of the event will be presented in the next column.
In Thailand, digital trends are well accepted. All categories of services can be found on the Internet. New businesses or so-called â€œstartupsâ€? appear daily. Although many businesses fold rapidly, many have succeeded, such as Ookbee, Wongnai, Grab and Uber. According to the Thailand Internet User Profile 2016 of the Electronic Transactions Development Agency (Public Organization) (ETDA), on average, Thai users spent about 45 hour or 6.4 hours per day on the Internet through a portable device. The top five popular activities of Internet users on portable devices are talking via a social network 86.8%, watching a video on Youtube 66.6%, reading an E-book 55.7%, searching data 54.7% and engaging in an online transaction 45.9%. Based on this information, it is obvious that Thais use the Internet a lot and are ready for new businesses that match to their needs.
B o a r d r o o m | 13
C o v e r S t o ry
MANAGING TECHNOLOGY & DISRUPTION
_CYgOIS;9Wg®²$S;DTD;9Wg>T;CTÆÌÁEIC$S< <EVKS9;VI`PC@_-OEOV;-SIES;L`GR<EVKS9_OOO; ¥=ER_9Jc9D¦+lT$S6+S6*T;ÆÌÁÁæïâàñìï¿ïæâãæëä ±¬¯®³b;MS I %h O ÊÞëÞäæëäÑâàåëìéìäö£ Áæðïòíñæìë _@YgO_LI;T_EYgO*>G$ER9<9Wg_$V6%Xh;+T$ $TE@GV$a,C:ZE$V+MEYO9Wg_EWD$ITÁæðïòíñæìë
a6D_9'a;aGDW Ll T 'S 9Wg $l T GS * $ T I%Xh ; CTCW <9<T9b;`7GRBT'OZ7LTM$EEC'YOÆëñâïëâñìã ÑåæëäðMEYOÆìÑ.Xg*_=;_9'a;aGDW9Wg9lTbM%OC[G b;9Z$OZ=$E5MEYOLVg*%O*9WgOD[b;_'EYO%TD_-YgOC7O $S;c69T*OV;_9OE_;f7a6DÊï«ÉÞñóÞªÈæðèìéÞc6bM 'lT+lT$S6'ITC%O*ÆìÑ;WhEIC8X*_9'a;aGDWOYg;c6`$ ÓæïñòÞéÏâÞéæñö`GRÁïìëâð@EOC`L6*bM6[IT :ZE$V+b;`7GROZ7LTM$EEC;lT_9'a;aGDW_MGT;Wh CT=ERDZ $ 7 b - _ @Yg O _@Vg C C[ G ' T bM ` $ $ TE6l T _;V ; :ZE$V+ODT*cE 9Sh*b;6T;'ITCLTCTE8b;$TE>GV7 =ERLV9:VBT@b;$TE6lT_;V;*T;c=+;$ER9Sg*'ITC =GO6BSDEIC8X*$GTI8X*7SIODT*%O*¾ÆÄb; $TE;lT_9'a;aGDW_MGT;WhCT-ID@S4;TbM<EV$TE =ER$S;BSD%O*<EVKS9LET*C[G'TbM$S<G[$'T`GR ¾ÆÄc6CT$%X;h _@YOg +Z6=ER$TDbM>_[ %TEIC*T;_Mf;IT _9'a;aGDW-ID_=6aO$TL9T*:ZE$V+bMCe9Wgb;O6W7 OT+cC_'D+V;7;T$TE8X* M;T9WgLTl 'S%O*'5R $EEC$TE+X*_=;$TE_EVCg 'V69W+g R;lT_9'a;aGDWbMCe _MGT;WCh T-ID9lTbM+;V 7;T$TE$GTD_=;'ITC+EV*
a6Db;-I*`E$c6ES<_$WDE7V+T$ Mr. Tomi Latva-Kiskola, Country Manager and Chief ËââåßáîÁôáßñðåòá+T$½ÅÃ%Xh;$GTI<EEDTD@V_JK b;MSI%OÆëñâïëâñìãÑåæëäð·ÏâæêÞäæëæëäñåâ ¥æê¦íìððæßéâC_W ;YOh MTITb;=++Z<;S _9'a;aGDWbMCe $lTGS*_=GWgD;a,C$TEb--WIV7%O*>[';b;9Z$6T; `GR'ITC_=GWgD;`=G*;Wh$f%DTDOO$c=b;I*$IT* ODT*7O_;YOg *_;YOg *+T$a'E*LET*@Y;h 2T;%O*=ER_9J c6@4S ;Tc=CT$%5R9W7g ; 9Z;b;$TE>GV7O*'=ER$O< %O*_9'a;aGDW7T*eG6;ODG*+X*$ER7Z;bMCW $TE_%T8X*`GR;lT_9'a;aGDWCTb-ODT*$IT*%IT* +X*8X*_IGT`GI9Wg<EVKS9b;`7GROZ7LTM$EEC7O* MS;CT_=GWgD;`=G*$TE9lT:ZE$V+_-;$S; a6DMS;CT @V+TE5TIT+RG*9Z;b;_9'a;aGDWbMCe_@YgO;lTCT `C_9'a;aGDWbMCe+R;lTCT.Xg*=ERaD-;9Wg b-bM_$V6=ERaD-;ODT*cE_@YgO9Wg+R_7V<a77Oc=b; _M;YO+V;7;T$TE `7b;%5R_6WDI$S; $f;lTCT.Xg* aG$9Wg_9'a;aGDW_%TCTCW<9<T9LlT'S 'ITC_LWgD*E[=`<<bMC9Wg'5R$EEC$TE'IE7O* 14 | B o a r d r o o m
ERCS6ERIS*6ID b;MSI%O “Managing Cyber Exposure at the Board Level” Éîª½êàîáó Mahony, Regional Director, Financial Services ¢ÌîëâáïïåëêïÃîëñì+T$½ËÊc6$GTI8X*'ITC _LWgD*6T;c._<OE`GR$TEa+C7W9Wg_=;OS;7ETD7O % O C[ G Ll T 'S %O*<EV KS 9 9Wg _ $V 6 %Xh ; OD[ 7 GO6_IGT +;<EVKS9cC'IE'V6`7_@WD*IT+R= O*$S;$TEa+C7W 9T*c._<OEODT*cE `7'IE'V6IT+RES<CYOODT*cE MGS*8[$a+C7W6IDODT*cE$f7TC+T$$TELlTEI+a6D ¾ÌË@<IT<EVKS9b;_O_-WD+lT;I;CT$9lT=ER$S; LV;9ES@D9Wg+S<7O*c6CT$$IT9lT=ER$S;LV;9ES@D9Wg +S<7O*cCc6 %5R_6WDI$S;$fDS*cC_Mf;'ITC+lT_=; 9Wg+R7O*_@VgC$TE= O*$S;%OC[GLlT'S%O*<EVKS9 $TEa+C7W9Wg_$V6%Xh;LI;bM_=;$TEa+C7W +T$BTD;O$ `GR_$V6_@ETR';ETDMIS*=ERaD-; 6T;$TE_*V; CW7Sh*`7$TEa+C7Wb;E[=`<<9Wg.S<.O; c=+;8X*b;E[=`<<9Wg*TDODT*cC;T_-YgO_-;ÐíâÞï Íåæðåæëä .Xg*_=;$TEL*CSG`IECT9T*OW_CGa6D =GOC_;YhOMT`GR>[L*OW_CGbM6[;T_-YgO8YO _@YgObM >[OT;6TI;aMG6cAGMEYO$6GV*' `GR_=6-O*bM ';ETD_+TR_%Tc=DS*'OC@VI_7OE`GR`@E$ER+TD c=b;ER<<9Wg_-YgOC7OOD[ODT*E[_9TcC8X*$TE5
+T$_M7Z$TE5a+C7W9_gW $V6%X;h OD[_ EYOg De`GR>[_ LWDMTD 9WgCW7Sh*`7O*'$E9Z$%;T6c=+;8X*M;ID*T;ES2<TG 'ITC_LWDMTDcCc6_$V6%Xh;6ID?CYO';ETD_9T;Sh; '5R$EEC$TE`GR>[ < EV M TEER6S < L[ * $f CW a O$TL c6ES<>G$ER9<b;2T;R>[>V66ID _;YgO*+T$CW _M7Z$TE59Wg<EVKS99WgCW-YgO_LWD*CT$CTD9SgIaG$8[$ >[8YOMZ;A O*EO*MGS*8[$a+C7W9T*c._<OE_@YgO%aCD %OC[GLlT'S 6ID_M7Z>GIT9lTM;T9Wg$lT$S<6[`GcC _@WD*@OÊï«ÊÞåìëö +X*_;;IT '5R$EEC$TE `GR>[<EV MTEER6S<L[*7O*6[`GbM`;b+IT9SgI9Sh* O*'$EbM'ITCLlT'S$S<$TE= O*$S;'ITC_LWgD* 6T;c._<OE a6D_,@TRODT*DVg* >[<EVMTEER6S<L[* 'IE6[IT>[6[`GÆÑ `GR>[6[`G$TE<EVMTE'ITC_LWgD* =ERLT;*T;$S;b;_EYgO*;Wh `GR'5R$EEC$TE'IE $l T $S < 6[ ` GbM CW ; aD<TD= O *$S ; 'ITC_LWg D *`GR =$= O*%OC[G9Wg_MCTRLC$S<O*'$E LlTMES<-I*$TEOBV=ETD$GZC b;MSI%OÑåÞæéÞëá ±«ÞëáÁæðïòíñæóâÑâàåëìéìäöÌííìïñòëæñæâð ìïÑåïâÞñð9Wgc6>[9E*'Z5IZ4V+T$MGT$MGTDLT%T CTEIC_LI;TODT*L;Z$L;T; _%Tb+*TD c6`$ 6E«_+K0TJVIES$K _G%T;Z$TEEO*=ER:T;LlT;S$ *T;'5R$EEC$TE$V+$TE$ER+TD_LWD*$+V $TEa9E9SJ; `GR$V+$TEa9E'C;T'C`M*-T7V¥$L9-«¦'Z5=EVT MOC_O;$=ER:T;`GR>[$O7Sh*<EVKS9_O.VLa=E _AL-Sg;;SG_.f;_7OE+lT$S6'Z59E*DJ'S;:CT;;9 =ER:T;_+TM;T9Wg<EVMTE<EVKS9_E66Wh `@G;_;f7 +lT$S6a6DCW 6E«2V7V@*J ;S;9TBVIS4; $EEC$TE <EVKS9 c=EK5WDc 9D +lT$S6 `GR ÆÀÑ ¾áóæðìï ñì¿ìÞïáìãÀìêêæððæìëâïð$TE9g T_EYO`Mg* =ER_9Jc9D_=;>[6lT_;V;$TEOBV=ETD
_=;DZ'9Wg_9'a;aGDWL;S<L;Z;:ZE$V+%;T6_Gf$ MEYO ETDDOD MEYOÐÊÂ `GRCZ*_;;_EYgO*$TEJX$KT @F7V$EEC%O*>[<EVaB'`GR6ID$TE_=GWgD;`=G*9Wg EI6_EfI;Wh MGTD'ESh*9Wg9lTbM<EVKS9cC$GT9Wg+RLET* ORcEbMCe_@ETRDX67V6$S<=ERL<$TE5_6VCe CWOT$TEMI*M;T@RI*MGS*$GSIIT$TE_=GWgD;`=G* +RCW>G6W>G_LWD7O<EVKS9ODT*cE+;CW'lT$GTI9WgIT b ; a G $ 9Wg _ = GWg D ; ` = G * c = O D T * E I 6 _ Ef I =ERL<$TE5'YOJS7E[7SI,$T+%O*_ET b;%5R9Wg6E«_+K0T$GTIIT=ER_9Jc9Da7 CT+T$BT'_$K7E_=GWDg ;CT_=;OZ7LTM$EEC`GR$TI_%T L[D Z'6V+V7OGb;9Wg;Wh6[_MCYO;+R_=;$TE;lT_9'a;aGDW _%TCTb-*T;bMCT$%Xh; `7b;'ITC_=;+EV*`GI ÑåÞæéÞëá ±« 'YO_EYgO*%O*';9WgE[+S$_OT_9'a;aGDW CTb-ODT*-T,GT6 L;b+_EYgO*$TE<EVaB'`<< EICCYO¥ÀìééÞßìïÞñæóâàìëðòêíñæìë¦_;;_EYgO* $TE`<*=;¥ðåÞïâ¦CT$$IT$TE_=;_+T%O*¥ìôë¦ L;b+9W+g R;lTLV*g 9WCg OW D[C T7ODO6 MEYOLET*ORcEbMCe 9Wg`7$7T*OO$c=+T$_6VC `79Sh*;Wh ÑåÞæéÞëá ±« DS*CW-gO*aMIg 9W g Ll T'S ;S g ;'Y O 'ITC@Eh O C%O* =ER-T$E9Wg+RES<_9'a;aGDW_MGT;Wh EICc=8X*'ITC _LWgD*7T*e9WgOT+_$V6%Xh;+T$$TE%T6'ITCE['ITC _%Tb+_EYgO*_9'a;aGDW
Mr. Tomi Latva-Kiskola, Country Manager and CEO, AIG
ÊÞàåæëâéâÞïëæëä_=;$TE9lTbM'OC@VI_7OE _EWD;E[+ T$ER<< a6D9W'g ;cC+Tl _=;7O*c=a=E`$EC MEYO9lTORcE$f7TC=GODbM'OC@VI_7OE_EWD;E[_O* LVg*9Wg7hO*_ET7h O *9l T'YO $lTM;6$1$TE_EWD ;E[ h a6Db- ' 5V 7 JTL7E C T$l T M;6$1$TE_EW D ;E[ 'OC@VI_7OE+Rb-$1;S;h _ET_@WD*`'bLb;'OC@VI_7OE _EVgC`E$ 6E«2V7V@*J _$EVg;;lT6ID'lT8TCIT `GI$lTM;6IT8T%OC[GCT`<<;Wh 'OC@VI_7OE+R CW9T;cM;'V6IT_=; ÁæäæñÞé ËÞñæóâ .Xg*`;;O; =ERCIG>GCT_=;ODT*cE cC CW >[ _ % T E I C*T;9 T ;b6'V 6 I T 7;_O*_% T % T D _@ETRÁæäæñÞéËÞñæóâMCTD8X*';9WgCW9S$KR$TEb- 'Z59E*DJ$GTIITDO;c=_CYgO¯= 7TC$0%O* OZ=$E5'OC@VI_7OE`GR_9'a;aGDW6V+V7OGOD[b; CSIE¥ÊììïâðÉÞô¦9Wg$GTIIT'OC@VI_7OE+R_$* ER6S<L[*CT$a6DcC7O*_EWD;E[_EYgO*6V+V7OG$S;CT$ %Xh;¯_9T9Z$e®µ_6YO;;Sg;_9T$S<IT=++Z<S; _@ETR_7V<a7b;DZ'9W_g 9'a;aGDW$Tl GS*LZ$*OCLI ;bM 'OC@VI_7OE@S4;Tc=MGTD_9T7SICT$ 9lTbM _=;$GZC9Wg_$V6MGS*=®¶¶±LlTMES<';EZ;9WgOTDZ_$V; 'ITCLTCTE8b;$TE9l T *T;%O*'OC@V I _7OE CW $IT°²=LI;bM`GI+R_=;ÁæäæñÞéæêêæäïÞëñ CT$%Xh;7TCc=6ID b;O;T'7OT++R_=GWgD;+T$ .Xg*_=;$GZC9Wg7O*_EWD;E[_EYgO*6V+V7OG'O;%T*CT$ ';CT_=;_'EYgO*+S$Ec6MC6 `GROT++REICc=8X* _@ETR7O*=ES<7SIbM_%T$S<LVg*`I6GOCbMC;WhbMc6 *T;<EV$TE6ID D$7SIODT*_-; ET;ÊàÁìëÞéá 9Wg=++Z<S;CW$TELSg*OTMTE>T;_'EYgO*'OC@VI_7OEc6 a6DcC7O*_%T`8ILSg*>T;_@;S$*T;9Wg_'T9_7OEOW$ Thailand 4.0 _CYgObM;VDTC'lTITÑåÞæéÞëá±«'Z59E*DJ 7Oc=`GROT++R%DTDc=L[%Sh;7O;$TE=EZ*OTMTE M;X*g b;>[O BV=ETD$GTIIT CS;_MCYO;$TE_=GWDg ;>T; 9WgLTCTE8b-_'EYgO*+S$E`9;`E**T;'; ;O$+T$;Wh +T$DZ'$TELYgOLTECT_=;_EYgO*$TELET*IS4;:EEC b;BT'OZ7LTM$EEC_EVgCCW$TE=67SIG*%O*aE**T;
Mr. Andrew Mahony, Regional Director, Financial Services & Professions Group-Aon,
B o a r d r o o m | 15
b;=ER_9JaG$9WgLTC `GIDTD2T;$TE>GV7_%TCT OD[b;7GT6MGS$CT$%Xh; _@ETRLTCTE8b-MZ;D;7 ¥Ïìßìñ¦ CT`9;9Wgb;$ER<I;$TE$TE>GV7 9lTbM G67;9Z;G*c=c6CT$6S*;Sh;b;BT'OZ7LTM$EEC 9Wg>GV7LV;'TÌÂÊ+Rc6ES<>G$ER9<a6D7E* ;O$+T$;Wh _9'a;aGDWD*S LTCTE8'S6$EO*%OC[G 9Wg>[<EVaB'L;b+MEYO7O*$TEc6_O*LS*_$7+T$M;T Ëâôð ãââá b; ÃÞàâßììè %O*`7GR';+RcC _MCYO;$S; 6ID$ER<I;$TEÊÞàåæëâéâÞïëæëä ;Wh+Rc6ES<'ITCL;b++T$$TE7GT6CT$%Xh;_@ETR LTCTE8b-_=;%OC[GLlT'Sb;$TEIT*`>;a)K5T >GV7BS53bM7E*$S<$GZC_= TMCTD
$TE$lT$S<6[`G LlTMES<$TE$lT$S<6[`Gb;_EYgO*ÆÑ;Sh;7O*9lT 'ITC_%Tb+$O;IT =++Z<S;c6_=GWgD;+T$E[=`<< ÀâëñïÞéæ÷â c=L[`<<ÁâàâëñïÞéæ÷â `GI 6S*;Sh; $TE$lT$S<6[`G7O*CW$TE=ES<_=GWDg ;bMLO6'GO*$S; a6D7O*_;;c=9Wg_EYgO*$TE<EV$TE%O*_9'a;aGDW CT$$I T _EYg O *'ITC9S ; LCS D %O*_9'aGaGDW 6E«_+K0T$GTIIT$TE$lT$S<6[`G7O*_OYOh =ERaD-; $S<';LI;bM _@YgObM_$V6$TE@S4;Tc=%T*M;T `CITES2<TG+R_%Tb+_9'a;aGDWcC8O*`9 `78T $TEb-_9'a;aGDW`GIL*>G$ER9<7O';LI;bM _ET7O*_%Tc=+S6$TE `78T_$V6=ERaD-;$f=GOD _'T9lTc= 9Sh*;Wh BT'ES2'IEOD[b;2T;R>[L;S<L;Z; CT$$IT6E«_+K0T$GTI_@VgC_7VCIT_9'a;aGDW cC_'DÁæðïòíñæóâb'E`7';9WgE[+S$_9'a;aGDW`GI ;lTCT Áæðïòíñæóâ ;Sh;OS;7ETD `GRCW*T;IV+SD +T$=ER_9JOOL_7E_GWD@<IT² :ZE$V+b;=ER_9J OOL_7E_GW D 9Wg $l T GS * G C LGTD_@ETR_9'a;aGDW 9Wg _%TCT@GV$a,C;Sh;c6`$®«:ZE$V+%TD=GW$¯«LYgOLVg* @VC@°«a9E'C;T'C±«$TE:;T'TE²«9Wg=EX$KT `GROW $ M;Xg * :Z E $V + 9Wg O D[ b ;BTIRIV $ F7'Y O :Z E $V + OLS*MTEVC9ES@D LlTMES<7SIODT*9Wgc6ES<>G$ER9< +T$$TEáæðïòíñ9W_g Mf;c6-6S _+;'YO$E5W%O*ÈìáÞè 9Wg8[$GCc66ID_6f$$GZCM;Xg*9Wg;lT_OT_9'a;aGDWCT Áæðïòíñ6ID$TELET*'ITCLR6I$L<TDb;$TE 8TDBT@ 9lTbM*TD7O$TEb-*T;`GR`<*=; G6 %Sh;7O;$TEGT*OS6BT@b;%5R9WgÈìáÞècCCW$TE =ES<7SI7OaG$9Wg_=GWgD;`=G*c= +;9TD9WgLZ69lTbM 7O*=67SIG*6S*;Sh;b;2T;R$EEC$TE$TE$lTM;6 ;aD<TDMEYOIT$GDZ9: 'IEJX$KT IV_'ETRM+T$ %OC[G=++Z<S;CT$$IT%OC[G_CYgOc7ECTL9Wg>T;CT ODT*_CYgO$O;OW$7Oc=
16 | B o a r d r o o m
'ITC=GO6BSD%O*%OC[G 9T*6T;'ITC=GO6BSD%O*%OC[G_=;M;X*g b; 'ITC_LWg D *9Wg _ $V 6 %Xh ; _= ; _*T7TC7S I 7TC+l T ;I; >[b-*T;9Wg_@VgC%Xh; $TEESgIcMG%O*%OC[G_$V6c6 +T$MGTD-O*9T*_-;$TE%aCD%OC[G¥ÅÞàè¦ LTCTE89lTc6h* gTD a6D9W g> [h b-h * T;cCgE[ h 7SI IgT c6O;ZT7bMCW$TE_%T8X*%OC[GLI;7SI IV:W$TE *TDe9Wg@<c6'YO$TELET*`O@MGO$>[b-*T;_-; `O@@GV_'-Sg;`7*M;T_=;7;.Xg*$O;9Wg+Rb-`O@ @GV_'-Sg; >[b-*T;7O*O;ZT7bM`O@@GV_'-Sg;_%T 8X*%OC[G%O*_'EYgO*MEYOðìàæÞé ;Sh; .Xg*;Sg;'YO-O* 9T*LlT'S9Wg9lTbM%OC[G8[$%aCDc= `GR'ITC>V6 @GT69Wg_$V6+T$$TEb-*T;>T;ðìàæÞé LTCTE8$O bM_$V6'ITC_LWDMTDc6_@WD*_LWhDIIV;T9W_@ETRORcE $f7TC9W_g ETOS@aMG6_%TL[E R<<ðìàæÞé`GIcCLTCTE8 G<OO$c6 MT$cCCW$TEERCS6ERIS*`GR$TE= O*$S; 9Wg+R$ObM_$V6'ITC_LWDMTDc6CT$ ODT*cE$f7TC 6E« _+K0T 7Sh*%OLS*_$7IT =ER_9Jc9D=ER$TJ7SIIT_=;J[;D$GT*%OC[G 9T*6T;_9'a;aGDW `7$TE+S6_$f<%OC[Gb;aG$ OO;cG;MGTDODT*DS*OD[9Wg7T*=ER_9J_-;ðâïóâï %O*ÃÞàâßììè_$f<OD[9 gW ÐæëäÞíìïâ;S;g MCTD'ITCIT DVg*8T_ETb-<EV$TEMEYObL%OC[Gb;aG$OO;cG;CT$ _9TcME %OC[G+RCWaO$TLESgIcMGc=c6*TDCT$%Xh; 6S*;S;h E2S <TG'IE7O*CW;aD<TD9W=g O *$S;c6CT$$IT ;Wh b;9T*$GS<$S; 8T_ETLTCTE8+S6$TE_$f<%OC[G `GR;lTCTb-c6ODT*LET*LEE' c9D+RLTCTE8 _=;J[;D$GT*c6cCDT$_GD
a6DES2<TG 'T_*V;+R8[$$lTM;66ID'ITC7O*$TE %O*';ODT*`9+EV* _M7Z;Wh_O*9Wg9lTbMES2<TG7O* _? TERIS*`GR_7EWDC$TEES<CYObM6W MEYO $TE9lT LSTOS+,EVDR ¥ÐêÞïñ àìëñïÞàñ¦ 9Wg_=;$TE9lT %O7$G*7T*e9Wg8[$?*cIb;a'6'OC@VI_7OE `GRa'6;Sh;+R+S6$TE7TC%O7$G*a6DOS7a;CS7V 9S;9W9Wg_$V6_M7Z$TE57TC_*YgO;c%b;LST _-; $TEaO;9Wg6V; MT$9Wg6V;`=G*;Sh;CW$TE_=GWgD;-YgO _CYgOb6ER<<+R9lT*T;>T;_9'a;aGDWßéìäàåÞæë ITbM9lT$TE7S6I*_*V; ¥¿æñàìæë¦ +T$>[.YhOc=DS* >[%TD9S;9W a6DcC7O*>T;:;T'TE %+S6'ITC _LWgD*b;$TE8[$a$* MEYO<V6_<YO;LSTc6 `7b; =ER_9Jc9D$0MCTDDS* cC'EO<'GZCb;_EYg O*;Wh +X*9lTbMER<<DS*cCLTCTE8b-c6LC<[E5 6S*;Sh; MT$=ER_9Jc9D7O*$TE$TI_%TL[ÑåÞæéÞëá±« $0MCTD`GR;aD<TD7T*e'IE+R7O*CW$TE@S4;T bMLO6'GO*$S<_9'a;aGDWCT$%Xh; `GR:ZE$V+b; DZ';Wh+RLET*O*'$E`<<bMC%Xh;CT a6Da'E*LET* O*'$E+RCWGS$K5R_=EWD<_=;E[=6TI'YO9Z$';c6 =ERaD-;_9T$S; _LCO$S; `GRb;=ER_6f;LZ69TD 9WgLlT'S 'YO_EYgO* $TE_CYO*`GR=ER-T:V=c7D 9Wg cC_;;_EYgO*$TE_GYO$7Sh* `7_;;_EYgO*$TEOO$_LWD* _@ETRER<<_$T7O*aMI7>T;;S$$TE_CYO* .Xg*OT+ +ROO$LWD*`9;_ETb;LVg*9Wg_ETcC7O*$TE 8TCW $TE;lT_9'a;aGDW ¿éìä àåÞæë CTb-b;$TE_GYO$ 7Sh*=ER-T-;LTCTE8OO$_LWD*c6+T$9Z$_EYgO*`GR 9Z$9Wg<;aG$`GRDS*=ERMDS6*<=ERCT5b;$TE+S6 7Sh*$TE_GYO$7Sh*OW$6ID ;O$+T$;WhÁæäæñÞéÂàìëìêö+RCWMGS$°%O 'YO®«Ìíâëëâðð¥ÑïÞëðíÞïâëàö¦'YO%OC[G7O* a=E*bL_%T8X*c6`GR*TD_@YgObM=ER-T-;LTCTE8 ;lTc=b-`GR7ODO6c6¯«ÀìééÞßìïÞñæìë'YO'ITC EICCYOb;$TEb-_'EYgO*CYOMEYO%OC[G MEYOLVg*b6LVg* M;Xg*bM_$V6=ERaD-; _@ETRO6W7$TE9lT*T;CS$+R CWGS$K5R_=;c.aG9Wg`7GRM;ID*T;+R9lT*T;bM GZGI *6ID';MEYO_'EYOg *CYOb;`>;$cCC$W TE`<*=; MEYO_-YgOCaD*$S<`>;$OYg;e_@YgO-IDG6'Tb-+TD °«ÉâÞáâïðåæí_;;_EYgO*$TELET*BTIR>[;lTCT$$IT $TELET*>[;lT _@ETRb;DZ'ÁæäæñÞé Âàìëìêö ;Wh 7O*b-JS$DBT@`GR'ITCLTCTE8%O*`7GR'; _%TCT6lT_;V;*T;bM_$V6=ERaD-;L[*LZ6 >GS6$S; _=;>[;lTb;LVg*9Wg`7GR';8;S6
ÁæäæñÞéÂàìëìêö9Wgc6DV;$S;<ODeMCTD8X* $TE%S<_'GYgO;_JEK2$V+%O*=ER_9Ja6D$TE;lT _OTÆÑMEYO_9'a;aGDW6V+V7OG_%TCTb-_@YgO_@VgC >G>GV7 _@VgC>G*T; a6Db-_IGT;ODG*`GRLET* C[G'T_@VgCbM`$LV;'T`GR<EV$TE7T*e_@YgObM_ET `%*%S;$S<-T7V7T*ec6LI;bM+Rb-_9'a;aGDW ¯ª° ODT* ;Sg;'YO¿éìäàåÞæë©¿æäÁÞñÞ `GR ¿æñàìæë ;VDTC%O*¿éìäàåÞæë 'YO ER<<$TE +S6$TE2T;%OC[GLlTMES<$TEDY;DS;7SI7;$TE9lT :ZE$EECLY<LTIEO*EOD`GR<S;9X$'ITC_=;_+T%O* b;LV;9ES@D¥_-;L$ZG_*V;OV_Gf$9EO;V$LODT* ¿æñàìæë¦ MEYOORcE$f7TC9Wg_=GWDg ;CYO$S;c6 ¿éìä àåÞæë$O bM_$V6$TE_=GWDg ;`=G*b;aG$c._<OEOT9V LYgO$GT*b;$TE`G$_=GWgD; +T$_6VC9Wgb-_*V;$f :ZE$V+b;DZ'6V+V7OG _=GWgD;_=;`<<6V+V7OG 9Wg_EWD$IT _*V;6V+V7OG _CYgO@[6'ZD6T;:ZE$V+'Z59E*DJ_GT8X*$E5W ¥Àïöíñìàòïïâëàö¦ .Xg*_*V;6V+V7OG;Wh+RcCc6OO$ %O* ¾éæßÞßÞ 9Wg_EVgC+T$$TE.YhO%TDLV;'T<;aG$
OO;cG; _CYgOG[$'T7O*-lTER_*V;$fbMb-IV:WCT_7VC _*V;b;<S7E¥¾éæÍÞö¦`GR_CYgOCW$TE_7VC_*V;b;<S7E +lT;I;CT$+X*%DS<%DTDCW$TEbM6O$_<WhD`$G[$'T 9Wg_7VC_*V; b;%5R9WgG[$'TCW$TE.YhOLV;'T+lT;I; CT$+X*CW$TE=GOD_'E6V7bM$S<G[$'T_@ETR9T* ¾éæßÞßÞ CW=ERIS7V$TE.YhO%TDOD[`GI `GR8T>[ =ER$O<$TEETDb67O*$TEG*9Z;9Wg_@VC%Xh; 9T* ¾éæßÞßÞ _=6bM<EV$TE6T;LV;_-YgO`$>[=ER$O< $TE;Sh; _@ETRCW=ERIS7V$TE.YhO%TD_-;$S; 9lTbM =++Z<S;+T$_If<.YhO%TDLV;'TOO;cG;_7V<a7_=; :;T'TE_7fCE[=`<<b;-YgO ¾éæ ÃæëÞëàæÞé Ðâïóæàâ 8YO_=;7SIODT*+T$ÏâñÞæéL[¿Þëè`GR;Wg'YOM;Xg* b;:ZE$V+9Wg_EWD$ITÃæëÑâàå 6E«_+K0T _LEVCIgT b;DZ'Ãæëñâàå ;Wh :;T'TE+RcC_+O'[`%*9Wg_=;:;T'TE _@ETR+R _Mf;c6IT$TE_*V;$TE:;T'TE`<<_$T CW_@WD*'; <T*$GZC_9T;S;h 9WLg TCTE8_%T8X*_*V;9Z;c6 _;YOg *6ID MGS$_$53b;$TE=GODLV;_-YgO_-;$ER`L_*V;L6 $TECW_'E6V7_=;7;9lTbM';<T*$GZC _-;`C'T
cCLTCTE8_%T8X*_*V;9Z;+T$:;T'TEc6`7`+'MCT ¥Êï«ÇÞàèÊÞ¦>[$O7Sh*¾éæßÞßÞ_Gf*_Mf;+Z6;Wh+X* c69lT:ZE$V+7TC9Wg$GTI%T*7; 9lTbM_$V6$TE _=GWgD;`=G*9Z$';LTCTE8_%T8X*_*V;9Z;c6*TD%Xh; LO6'GO*9Wgc6$GTIcI%T*7;IT MT$_ETE[+S$b- ¿æäáÞñÞ$f+RLTCTE8LET*=ERaD-;c6CT$'Z5 =EVT_LEVC7OIT ÃæëÑâàå cC+lT_=;7O*_=; ÐñÞïñòíMEYOßæñàìæëMEYOßéìäàåÞæë`7_=; _EYgO*%O*$TE_*V;EIC$S<_9'a;aGDWCT$$IT OW$M;Xg*_9'a;aGDW9Wg;TL;b+'YO Ôâß ßìñ `GRÀåÞñßìñ6E«_+K0TLEZ=IT=++Z<S;;Wh9lTORcE >T;ER<<OV;_7OE_;f7CWER<<7O<a76ID=T =ER6VK2CT$CTD 'Z59E*DJ_LEVCIT MGTD'; OT++R'V6IT`O@@GV_'-Sg;_=;-O*9T*9Wgb-<OD `9+EV*`GI<EV$TE9Wgb-<ODCT$9WgLZ6'YOÀåÞñßìñ _@ETRCW$TE7O<a7$S<G[$'Tc6*TD ODT*_-; a=E`$ECðæïæ9Wga77O<$S<_ETc6a6DcC7O *@VC@9Sh* DS*';MT%OC[GbM_ETc6ODT*EI6_EfIOW$6ID`GR `;Ia;Cb;O;T'7+RCW$TE;lTMZ;D;7$S<=T
=ER6VK2 ¥Ïìßìñð Þëá ¾ïñæãæàæÞé Æëñâééæäâëàâ¦ _%TCTCW<9<T9CT$%Xh;`GR+R'ODeG6<9<T9 $TE9lT*T;%O*C;ZKD ODT*cE$f7TC JTL7E<T* JT7EDS*'*+lT_=;7O*b-C;ZKDb;$TE9lT*T;OD[6W _-;6T;9S;7$EEC_=;7; OD T *cE$f 7 TCLVg * Ll T 'S 9Wg 7 O *9l T b;2T;R $EEC$TE 'YO7O*CWIVLSD9SJ;9Wg$IT*c$G _%Tb+8X* GS$K5R$TE_7V<a7%O*_9'a;aGDW _%Tb+$TE_=; ÁæäæñÞé Âàìëìêö _@YgO;lTc=L[$TE$lT$S<6[`G`GR IT*;aD<TDODT*CW=ERLV9:VBT@@EOC9Sh*bM'ITC CSg;b+$S<>[b-<EV$TEbMc6IT%OC[G+R=GO6BSD cC ESgIcMG`GR_=;'ITCGS<_LCO ;O$_M;YO+T$;Sh; `GI >[b-*T;<;aG$OV;_7OE_;f79Z$';'IE7O*CW 'ITC7ERM;S$E[ _Mf;8X*>G$ER9<EO<6T;9Sh*>G 6W>G_LWD`GR7O*b-%OC[G<;'ITC8[$7O*9Z$'ESh* 6S*'lT$IT*9WgITÖìòàÞëäâñðâàòïæñöôæñåìòñ íïæóÞàö©ßòñöìòàÞëñäâñíïæóÞàöôæñåìòñ ðâàòïæñö«
Dr. Thitipong Nandhabiwat, Mr. Songyot Kanthamanon, Dr. Jesada Sivaraks, Mr. Prinya Hom-anek
B o a r d r o o m | 17
Mr. Latva-Kiskola indicated that “Internet of Things” or IoT, will play a key role in each industry as this technology connects data or objects in the network through the Internet. He went on to define IoT and other technologies, such as virtual reality and drones, and provided examples of how businesses in each industry has adopted those technologies to add value to their businesses, including by increasing production potential, efficiency of the operation and security. The briefing opened with a lecture given by Moreover, he noted that AIG has adopted those Mr. Tomi Latva-Kiskola, Country Manager and technologies to improve insurance services and Chief Officer Executive of AIG, on the topic “Internet of Things: Reimagining the (im)possible”. add value to the company and better serve the He began by explaining that new technologies are customers. The users of those technologies are changing the lifestyles of people in every aspect inspired by them as they realize the potential of their lives. This change is effecting more and opportunities emanating from them are beyond their initial expectations. A key duty of the board more people because infrastructure has been improving at a rapid rate while the corresponding of director is to initiate the adoption of those costs of technologies has decreased substantially. technologies to bring out their full potential. Although new technologies can potentially Consequently, new technology has become accessible to a wider number of people. Companies provide unimagined benefits, they can also generate new risks, which the board of director in general should alter their businesses and consider which new technology to invest in that must be cognizant of as well. In that context, Mr. would offer the highest benefit and contribute to Andrew Mahony, Regional Director, Financial Services and Professions Group, AON delivered growth in income. The Thai Institute of Directors (IOD), New Hampshire Insurance Company Limited (a subsidiary of AIG Property Casualty, U.S.) and AON (Thailand) Company Limited jointly organized the IOD Director Briefing 4/2016 on 15 September 2016. The theme of this event was managing the impact of technology on business disruption.
18 | B o a r d r o o m
a lecture on managing cyber exposure at the board level. He spoke specifically about cyber risks and cyber-attacks, explaining that they pose the threats of a breach of a company’s data. Companies should not only protect its data from cyber-attacks but they also should have in place a plan on what to do in case they are hit by such an attack. According to a survey conducted by AON, many Asian companies have insurance to cover tangible assets but not to cover intangible assets and are of that view that they should increase the protection of company data against a cyber-attack. He said that most cyber-attacks are made by outsiders seeking a payout, while noting such attacks range from being very complex to ones that are incredibly simple, such as spear phishing in which a malware is sent via e-mail to the account owner with a copy of the content to convince the readers to download the file or click an attached link. By doing this, the sender can access the computer and get through the network.
Mr. Mahony explained that the victims of cyber-attacks include all types of organizations, ranging from private companies to government agencies. The damage from a cyber-attack is not necessarily attributed just to the attacker; the board of directors and senior management can be held accountable, as well; some well-known companies worldwide have been accused of insufficient supervision of the computer system by the shareholders after important data was breached through a cyber-attack. Thus, he emphasized that the board of directors and senior management must ensure that the whole organization is versed in risk prevention from a cyber-attack. Specifically, senior management should supervise the IT officers and risk administrators in coordinating efforts to deal with this issue. Furthermore, the board of directors should have in place an appropriate policy on risk prevention and protection for the organization. The topic for the group discussion session of the briefing was “Thailand 4.0 and disruptive technology opportunities or threats”. Experts from various fields participated in the discussion, namely Dr. Jesada Sivaraks, Secretary of Vice Chairman of the National Broadcasting and Telecommunications Commission (NBTC); Mr. Prinya Hom-anek, CEO and Founder of ACIS Professional Center Company Limited; and Mr. Songyot Kanthamanon, CEO of Ready Planet Company Limited. Dr. Thitipong Nandhabiwat, Board of Directors of Thailand Post Company Limited and ICT Advisor to Board of Commissioners, Port Authority of Thailand, served as the moderator. Dr. Thitipong opened the discussion by asking if any of the briefing participants consider themselves to be digital native. Certainly, none of them were, as a digital native is a person with the ability to use a computer and digital technology at a high level without much training because they were born in the age of technology. Most digital natives were born after 1994. People that are older than 35 years are considered to be digital immigrants, a group that needs to learn about digital technology and adapt to the digital environment. Thailand 4.0 Mr. Songyot then spoke about Thailand 4.0, which he explained was the transition from a communication period to creating culture. It is the age in which technology supports small and medium enterprises and the focus tends to be on studying consumer behavior. Because of ongoing rapid changes, many companies are reluctant
Governance Regarding IT governance, it first must be understood that this type of governance has changed from being centralized to being decentralized. Thus, governance needs to be adjusted accordingly by emphasizing the service of the technology rather than the state of art of the technology. Dr. Jessada said that “… governance has to benefit the majority for forward development. Although the government may not understand technology comprehensively, if the technology adaptation affects the majority, we have to take an action. If it benefits the majority, we can just ignore it. Nevertheless, the role of the public sector should be to serve as the supporter” He added that “the technology never disrupts anybody but people who are adept with technology that use it to disrupt business are dangerous” According to research from Australia, it was found that five types businesses in the country A computer is smarter with machine learning Machine learning entails enabling a computer to are collapsing, namely (1) retailing; (2). printing learn from a system without a human to program media, (3). telecommunications; (4). banking; or control it. The computer would learn by itself. and (5.) consultancy, while real estate sector is in crisis. A good example of a business that was The human being’s role is to apply the mathdisrupted is Kodak, which was made obsolete by ematics to determine learning rules. Then, the computer would rely on those rules and process young people who used technology to facilitate photography for using and sharing. The need to the input accordingly to the rules. print photos was reduced considerably, Kodak’s Mr. Songyot said that a computer would double main business. The company did not adapt to the changing world and it eventually had to close. its knowledge every 18 months according to This reinforces the view that a director on policy Moore’s Law. This means that a computer is many times smarter than the ones developed in and strategy should study and analyze current data than data from previous quarters. the past and have much greater capacity. In the future, human labor will be completely replaced by machines in the industrial sector and possibly Data security Data security is one of the risks associated with in the service sector, as well. For example, the increase in users. Data leakage can come McDonald offers a service in which customers from many channels. For instance, hacking can give their orders through a computer without be done easily with users not aware that they having to queue at a counter. At some point, a were unconsciously permitting the hacker to machine handle the cooking process as well. Moreover, in the industrial sector, many factories access their personal information. Another easy scam is to create a hoax application, such as have been closing in the third-world countries, as the production bases are tending to be moved one in which the user grants permission to an close to the main markets. This is because robots application to access personal information on the computer or social media. The misuse of social are replacing human labor in the production media can result in extensive damage because process, which is leading to a substantial whatever is uploaded to social media cannot be reduction in costs. In such instances, the operations of original equipment manufacturers deleted. (OEM) may be directly affected. Dr. Jessada noted that Thailand has declared In addition, the technology can screen data that itself as a hub for technological data but much of its online data storage is in other countries. are of interest to the consumers. For example, news feeds on Facebook of each user is different. For example, the server of Facebook is stored in The machine learning process will become more Singapore. This means that the more the service prominent in the market as it may become a key is used or data are uploaded online, the higher chance of data leakage. Thus, the government database for advertising a product to the right should have a policy to better protect the users. target markets. to create something new as they prefer to stick with the old experience or are concerned how the change would affect the company. In that context, he cited the following proverb: In the fast changing world, experience is our great enemy. Dr. Jessada then said that Thailand has evolved from being an agriculture-based economy to one that is dominated by industry in the digital age, which requires the use of more advanced technology. Actually, the objective of Thailand 4.0 is to adopt technology intelligently and pay attention to collaborative consumption, focus on sharing rather than owning and create new things. However, Thailand 4.0 has a number flaws, with one being that many people or operations are ill-prepared to adopt the technology and deal with the risks associated with it due to lack of knowledge and understanding of it.
B o a r d r o o m | 19
On the other hand, if data storage is managed and used creatively, it would not be difficult for Thailand to be a hub. Digital economy Digital economy, which is often discussed, refers to driving the economy by adopting IT or digital technology to increase production, decrease production time and add value to products and services in order to be able to compete with other countries. It mainly is comprised of three technologies, blog chain, big data and bitcoin. Blog chain is a database management system for verification, transaction, traceability and ownership records of an asset (for example, electronic currency, such as bitcoin) or whatever is transferable. Blog chain has triggered a large change in the cyber world by serving as an intermediary in the exchange of money digital money or so-called â€œcryptocurrency. This digital money is issued by a government. The value of the currency is determined based on the genuine needs of the people. Consequently, governments need to monitor and prepare measures to deal with this issue. A smart contract is 4 coded in a computer. The code is managed in accordance with the contract automatically For example, with a land ownership transfer, if the landowner changes, the system would work through a blog chain to transfer money (bitcoin) from the buyer to seller immediately without using a bank as an intermediary. This eradicates the risk of fraud or adjusting a contract. However, Thailand has yet to adopt a law to cover this issue, making it difficult for the system to work completely. Thus, if Thailand were to transition to Thailand 4.0, laws and policies should be updated in accordance with the technology. Business in the digital age needs a new kind of organization that has a star-shaped organizational structure, which implies that everybody benefits equally. The
20 | B o a r d r o o m
last important issue on the topic is politics and democracy. Elections are not emphasized. Under the old system, the choice in an election might have been politician not preferred by the voters. If a blog chain is used for an election, people could vote for any topic anywhere on Earth and funds would be saved with election costs reduced. The digital economy is comprised of three principles: (1) openness; (transparency), information must be transparent and accessible for the public to be able to use and benefit from it ; (2) collaboration, cooperate to use a tool or information or anything for the highest benefit because in the past, each organization or agency would work with their own labor or tools without sharing or connecting with other departments to reduce cost.; (3) leadership, emphasis is placed on creating leadership rather than a leader because in the age of the digital economy, potential and competence of each person is sought for higher benefit. Each person would alternate to be a leader in the area in which he/she is adept. Business in the digital age Mr. Songyot talked about the case of Alibaba, which started as an entity that traded goods online. When the customers had to pay for the goods, they would have to refill a card (Ali Pay) and if they had access money in the card, Alibaba would pay them interest to induce them to refill the card. Also, if customers made a large order, they could get credit from Alibaba because the company already had a trading record with the customer. If an entrepreneur would like to invest more, Alibaba also has a credit service. Alibaba has evolved from being an online shopping website to a bank under the name Ali Financial Service. This is another example of a retailer becoming a financial institution in a type of
business referred to as fintech: Dr. Jessada added that in the fintech age, banks would not have other banks as competitors because the capital from the old banking system was accessible for some people due to requirements for credit, such as cash flow and credit.. Some business operators, such as vendors, cannot access capital from a bank. Mr. Jack Ma, the founder of Alibaba, capitalized on this by making it possible for everybody to have better access to the capital. Being able to use big data efficiently is very beneficial. Mr. Prinya added that fintech is not necessarily a startup or bitcoin or blog chain but is instead a finance combined with technology. Other interesting technologies are web bot and chat bot. Dr. Jessada summarized that much can be accomplished through the Internet system by interacting with artificial intelligence. He added that many people might think that applications are the most popular channel. Actually, chat bot is because through it, a company can interact with the customers easily. For example, the chat bot Siri can interact without typing. Moreover, it can search rapidly. There has been a trend to develop robots and artificial intelligence that would play a more important role in the work environment. However, some services must be carried out by human beings, such as dental services. Directors need to have a broad vision and understand the growth characteristics of technology and the digital economy in order to have governance and set more effective policies. Moreover, every user on the Internet should be very aware of the advantages and disadvantages and use the data correctly. They need to take into account the following proverb: â€œYou can get security without privacy, but you canâ€™t get privacy without security.
Does your IT deliver value? Independent IT review will improve business outcomes
Driving Company Success with IT Governance
Recommended for Non-IT Director For more information: 0 2955 1155 Ms. Tanyaporn Ext. 406 email@example.com
ITG 4/2017 27 - 28 March 2017
Capital Structure, Æ§ÆØÎÈ³ÊÊÉËÔ×ÙÍÊ¸ÚÈÈÊØØ ÔËÆ§ÚØÎÓÊØØ
a6D 'Z5EI*?;b+LCZ9EùÊð«ÏòÞëäãìëÇÞæðÞêòñ ¾n³¬n³¶Æ¨µ²£®³¨¹À«ù Curriculum Development
$TELE T *'ITCDSg * DY ; bM $S < $V + $TE;Sh ; ;O$+T$=++SDMGTDe6T;cCIT+R_=;LV;'T MEY O <EV $ TE9Wg 7 E*$S < 'ITC7 O *$TE%O*7GT69Wg _=GWgD;`=G*7GO6_IGT'ITC@EOC%O*9ES@DT$E %O*O*'$EcCIT +R_=;6T;`>;:ZE$V+6T;<Z'GT$E 6T;_9'a;aGDW9WgLTCTE8EO*ES<$TE_7V<a7%O* $V+$TE>T;`>;$GDZ9:9Wgc67Sh*_= TMCTDcI =++SD 9T*$TE$TE_*V;8YO_=;=++SD9WgLlT'S_-;$S;9Wg+R ;lT@T$V+$TEbM<EEGZIS78Z=ERL*'O*'$Ec6 _ET+X* CS$@<ITCW>[=ER$O<$TEMGTDeETD9WgCWcO_6WD9T* :ZE$V+9Wg_=;9Wg7O*$TE%O*7GT6`77O*=ERL<$S< =MT6T;_*V;9Z;9WgcCLTCTE87ODO6bMLV;'T MEYO<EVMTEc=L[7GT6c6 22 | B o a r d r o o m
6S*;Sh;=++SD6T;_*V;9Z;+X*_=;LVg*9Wg:ZE$V+cC 'IEGR_GDb;$TEIT*`>;bMEO<'O< _EVgC7Sh*`7 $TE$l T M;6`>;$GDZ 9 : E RDRDTI%O*$V + $TE 9VJ9T*9Wg$V+$TE7O*$TE+RCZ*c= c6CW$TE=ER_CV; _7EWDC'ITC@EOC@Yh;2T;%O*M;ID*T;:ZE$V+bM 6lT_;V;*T;c=7TC`>;c6 .Xg*'Tb-+TD9Wg$V+$TECS$ 7O*b-_*V;+lT;I;CT$_-;$TE%DTD7SIaE**T;$TE G*9Z;b;_'EYgO*+S$EbMC $TE9lTER<<ÆÑ8T$V+$TE cCc6_ _7EWDCIT*`>;_*V;9Z;'I<'[$S;c=bM_@WD* @O7O$TE%DTD7SI$fCS$+R_LWD_=EWD<'[`%*9WgCW$TE IT*`>;'ITC@EOC`GR-V*LI;`<*7GT6c6$O;
MGS$e'OY _*V;9Z;b;LI;_+T%O*$V+$TE`GR_*V;9WCg T +T$$TE$[D CY .X*g _*V;9WCg T+T$$TE$[D CY ;S;h $f+RCW7; 9Z; b;E[=`<<6O$_<WhD9WgLTCTE8;lTCT_=;'Tb-+TD 9T*BTKWc6`79*hS ;W9h *hS ;S;h $TE@V+TE5T8X*'ITC_LWDg * b;$TE>V6;S6-lTERM;Wh9WgOT+_$V6%Xh;c6$TE@V+TE5T 8X*ETDc69Wg+R_$V6%Xh;+T$$TE;lT_*V;$[DYCc=b-IT _=;ERDRLSh;MEYOERDRDTI$TEb-`MG*$[DYC_*V;>V6 =ER_B9$S<IS78Z=ERL*'$TEb-_*V;$fOT+9lTbM$TE <EVMTELBT@'GO*%O*$V+$TECW=MTc6;O$+T$ ;Sh;`GI$TE@V+TE5T8X*a'E*LET*%O*_*V;9Z;%O* $V+$TE¥ÀÞíæñÞéÐñïòàñòïâ¦;Sg;$f'YOLS6LI;%O* M;WhLV;`GRLI;%O*_+T%O*$f_=;_EYgO*9Wg7O*<EVMTE `MG*_*V;9Z;%O*$V+$TE`<*c6_=;¯=ER_B9 +S6$TEbMOD[b;LS6LI;9Wg_MCTRLC$S<GS$K5R$TE
6lT_;V;:ZE$V+%O*`7GROZ7LTM$EEC _@ETR`7GR OZ 7 LTM$EEC$f + RCW GS $ K5R$TE<EV M TEM;Wh LV ; `7$7T*$S;D$7SIODT*_-;:;T'TE@T5V-D+RCW OS7ETLI;M;WhLV;9WgL[*_@ETR_=;GS$K5R%O*$TE =ER$O<$TE9Wg 7 O *;l T _*V ; 9Wg ES < ?T$c==G O D$[ OZ7LTM$EECOYg;e9WgCWLS6LI;M;WhLV;7O9Z;L[*$f_-; LT:TE5[=aB'LV;'TOZ7LTM$EEC OW$=++SDM;X*g b;$TE@V+TE5Ta'E*LET*_*V;9Z; %O*$V+$TEc6`$ GS$K5R7;9Z;%O*$V+$TEITCW b;LI;9Wg_=;'Tb-+TD'*9WgL[*MEYOcC _@ETRMT$CW _M7Z $ TE5 B TD;O$CT$ER9<9l T bM $V + $TEcC LTCTE89lTETDc6c67TC9Wgc6IT*`>;cI `77O*CW 'Tb-+TD9WgcCLTCTE8MGW$_GWgD*c6b;LI;;Wh$f+R $ER9<LBT@'GO*%O*$V+$TE MT$$V+$TE9WgCW GS$K5R7;9Z;'*9WgL[*_-;;WhCW$TEb-`MG*_*V;9Z; +T$$TE$[DYCb;ER6S<L[*$f+RCW'ITC_LWgD*_@VgC%Xh; MT$cCLTCTE8DO6%TD7TC9Wg7Sh*_= TcI LlTMES<`MG*_*V;9Z;b;LI;%O*_+T%O*b; -I*_EVgC`E$_+T%O*$V+$TECS$b-_*V;7SI_O*MEYO_*V; %O*'EO<'ESI_'EYOÂ‰T7VMEYO_@YgO;CTEICG*9Z;$S; .Xg*MT$_*V;9Z;b;LI;%O*$TE$[DYC _+T%O*_*V;+R c6 ES < >G7O<`9;b;E[ = %O*6O$_<Wh D .Xg * _= ; >G7O<`9;9Wg7TD7SI `7LlTMES<_+T%O*_*V;G*9Z; b;LI;9Z;;S;h >G7O<`9;+R_=;b;OS7ETcC7TD7SI %X;h OD[$ S<>G=ER$O<$TE;O$+T$_*V;G*9Z;LI;7SI MEYO+T$<Z''Gb$G-V6 DS*CW;S$G*9Z;9WgL;b+G*9Z; b;$V+$TE9WgCW`;Ia;C_7V<a7L[*a6D_%TCTG*9Z; _= ; >[ 8Y O MZ ; `GRES < >G7O<`9;b;E[ = `<< _*V;=;>G;S$G*9Z;_MGT;Whc6`$ÂžĂŤĂ¤Ă˘ĂŠĂ†ĂŤĂłĂ˘Ă°ĂąĂŹĂŻÂŠ Ă“Ă˘ĂŤĂąĂ˛ĂŻĂ˘ Ă€ĂžĂĂŚĂąĂžĂŠĂŚĂ°Ăą MEYOb;E[=`<<%O* Ă?ĂŻĂŚĂłĂžĂąĂ˘ Ă‚ĂŽĂ˛ĂŚĂąĂśĂƒĂŚĂŻĂŞ.X*g +RCW_@WD*cC$<gW EVK9S _9T;S;h 9W+g RLTCTE8 c6_*V;9Z;+T$$GZC;S$G*9Z;=ER_B9;Wh _;YgO*+T$ OS7ET>G7O<`9;9W7g *hS cI%O*;S$G*9Z;=ER_B9;W+h RL[* 7O*_=;:ZE$V+9WgLTCTE8`L6*bM_Mf;`;Ia;Cb; $TE_7V<a7ODT*`9+EV* MT$b;=++Z<S;;Wh$f'*M;W cC@;b;$GZC_9'a;aGDW9WgCW$TE$TI$ERa66ODT* EI6_EfI9Wg_=;9WgL;b+%O*;S$G*9Z;$GZC;Wh .Xg*$IT +RCW$TE7S6LV;b+G*9Z;b;<EVKS9M;Xg*;Sh;7O*>T; $ER<I;$TEJX$KT@[6'ZDĂ Ă˛Ă˘ĂĄĂŚĂŠĂŚĂ¤Ă˘ĂŤĂ Ă˘7T*e +;_= ; 9Wg ` ; b +`G I I T $V + $TE9Wg G *9Z ; +RbM >G7O<`9;b;ER6S < 9Wg ;S $ G*9Z ; $GZ C ;Wh @ Ob+ `7 $ TE9Wg + Rc6 _ *V ; G*9Z ; +T$;S $ G*9Z ; 9Wg CW 'ITC_-Wg D I-TÂ‰L[ * ;Wh C T;Sh ; ;O$+T$L I ;%O* 'ITC_=;_+T%O*9WgG6G*`GI DS*CW_*YgO;c%OYg;e 9Wg7TCCT6ID.Xg*_+T%O*$V+$TE7O*_LWDLGR_@YgO $TE_7V<a7%O*:ZE$V+ `7%O6W%O*$TEc6ES<_*V;9Z; +T$;S$G*9Z;CYOOT-W@_MGT;Wh;Sh; $V+$TE$f+Rc6
9W=g EX$KTCYOOT-W@CT-ID-W`h ;R`GR_@VCg =ERLV9:VBT@ $TE9lT*T;`GR_LCYO;_=;b<_<V$9T*ES<EO*bM$S< $V+$TEMT$7O*$TE_@VgC9Z; MEYOMT;S$G*9Z;bMC .Xg * a6DL I ;CT$`G I ;S $ G*9Z ; $GZ C ;Wh + R$l T M;6 - I *ERDR_IGT9Wg + RG*9Z ; cI _ CYg O 'E<ERDR_IGT `GI$fOO$+T$:ZE$V+c= $TE;lT:ZE$V++69R_<WD; _%T7GT69Z;$f_=;-O*9T*9WgCS$+R=1V<S7V$S;_CYgO $V+$TECW$TE_7V<a7@O $TE;l T $V + $TE_% T +69R_<W D ;.Yh O %TDb; 7GT6MGS$9ES@DOT+cCb-'lT7O<%O*9Z$$V+$TECW MGTDe$V+$TE9WgDS*<EVMTEb;E[=`<<<EVKS9_O$-; `7$fLTCTE8;lT@TbM$V+$TE_+EVÂ‰_7V<a7ODT*7O _;YgO* CW_*V;9Z;MCZ;_IWD;%DTDbMÂ‰a7cC`@$V+$TE b;7GT6MGS$ 9ES@ Dk Q `GR$fcCg 7h O *CW $0_$53k %O<S*'S<7T*eEIC8X*$TE9lT7TC`;I9T*$TE _=6_>D%OC[G7T*e_MCYO;$S<<EVKS9+69R_<WD; 9Wg7O*$TE'ITCa=E*bL_@YgObM;S$G*9Z;.Xg*EIC8X* =ER-T-;9SgIc=CW'ITCCSg;b+b;$TE;lT%OC[G9Wgc6 _=6_>DcI;Sh;c=b-b;$TE7S6LV;b+G*9Z;c6 EIC8X* 'ITC$66S;b;$TEES$KT>G=ER$O<$TEbM_=;c= 7TC'ITC'T6MIS* `7$TE;lT<EVKS9_%T7GT6;Sh; ;O$+T$_*V;9Z;$O;bMÂ‰9Wg$V+$TE+Rc6ES<`GI;Sh; C[G'T$V+$TE$f+Rc6ES<$TE=ER_CV;_=;ET'T7GT6 MZ;%O*$V+$TECWET'T7GT6LTCTE8.YhO%TD_=GWgD; CYOc6*TD >G@GODc6ODT*OYg; _-; <EVKS9OYg;e $fODT$9lT:ZE$V+$S<<EVKS9+69R_<WD;.Xg*+R-IDbM LTCTE8'S6_GYO$'['T9WgCW'ITCLTCTE8 _=;$TE 9lTbM`<E;6LV;'T_=;9WgE[+S$b;I*$IT*7ODO6 :ZE$V+c6 ;O$+T$;Sh;DS*LTCTE86X*6[6<Z'GT$E9Wg CW'ITCE['ITCLTCTE8CTEIC9lT*T;$S<O*'$E c6 OW $ 6 I DEIC8X * $TELE T *`E*+[ * b+`GR$TEbM 'T7O<`9;`$>[<EVMTEO*'$E `GR+T$$TE7O* _=6_>D%OC[G 9lT7TC$0ER_<WD<`GR=1V<S7V7TC MGS$$TE$lT$S<6[`G$V+$TE$TE=1V<S7V7TC_$53 7T*e_MGT;Wh9lTbM$TE<EVMTE*T;_=;c=ODT*CW =ERLV9:VBT@b;E[=`<<CT7E2T;LT$G.Xg*LTCTE8 6X*6[6;S$G*9Z;L8T<S;7T*e;O$+T$;Sh;`GI $TEER6C9Z;b;'ESh*7Oec=$fLTCTE8CW9T*_GYO$ 9Wg$V+$TE%;T6bMÂ‰LTCTE89lTc6ODT*c6_=EWD< $IT$V+$TE9SgIc= _-; $TEOO$MZ;$[ $TE`=G* OLS*MTEVC9ES@D$V+$TE_=;9ESL7_@YgO$TEG*9Z;b; OLS*MTEVC9ES@DÂĽĂ?Ă‚Ă†Ă‘ÂŚ $TE<EVMTE+S6$TE`MG*_*V;9Z;9Sh*MGTD9Wgc6 $GTICT`GI;Sh;DS*CWO*'=ER$O<9WgLlT'SÂ‰9WgMGTDe $V+$TE_CYgO_7V<a7CTb;ERDRM;Xg*CS$GR_GDc='YO $TELEEMT Ă€ĂĽĂŚĂ˘ĂŁ ĂƒĂŚĂŤĂžĂŤĂ ĂŚĂžĂŠ ĂŒĂŁĂŁĂŚĂ Ă˘ĂŻ 9WgCW'ITCE[ 'ITCLTCTE8CT- I DIT*`>;9T*$TE_*V ;
L;S<L;Z;%OC[G9T*$TE_*V;-IDbM'5R$EEC$TE LTCTE89l T $TE7S 6 LV ; b+G*9Z ; c6 O D T *CW =ERLV9:VBT@_=;c=7TC$GDZ9:%O*$V+$TE9Wgc6 IT*cI MT$_+T%O*:ZE$V+LTCTE8IT*`>;b;9Z$e 6T;bMLO6'GO*$S; `GR_GYO$`MG*_*V;9Z;9Wg _MCTRLC$S<`7GR-I*$TE_7V<a7%O*$V+$TE `GR CW <Z ' GT$E9Wg CW ' ITCLTCTE8CT- I DL;S < L;Z ; $f cC_=;$TEDT$_GD9Wg$V+$TE%O*9T;+RLTCTE8 _7V<a7ODT*DSg*DY;c6b;O;T'7
789 For a business to become sustainable, it must offer a product or service that matches the requirements of the changing market and have readily available resources, including a business plan, personnel and technology, which help to support the expansion of the business through the company strategy. Having access to the funding required for the business to achieve its objective is another key factor. Many entrepreneurs have solid business ideas but lack access to the capital to bring their product or service to the market. Thus, capital is a factor that a business must take into account during the various phases of planning: the long-term strategy of the business; the direction of the business; and the fundamental evaluation of a business unit to operate in accordance with the plan. Sometimes a business needs a large amount of capital to, for example, to expand a factory, buy a new machine or invest in a new IT system. If the business does not have a sufficient capital plan for the expansion, it may lose its competitiveness and market share. Capital sources of a business can be divided into two main categories: capital of the business owner; and capital from a loan. The loan incurs interest charges that can be written off as an expense for taxes. Nevertheless, the risk of a possible default, a consideration of income generated from the loan regardless of whether it is long term or short term and a mismatch when the loan is received and when money is generated from it can have a negative effect on the cash flow of the company. Moreover, consideration of a capital structure of the business, which is the ratio of debt to assets, must be managed in accordance with the characteristics of each industry. This is because each industry is different in its debt management, For example, commercial banks have a high ratio of the debt per asset because of the nature of the business, B o a r d r o o m | 23
which involves taking in deposits for granting credit. Other businesses that also have a high ratio of debt per asset are related to infrastructure and industrial products.
invest in a business. When that time period is complete, they will unload their investment. Listing on the stock exchange is a channel for a business when it grows large enough.
Listing a business on the stock exchange may not be the answer for every business. Many businesses operate as a private company and can continue to expand and have cash flow comparable to listed companies on the stock exchange. Moreover, if they remain private companies, they would not have to comply with the many rules and regulations required for listed companies, including the information disclosure. Listed companies must be transparent to secure investor and the public confidence. Listed companies can also be pressured by shareholders to maintain Regarding capital being sourced from the owner, their performances as expected. Listing a company on the stock exchange requires a at the start of a business, the owner often uses large amount of capital. The company value is his/her own money or money from family or assessed as a market price. Company shares friends for a joint investment. If the capital is from a loan, the lender will receive compensation have a market price which could be traded easily. Another byproduct is that other companies are in the form of interest, which is a fixed return. However, for the lender, the rate of return is not more inclined to conduct business with listed companies, which could facilitate the screening of fixed. It is based on the performance of the competent trade partners and make the company company. Apart from the company owners or brand more well-known. Also listed companies from the close contacts, there are outside tend to attract more competent personnel to work investors who are interested in investing in a for the organization and create a motivation and business that is likely to grow rapidly. So, by being a shareholder, they receive compensation compensation for the organization administrators. Listed companies have to disclose their information in the form of a dividend. These investors are and comply with the rules and regulations in angel investors, venture capitalists or from a private equity firm. Only a few companies receive accordance with the corporate governance. These capital from these investors because the expect- enhance the effectiveness of the company ed compensation rate to them is rather high and administration and attract institute investors. the companies must show a trend of continuous Furthermore, in terms of raising funds, listed growth. Currently, technology firms are of interest companies have more alternatives. For example, to these types of investors because of their great one option may be to convert real estate into a potential to grow rapidly. It takes time for these real estate investment trust (REIT). types of investors to make a decision to invest in Capital source management as described in any company because of the many reviews, dialogues and due diligences involved to ensure previous paragraphs have an important that the investment will provide business yields component that many companies often neglect, which is selecting a chief financial officer who with a satisfying return. Receiving funds from professional investors will decrease the ownership can contribute to the making of a financial plan and effectively inform the Board of Directors of the business owner. Furthermore, it also brings many consequent conditions. The business about the company finances so that it makes decisions in accordance with the strategy of owner may have to sacrifice certain plans for the business. If the business owner develops a business growth. However, the advantages of receiving capital from these professional investors comprehensive plan and chooses an appropriate capital source for each stage of the business and are that a professional consultant may offer has competent and supportive personnel, it is not professional advice that could enhance the difficult for the business to grow sustainably. effectiveness of the company. Mostly, these investors will determine a period that they will Another factor that should be taken into account with regard to the capital structure of a business is the fixed costs. If, for example, an external event prevents the company from generating enough income set in its business plan and there is a high fixed cost, it inevitable that this will have an impact on the liquidity of the business. If a business with a high fixed cost relies heavily on capital from a loan, it will face serious problems if it cannot generate revenue according to the plan.
24 | B o a r d r o o m
B o a r d r o o m | 25
30V<þ;2"K4|DK L=Y#;/OW=ā_G"7L±0G3W"þ3D.GK/Y3;K/N¬ .A<;K?XA=X?JL=W/=ÿ<;=K4;QGZ3G3L/
Lessons Learned from ATM Malware Attacks The lessons learnt from the recent problems of ATM machines being attacked with malware, and the preparation of future protective measures. 3L<5=þ}}LEG;WG3 ²×µ×ÎÓÞÆÔ×ÒÆÓÊÐ ACIS Professional Center Co., Ltd. and Cybertron Co., Ltd.
_'EYgO*?T$8O;ª_*V;L6OS7a;CS7VMEYO9WgE[+S$ $S;6Wb;;TC_'EYOg *_O9W_OfC_%TCTCW<9<T9b;-WI7V =ER+lTIS;%O*_ET7Sh*`7IS;9Wg¯´CV8Z;TD;@«J«¯²® ¥$O;>[_ %WD;+R_$V6_LWDOW$¦a6D_'EYOg *_O9W_OfC_'EYOg *`E$ 7S*h OD[9 CgW MT;'EGO;6O;_=;%O*:;T'TE¿ÞïàéÞöð +T$;Sh ; $f _ EVg C ;V D C$S ; OD T *`@E M GTD9Sg I aG$ +T$'ITC;VDC$TEb-*T;_'EYgO*_O9W_OfC9Wg_@VgC%Xh; $TEa+C7WL8T<S;$TE_*V;9WgCZ*$TEa+C7Wc=9Wg_'EYgO* _O9W_OfC$f$lTGS*_@VgC%Xh;9SgIaG$_-;$S;$TE8O;_*V; +T$_'EYg O *_O9W _ Of C OD T *>V 6 $0MCTD%O*$GZ C `P$_$OEc6LET*'ITC_6YO6EO;7O:;T'TE`GR G[$'T%O*:;T'TE7T*e9SgIaG$b;_IGT;Wh ;L1dLAL;WLZ#G"5=JG4G"W=ā_G"WG1OWG^;K3 G3
O*'=ER$O<%O*_'EYOg *_O9W_OfC9Z$_'EYOg *b;aG$ ;W=h ER$O<6IDLI;%O*ÅÞïáôÞïâ`GRÐìãñôÞïâ 9Wg7O_-YgOC$S<ER<<_'EYO%TDBTDb;%O*:;T'TE _EVgC+T$LI;%O*ÅÞïáôÞïâ %O*>[>GV7`7GRETD +RCWGS$K5R9Wg`7$7T*$S; DWgMODO6;VDC9Wg_ET_Mf; $S;<ODec6`$Áæâßìéá©ÔæëàìïËæõáìïã`GR ËÀÏ `7GRDWgMOCW$TEOO$`<<9WgcC_MCYO;$S; $TE9lT*T;BTDb;_'EYgO*$fCW'ITC`7$7T*$S;b; `7GRDWgMOBTDb;_'EYgO*_O9W_OfC=ER$O<c=6ID LI;%O*_'EYgO*'OC@VI_7OE9WgLI;bM9lT*T;6ID ER<<=1V<S7V$TEÔæëáìôð`GRLI;%O*_'EYgO*_.A 9Wg b - _ $f < _*V ; 9Wg CW ' ITCCSg ; '*=GO6BS D L[ * $I T 7S I _'EYgO*'OC@VI_7OE9WgBTDb;_'EYgO*_O9W_OfC 26 | B o a r d r o o m
+Z6OO;%O*ER<<9W@g <_=;=ER+lTc6`$-O*aMI %O*ER<<=1V <S 7V $TE Ôæëáìôð 9W g_$V 6 %X h;b; _'EYgO*'OC@VI_7OE7TCLlT;S$*T;MEYO7TC<T; 9SgIc=$fcC7T*$S<$S<-O*aMI%O*ER<<=1V<S7V$TE Ôæëáìôð %O*_'EYgO*'OC@VI_7OE9WgOD[b;_'EYgO* _O9W_OfC6*S ;S;h _'EYOg *_O9W_OfC$fCaW O$TLb;$TE7V6cIESL 'OC@V I _7OE M EY O 8[ $ a+C7W 6 I DCS G `IE _ - ; $S ; _@WD*`79gW_'EYgO*_O9W_OfCcC'ODCW=MT;WhCT$O; _;Yg O *+T$_'EYg O *_O9W _ Of C OD[ b ;_'EY O % T D= 6 %O* :;T'TECTa6D7GO6+;_CYgO='«J«¯®`P$_$OE M;ZC-TI;VI.W`G;6Êï«¿ÞïëÞßöÇÞàèc6`L6* $TE_+TRER<<_'EYgO*_O9W_OfC<;_I9W*T;¿éÞàèÅÞñ ÀìêíòñâïðâàòïæñöÀìëãâïâëàâ¯®9WgGTL_I$SL $TE_+TRER<<b;'ESh * ;Sh ; _= ; 9Wg a 6 * 6S * c=9Sg I aG$ b;MSI%O$TE<EEDTD9WgE[+S$$S;9SgIc=b;-YgO ¾ÑÊ ÇÞàèíìññæëä¥6[E[=9Wg®¦9lTbM-TIaG$c6_EWD;E[IT _'EYgO*_O9W_OfCcC=GO6BSD+T$`P$_$OEOW$7Oc= ¥=++Z<S;Êï«¿ÞïëÞßöÇÞàèc6_LWD-WIV7c=`GI5 $EZ*.T;AET;.VLa$_CYgO='«J«¯®°¦
_M7Z$TE5CSG`IE9gW_$V6%Xh;$S<_'EYgO*_O9W_OfC _=;'ES*h `E$%O*aG$_$V6%X;h b;=¯¶a6Dc6E<S -YOg IT Ðèæêâïa6DCSG`IEÐèæêâïCW$TE`@Eb;-I*= '«J«¯®ª¯®°`P$_$OE-TIESL_.WDc6;lTCSG`IE Ðèæêâï$GS<CTb-OW$'ESh*M;Xg*.Xg*8[$7EI+@<a6D ÈÞðíâïðèöÉ¾¿_=;_IOE-Sg;bMC%O*CSG`IEÐèæêâï 9Wg_%T8X*_'EYgO*_O9W_OfCa6D$TE_=6_'EYgO*a6D7E* `GR_%T8X*a6D>T;9T*_'EYO%TD=6BTDb;:;T'TE +T$;S;h $fL*gS bM_'EYOg *_O9W_OfC+TD_*V;OO$CT `77T *$S; 9WgCSG`IEÐèæêâï`O<6S$%OC[GÀïâáæñÀÞïá%O* G[$'T:;T'TEODT*_*WD<e ¥M;T7T+O%O*CSG`IE Ðèæêâï6[c6b;E[=9Wg¯¦CSG`IELSg*bM_'EYgO*_O9W_OfC +TD:;<S7EOO$CT'ES*h GR±,<S<`GRDS*_$f<%OC[G b;ÀÅÆÍ`GRÍÆË%O*G[$'T9WgCTb-_'EYgO*_O9W_OfC OW$6ID%OC[G_MGT;W8h $[ ;lTc=LET*<S7E_'E6V7=GOC c=$6_*V;7Oc6OW$ +R_Mf;c6IT CSG`IE Ðèæêâï LTCTE8Ðèæê MEYO6S$%OC[GG[$'T%O*:;T'TEc6 a6DcC7O*7V67Sh*ÅÞïáôÞïâÐèæêêâï`7ODT*b6 `GRCW $ TE`@E M GTDc=DS * >[ > GV 7 _'EYg O *_O9W _ Of C
Ëì«¯ Ðèæêâï¾ÑÊÊÞéôÞïâÄâñðÒíáÞñâá©Ñòïëð¾ÑÊðæëñì ÐèæêêæëäÊÞàåæëâð
MGTDeDWgMO9SgIaG$a6D@<9WgÒ¾Â©ÃïÞëàâ©ÒÐ¾© _CYgO_6YO;$E$1T'C '«J« ¯®³ 9Wg>T;CT ÏòððæÞ©ÊÞàÞì©ÀåæëÞ©Íåæéæííæëâð©ÐíÞæë©ÄâïêÞëö© _'EYgO*_O9W_OfCb;=ER_9Jc7MIS;_@Vg*8[$`P$'c=9SgI ÄâìïäæÞ©ÍìéÞëá©¿ïÞ÷æé`GRÀ÷âàåÏâíòßéæà =ER_9J_-;$S;a6DCW'ITCL[_LWD8X*¯«²GT ;_MEWD LMES2@<IT_=;?COY %O*`P$_$OE-TIDZaE=7RIS;OO$ +T$_M7Z$TE5CSG`IEÐèæêâï-I*='«J« `GRESL_.WD .Xg*_=;'ESh*`E$b;=ER_9Jc7MIS;9WgCW ¯®°ª¯®±7TC7OCT6ID$TE';@<CSG`IEOW$7SI _M7Z $ TE5 a +C7W _ 'EYg O *_O9W _ Of C 9Sg I =ER_9Jb; 9Wga+C7W_'EYgO*_O9W_OfC_-;$S;CSG`IE7SI;WhCW-YgOIT GS$K5R`<<;Wh9lTbM:;T'TE7O*MDZ6bM<EV$TE Ñöòíèæë8[$';@<a6DÈÞðíâïðèöÉ¾¿b;=¯®±b; _O9W_OfC$IT®©_'EYgO*LY<_;YgO*$S<_M7Z$TE59Wg _'EYgO*_O9W_OfC`8<DZaE=7RIS;OO$`GRDS*`@Ec=DS* _$V6%Xh;b;=ER_9JWg=Z ;$fCW$TEa+C7W_'EYgO*_O9W_OfC LMES2O_CEV$T©OV;_6WD`GR+W;OW$6ID¥6[E[=9Wg°¦ _-;$S;`8CDS*b-_IGT`'_@WD*°-SgIaC*`7LET* CSG`IE+R9lT*T;<;ER<<=1V<S7V$TEÔæëáìôð°¯ 'ITC_LWDMTDL[*8X*®«±@;S GT;_D;¥®¯«´GT ;_MEWD <V9b;-I*_IGT$GT*'Y;_9T;Sh;@<IT`P$_$OEb- LMES2¦_$V6%Xh;$S<_'EYgO*_O9W_OfC7TCET;LR6I$.YhO $Z`+>Wc%_'EYgO*_O9W_OfC`GR;lTÀÁªÏÌÊ c=<[7 ®©± _'EYgO*_CYgOIS;9Wg ®² @FKBT'C '«J«¯®³ _'EYgO*'OC@VI_7OEb;_'EYgO*a6DCSG`IE+R9lTbM _IGT²«¾Êµ«¾Ê_@WD*°-SIg aC*_9T;S;h _'EYgO*_O9W_OfC+TD_*V;OO$CT_=;:;<S7E'ESh*GR± a6DCW$TEa+C7W6IDIV:W ÅÞïáôÞïâ Ðèæêêæëä ,<S<_-;$S;CSG`IEÑöòíèæë_=;7;`<<%O*$TE EIC9Sh*$TE=GODCSG`IE_%Ta+C7W_'EYgO*_O9W_OfC a+C7W_'EYgO*_O9W_OfCa6DcC+lT_=;7O*a+C7W_'EYO `GRDS*;lT<S7E_'E6V7=GOC9W`g P$'c6+T$`OAEV$Tb7 %TD%O*:;T'TEMEYO6S$%OC[G%O*G[$'T`7a+C7W CT$6_*V;OW$6IDa6D+lT;I;OT-T$ECW8X*®'; c=9Wg7SI_'EYgO*_O9W_OfCa6D7E*_GD +T$-O*aMI EIC$S;8O;_*V;'ESh*bM8YOIT_=;'ESh*`E$b;Wg=Z ; 9T*$TDBT@%O*7SI_'EYgO* `GR-O*aMI9T*6T; _-;$S;9WgCW_M7Z$TE5`<<;Wh_$V6%Xh; ER<<=1V<S7V$TE`GR$TE= O*$S;$TE_%T8X*_'EYgO* 'OC@VI_7OEBTDb;_'EYgO*
±« _? T ERIS * $TE9l T *T;%O*_'EYg O *_O9W _ Of C > T ; _'EYO%TDBTDb;%O*:;T'TE`<<¯±Õ´_@YgO 9Wg+RLTCTE87EI+LO<'ITC>V6=$7V9T*_'EYO %TDBTDb;c67GO6_IGT ²« 9lT$TEÅÞïáâë=6-O*aMI_'EYgO*'OC@VI_7OE 9Wg O D[ b ;_'EYg O *_O9W _ Of C 9Z $ _'EYg O *a6D9l T 7TC CT7E2T;'ITCCSg;'*=GO6BS D%Sh; 7l_ T9Wg_=; CT7E2T; MEYO 9lT7TC ÍÀÆ ÁÐÐ Ðâàòïæñö Äòæáâéæëâð ³« _'EYgO*_O9W_OfC'IEOD[b;9WgLIT*CW$GO*ÀÀÑÓ 'OD<S;9X$BT@7GO6_IGT _+TM;T9Wg:;T'TE MCSg;7EI+LO<'ITC>V6=$7V%O*_'EYgO*OD[_=; ERDRe ´« :;T'TE'IE7EI+LO<_*V;L6b;_'EYgO*_O9W_OfC 'I<'[$ <S $TE9lTÏâàìëàæéâ$ER9<DO69Z$IS; µ« :;T'TE'IE9lT Ðâàòïæñö ¾òáæñ 6ID$TE9lT ÍâëâñïÞñæìë Ñâðñæëä ER<<_O9W_OfC'ESh*bM OW$'ESh*_@YgObMCSg;b+b;'ITCCSg;'*=GO6BSD %O*_'EYO%TDBTDb;:;T'TE9Sh*;Wh_=;$TELET* 'ITCCSg;b+bMG[$'T%O*:;T'TEOW$6ID
Skimer 1st Gen
Skimer 2nd Gen
;O$+T$;WDh *S CW$TE';@<CSG`IE-YOg ÍÉÌÒÑÒÐ £ X3A1L"Z3L=?.AL;WDO_<"G"23LL=#LL= `GRÍ¾ÁÆË 'h ; @<a6DÐöêÞëñâà `@Eg b ; 0SY#;/OW=ā_G"WG1OWG^;Z3G3L/ =ER_9J_Cf$.Va$ `GR b;a.;_O_-WD%O*_ET$fCW$TE ®« 7 O *7EI+LO<'ITC=GO6BS D 9T*$TDBT@ 7EI+@<CSG`IEb;=ER_9JCT_G_.WD8[$a+C7Wc=CW ¥ÍåöðæàÞé Ðâàòïæñö¦ %O*_'EYgO*_O9W_OfC9Z$ C[G'T'ITC_LWDMTD$IT°GT;EV*$V7a6DCSG`IE _'EYgO*9Wg:;T'TE_=6bM<EV$TEOD[ITCW'ITC Í¾ÁÆË_-;$S;`GRDS*7EI+@<OW$IT'[CYO%O* =GO6BSD_@WD*@OMEYOcC7O$TE8[$a+C7W9Wg7SI _'EYgO*_O9W_OfC-YgO6S*EIC8X*_'EYgO*íìæëñªìãªðÞéâð _'EYgO*_O9W_OfCa6D7E* `GR_'EYgO*ðâéãªðâïóæàâèæìðè8[$;lTCTa@L7b; ¯« 'IE_=GWgD;$Z`+_'EYgO*_O9W_OfC a6DcCb- ÊÞðñâïÈâö9Wg_7EWDCbMa6D<EVKS9>[>GV7_'EYgO* _If<c.79Wg<EVKS9¿Þæáò _=;_+T%O*$TEa+C7Wb; _O9W_OfC GS$K5R;Wh 9lTbM:;T'TE7O*bM'ITCLlT'S$S< 'ITC=GO6BSD9T*$TDBT@ ¥ÍåöðæàÞé Ðâàòïæñö¦ °« 'IE7V67Sh*ER<<_7YO;BSD9Wg_'EYgO*_O9W_OfCbM `+*_7YO;$TE<Z$EZ$a6DOS7a;CS7V %O*_'EYgO*_O9W_OfCCT$%Xh;
$G T Ia6DLEZ = +R_Mf ; I T b;= + +Z <S ; `GR O;T'79V J 9T*b;$TE_+TR`GRa+C7W _ 'EYg O * _O9W_OfC%O*:;T'TE;S<IS;+R_EVgC`@EMGTD `GRCW 'ITCLGS<.S<.O;CT$%X;h 9lTbM:;T'TE9Z$:;T'TE 7hO *OD[ gb;LBTIR_7EWD C@EhO C'IECWÐâàòïæñö ÌíâïÞñæìë Àâëñâï `GR Æëàæáâëñ Ïâðíìëðâ ÍéÞë¬ÆëàæáâëñÏâðíìëðâÁïæéé bM@EOC7O$TE a+C7WOD[_LCO _@YgOLET*'ITCCSg;b+bM$S<G[$'Tb; 9WgLZ6
B o a r d r o o m | 27
Automatic teller machines, or widely-known as ATM’s, have played a major and ever- increasing role in our everyday lives ever since 27 June, 1967 (even before the author of this article was born!), when the first ever ATM was installed and made available in London by the UK’s Barclays Bank. Thereafter, they became popular and widely used everywhere throughout the world. With the ever-increasing popularity and widespread use of ATMs, cyber attacks on financial organizations have focused on hacking into their ATMs, and have become correspondingly widespread globally as well – such as, illegal cash withdrawals from ATMs by various groups of hackers that have recently caused much headache and problems for many banks around the world.
Jackpotting” (Please see photo No.1), resulting in the general public becoming aware that ATMs are no longer as safe and secure from hackers as previously believed. (At present, Mr. Barnaby Jack has passed away in San Francisco since 2013,)
The very first incident of a malware attack on ATMs that occurred in 2009, which was referred to as an attack using a ‘skimmer’ malware. Such ‘skimmer’ attacks became more widespread during 2010 – 2013, when a Russian hacker again used such a ‘skimmer’ malware to attack ATMs, which was discovered by the Kaspersky LAB to be a new version of the ‘skimmer’ malware. This new version can access ATMs directly as well as through the bank’s closed network, which then Let’s look at and understanding the components authorizes the ATM to dispense cash; whereby the difference is that this new ‘skimmer’ can also of an ATM first The key components of all ATMs are its Hardware access and steal confidential data from credit and Software, which is used to connect the ATM cards of the bank’s customers. (Please see a view to the respective internal banking network. Firstly, of the ‘skimmer’ malware in Photo 2). This new malware authorizes the ATM to dispense 40 bank the Hardware: the characteristics and features of this key component will differ for the various notes at a time, as well as store confidential data respective makes of ATMs. The most widely seen on a CHIP together with the confidential PIN code of a bank’s customers who use the ATM. Such and used makes of ATMs are: Diebold, Wincor confidential customer information is used to Nixdorf and NCR, each with their respective create fake credit cards that are then used for differing designs and external appearances. However, the internal computer of all ATMs will making further cash withdrawals. It can be seen be based on a Windows Operating System; while that this ‘skimmer’ malware is able to skim or access and steal confidential bank customers’ the internal safe (for storage of the cash) will have more security features and be well-protected information without the need to insert and install any Hardware Skimmer. It has also seen than the internal computer in an ATM. increased and widespread usage with many various makes of ATMs across the world - as It is often found that the weakest feature of an ATM is the vulnerability to be affected by ‘bugs’ has been found in the UAE, France, USA, Russia, Macao, China, Philippines, Spain, Germany, in its Windows Operating System that often Georgia, Poland, Brazil and the Czech Republic. occurs – which is no different for those PCs’ being used in many homes or offices. Therefore, ATMs also have the opportunity to be affected by From the many ‘skimmer’ malware attacks during 2013 – 2014, another type of malware was also computer bugs or be attacked by malware. discovered by the Kaspersky LAB in 2014 and However, this vulnerability was not evident called the ‘Tyupkin’ malware, and found to be before and until recently, since ATMs have always been a part of a bank’s ‘closed’ network. used in attacking ATMs in Europe as well as on That is, up till 2010, when a young New Zealand a widespread basis in the US, India, and China (please see Photo 3). This malware is used hacker, named Barnaby Jack was able to only at night time, through the Windows 32 bit demonstrate, publically on stage the Black Hat Computer Security Conference 2010 held in Las Operating System. It was found that a hacker made use of a fake copy of a key to access the Vegas, that he was able to hack into an ATM. That demonstration in hacking into an ATM was ATM and stole the CD-Rom that was then used to boot up the internal computer system, which widely seen globally and is known as “ATM
28 | B o a r d r o o m
also resulted in the malware authorizing the ATM to dispense 40 bank notes at a time. This ‘Tyupkin’ malware was the origin of many ATM attacks without the need to access the bank’s network or skimming and stealing the customer’s confidential data. Instead, it directly attacks the ATM itself, through using a weakness in the physical make up of the machine together with a vulnerable feature of its Operating System and a faulty security feature in preventing access to its internal computer system.
Additionally, other malwares – named PLOUTUS and PADIN – were discovered by Symantec, to be used on a widespread basis in Mexico. In our Asia region, the same PANDIN malware was found to be used in Malaysia where damages and }LEG;WG3 losses5=þof}over 3 million Malaysia Ringit were incurred. It was also discovered that the operating ACIS Professional Center Co., Ltd. and Cybertro Cybertron Co., Ltd handbooks of a well-known make of ATM as well as of point of sales devices and a self-service kiosk were posted on a website owned by Baidu. These malware attacks resulted in banks giving added attention to the physical security aspects of ATMs. In July 2016, ATMs throughout Taiwan also began to be attacked by hackers with total damages and losses amounting to as much as US$ 2.5 million. It was found that the hackers were from Eastern Europe and Russia. It was also the very first time that such ATM attacks occurred in Taiwan in a similar manner throughout the country, which resulted in banks there having to stop providing their services through a total of 1,000 ATMs that was subsequent to a similar situation in Japan where such attacks on ATMs also occurred. Moreover, it only took 3 hours for the resulting overall damages and losses to total as much as Yen 1.4 billion (or equal to US$ 12.7 million), with over 1,400 ATMs located in convenience stores becoming affected by the attacks over only a brief period of 3 hours between 05:00 am to 8:00 am on 15 November, 2016. As such, the attacks were made by means of hardware ‘skimming’ together with making use of malware attacks on the ATMs. Also, hackers from Africa used fake credit cards to withdraw cash, with more than 100 perpetrators working together to withdraw massive amounts of cash. It was the first time ever that such an incident occurred in Japan.
8 Guidelines for Banks in reducing the risks of having their ATMs being attacked in the future. 1. Undertaking regular inspection of the physical security features of ATMs used in providing banking services to customers, so as to make sure whether or not their security and safety features are adequate to protect the ATMs from being attacked directly. 2. Keys for the ATMs should be changed from the master key as supplied by the ATM manufacturer. 3. An alarm system should be installed in the ATM, so as to automatically alert the bank of any irregular access or attack to the ATMs. 4. Be vigilant and always fully informed, on a 24 x 7 basis, of the actual operations of bankâ€™s ATM network via the bankâ€™s own internal system, so as to be always be able to assess any irregular incidents that may occur at all times.
5. Harden any potential weak points or vulnerabilities of the computer system being used within the ATMs at all times, through following and implementing the recommended basic security/safety features and operating standards, or through following the PCI DSS Security Guidelines. 6. ATMs should be installed in a well-lit location together with a CCTV system that can then always record their usage. Bank offi9cials should also always assess and check out any irregular incidents or situations on a regular basis. 7. Banks should check and verify the amount of cash in the ATM together with reconciling this with the daily transactions made. 8. Banks should undertake a Security Audit through a repeat major Penetration Testing of their ATM operations system, so as to be fully confident of the internal security
and safety systems of the bank, which, in turn, will also enhance the confidence of its customers. In summary, it can be seen that the current and future trends in stealthily accessing and attacking a bankâ€™s ATMs will both become increasingly widespread as well as more sophisticated and complex. As such, this will result in banks having to become much better prepared. Banks should establish their respective Security Operation Center and Incident Response Plan/Incident Response Drill, so as to always be well-prepared to face and deal with any possible attacks, as well as to ultimately establish increased confidence on the part of their customers.
B o a r d r o o m | 29
ÐÎËÈÛÈX?JÈÛÈÈÕÈÓàÛÐÊÚ Frequently Asked Questions –
Data analytics .=W<LA?KC-%L/N4K}%L%K<R-YD:-W8Ċ_;BN=þAK??: DdL3K"L3/=A#DG44K}%OX?J1O_5=ĀCL1L"2R=N#GOAL< ©×¾ÆÔÜÆÑÚÐ¨ÍÆÉÇÚÓÈÍÆÈÍÆÎ²×¸ÔÕÍÔÓµÊ×ÒØÎ×ÎÛÆÑÑÔÕ µÆ×ÙÓÊ×¦ÉÛÎØÔ×ÞµÆ×ÙÓÊ×¦ØØÚ×ÆÓÈÊ
30 | B o a r d r o o m
_9'a;aGDW`GR'OC@VI_7OEc6ES<$TE@S4;T `GR;lTCTb-9Sh*b;aG$:ZE$V+ b-_=;$TELI;7SI MEY O _@Yg O IS 7 8Z = ERL*' OYg ; 7TC9Wg 7 O *$TEOD T * EI6_EfI`GR`@EMGTD 9lTbM_$V6=EVCT5%OC[G9Wg _$V6%Xh;bMCb;`7GRIS;ODT*CMTJTG%OC[G_MGT;Wh 'YO9ES@DT$E'ITCE[OS;CW'Z5'T8TMT$_ETLTCTE8 ;lTCTb-=ERaD-;b;=++Z<S;_ET+R@<ITCW'lTJS@9 bMCe'lT@[6bMCeMEYOIVIS4;T$TEMEYOIV:W$TEbMC _$V6%Xh;ODT*LClT_ _LCO 9Wg<T*'ESh*_ET$f@O+R_%Tb+ <T*'ESh*_ET$fcC'OD_%Tb+ `GI'lT8TC7OCT$f'YO _$Wg D I%hO *ORcE$S< _ET +Z 6 =ERL*'k%O* Ã¾Î ¥'lT8TC9Wg@<<OD¦ ;Wh$f_@YgO7O<'lT8TC9Wg_ETCS$+R L*LSDOD[7GO6_IGT7GO6+;>G$ER9<7OIV-T-W@ <S-W`GR$TE7EI+LO<<S-W
9Wg* gTD7gO $TE_%h Tb+ MEYO 7g O $TE7S 6 LV;b+ 7SIODT*_-;ETD*T;$TE%TD ETD*T;>G$TE ¾«'lTIT¿æäáÞñÞ=ET$1%Xh;b;<9'ITC_=; 6lT_;V;*T; 'ESh*`E$_CYgO= '«J«®¶¶´a6D;S$IV9DTJTL7E %O*O*'$TE;T.T .Xg*c6$GTI8X*=MT7T*e 9WgCW • $TEIV_'ETRM`<<_-V*IV;V+,SD ¥ÁæÞäëìðñæà ÞëÞéöñæàð¦_=;$TEO:V<TD8X*LT_M7Z%O*LVg*9Wg %OC[GCT$CTDCMTJTG9WgbM_$V;$IT+R+S6_$f< _$V6%Xh;=++SD7T*e`GR'ITCLSC@S;:%O* b;M;ID'ITC+lT%O*'OC@VI_7OE 'ITCMCTD9Wg =++SDMEYO7SI`=E7T*e9CWg 'W ITCLSC@S;:7O $S; $GTI$S;a6D9SgIc=%O*'lTIT¿æäáÞñÞ$f'YO%OC[G %O*LVg*9Wg_$V6%Xh; 7SIODT*_-;'ITCLSC@S;: %;T6bMg`GRCW'ITC.S<.hO;CT$.Xg*_$V6%Xh; _;YgO*+T$$TE$TIc$G%O*_9'a;aGDW +X*_$V6=MT ERMI T *DO6%TD7 O $V + $EEC9T*$TE7GT6 $TE_$f<%OC[G7T*e+lT;I;CT$CTD.X*g _$V;%O<_%7 `7GR=ER_B9 .Xg*_=;$TIbMC9Wg-ID_LEVCbM MEYO'ITCLTCTE8%O*$TE+S6$TE%OC[G`<<_6VCe 7S6LV;b+c=b;9T*9Wg8[$7O* +R<S;9X$+S6$TE`GR=ERCIGc6BTDb;_IGT9WLg C'IE • $TEIV_'ETRM`<<@DT$E5 ¥Íïâáæàñæóâ ÞëÞéöñæàð¦_=;$TEIV_'ETRM_@YgO@DT$E5LVg*9Wg $lTGS*+R_$V6%Xh;MEYO;T+R_$V6%Xh; a6Db-%OC[G ÄÞïñëâï.Xg*_=;<EVKS9IV+SD`GR9Wg=EX$KT9T* 9Wgc6_$V6%Xh;`GI$S<`<<+lTGO*9T*L8V7V MEYO :ZE$V+%O*=ER_9JLMES2O_CEV$T ;VDTC'ITCMCTD %O*¿æäáÞñÞ ITCW'Z5LC<S7V ° =ER$TE¥°Ó¦ _9'a;aGDW=T=ER6VK27T*e¥¾ïñæãæàæÞé 6ID$S;'YOCW%;T6bMCMTJTG¥Óìéòêâ¦_=; æëñâééæäâëàâ¦7IS ODT*_-;$TE@DT$E5DO6%TD %OC[G9WgCW$TE_=GWgD;`=G*EI6_EfI¥Óâéìàæñö¦ _-; $TE@DT$E5>G=ER-TC7V %OC[G+T$ÐìàæÞé êâáæÞ `GRCWa'E*LET*MGTD • $TEIV_'ETRM`<<bM'lT`;R;lT¥Íïâðàïæíñæóâ E[=`<<¥ÓÞïæâñö¦ _-; _=;%O'ITC _=;7TET* ÞëÞéöñæàð¦ _=;$TEIV_'ETRM%OC[G9WgCW'ITC %OC[G_=;BTKTÕÊÉ_=;_LWD*MEYO_=;E[=BT@ .S<.O;9WgLZ6 _=;9Sh*$TE@DT$E5LVg*7T*e 9Wg +R_$V6%Xh;%O6W%O_LWDLT_M7Z`GRERDR_IGT %O*LVg*9Wg+R_$V6%Xh;`GR$TEbM'lT`;R;lT9T* ±L=1O_#J3dLíÐÎËÈÛÈî;LZ%5=JY<%3/G"1dL _GYO$7T*e9WgCWOD[`GR>G%O*`7GR9T*_GYO$ G< L"[=4L" ¾«$TE9Wg+Rb-=ERaD-;%O*¿æäáÞñÞ_@YgO$TE =ERCIG>G _=;$TEb-JTL7E_@YgO;lT%OC[G9WgCWOD[ ± ÈÛÈ ÈÕÈÓàÛÐÊÚ ;OAL;DdLK}G< L"[= X?J CT$CTDCTb-_@YgO`=G'ITCMCTD`GRLEZ=%O_9f+ /KAG< L"G"L=Z%ÈÛÈÈÕÈÓàÛÐÊÚ +EV*_@YgOb-b;$TE7S6LV;b+ `GR ÁÞñÞ ÞëÞéöñæàð ¾« b;=++Z<S;%OC[G`GR$V+$EEC9Wg_@VgC%Xh;>T;aG$ _=;JTL7EMEYOIV:W$TEM;Xg*9Wg+R;lT¿æäáÞñÞCTb- OO;cG;;;hS CWO7S ET$TE_@VCg L[*%X;h b;9Z$e= $TE_%Tb+ bM_=;=ERaD-;7O$TE6lT_;V;:ZE$V+$TE%TD$TE %OC[G9Wg_%TCT$TE;lT%OC[GCT_-YgOCaD*$S;+T$LYgO 7GT6 $TE_CYO* `GR_JEK2$V+9Wg_7fCc=6ID'ITC 7T*e`GR'ITCLTCTE8IV_'ETRMMT'ITCLSC@S;: MGT$MGTD %O*%OC[G;S;h c69Tl bM_ETLTCTE8=ES<=EZ*$TE6lT_;V; :ZE$V+ $TE%TD`GR$TE7GT6 LTCTE8-V*'ITCc6 _=EWD<+T$'[`%*%S;MEYOLET*aO$TL9T*:ZE$V+ ±ÈÛÈÈÕÈÓàÛÐÊÚQGGJ[= ¾«ÁÞñÞÞëÞéöñæàð _=;JTL7E%O*$TEIV_'ETRM %OC[G7T*e+T$¿æäáÞñÞ_@YgO-IDb;6T;:ZE$V+ 7SIODT*9WgCW$TEb-=ERaD-;%O* ÁÞñÞ ÞëÞéöñæàð MEYO7TCIS78Z=ERL*' OYg;e9Wg7O*$TE.Xg*_EVgC7; b;_-V*:ZE$V+MEYO7TCIS78Z=ERL*'9Wg7O*$TE +T$'ITCLTCTE8%O*_ETb;$TE;lT%OC[GMGT;Sh; • b;= '«J«¯®¯=ER:T;T:V<6WÌßÞêÞb- CTbMOD[b;E[=`<<9Wg@EOC+R=ERCIG>Gc6a6D $TE9lTÁÞñÞÞëÞéöñæàð_@YgOIV_'ETRM2T;_LWD* _9'a;aGDWMEYO-Z6'lTLSg*`GR`<<+lTGO*9WgLET*%Xh; _GYO$7Sh*%O*7SI_O*`GR$TE=1VLSC@S;:7T*e _@YgO;lT%OC[G9Wgc6>T;$TEIV_'ETRM`GICTb- MEYO %O*2T;_LWD*$S<$V+$EEC$TE_GYO$7S*h $TEMT_LWD* `=G'ITCMCTDa6D<Z''G9Wgc6ES<$TE?$O<EC$TE %O*ÌßÞêÞ `GR=ES<$GDZ9:$TEMT_LWD*c6 b-_9'a;aGDW_MGT;Sh; E[=`<<%O*$TEIV_'ETRM 7TCLBT@%O*`7 G R`M * c6 9S ; $TGI T 'IE %OC[GLTCTE8`<*c66S*;Wh _;;_%TMT$GZCb6`GRD$_I;$TEMT_LWD*$S< • $TEIV_'ETRM%OC[G`<<@Yh;2T; ¥Áâðàïæíñæóâ $GZCb6_@YgOb-9ES@DT$E`GR_IGT%O*7;bMCW =ERLV9:VBT@CT$9WgLZ6 ÞëÞéöñæàð¦_=;$TEIV_'ETRM_@YgO`L6*>G%O* ETD$TE9T*:ZE$V+_M7Z$TE5MEYO$V+$EEC7T*e • Òßâïb-ÁÞñÞÞëÞéöñæàð-IDb;$TE7S6LV;b+ 9Wgc6_$V6%Xh; MEYOOT+$lTGS*_$V6%Xh; b;GS$K5R `<<OS7a;CS7_V @YOg $TE=ES<ET'T'Ta6DLTEMT$ ±ÐÎËÈÛÈQGGJ[=
CW'ITC7O*$TEL[* 'Ta6DLTE$f+RL[*7TCc= 6ID _-;_CYgO_$V6_M7Z$TE5+S<7SI=ER$S;$GT* $EZ*.V6;WD =ER_9JOOL_7E_GWD_CYgO=GTD= ¯®±OS7ET'Ta6DLTE%O*Òßâïb;DT;6S*$GTI @Z*L[*%Xh;±_9T_CYgO_9WD<$S<OS7ET=$7V_@ETR 9Z$';ODT$+R_6V;9T*$GS<<T;a6D_EfI • ÁìêæëìÍæ÷÷Þ.Xg*%TD@V..T>T;aG$OO;cG; CT$$IT±¢%O*DO6%TD9Sh*MC6c6;lTER<< ÁÞñÞÞëÞéöñæàðCTb-b;$TEIV_'ETRM%OC[G :ZE$V+`7GRLI; `GRMT'ITCLSC@S;:%O*-Z6 %OC[G`7GRLI;_%T6ID$S; 9lTbM9WC%TD`GR $TE7GT6;Sh;c6ES<E[%OC[G9Wg;TL;b+_$WgDI$S< DO6%TD `GR9lT;TDITLV;'TORcE9Wg+R%TD6W 7Oc= `GRc6'lT7O<ITLT%TcM;9Wg%TD6WMEYO CW`;Ia;C9Wg+R9lT$lTcEL[*_@YgO=ERaD-;b; $TEb-9ES@DT$E%O*7; ±L=8K , 3L1L"W1Y3Y?<O Z E;_ 1 O _ % Q _ G A_ L íÈÊÏÐÕÌ ÓÌÈÙÕÐÕÎî QGGJ[= X?J/KAG< L"G" L=Z%íÈÊÏÐÕÌÓÌÈÙÕÐÕÎî
¾«ÊÞàåæëâéâÞïëæëä'YO$TE9lTbM'OC@VI_7OE ES<9ET<+T$%OC[GMEYO+T$LBT@`I6GOCa6DcC +lT7O*CW';c=a=E`$EC*T;;Sh;e a6D;lT'ITCE[ 9Wg c 6 ES < CT+S 6 _$f < cI b ;2T;'ITCE[ b ;E[ = `<< $TE`9;'ITCE[ODT*b6ODT*M;Xg* _-; $0 MEYO A*$-S;_=;7; 7SIODT*%O*$TEb- ÊÞàåæëâéâÞïëæëä _@YgO-ID @DT$E5 • 9WC;S$IV+SDCMTIV9DTGSD ÊÆÑ b- ÊÞàåæëâ éâÞïëæëä _@YgO?$bM'OC@VI_7OELTCTE8<O$ c6IT+T$BT@ÄììäéâÐñïââñÓæâô%O*`7GR D T ;6[ = GO6BS D CT$; O D`' c M;b;LTD7T C;ZKD +T$$TE;lT%OC[GOS;6S<'ITC=GO6BSD 9WgCT+T$$TE_E97Vh* • $TEb-ÊÞàåæëâéâÞïëæëä$S<BT@8TD6TI_9WDC _@YOg MTIT>[C EW TDc6;O DOTJSDOD[9 cgW M; a6D9lT$TE 'T6$TE5'ITC;T+R_=;%O*'ITCDT$+; +T$%OC[GBT@8TD+T$6TI_9WDC7O;$GT*IS; `GR7O;$GT*'Y;b;-I*_IGTM;X*g a6DMT'ITC _$WgDIaD*ERMIT*'ITC_=GWgD;`=G*b;BT@8TD 7O;$GT*IS ; $S < BT@8 T D7O;$GT*'Y ; 9WgCW`L*cAA T_=;7SIIS6'ITC_+EV ± 3G#L3O` L=8K,3L1L"W1Y3Y?<O ZE; GO G< L"E3P"_ 1O%_ G_Q A LíÖÎÕÐÛÐÝÌÊÖÔ×ÜÛÐÕÎîQGGJ[=
¾«Àìäëæñæóâàìêíòñæëä'YO'OC@VI_7OE9Wg _%Tb+`GRLTCTE8_EWD;E[% O C[G7T*e'V6`GR7S6LV;b+
B o a r d r o o m | 31
ETD$TE9T*:ZE $V + 9Wg_$V6 %Xh; .Xg* `7g _6V C *T; c==ERDZ$7b-c6 MEYO$GTIa6DLEZ=IT_=;IV:+W 6S $TE c6_O* a6Db-IV:W$TE_EWD;E[_-;_6WDI$S<LCO*%O* C;ZKD`GRLTCTE87O<L;O*7OLV*g 7T*e7SIODT*_-; 7EI+LO<<S-Wb-IV:W$TE_GYO$$GZ C7S IODT* %OC[GBTDb;`GRBTD;O$O*'$E9Wg7EI+LO< _@YgO • b;=®¶¶´Áââí¿éòâ.Xg*_=;'OC@VI_7OE%O* _@YgO9lT$TE96LO<'ITC8[$7O*'E<8I;%O* ';MT+Z69WgCW'ITC_LWgD*b;$TE_$V6%OC[G9Wg%S67O%O ETD$TE:ZE$V+ .Xg*=ERLV9:VBT@_9WD<cCc6$S< _9f++EV*OS;CWLTERLlT'S`GR_@YgObMc6%OLEZ=+T$ Æ¿Êc6_OT-;RÄÞïïöÈÞðíÞïìó`-C= MCT$ EZ$aG$.Xg*_=f;+Z6_EVCg 7;%O*$TE9W'g OC@VI_7OE $TE7EI+LO<<S-WODT*8[$7O* CW=ERLV9:VBT@ ;IS7$EEC9T*_9'a;aGDW9WgCWOD[b;=++Z<S; LTCTE87S6LV;b+ ¥b;_$CLMCT$EZ$¦ c66W$IT • ÁÞñÞÞëÞéöñæàð8YO_=;_9'a;aGDWbMCLlTMES< `GRCW=ERLV9:V>G C;ZKD MGS*+T$;Sh;_9'a;aGDW_-V* ÊÞàåæëâ >[LO<<S-W .Xg*7O*b-$TEG*9Z;ODT*CMTJTG éâÞïëæëä`GRÀìäëæñæóâàìêíòñæëäc68[$ c=$S<PTE6`IE .OA7`IE 9S$KR`GR$TE $TEIV _ 'ETRM _ =EW D <_9W D <DS * '*_= ; %DTD>GOO$CTb;_-V*:ZE$V+CT$%Xh; 'I<'ZC'Z5BT@8YO_=;LI;LlT'SLlTMES<<EVK9S O*'=ER$O<LlT'SODT*M;Xg*b;$TE_=GWgD;`=G* • aE*@DT<TG-Sh ; ;l T `M * M;Xg * b;=ER_9Jc9D 7EI+LO<<S-W%;T6bMb;$TE7O<L;O*7O E[=`<<$TE7EI+LO<<S-W`GR_EVgC+RL*>G6W9Wg_Mf; c6;lTER<<Àìäëæñæóâàìêíòñæëä9WgOO$`<< 'ITC7O*$TE%O*7GT6$TELO<<S-W9Wg_;; _=;E[=:EECb;`*%O*$TE@S4;T'Z5BT@*T;7EI+ G[$'TETDbM ;O$_M;YO+T$$TE7EI+LO< LO<<S-W$TE=ES<=EZ*=ERLV9:VBT@%O*$TE7EI+LO< CT_@YgOL;S<L;Z;'5R`@9DMEYO>[_-WgDI-T 6T;CR_Ef* _CYgO7O*@V+TE5T9T*_GYO$b;$TE <S-W`GI ÁÞñÞ ÞëÞéöñæàð DS*LTCTE8;lTc= <S-W`GR$TE_@VgC'ITCE['ITC_%Tb+_-V*GX$b;_EYgO* ES$KTLlTMES<>[= ID b-$S<*T;$TEbM'ITC_-YOg CSg;=ER_B9OYg;ec6 9Wg_$WgDI%O**T;7EI+LO<9Wg_ET7O*bM<EV$TEG[$'T • MZ;D;7-YgOÍâííâïb;=ER_9JWg=Z ;9WgLTCTE8 OW$6ID _%Tb+`GR7O<L;O*7OOTEC5`GR'ITCE[LX$ • b;=++Z<S;<EVKS97EI+LO<<S-W%;T6_Gf$CW ± ¢ [.` ; O L=8K , 3LX?J3d L 3AK / ==;1L" OO$CT+lTM;TD _LCYO;MZ;D;7bM$TEES<b- % O +l T $S 6 6 T ;'ITCE[ ` GR=ERL<$TE5 b ; W1Y3Y?<OZ3W%N"ÙÛÐÍÐÊÐÈÓÐÕÛÌÓÓÐÎÌÕÊÌ«5}}L 6[`G_6f$MEYO>[L[*OTDZb;<T; $TEb- ÁÞñÞÞëÞéöñæàð 6S*;Sh;+X*CW<EVKS9 5=J.NC*¬;L% A<Z3L=/=A#DG44K}%OE=āG[; • Æ¿Ê c6@S4;T Æ¿Ê ÔÞñðìë Ñïâëá ¾íí >[+lTM;TD.OA7`IE <T*ETD_EVgC_%TCT_L;O ¾« ;IS 7$EEC9T*_9'a;aGDW bMCg e .X g*c6h`$g LlTMES<;S$-fO==*.Xg*9lTM;T9Wg`;R;lTITLV;'T %TDa=E`$EC$TE7EI+LO<<S-W_@YgOEO*ES< ÊÞàåæëâ éâÞïëæëä ¥$TE_EWD;E[%O*'OC@VI_7OE¦ 9Wg$lTGS*7O*$TEOD[b;7O;;Wh'YOORcE EIC9Sh* $TEb- ÁÞñÞ ÞëÞéöñæàð `GRDS*_-YgOC7O MEYO Àìäëæñæóâ àìêíòñæëä ¥=T=ER6VK2 a=E`$EC%O*7;$S<a=E`$EC9T*<S-WOYg;9Wg ¬ 'OC@VI_7OE_LCYO;C;ZKD¦ L*>GbM_$V6$TE 9lT;TD8X*>GV7BS539Wg$lTGS*_=;9Wg;VDCL[*LZ6 c6$O;9WgLV;'T+R%T67GT6 7GO6+;$TE.YhO _=;9Wg;VDC_-;ÐÞäâ©Æëñòæñ©Õâïì©Ñ¾Ð¿ììèð© _=GWgD;`=G*E[=`<<$TE7EI+LO<<S-Wc=ODT* %O*%IS=bMCbM_=;9Wg8[$b+>[ES< Ãïââ¾äâëñ© `GRÈÞðåãéìô a6DM;Xg*b;>[ CT$ LlTMES<ÂÖ `GI_ET_EVgC7;6ID$TE;lTIV:W +lTM;TD6S*$GTIc6`$ÀÞðâÔÞïâ¾ëÞéöñæàð $TEIV_'ETRM_=EWD<_9WD< ¾ëÞéöñæàð CTb- `GR 9Wg;lT_L;Oa=E`$EC ÆÁÂ¾ ÁÞñÞ ¾ëÞéöðæð $l T GS * @S 4 ;T$ T I7 O c=b;$TE;l T ;IS 7 $EEC9T* ±414L1G"6SDG44K}%O/ GÈÛÈÈÕÈÓàÛÐÊÚ;O .Xg * _= ; _'EYg O *CY O 9Wg b - b ;$TEIV _ 'ETRM % O C[ G _9'a;aGDW bMCg e CTb-h O Dg T*7gO _;YgO* _@Yg ObMh G< L"[=4L" ¾«<9<T9%O*>[LO<<S-W9WgCW7OÁÞñÞÞëÞéöñæàð %;T6bM ` GR.S < . O ;Ll T MES < >[ 7 EI+LO< LO6'GO*$S<$TE7EI+LO<9Wgc6=ERLV9:VBT@L[* BTDb;`GR>[7EI+LO<<S-WOVLER a=E`$EC `GRb-_IGT;OD$IT_6VCCT$ `GRL;O*7O'ITC LTCTE8$GTILEZ=c66S*;Wh ÆÁÂ¾ÁÞñÞ¾ëÞéöðæð_=;9Wg;VDCb;<EVKS97EI+ 'T6MIS * %O*7GT6`GR$TE7 O *=1V <S 7V 7 TC% O • b;=++Z<S;ÁÞñÞÞëÞéöñæàð _%TCTCW<9<T9 LO<<S-W%;T6$GT*`GR%;T6bM EIC8X* $lTM;6%O*>[CWLI;c6_LWDMGS$bMc66WDVg*%Xh; $S<$TE7EI+LO<<S-WCT$%Xh; L*>GbM_$V6 M;ID*T;BT'ES29Sh*ER6S<9O*8Vg;`GRER6S< $TE7EI+LO<E[=`<<bMCe 9Wg@S4;T%Xh;+T$ -T7V _@YgOb-7EII+LO<ETD$TE:ZE$EEC7T*e $TE;lT;IS7$EEC9T*_9'a;aGDWbMCe _%T E[=`<<`GR$0_$53_6VCe9Wgb-OD[$TE_%TCT %O* ÁÞñÞ ÞëÞéöñæàð 9lTbM$0_$37T*e %O*O*'$E CT-IDb;$TE7EI+LO<<S-W _ETc6;lTCTb-$S< +lT_=;7O*_=GWgD;7TCc=6ID'ITCERCS6ERIS* GS$K5R%O**T;.Xg*LTCTE8`<*OO$_=;¯LI;'YO _ET7O*DOCES<IT;IS7$EEC9T*_9'a;aGDW_=; ±¢[.3dLW1Y3Y?<OWO_<AK4íÈÛÈÈÕÈÓàÛÐÊÚî LVg * Ll T 'S `GR+l T _= ; 7 O $TE7EI+LO<<S -W ;LZ% Z3L=/=A#DG44K}%OE=āG[; *T;7EI+LO<ER<<`GRETD$TE<S -W 9Wg 8T_ETcC=ES<7SI7TC;IS7$EEC9T*_9'a;aGDW ¾« LlTMES<ÂÖ `GIc6CW$TE;lTÁÞñÞÞëÞéöñæàð _$V6%Xh;_=;=ER+lT ¤Îëñðåêá Ýñàåð óëîç¥ _;; bMCge9Wg_%TCTOT++RL*>GbM'ITCLTCTE8 _%TCT-IDb;$TE7EI+LO<<S-W a6D_=;IV:W9Wg_ET $TE=ERDZ $7b- IV :W$TEIV _'ETRM_=EW D<_9WD<$S< %O*>[ L O<<S -W b ;$TE7O<L;O*7O'ITC b-IV_'ETRM%OC[G_@YgO9lT'ITC_%Tb+bM8O*`9IT *T;$TE7EI+LO<6S*$GTI _-; *T;$TE7EI+LO< 7O*$TE%O*7GT6MDO;DT;G*`GR=ERLV9:VBT@ %OC[G9Wcg 6CT;S;h +RLYOg 8X*ORcE8TMT$_ETc6%O C[GCT $ER<I;$TE$TE.YOh `GR$ER<I;$TE$TE%TDEIC8X* 6ODG* `G I 9l T bM O D[ b ;E[ = `<<9Wg L TCTE8-Wh IS 6 `;Ia; C *T;7EI+LO<ER<<$TE+ T D_*V ; _6Y O ;@;S $ *T; • ÁÞñÞÞëÞéöñæàð9lTbM>[LO<<S-WLTCTE87EI+ _=EWD<_9WD<'ITCLSC@S;: IV_'ETRM `GR+S6GlT6S< `GR$TE;lTa=E`$EC Ïìßìñæàð ¥Ïìßìñæàð _=; LO<ETD$TE9T*:ZE$V+9Sh*®¢%O*+lT;I; -Sh;c6`L6*IT_ETLTCTE8;lTIV:W$TEÁ ÞñÞÞëÞéöñæàð a=E`$ECMEYOIV:W$TE7EI+LO<9Wgb-'OC@VI_7OE
32 | B o a r d r o o m
Q. How can we utilise big data? A. The use of big data in data processing relies on the science of interpretation and summarisation of the vast amounts of data available for decision making. Data analytics is a tool by which big data can be used for business, sales, marketing, political and economic purposes.
Q. What is data analytics?
CT-IDb;$TE7EI+LO<%Sh;7O;MEYOER<< MEYO ETD$TE<SÂ‰-W9_gW $V6%X;h _=;=ER+lTÂĽĂ?ĂŹĂ˛ĂąĂŚĂŤĂ˘ĂĂŻĂŹĂ Ă˘Ă°Ă°ÂŚ _-; %Sh;7O;`GRER<<$TE.YhO ER<<%TD ER<< $TE<S;9X$<SÂ‰-W`D$=ER_B9 _=;7;ÂŚ _%TCT-ID b;$TE7EI+LO< _@YgO>GS$6S;=ERLV9:VBT@%O* *T;7EI+LO< a6D_,@TR*T;9WgCWGS$K5R9Wg7O*9lT .lTe$S;_=;=ER+lTb;=++Z<S;Ă‚Ă–DS*'*OD[b;-I* _EVgC7;%O*$TE=ER_CV;>G$TE;lT Ă?ĂŹĂ&#x;ĂŹĂąĂŚĂ Ă° CT -ID7EI+LO< *T;7EI+LO<ETD$TE9Wg c C _ $V 6 %Xh ; _= ; =ER+lT Â¤ĂŠĂŤĂŞÂŠĂŽĂŤĂąĂ°ĂĽĂŞĂĄ Ă?ĂąĂ ĂĽĂ° ĂłĂŤĂŽĂ§ÂĽ _=;;lT$TE IV_'ETRMk_=EWD<_9WD<%Sh ;L[* .Xg*=ER$O<6h ID ĂŠĂžĂ ĂĽĂŚĂŤĂ˘ ĂŠĂ˘ĂžĂŻĂŤĂŚĂŤĂ¤ ÂĽ$TE_EWD;E[%O*_'EYgO*ÂŚ `GR Ă?ĂŻĂ˘ĂĄĂŚĂ ĂąĂŚĂłĂ˘ĂžĂŤĂžĂŠĂśĂąĂŚĂ Ă°ÂĽ$TEIV_'ETRM_-V*'T6$TE5ÂŚ `GRĂ€ĂŹĂ¤ĂŤĂŚĂąĂŚĂłĂ˘Ă ĂŹĂŞĂĂ˛ĂąĂŚĂŤĂ¤CT=ERDZ$7b-$S<*T; 7EI+LO<ETD$TE<SÂ‰-W9WgcCc6_$V6%Xh;_=;=ER+lT c6`$ $TE7EI+LO<$TE6OD'T $TE7Sh*LlTEO* _=;7;a6DĂŠĂžĂ ĂĽĂŚĂŤĂ˘ĂŠĂ˘ĂžĂŻĂŤĂŚĂŤĂ¤+R_=;_'EYgO* CYO_@YgO-IDER<ZIT >[7EI+LO<<SÂ‰-Wc6=1V<S7V*T; ODT*cEa6D6[+T$IV:W$TE9lT*T;%O*>[LO<<SÂ‰-W<; _'EYgO*'OC@VI_7OE `GIER<<$f+RLTCTE8`;R;lT IV:W$TE9lT*T;`GRIV:W$TE7EI+LO<9Wg6W9WgLZ6bM$S< >[L O<<SÂ‰-Wc6`GRLlTMES<Ă€ĂŹĂ¤ĂŤĂŚĂąĂŚĂłĂ˘Ă ĂŹĂŞĂĂ˛ĂąĂŚĂŤĂ¤ +R_= ; _'EYg O *CY O _@Yg O - I DL;S < L;Z ; >[ L O<<S Â‰ -W ';MT'lT7O<$WgDI$S<IV:W$TE7EI+LO<<SÂ‰-WÂĽÂžĂ˛ĂĄĂŚĂą ĂŞĂ˘ĂąĂĽĂŹĂĄĂŹĂŠĂŹĂ¤ĂśÂŚ_-;IV:W$TE$lTM;6`GR'V6'lT;I5 +lT;I;_*V;9Wg _= ;LTERLlT'SÂ‰ %O*$TE7EI+LO< *<$TE_*V;;Sh;eÂĽĂ?ĂŠÂŹĂ‘Ă‚ÂŚ
The development and adoption of technology and computers to meet business, personal and other needs has been rapid and widespread, and as a result vast amounts of data are generated every single day. This data can be an invaluable resource if we have the ability to utilise it. Data analytics gives us that ability.
A. Data analytics is the science of analysing big data for business or other purposes. It begins with the capability to transform big data into a format in which it can be processed by the technology, software or model created for the intended purpose. The processed and analysed data is then utilised or interpreted by professionals trained to use such technology. Data analytics can be categorised as follows:
Nowadays we face a constant stream of new terms, breakthrough technologies and methods. Some we find understandable but when we donâ€™t â€˘ Descriptive analytics is the most basic data analysis, focusing on â€œWhat has happened?â€?, understand, the question we ask ourselves is â€œWhat is happening?â€? or â€œWhat could haphow they are relevant to us. This list of frequently pen?â€? Sample uses include sales reports and asked questions is intended to provide answers operating results. to some questions commonly asked about data â€˘ Diagnostic analytics is used to answer the analytics, and discuss its impact on the accounting question â€œWhy did it happen?â€? by examining and audit professions. the relationships between factors that are correlated, such as the relationship between sales and each type of marketing activity, Q. What is big data? which helps to guide our decision-making in A. The term â€œbig dataâ€? was first used in an the right direction. article written by NASA scientists in 1997, which â€˘ Predictive analytics is a form of advanced discussed the problem of storing extremely large data analysis which predicts future events volumes of data in computer memory units. Big using a combination of historical information data now generally refers to the vast amounts of and statistical models or relatively more highly complex data that are created as a result complex technology, such as machine learning of technological advances, which gave rise to the or data mining. Examples of the use of problem that existing data management technology predictive analytics are in sales forecasting did not have enough capacity to store, manage and credit rating score calculation. and process such volumes of data in a timely â€˘ Prescriptive analytics is the most complex manner. form of data analysis because not only does it predict future events, their causes and their According to the definition given by US research duration, it also provides advice on the and business advisory firm Gartner, big data options available and their potential impact. is characterised by the three Vs: volume (the amount of data is vast), velocity (the data Q. Why is data analytics important and changes very fast, such as data generated from social media platforms) and variety (the data is in how is it used? various formats such as text, tables, XML, audio A. The volume of data and online activities generated by social networks increases every or pictures). year. The ability to understand the data we receive, connect data derived from various
B o a r d r o o m | 33
rate the relative safety of different neighborsources and analyse the relationships among hoods, based on pictures from Google Street data can result in vast improvements in business View. operations, sales and marketing, providing competitive advantages or creating new business • Machine learning and satellite images were used to make predictions about poverty in opportunities. order to locate areas where low-income people lived, by comparing daytime and Here are some examples of the use of data ananighttime satellite images to identify the lytics for business or other purposes: presence or absence of electricity in each area, which can be used as guidance for • In 2012, US President Barack Obama used development. data analytics to analyse his voting base and interactions between his voting base and the election campaign. This enabled his team to Q. What is cognitive computing adjust his campaign strategy to each group technology? of voters in a timely manner, helping to A. Cognitive computing enables computers to ensure the most effective use of his resources understand and learn various types of in due time. information so that they can think and make • Uber uses data analytics to support its decisions on their own, using the same learning dynamic pricing system, which automatically method as that of the human brain. It also adjusts fares based on demand, i.e. when the enables them to respond in a variety of situademand for service is high, the quoted fare tions, such as the following: will be high as well. This was evident when 14 people in Sydney, Australia, were being • In 1997, Deep Blue – a computer developed held hostage in 2014, with quoted Uber fares by IBM – defeated world chess champion for the affected area four times higher than Garry Kasparov, marking the first time that the normal rate because everyone nearby a computer was able to make decisions (in wanted to rush home. chess games) better than a human. • Domino’s Pizza, whose online sales account Subsequently, use of machine learning for more than 40% of all sales, uses data and cognitive computing technologies has analytics to analyse each business segment expanded into the world of business. and search for relationships between each • One of the leading hospitals in Thailand has set of data. This provides insights into sales implemented cognitive computing technology and possible new best-selling items for its to support oncologists and oncology experts sales and marketing teams. It also provides in considering treatment options for patients information about which branches have high with cancer. sales volume or are likely to be highly profitable, • A robot developed in Japan named Pepper so that the company can adjust the use of is able to read and respond to emotions, and resources accordingly. so it can be used to watch over children or elderly persons. Q. What is machine learning technology • IBM has developed the IBM Watson Trend application for shoppers. The application and how is it used? recommends products that are in high A. Machine learning enables computers to recdemand and predicts which hot-selling ognise data or their surroundings without manual items may sell out soon. It also suggests input from humans. The data are then stored as New Year’s gifts that are most likely to be a knowledge base in various formats, such as a appreciated by the recipient. rule or a function. Here are some examples of using machine learning for prediction: • An MIT research team used machine learning to train computers to determine how people
34 | B o a r d r o o m
Q. What is the role of data analytics in an audit? A. The role played by data analytics relevant to audits can be summarised as follows:
• Data analytics has an increasingly important role in audits, and its use has led to the development of new ways of auditing within an existing regulatory regime. The emergence of data analytics necessitates careful regulatory change, but we have to accept that embracing technological innovation is essential for auditors. Without it, their ability to respond to market demand may be compromised and their efficiency reduced. • Data analytics enables auditors to check 100% of the transactions in a population, whereas previously only samples could be selected and checked for correctness. The old method is clearly a lot less effective than the current method that is supported by the use of innovative technology. • Data analytics is a new technology for auditors. It requires substantial investment in hardware, software, skills and quality control, but it is an important part of the response of large audit firms to market demand in the largercompany audit market. Data analytics can be applied to a wide range of assurance engagements, not just audit. • For now, smaller audit firms have limited knowledge and experience of the application of data analytics. However, some software vendors are beginning to offer audit firms audit software that supports data analytics, integrated with many of the widely used proprietary accounting systems such as Sage, Intuit, Xero, TASBooks, FreeAgent and Kashflow. CaseWare Analytics is one of these vendors, offering a large and complex data analysis tool called “IDEA Data Analysis” to internal and external auditors. This tool is now widely used among mid-tier and large audit firms, as well as by local and national government agencies for monitoring organisational transactions.
Q. Does EY use data analytics technology in its audits? A. EY uses data analytics in audits to gain insights through analysis of collected data that is arranged in formats that can be used in prediction of trends, comparison of relationships, analysis and classification. This demonstrates that data analytics has audit applications and it can be said that data analytics is used to manage
the internal and external data of companies being audited, in order to identify risks of material misstatement and to ensure that audits are carried out efficiently and effectively, and provide accurate audit conclusions. Data analytics is a critical element of our audit transformation and is beginning to deliver tangible benefits in terms of enhancing audit quality, improving audit efficiency, and providing more relevant insights to our clients.
Q. Does EY use artificial intelligence in its audits? A. Emerging technological innovations, like machine learning and cognitive computing, have significantly transformed the audit process. At EY, we began this transformation with the use of data analytics in our audits, and we are continually developing applications of new technologies that are consistent with our goal of a highly efficient and significantly less time-consuming audit that better meets both market expectations and the performance requirements of key stakeholders. Our use of new technologies to facilitate the audit depends on the audit work being done, and such work can be divided into two types.
Routine audit work - The focus is on application of analytics in routine audit work, such as auditing the purchase and sales or payroll processes, and the use of robotics (programs or computer-assisted methods used in the audit of routine processes, systems or accounting records, sales processes and the recording of transactions in ledger accounts) in the audit, in order to enhance the efficiency of routine audit work. EY is currently at the early stages of evaluating the effectiveness of using robotics to facilitate audit work. Non-routine audit work â€“ Advanced analytics, including machine learning, predictive analytics and cognitive computing, are used in non-routine audit work tasks, such as reviewing impairment and provisions. Machine learning helps auditors to determine the best working and audit approaches based on the way they work on their computers, while cognitive computing assists auditors in identifying appropriate audit methodologies determining the level of materiality and tolerable error.
B o a r d r o o m | 35
A-B-C R-#N/=?.LDN=J%L.L8"B ²Ø¯ÎÙÑÆÉÆ¸Î×ÆÈÍÆÉÆÕÔÓÌ ¨Ô×ÕÔ×ÆÙÊ±ÊÌÆÑ¦ËËÆÎ×Ø 4=þCK1=R"[1<XG& L5=JK3%OAþ/#dLK.;EL%3 °×ÚÓÌÙÍÆÎ¦½¦±ÎËÊ®ÓØÚ×ÆÓÈÊµÑÈ
$TI_%TL[c7ECTLLZ69TD%O*=MGTDeO*'$EDS*'*+6+O$S<$TE9lT7TC_= TMCTD9WgIT*cI 7S*h `77; =b;`7GR=_= TMCTDb;$TE6lT_;V;$TE7T*eDOC_=GWDg ;c=7TC=++SD7T*ecCIT +R_=; _JEK2$V+$TE_CYO*$0MCTD`7LVg*9Wg$EEC$TE>[<EVMTE`GRM;ID*T;7T*eb;O*'$E9ET<$S; CT;T;'YO_EYgO*$TE$lT$S<6[`G$V+$TE9Wg6W.Xg*8YO_=;_EYgO*9Wg'Z;-V;c=`GI`7_=;9Wg;TLS*_$7IT $TE$lT$S<6[`G$V+$TE9Wg6W;Wh`7GRO*'$Ec6;lTCT_=;LI;M;Xg*%O*`>;6lT_;V;$TEb;`7GR=MEYOcC _MCYO;_-;$TE6lT_;V;$TEOYg;e_-;$TE%TD$TEG*9Z; A-B-C'YOL[7E*TDe9W_g =;àåâàèéæðñbM$<S $EEC$TE`GR>[< EVMTELlTMES<a'*LZ69TD %O*c7ECTL%O*=;Wh_@YgObMO*'$ECW$TE$lT$S<6[`G$V+$TE9Wg6Wa6DcC7O*c='V6EV_EVgC$TE6lT_;V;$TE bMCeMEYOG*9Z;bMLVh;_=GYO*6S*;Wh
36 | B o a r d r o o m
¾ààìòëñÞßæéæñöæðÞèâöïâîòæïâêâëñìãäììá äìóâïëÞëàâ« 'ITCES<>V6ES<-O<'YO$Z`+%O* $TE$lT$S<6[`G$V+$TE9Wg6W7TC9Wg Òëæñâá ËÞñæìëð Âàìëìêæà Þëá ÐìàæÞé Àìêêæððæìë ãìï ¾ðæÞ ÞëáñåâÍÞàæãæà$GTIcI Àåâàèéæðñ· b'E$EEC$TE¬_G%T;Z$TE<EVKS9 _CYOg cMEg=ER-ZC'5R$EEC$TEc7ECTLLZ69TD ODT*cE'*+RcC*T D;S$8TO*'$E+R7O*<S*'S< bM$EEC$TE>[< EVMTE@;S$*T;bMCW ¾ààìòëñÞßæéæñö `7_'EYgO*CYO9Wg+R-IDLET*¾ààìòëñÞßæéæñöO*'$E 'YO$0<S7EER_<WD<O*'$ECT7E2T;9T*+EVD:EEC ;aD<TDBTDb;O*'$E;aD<TD$lTM;6OlT;T+%O* `7GRM;ID*T;9Wg$lTM;68X*%O<_%7OlT;T+'ITC ES<>V6-O<%O*$EEC$TE >[<EVMTE `GR@;S$*T; O*'$E'IE$lTM;6bMCW$TE7EI+9T;$0ER_<WD< 7T*e_MGT;Wh_=;ETD= a6DOT+<EE+ZOD[b;ITER $TE=ER-ZC'5R$EEC$TE_@YgObMCW$TE=ES<=EZ* bM$0ER_<WD<7T* e bM_=;=++Z<S; _G%T;Z$TE
<EVKS9'IECWàåâàèéæðñITER=ER+lT7T*eb;$TE =ER-ZC'5R$EEC$TE_@YgObM$EEC$TEc6OT;b; `7GR= `GR=ES<=EZ*bM_=;=++Z<S;_LCO _@ETR LVg * _MG T ;Wh 'Y O 7S I $l T M;6bM $ TE6l T _;V ; *T;%O* O*'$EOD[b;%O<_%7%O*$TE$lT$S<6[`G$V+$TE9Wg6W “B” Bible b;9W;g MhW CTD8X*$TEEI<EIC$0MCTD
ER_<WD< =ER$TJ ;aD<TD7T* e 9Wg_$WgDI%O* $S<:ZE$V+%O*O*'$E;Sh; e .Xg*OT+EI<EIC_=;E[= _GC MEYOEICb;ER<< æëñïÞëâñ %O*O*'$E_@YgO bM? TD$0MCTD¥ÉâäÞé¦ MEYO? TD=1V<S7V$TE7TC $0MCTD ¥ÀìêíéæÞëàâ¦ b-_=; àåâàèéæðñ b; $TE7V67TCIT? TD7T*eb;O*'$Ec6=1V<S7V7TC $0MCTDER_<WD<=ER$TJ7T*e'E<8I;`GR 7E*_IGT _@YgOMGW$_GWgD*$TEa6;a9K9T*$0MCTD _-;a9K=ES<`GRa9K+lT'Z$.Xg*LTERLlT'S%O*a9K =ES<;Sh; MT$_=;a9K=ES<b;+lT;I;;OD MTb-IT +RcC CW > G$ER9<7 O $TE$l T $S < 6[ ` G$V + $TE9Wg6W _;YOg *+T$a9K=ES<8YO_=;a9K9T*OTT`GRL*>G7O BT@GS$K5`GRCT7E2T;$TE$lT$S<6[`G$V+$TE9Wg6W %O*O*'$E Àåâàèéæðñ· b'E $EEC$TE¬? TD$0MCTD¬? TD=1V<7S V $TE7TC$0MCTD _CYgOcMEg=ER-ZC'5R$EEC$TE9Z$c7ECTL ODT*cE$TE6lT_;V;:ZE$V+9Wg%T6$EO<MEYO
a'E*LET*9T*$0MCTD_LCYO;$TE%S<_'EYgO*<V; a6DcCCW_E6TE 'Z5OT+%S<c=-;B[_%TMEYO7$9R_G b;9WLg 6Z b;_CYOg O*'$EcCC$W TEEI<EIC$0MCTD9Wg 7O*=1V<7S V O*'$E_LWDg *7O$TE=1V<7S >V 6V $0MCTDc6 a'E*LE T *9T*$0MCTD'Y O M;Xg * b;`=6O*' =ER$O<%O*$TE$lT$S<6[`G$V+$TE9W6g 7W TC9Wg Òëæñâá ËÞñæìëðÂàìëìêæàÞëáÐìàæÞéÀìêêæððæìëãìï ¾ðæÞÞëáñåâÍÞàæãæà$GTIcIIT ÄììáäìóâïëÞëàâ ïâîòæïâðãÞæïéâäÞéãïÞêâôìïèðñåÞñÞïââëãìïàâá æêíÞïñæÞééö« $0MCTD7T* e CW$TE@S4;T`GR _=GWgD;`=G*7GO6_IGT 6S*;Sh; 9Z$c7ECTL ? TD $0MCTD¬? TD=1V<S7V$TE7TC$0MCTD'IE<EE+Z ITER$TEETD*T;$0MCTDbMCeMEYO$0MCTD 7T*e9WgCW>G$ER9<7OO*'$EbM$EEC$TEc69ET< _;YgO*+T$$0MCTDMGTD,<S<9WgCW$TE$lTM;6a9K %O*$EEC$TEcI6IDLI;$TEC¿Wæßéâ'IEER<Z7SI<9 $0MCTD>[ES<>V6-O<ERDR_IGT=1V<S7V7TC`GR ERDR_IGT$TE7EI+LO<a6D? TD$0MCTD¬? TD =1V<S7V$TE7TC$0MCTD_-;b;:ZE$V+=ER$S;-WIV7 'lTLS*g ;TD9R_<WD;$lTM;6bM<EVK9S =ER$S;-WI7V 7O* L * ETD*T;ETDGR_OW D 6_$Wg D I$S < @;S $ *T;bM ` $ LlT;S$*T;'5R$EEC$TE$lT$S<`GRL*_LEVC$TE =ER$O<:ZE$V+=ER$S;BSD6S*;Sh;<EVKS97O*$lTM;6 ITM;ID*T;9Wg_$WgDI%O*c6`$ ? TD<Z''G7O*L* %OC[GETDGR_OWD6_$WgDI$S<@;S$*T;`GR? TD=1V<S7V $TE7TC$0MCTD+R_=;>[L*%OC[G `GR_IGTb; $TEL*'YO9Z$_6YO;$ZCBT@S;:_=;7;
“C” Communication $TE$l T $S < 6[ ` G
$V+$TE9Wg6WcC_$V6%Xh;c6ODT*LC<[E5MT$O*'$E cCCW$TELYgOLTEbM$EEC$TE>[<EVMTE`GR@;S$*T; c69ET< $TELYgOLTE'YO$TE6lT_;V;$TE9Wg9lTbM_$V6 $TECWLI ;EIC¥ÍÞïñæàæíÞñæìë¦`GR$TECWLI ;c6_LWD `GRCW'ITC_=;OS;M;Xg*OS;_6WDI$S; ¥Âîòæñö Þëá Æëàéòðæóâëâðð¦ .Xg*_=;O*'=ER$O<%O*$TE$lT$S< 6[`G$V+$TE9Wg6WMGS$$TE%O* Òëæñâá ËÞñæìëð ÂàìëìêæàÞëáÐìàæÞéÀìêêæððæìëãìï¾ðæÞÞëá ñåâÍÞàæãæà M;Xg*b;7SIODT*%O*$TELYgOLTE9Wg6W'YO ¾ëëâÊòéàÞåöO6W7ÀÂÌ9Wg@GV$L8T;$TE5 %O*Õâïìõ+;=ERL<'ITCLlT_Ef+$GTIcIIT $TELYOg LTE 9WgCW=ERLV9:VBT@.Xg*_EWD$c6IT_=;LI;=ER$O<9Wg LlT'S9WgLZ6%O*'ITCLlT_Ef+b;$TE_=GWgD;`=G* $GDZ9:%O*O*'$E Àåâàèéæðñ· b'E$EEC$TE¬>[<EVMTE¬@;S$*T; _CYgOcME$TE$lT$S<6[`G$V+$TE9W6g CW 9W $Z aO$TL ODT*cEcCIT O*'$E+R$lTM;6$lTM;6$0<S7E ER_<WD<O*'$E CT7E2T;9T*+EVD:EEC ;aD<TD BTDb;O*'$E9W6g CW T$`'cM;`7MT$cCC$W TELYOg LTE +RcC_$V6$TE$lT$S<6[`G$V+$TE9W6g cW 6_GD $TELYOg LTE 'IE_$V6%Xh;a6D7GO6 `7MTb-ITcCCW$TE$lTM;6 $GDZ9: b;LI;%O*$EEC$TE`GR>[<EVMTEO*'$E 'IEb-7SI-ID.Xg*$f'YO _G%T;Z$TE<EVKS9b;$TE9lT M;T9WgLYgOLTEbM`$$EEC$TE¬>[<EVMTE_-;$TE=2C ;V_9JbM`$$EEC$TE¬>[<EVMTE9Wgc6ES<$TE`7*7Sh* bMC $TEb-`<<LlTEI+_@YgOLO<8TC'ITC_%Tb+ ETD=b;LI;%O*@;S$*T;O*'$E'IECW$TE$lTM;6 bM?T D9W_g $WDg I%O*LYOg LTE`GRDTl _EYOg *7T*e9_gW $WDg I%O* .Xg*_=;LI;M;Xg*%O*$TE$lT$S<6[`G$V+$TE9Wg6WbM`$ @;S$*T;_=;ETDc7ECTL a6D-O*9T*7T* e 9Wg O*'$ELYgOLTEBTDb; a6D7T*$S;c=`7GRO*'$E _@YgO_=;$TEDlTbM@;S$*T;c6ES<E[7GO6_IGT`GRCW 'ITCE[LX$8X*$TECWLI;EICa6D7O*LYgOLTEIT9lTcC 9Z$';8X*'IECWLI;EIC `GR>GGS@:'YOORcE9Sh* >G6W`GR>G_LWD_@ETRM;ID*T;7T*e9WgcCc6 9lT*T;_$WgDI%O*$S<*T;$0MCTDa6D7E*OT+%T6 'ITCE['ITC_%Tb+IT_M7Zb6M;ID*T;%O*7;+X*CW LI;c6LI;_LWDb;_EYgO*$TE$lT$S<6[`G$V+$TE9Wg6W
B o a r d r o o m | 37
It is regardless the perfect charter, penalty is a type of the criminal sanction impacting How to the image and standard of the Good Governance organization’s rules, code of conduct, internal policies etc., Without communication, Good of such organization. Governance is failed. A communication shall be input at all time with the communication strategy. Checklist: Company Secretary is a helper to communicate Who Directors/Legal/Compliance When Every quarter of the board of directors’ Good Governance matter to directors/executives for example the Good Governance communication meeting in orientation for the new appointed directors/exHow Lack of the legal framework is like ecutives, an annual Good Governance survey for controlling the aircraft without radar. You may crash a mountain or fall into the ocean. There is employees etc. Communication shall be the possibility to engage in the regulatory risk if conducted regularly by the assigned departments. It can be done by quarterly and in any a Bible has not been input into an organization. A-B-C is the simple formula which will be the applicable checklist for directors and executives United Nations Economic and Social Commission communication channels in order to echo Good Governance to employees. An organization shall for the last quarter of 2016 in order to implement for Asia and the Pacific states that “Good communicate why they have stake in Good governance requires fair legal frameworks that Good Governance without reinvention and Governance and what is the positive and negative are enforced impartially.” Law has a dynamic investment in the Good Governance strategy. result of Good Governance engagement. This is nature. Legal/Compliance shall propose the updated related laws and regulations quarterly to because some of business units may not have an “A” Accountability “Accountability is a key understanding how Good Governance plays an the board of directors’ meeting. It is significant requirement of good governance.” stated by United Nations Economic and Social Commission because many laws and regulations specified the important role to them. penalty to directors. In terms of the Bible, it shall for Asia and the Pacific. consisting of the laws and regulations, responsible departments, time lime to comply Checklist: Source: ”What is Good Governance?” United Nations Economic and Social Commission for and tracking period for the Legal/Compliance. Who Directors/Company secretary Asia and the Pacific “Anne Mulcahy: The Keys to For example, in the life insurance business, an When Last quarter of each year Turnaround at Xerox” Stanford Business December 1, How It is not efficient to enforce directors, insurance company is required to submit the 2004 by Lisa Vollme report re: employees’ details to the Office of executives and employees to engage in Accountability. Organizations need to have Insurance Commission. Human Resources, energy-saving tools: charters, organization’s therefore, shall submit the information to rules, code of conduct, internal policies, Compliance in order to submit to the OIC every delegation and authority policies etc. specifying February. the scope, authority and responsibilities of directors, executives and employees. Each “C” Communication Good Governance cannot organization shall have the annual tracking. It can be accomplished if there is the lack of be added as the agenda in the board of directors’ communication to directors, executives and meeting in order to let directors review and employees to acknowledge. Communication update such energy-saving tools. This is the creates “Participation” and “Equity and significant component for the Good Governance. Inclusiveness” which are the characteristics of Good Governance stated by United Nations Economic and Social Commission for Asia and “B” Bible is the package by gathering laws, regulations, notifications and policies related to the Pacific. One of the outstanding communication such organization’s business. It can be in a form role model is Anne Mulcahy, the former CEO of Xerox who engraved success history of Xerox of the manual or intranet as the checklist for Legal or Compliance to monitor if each business and said that “Effective communication was units have complied by related laws, regulations, perhaps the single most important component of notifications and policies completely and in time. the company’s successful turnaround strategy.” This will help avoiding any fine penalty and imprisonment. There may be the understanding Checklist: Who Directors/executives/employees that the minor amount of fine penalty does not When At all time impact the organization. However, the fine Stepping to the last quarter of 2016…many organizations are tight up with the corporate targets set since the early of 2016. The targets are definitely have changed according to the economic, political situation, laws and regulations. “Good Governance” as familiar component to each organization which may be overlooked. It is questionably that does each organization inject the Good Governance into their annual action plan as they set the action plan on the sale, investment etc.?
38 | B o a r d r o o m
=L<"L3AL;LAE3L=JEA L"W.QG3 K3<L<3Âą/R?L;Â´ÂˇÂˇÂťÂŹÂšĂšĂ—Ă?ĂšĂ?Ă›Ă›ÂœĂ?Ă˜Ă—ĂšĂœÂźÂ?Ă?Ă˜ĂœĂ?Ă•ĂŠĂ?ĂšÂąÂ™Ă‹ĂœĂ—ĂŠĂ?ĂšÂ´ĂşĂťÂ¸Â W2@< @:4(M3J.MÂ‘Â§Ă“Ă?Ă?Ă‰Ă‡Ă˜Ă?ĂšĂ‰ÂĽĂ‡Ă˜Ă?Ă“Ă’Â§Ă“Ă…Ă?Ă?Ă˜Ă?Ă“Ă’Â’ F!9KVF$2Z0;Y2K<. F. K2K<0Q"<Ă˝. (Thai Private Sector Collective Action Coalition Against Corruption: CAC)
Ă€ĂŹĂŻĂŻĂ˛ĂĂąĂŚĂŹĂŤĂ‘ĂŹĂ¤Ă˘ĂąĂĽĂ˘ĂŻa6D_-VÂ‰Ă?ĂŻĂŹĂŁÂŤĂ?ĂŹĂŤĂžĂŠĂĄĂ‚ÂŤ ÂżĂ˘ĂŻĂ˘ĂŤĂ&#x;Ă˘ĂŚĂŞ+T$Ă‹Ă˘Ă´Ă–ĂŹĂŻĂ¨Ă’ĂŤĂŚĂłĂ˘ĂŻĂ°ĂŚĂąĂśĂ?ĂąĂ˘ĂŻĂŤĂ?Ă ĂĽĂŹĂŹĂŠ ĂŹĂŁÂżĂ˛Ă°ĂŚĂŤĂ˘Ă°Ă°ÂžĂĄĂŞĂŚĂŤĂŚĂ°ĂąĂŻĂžĂąĂŚĂŹĂŤ_=;ĂˆĂ˘ĂśĂŤĂŹĂąĂ˘Ă°ĂĂ˘ĂžĂ¨Ă˘ĂŻ .Xg*_=;>[E[b;_EYgO*$TE<EVMTE:ZE$V+LCSDbMC`<<b- Ă‚ĂąĂĽĂŚĂ _=;_'EYgO*;lT9T*;Sh;+R7O*9lTODT*cE `GR 7O6IDĂŠĂŻÂŤĂ?ĂĽĂžĂŁĂŁĂŚĂŠĂžĂąĂĽĂ˘ĂŻ>[$O7Sh*<EVKS9Ă—ĂŚĂŽĂŚĂąĂˇĂž Ă…Ă˘ĂžĂŠĂąĂĽĂ€ĂžĂŻĂ˘Ă‰ĂŚĂŞĂŚĂąĂ˘ĂĄÂĽĂ—Ă…Ă‰ÂŚCT_GTbMLCT-V$A* b;MSI%O9Wg';c9DMGTD';DS*'V6ITcC;T+R_=;c= c6Ă…ĂŹĂ´ÂżĂ˛Ă°ĂŚĂŤĂ˘Ă°Ă°ĂƒĂŚĂ¤ĂĽĂąÂžĂ¤ĂžĂŚĂŤĂ°ĂąĂ€ĂŹĂŻĂŻĂ˛ĂĂąĂŚĂŹĂŤ ÂžĂ?Ă˘ĂžĂŠĂ‰ĂŚĂŁĂ˘Ă€ĂžĂ°Ă˘Âź<EVKS9;Wh_=;7SIODT*9Wg_6;-S6 b;$TE7O7T;$TE_EWD$ES<LV;<;+T$_+TM;T9WgES2 ;O$+T$;Whb;*T;6T;$TE<EEDTDbM'ITCE[ .Xg*_=;OZ=LEE'LlT'SÂ‰%O*$TE=ER$O<:ZE$V+ `GR _$Wg D I$S < $TE+S 6 9l T ;aD<TD`GRER<<= O *$S ; _=;9Wg9ET<$S;6WITĂ€Ă?Ă† %O*=ER_9JOV;_6WD;Sh;OD[ 'OEES=-S;`GR$TE+TDLV;<;;Sh;a'E*$TEĂ€ÂžĂ€ b;OS;6S<9Wg7lT_ $IT=ER_9Jc9D c6ES<_-VÂ‰c=<EEDTDbM'ITCE[b;ITER7T*e_-; *T;LCT'C>[IV+SD`GR>GV7_BLS-BS53ÂĽĂ?Ă?Ă‚ĂŠĂ‚ÂŚ 9Sh * ;Wh 9 T ;LTCTE87V 6 7TC$V + $EEC7 T *e b;IS;9Wg ÂŻÂł $S;DTD; `GREIC$S<LCT'C<EVKS9 %O*a'E*$TEOT9V _-g;$TE+S 6 O<ECMGS $L[7E +69R_<WD;c9D+S6LSCC;T Ă‚ĂľĂĂ˘ĂŻĂŚĂ˘ĂŤĂ Ă˘ Ă?ĂĽĂžĂŻĂŚĂŤĂ¤ ÂžĂŤĂąĂŚÂŞĂ€ĂŹĂŻĂŻĂ˛ĂĂąĂŚĂŹĂŤÂˇĂ‘ĂĽĂ˘Ă?ĂŻĂžĂ ĂąĂŚĂ ĂžĂŠĂ„Ă˛ĂŚĂĄĂ˘ÂĽÂžĂ€Ă?Ă„ÂŚ b;IS;9Wg Âś `GR ÂŻÂŽ $S;DTD; b;_EYgO*$TE+S69lT `GR Ă‚ĂąĂĽĂŚĂ ĂžĂŠ Ă‰Ă˘ĂžĂĄĂ˘ĂŻĂ°ĂĽĂŚĂ Ă?ĂŻĂŹĂ¤ĂŻĂžĂŞ ÂĽĂ‚Ă‰Ă?ÂŚ c69Wg `<<=ER_CV ; 7;_O*_@Yg O LE T *CT7E$TE7 O 7 T ; Ă´Ă´Ă´ÂŤĂąĂĽĂžĂŚÂŞĂ ĂžĂ ÂŤĂ ĂŹĂŞMEYOLO<8TC$TELCS'E_%T 'OEES=-S;`GR$TE+TDLV;<;9Sh*;Wh_;YgO*+T$CW<EVKS9 O<EC$S<'Z5BS9ETBE5ÂÂŻÂŞÂśÂ˛Â˛ÂŞÂŽÂŽÂ˛Â˛7OÂŻÂŽÂł MGTD`M*_%Tb+>V6'V6IT$TE$EO$`<<=ER_CV;bM 789 'E<+R>T;$TEES<EO*.*Xg <EVK9S 9W'g 6V _-;;WLh I ;bMÂ‰ CS$+Rc6>G7E*%TC_LCO _@ETR_;YhOLTER%O* at Quarter 3, there was a total of 733 companies _O$LTE9Wg < EV KS 9 b- O T *CS $ +RcC ` L6*bM _ Mf ; 8X * As that have declared their stance against corruption ER<<<EV M TE+S 6 $TE'ITC_LWg D *'OE ES = -S ; 9Wg _ = ; and their intention to join the Thai Private Sector E[=:EECc6_GD<EVKS9CS$MG*>V6'V6IT$TE_%WD; Collective Action Coalition Against Corruption (CAC), ;aD<TD7O7T;'OEES=-S;`GR;aD<TD$TEbMMEYO of which 360 companies were listed companies. Also, during this Quarter an additional 70 companies ES<%O*%ISÂ‰;Sh;_=;_EYgO*9Wg_@WD*@O`GI b;- I *c7ECTLLTCCW < EV KS 9 =ER$TJ _+7;TEC5 7 O 7 T ;'OE ES = -S ; _@Yg O _% T E I C$S < a'E*$TE`;IE I C=1V <S 7V % O*BT'_O$-;c9Db; $TE7O7T;$TE9Z+EV7 MEYO Ă€ÂžĂ€ +lT;I; Â´Â°Â° <EV KS 9 a6Db;+l T ;I;;Wh _ = ; <EV KS 9 +69R_<W D ;b; 7GT6MGS$9ES@D Â°ÂłÂ <EVKS9 `GRCW<EVKS9DYg; _O$LTE%OES<EO*b;EO<;WhCT$8X*Â´Â<EVKS9;S<_=; +lT;I;L[*LZ6;S<7Sh*`7$O7Sh*a'E*$TE Ă€ÂžĂ€ a6D 'T6I T ; T +RCW < EV KS 9 > T ;$TEES < EO*9Sh * MC6 =ERCT5ÂŻÂÂ<EVKS9
b;_6YO;7ZGT'CIS;9WgÂŽÂľ7ZGT'Ca'E*$TE Ă€ÂžĂ€+S6$TE=ER-ZCER6S<-T7V'ESh*9WgÂ´MSI%OMGS$ +R_;;_EYgO* Ă‚ĂąĂĽĂŚĂ ĂžĂŠ Ă‰Ă˘ĂžĂĄĂ˘ĂŻĂ°ĂĽĂŚĂÂˇ Ă€ĂŹĂŞĂ&#x;ĂžĂąĂŚĂŤĂ¤
40 | B o a r d r o o m
submitted their application, together with the associated documents, for formal CAC Certification. This is the highest total number of companies applying in any given Quarterly period ever since the CAC was established. It is expected that there
will then be approximately a total of 200 companies having received formal CAC Certification. Additionally, with regards to undertaking seminars aimed at informing and educating about establishing anti-corruption policies together with various measures to prevent corruption and bribery, the CAC was invited to present its anti-corruptionrelated knowledge and experiences on various occasions; such as: presenting at the PREME Event on 26 September, 2016; and joining the Thai Listed Companies Association in an Experience Sharing Seminar on 9 September, 2016 and on 21 September, 2016, respectively, on the procedures for undertaking a self-evaluation and assessment exercise as well as on the implementation of various measures on anti-corruption and against bribery. This is because many companies misunderstand that they will receive formal CAC Certification just only by the completing the self-evaluation forms. As such, if companies think so, then often many will
Boardroom | 36
achieve the opposite outcome and fail to pass the CAC Certification process, since the contents of the self-evaluation forms submitted often do not really demonstrate that any real and substantive systems to manage the risks of corruption occurring have been effectively implemented within their organizations. Such companies are often misled in thinking that it is sufficient enough by only just writing policies on anti-corruption or on giving/receiving gratuities. On 18 October, 2016, the CAC will hold the 7th National CAC Conference, with the main theme focusing on “Ethical Leadership: Combating Corruption Together” through inviting Prof. Ronald E. Berenbeim, from the New York University Stern School of Business Administration, to be the keynote speaker. This is because Prof. Berenbeim is a guru on modern management techniques through the use of ethics as a catalyst, as well as on how such techniques can be applied. This keynote speech will then be followed by a Mr. Shaffi Mather, founder of
Ziqitza Health Care Limited (ZHL), who will make a presentation to IOD Members on a subject that many Thais still believe to be an unachievable task namely: How Business Fight Against Corruption – A Real Life Case? This company is a uniquely positive example on how to fight against demands for bribes from government officials, which is a real obstacle or issue in conducting business. Further, it is also widely known that India’s CPI ranking is much lower than that of Thailand. Furthermore, IOD Members can follow and obtain further detailed information on the various activities of the CAC – such as, about the Anti-Corruption: The Practical Guide (ACPG) and Ethical Leadership Program (ELP) courses - by accessing www. thai-cac.com or making direct enquiries to Khun Patraporn at the IOD at Tel: 02-955-1155 Extn. 216.
Anti-Corruption in Practice
= A ;4A3X G= = K 5 %K 3 Tipping points in the private sector becoming more active in its collective collaboration to solve the issue of corruption. b;IS;;Wh Â¿Ã¬ÃžÃ¯Ã¡Ã¯Ã¬Ã¬Ãª ODT$+R_GT8X*'ITC $ T IM; T %O*a'E*$TE`;IE I C=1V <S 7V % O*BT' _O$-;c9Db;$TE7O7T;$TE9Z+EV7MEYOÃ€Â¾Ã€.Xg* _6V;M;TCTc$GCT$`GIBTDb;ERDR_IGT`'M$= ;S<+T$_EVCg $O7S*h .X*g 'ITC$TIM;T`GR>G$TE6lT_;V;*T; 9Wg_=;E[=:EEC+S<7O*c69lTbMa'E*$TE;Wh$GTD_=; 9WLg ;b++;a'E*$TE7O7T;'OEE=S -S;b;7T*=ER_9J 7O*%O_EWD;E[+T$=ERL<$TE5$TE6lT_;V;*T;`GR 'ITC$TIM;Tb;6T;$TE7O7T;9Z+EV7%O*BT' _O$-;c9D a'E*$TE Ã€Â¾Ã€ _EVgC$O7Sh*%Xh;_CYgO= Â¯Â²Â²Â° a6DLCT'C:ZE$V+9WgLlT'SÂ‰%O*=ER_9J`=6O*'$E 'YOLBTMO$TE'Tc9DLBTMO$TE'T7T*=ER_9J LCT'C<EVKS9+69R_<WD; LCT'C:;T'TEc9D LBTOZ7LTM$EEC`M*=ER_9Jc9D LBT:ZE$V+ 7GT69Z;c9DLBT:ZE$V+9O*_9WgDI`M*=ER_9Jc9D `GRL8T<S;$EEC$TE<EVK9S c9D.X*g ES<M;T9W_g G%T;Z$TE a'E*$TE `GR_=f ; `$;;l T b;$TE%S < _'GY g O ; a'E*$TE6ID b;$TE_%TEICa'E*$TEÃ€Â¾Ã€<EVKS9_O$-; LTCTE8_%TEICc6a6DLCS'Eb+cCCW$TE<S*'S<`GR cCCW'Tb-+TD6ID$TE=ER$TJ_+7;TEC57O7T; 42 | B o a r d r o o m
$TE9Z+EV7$S<Ã€Â¾Ã€`7MGS*$TE=ER$TJ_+7;TEC5 `GI<EVKS9CW@S;:R9Wg+R7O*6lT_;V;$TE_@YgObMCW $TE$lTM;6;aD<TD`;I=1V<7S V EIC8X*ER<<'I<'ZC BTDb;O*'$E_@YgO= O*$S;$TE9Z+EV7bM'E<8I; 7TC_$539Wg'5R$EEC$TE Ã€Â¾Ã€ $lTM;6 `GR 7O*bM>[7EI+LO<BTD;O$9lT$TELO<9T;ITCW $TE6lT_;V;$TEb;_EYgO*6S*$GTI+EV* @EOC9Sh*DYg; MGS$2T;DY;DS;$TE6lT_;V;$TE_@YgO=ER$O<$TE @V+TE5T%OES<$TEES<EO*+T$'5R$EEC$TEÃ€Â¾Ã€ bMc6BTDb;ERDR_IGTÂ®Âµ_6YO;
$TE_=GWg D ;`=G*bM _ $V 6 %Xh;b;IV:W$TE9lT*T;%O* ER<<ET-$TE`GR$TEbM<EV$TE%O*BT'ES2_@YOg LET* ER<<9Wg CW'ITCa=E* bL`GR=ETJ+T$$TE9Z +EV 7 'OEES=-S;OW$6ID
;S<+T$IS;`E$9Wga'E*$TEÃ€Â¾Ã€_EVgC$O7Sh*%Xh; b;_6YO;@FJ+V$TD;=Â¯Â²Â²Â°9WgCWÂ¯Â°<EVKS9_%TEIC =ER$TJ_+7;TEC5 7 O 7 T ;$TE9Z + EV 7 $S < a'E*$TE 8X*IS;;Wh +lT;I;<EVKS99Wg_%TEIC=ER$TJ _+7;TEC5c6_@VgC%Xh;_=; Â´Â°Â° <EVKS9 `GRb; +lT;I;;Wh CW Â®Â´Â´ <EVKS9 9Wgc6>T;$TEES<EO*+T$ $ER<I;$TEES<EO*%O*Ã€Â¾Ã€;W_h =;$ER<I;$TE '5R$EEC$TEÃ€Â¾Ã€ 9WCg 'W ITC_%C%;`GR8YO_=;LI;9WCg 'W ITCLlT'SÂ‰CT$ _@ETR_= ; $Gc$9Wg + R6[ ` GbM < EV KS 9 9Wg _ % T CTE I C b;+lT;I;<EVKS99WgEIC=ER$TJ_+7;TEC5 =ER$TJ_+7;TEC5CW$TE6lT_;V;$TE_@YgOIT*ER<< Â´Â°Â°<EVKS9;Sh;LI;bMÂ‰+R_=;<EVKS9%;T6bMÂ‰9WgCW = O*$S;$TE9Z+EV7BTDb;O*'$E+EV* cCb-_@WD*`' @GS*9T*_JEK2$V+L[* a6D_=;<EVKS9+69R_<WD;8X* CT=ER$TJ_+7;TEC5`GR8TDE[=9lT@WOTEa6DcC Â°Â³Â <EVKS9 .Xg*CWC[G'T7GT6EIC$S;8X*_$YO< ÂµÂ c6G*CYO9lTORcE+EV*+S*_@YgOEIC`$c%=Â‰MT$TE _=OE_.f;7%O*C[G'T7GT6EIC%O*7GT6MZ;c9D ;O$+T$;Wh $fDS*CW<EVKS9G[$%O*<EVKS9%TC-T7VOW$ 9Z+EV7'OEES=-S; MGTD`M*`GR<EVKS9%;T6$GT*`GR_Gf$OW$+lT;I; a'E*$TEÃ€Â¾Ã€;O$+T$+R_=6@Yh;9WgbM<EVKS9 CT$9Wg$ER+TDOD[b;9Z$$GZCOZ7LTM$EEC7T*@T :ZE$V+LTCTE8_%TCW<9<T9b;$TEEIC`$c%=Â‰MT $S;7<_9T_%TCT_=;`;IEIC7O7T;$TE9Z+EV7$S< 'OEE=S -S;`GIDS*9lTM;T9W_g =;7SI$GT*b;$TE=ERLT; Ã€Â¾Ã€CT$%Xh;_EYgODe 'ITCEICCYO`GRb-@GS*%O*$TEEIC7SI%S<_'GYgO;
;O$+T$'ITC;T_-YgO8YO%O*a'E*$TE Ã€Â¾Ã€ 9Wg_$V6+T$$TE<EVMTE+S6$TEODT*_=;ER<<`GR _=;CYOOT-W@`GICW+Z6_=GWgD;LlT'SÂ‰ODT*;ODLTC +Z69Wg9lTbMa'E*$TE_7V<a7`<<$TI$ERa66 `GR <EVKS9_O$-;7Yg;7SIb;$TE9Wg+R_%TCTEICI*_=; _'EYO%TDÃ€Â¾Ã€
+Z6_=GWgD;9WgLTC 'YO $TE%DTD$TE9lT:ZE$V+ODT* LROT6=GO6'OEES=-S;+T$<EVKS99Wg>T;$TEES<EO* c=L[ $ GZ C <EV KS 9 9Wg _ = ; <EV KS 9 '[ ' T bM _ % T CTE I C a'E*$TE_@YgO%DTD@Yh;9Wg:ZE$V+LROT6bM$IT*%IT* CT$%Xh; b;=++Z<S; CW<EVKS9+69R_<WD;MGTD`M* 9Wg>T;$TEES<EO*`GI`GRc67ODO6_-VÂ‰-I;<EVK9S '[' T b;MI*a.$TE>GV7%O*<EVK9S bMCT_%TEIC=ER$TJ +Z6_=GWgD;`E$'YO$TE9Wg9Z$LCT'C:ZE$V+b; _+7;TEC5$S<a'E*$TEÃ€Â¾Ã€ _@YgO%DTD_'EYO%TD BT'$TE_*V;_%TCTEICa'E*$TE`<<D$LCT'C 9S*h $TE9lT:ZE$V+LROT6bM_$V6%X;h 7GO6$ER<I;$TE>GV7 :;T'TE@T5V-D<EVK9S MGS$9ES@D<EVK9S MGS$9ES@D +S6$TE$O*9Z; <EVKS9=ER$S;BSD <EVKS9=ER$S; 7SIODT*9W;g T -Y;g -Cc6`$<EVK9S LC<[E5`O6IT;. -WIV7cCIT+R_=;:;T'TE@T5V-D <EVKS9b;:ZE$V+ _9'a;aGDW+lT$S6Â¥CMT-;Â¦9Wgc6-S$-I;<EVKS9'['T 7GT69Z;`GR:ZE$V+=ER$S;$TE9Wg:ZE$V+b;BT'$TE ÂµÂ¶<EVK9S _%TCTEIC=ER$TJ_+7;TEC5$<S a'E*$TE _*V;9Sh*MC6_%TCTEICa'E*$TEÃ€Â¾Ã€`L6*8X*$TE _CYgO7;=;Wh`GR<EVKS9<T*+T$=a7E_GWDC+lT$S6 9WgBT'$TE_*V;.Xg*_=;M;Xg*b;_LTMGS$%O*_JEK2$V+ Â¥CMT-;Â¦9Wgc6-S$-I;<EVKS9b;MI*a.$TE>GV7 c9DDOCES<`GRbM'ITCLlT'SÂ‰$S<a'E*$TE Ã€Â¾Ã€ 9Sh*MC6Â±Â®<EVKS9bM_%TEICa'E*$TEÃ€Â¾Ã€ .Xg*CWLI;ODT*CT$b;$TE-IDLET*'ITCcIIT*b+ `GR'ITC;T_-YgO8YO%O*a'E*$TEÃ€Â¾Ã€ MT$LCT-V$%O* Ã€Â¾Ã€ 9Z$<EVKS9LTCTE8 9lT7SI_=;Ã Ã¥ÃžÃ«Ã¤Ã¢ÃžÃ¤Ã¢Ã«Ã±6ID$TE@DTDTC%DTD +Z6_=GWgD;9WgLO* 'YO `E*L;S<L;Z;+T$9Sh* _'EYO%TD:ZE$V+LROT6OO$c=bM'EO<'GZC8X*'['T M;ID*T;$lT$S<6[`G;S$G*9Z;L8T<S;`GR;S$G*9Z; `GR>[CWLI;c6_LWDOYg;e%O*<EVKS9b;GS$K5R;Wh`GI ETDDOD 9WgEIC$S;>GS$6S;bM<EVKS9+69R_<WD; $f_-YgO`;IT+lT;I;<EVKS99Wg9lT:ZE$V+ODT*LROT6 CW$TE$lT$S<6[`G$V+$TE9Wg6W9Sh*b;ER6S<;aD<TD`GR `GRa=E*bL$f+R9IW'[5ODT*EI6_EfI`GR_=;$TE $TE=1V<7S V .X*g $TE=ER$O<:ZE$V+ODT*=GO6'OEE=S -S; LE T *<EE9S 6 2T;bMC b M $S < $TE9l T :Z E $V + b; $f_=;_'EYgO*-Wh6T;:EECTBV<TG%O*<EVKS99WgLlT'SÂ‰ =ER_9Jc9DbM$GTD_=;ER<<9WgcCCW@Yh;9WgbM$S< 9l T bM < EV KS 9 +69R_<W D ;7 O *bM ' ITCLl T 'S Â‰ $S < $TE9Z+EV7'OEES=-S;OW$7Oc= _EYg O *$TE7 O 7 T ;$TE9Z + EV 7 9Sh * b;ER6S < ;aD<TD `GRER6S<=1V<S7V$TE 789 b;L I ;%O*M; I D*T;$l T $S < 6[ ` GOD T * Ll T ;S $ *T;'5R$EEC$TE$l T $S < MGS $ 9ES @ D ` GR 7GT6MGS$9ES@D$fL;S<L;Z;bM<EVKS9+69R_<WD; _= 6 _>D% O C[ G _EYg O *;aD<TD`GR`;I=1V <S 7V % O* <EVKS9b;_EYgO*$TE7O7T;9Z+EV7bM;S$G*9Z;9ET< LI;LCT'CL*_LEVC>[G*9Z;c9D $fc6CWa'E*$TE OTLT@V9S$KLV9:Vk>[8YOMZ;.Xg*CW$TEL*7SI`9;c=EIC =ER-Z C >[ 8Y O MZ ; =ER+l T = % O*<EV KS 9 +69R_<W D ; 9Z $ <EV KS 9 `GRLO<8TC'5R$EEC$TE<EV KS 9 8X * 'ITC'Y<M;Tb;$TE6lT_;V;$TE_@YgO7O7T;$TE 9Z+EV7'OEES=-S;%O*<EVKS9 9Sh*`E*M;Z;+T$9T*$TE `GR`E*9I*8TC +T$;S $ G*9Z ; G I ;CW L I ;L;S < L;Z ; bM CW < EV KS 9 +69R_<WD;_%TCTEICa'E*$TEÃ€Â¾Ã€ _=;+lT;I; CT$ _@ETR$TE_=;LCT-V$Ã€Â¾Ã€ 8YO_=;$TE LYgOLTE9Wg-S6_+;9WgLZ6IT<EVKS9bM'ITCLlT'SÂ‰$S< $TE7O7T;$TE9Z+EV7`GRCW$TE6lT_;V;$TEODT* _=;E[=:EEC
Association, The Tourism Council of Thailand, and the Thai Institute of Directors Association (IOD) which also accepted the responsibilities in acting as the Secretary for the CAC and in being a core leader in driving forward the CAC initiative. For private sector companies, joining the CAC through declaring their anti-corruption intent and stance is voluntary and not compulsory, as well as costs nothing to do so. However, subsequent to the formal declaration of intent and position against corruption, the company then has obligations to determine associated tangible policies and practices, together with various operating procedures and internal controls aimed at preventing acts of corruption that are in line with the established criteria specified by the CAC Council. The companyâ€™s external Auditor must also review and certify that these policies and practices have been genuinely implemented within the organization, together with submitting documented evidence that are used to achieve formal Certification by the CACâ€™s Council within 18 months.
The formal CAC Certification procedures are stringent and considered to be an important process. This is because it is a mechanism and means to oversee as well as ensure that those companies, who have declared their stance against corruption, have genuinely established and actually implemented the required anticorruption policies and practices within the organization rather than just merely announcing their formal anti-corruption declaration as a corporate PR gesture and then do nothing else Today, the Boardroom wishes to relate to its to put into practice various genuine measures to readers about the progress that has been made by the Thailand Private Sector Collective Coalition help solve the problems of corruption. Against Corruption (or CAC), which has advanced a long way in the 6 years since its establishment. The achieved progress and tangible results have Apart from allowing and giving business companies the opportunity to actively participate attracted a lot of attention and interest, with in solving the problems of corruption, the CAC various anti-corruption organizations from overseas being keen to come and learn from the also acts as the coordinating organization for the overall collaboration and collective actions successful experiences achieved by Thailandâ€™s in driving the required changes in the working Private Sector Collective Coalition Against behaviors of civil servants within the Government Corruption. system that provide services to people, so that this system will be transparent as well as void of The Thailand Private Sector Collective Coalition any corruption. Against Corruption (or CAC) Initiative was established in 2010 by 8 key business From the very beginning of the CAC Initiative associations in Thailand, namely: The Thai in 2010, when a total of 23 companies formally Chamber of Commerce, The Joint Chambers of declared their anti-corruption intent and stance, Commerce Foreign Chamber of Commerce in Thailand, The Thai Listed Companies Association, and up to today, there has been a significant The Thai bankers Association, The Federation of increase in the number of companies that have declared their intent and stance on being against Thai Industries, The Thai Capital Markets
B o a r d r o o m | 43
Anti-Corruption in Practice
The third major change event : The fact that listed companies, which have already received formal CAC Certification, have expanded their clean business practices, that are totally void of any forms of corruption, in a widening circle to also From the total of 733 companies having declared include their business partners, through inviting their intent and position on being against them to join the CAC. This is in order to spread corruption, the majority are large corporations the overall coverage of clean business practices possessing considerable economic power and into other associated businesses. Currently, strength, consisting of 360 listed companies many listed companies, that have received formal that, combined, account for almost 80% of the CAC Certification, have increasingly invited the total ‘market cap’ value of the Stock Exchange respective business partners within their of Thailand (SET). Additionally, many Subsidiary manufacturing supply chain to become CAC Companies of major overseas or multinational Members by declaring their intent and position corporations together with many mid-size and against corruption, so as to widen the coverage small companies, spread across various industrial of the clean businesses network throughout their sectors, are also joining to become Members of As for the regulatory authorities – such as, the respective overall manufacturing process. Securities and Exchange Commission (SEC) – the CAC all the time. they have all given significant support to requiring Exemplary examples of this trend are: Somboon Advance Technology Pcl, who invited 89 associated listed companies to fully disclose to investors Apart from the credibility of the CAC, due to its businesses to join the CAC through declaring effective overall management in a systematic and their respective anti-corruption policies and their anti-corruption intent and stance at the operating practices guidelines. While the Thai professional manner, there have been at least 3 beginning of the year; and Bangchak Petroleum Investors Association (TIA) has a program to major change events - or ‘tipping points’ - that Pcl., who also invited a total of 41 companies have resulted in its breakthrough growth as well protect Shareholders rights through appointing volunteers to attend Annual General Shareholders within its manufacturing supply chain to join the as in significant active participation by private Meeting (AGM) of all listed companies, in order CAC. companies in joining the CAC Membership to address questions to their Board of Directors network. relating to the progress made in regards to their If all CAC Member companies can act as the change agent, through endeavoring to expand respective actions in fighting corruption within The first major change event: The fact that all clean business practices to include their their companies. financial services related business associations business partners, suppliers and all other have joined the CAC in their entirety – commercial involved stakeholders in their businesses in such banks, securities and asset management companies, With such active support from both the official a manner, it is believed that the overall total general insurance and life insurance companies, authorities and also from investors, this has number of companies implementing clean and resulted in many listed companies joining and as well as other companies related to banking, transparent business practices will increase securities trading, capital markets and insurance participating in the CAC, since being a CAC quickly as well as exponentially. This will then Member is the clearest indicator that the listed services. The fact that all companies within the create new high standards of business conducts company takes seriously the issues of fighting financial services sector have joined in the CAC and practices within Thailand that will not allow corruption as well as putting in actual practice is a clear indication that the financial services any room for any acts of corruption going sector, which is one of the key economic pillars associated tangible measures. forward. in Thailand, places great importance on the CAC Initiative. Thus, this is major factor in helping to build trust, confidence and overall credibility of the CAC. corruption; whereby there is now a total of 733 companies, within which a total of 177 have now received formal CAC Certification.
44 | B o a r d r o o m
The second major change event: The support and driving force given by the regulatory authorities, institutional investors and retail investors, who have all push for good corporate governance to be implemented within listed companies – both at the policy and practices levels. As such, conducting business that is totally void of any corruption is a positive and key indicator of the company’s good corporate governance practices. This has resulted in listed companies to give great importance to being against corruption – both in terms of having policies and actually implementing genuine practices.
CMč!0N^5R 3<ýDK<W>I,I<<:K<.<@"CF3 @<0<K3VN^;@J3<K;!K25R CF33J|$NW33YD: .F20N^ù
ÆÇÔÚÙ³ÊÜ¦ÚÉÎÙÔ×õØ·ÊÕÔ×Ù (Part 2)
ª>[LO<<S-WLIC<9<T9%O*>[<EVMTEb; $TELYgOLTEÇ½Éb-MEYOcC $TE`<*`D$M;T9Wg'ITCES<>V6-O<ERMIT* >[+S69lTETD*T;9T*$TE_*V;`GR>[LO<<S-WDS*'*CW 'ITC+lT_=;`GRCW'ITCLlT'SÈ¾Ê'YO_EYgO*9Wg .S < . O ;MEY O _EYg O *9Wg >[ L O<<S -W 7 O *CW $ TEb- 6ZGD@V;V+9WgLlT'Sa6D_=;_EYgO*=$7V9Wg>[LO<<S-W+R bM'ITCL;b+$S<_EYOg *9WCg 'W ITC_LWDg *9WLg 6Z b;$TE`L6* %OC[G9Wg%S67O%O_9f++EV*¥ïæðèªßÞðâáÞííïìÞàå¦ b;*<$TE_*V;6S*;Sh;È¾ÊcCb-LVg*9Wg+R96`9;MEYO _;Yg O *+T$ETD*T;%O*>[ L O<<S -W E[ = `<< _=;_EYOg *_@VCg _7VC'ITC_Mf;%O*>[< EVMTEb;*<$TE_*V; bMC;Wh_=;_EYgO*bMC%O*9SgIaG$ +X*_=;_EYgO*=$7V9Wg EIC8X * cC b - LVg * 9Wg + R= 6 - O *I T *%O*$TE_= 6 _>D +RCW'lT8TC`GR 'ITC$S*IG%O*>[9Wg_$WgDI%O* %OC[G9WgcCLC<[E5MEYO%T6MTDc= b;,<S < ;Wh L BTIV - T-W @ <S -W +X * ;l T _L;O'l T 8TC `GR%O$S*IGMGS$ e EIC9Sh*%O'V6_Mf;_$WgDI ®ª $TELYgOLTE Ç½É 7OLT:TE5R+RCW>G $S<$ER<I;$TE+S69lTETD*T;9T*$TE_*V; 9Wg'5R $ER9<7O'ITCLSC@S;:`GR$TE_+E+T`<<7E*c= $EEC$TECT7E2T;$TELO<<S-WERMIT*=ER_9J 7E*CTERMI T *>[ L O<<S -W ` GR'5R$EEC$TE ¥Æ¾¾Ð¿¦c6EI<EIC+T$$TE@[6'ZD`GR_LI;T$S< 7EI+LO<MEYOcC >[9Wg_$WgDI%O*MGTD? TDb;ER6S<LT$G_-;b;LMET- CW'ITC_=;c=c69Wg+RCW'ITC_Mf;9Wg`7$7T* OT5T+S$E _;_:OE`G;6 O_CEV$Tb7 OOL_7E_GWD $S;b;$TE_GYO$_EYgO*MEYO_;YhOMT9Wg+RLYgOLTEb;È¾Ê `GROYg;e9Wgc6CW$TE;lTETD*T;%O*>[LO<<S-W`<< `7+T$=ER_9J9Wcg 6CW $TE;lTETD*T;%O*>[L O<<S-W bMCCTb-GI*M;T`GI `<<bMCc=b-`GI @<IT'ITC_Mf;9Wg`7$7T*;Wh _$V6%Xh;cC<OD b;9T*$GS<$S; CW$TELYgOLTE9Wg_@VgC CT$%Xh ; ERMI T *>[ L O<<S -W $S < '5R$EEC$TE 7EI+LO<OS;_=;_EYgO*9Wg6W `GR9lTbM>[<EVMTE`GR b;,<S<9Wg`GILBTIV-T-W@<S-Wc6bM%OC[G >GLEZ = +T$$TE7O<`<<LO<8TC.Xg * EI<EIC %Xh;_CYgO7;=¯²²¶_$WgDI$S<$TE_=GWgD;`=G*ETD*T; %O*>[LO<<S-W`<<bMC.Xg*`L6*bM_Mf;IT8X*`CIT >[9Wg_$WgDI%O*+RDS*CW'ITC$S*IG_$WgDI$S<>G$ER9< 7OBTERM;T9Wg`GR'Tb-+TD9WgOT+_@VgC%Xh;`GR $TEETD*T;_EYgO*LlT'Sb;$TE7EI+LO<¥Èâö¾òáæñ ÊÞññâï¦ %O*>[LO<<S-W`7$fCW$TE7O<ES<9Wg6W8X* =ERaD-;9WgCW7O>[b-ETD*T;9T*$TE_*V;
46 | B o a r d r o o m
'5R$EEC$TE7EI+LO<bLb+CT$%Xh;$S<_EYgO*9Wg >[ L O<<S -W E TD*T;`GRMCTD_M7Z = ER$O< *<$TE_*V;9WEg TD*T;%O*>[L O<<S-WOT *8X*'ITC_Mf; 9W`g 7$7T*+RcC_=;=MT_CYOg >[< EVMTE '5R$EEC$TE 7EI+LO<`GR>[ L O<<S -W CW ' ITC_% T b+ IS 7 8Z = ERL*' % O*$TEETD*T;.Xg * - I D_@Vg C 'ITC a=E*bLb;_EYgO*$TE7EI+LO< `GR9Sh*LTC? TDc6 CW$TE=EX$KTMTEYO$S;ODT*7O_;YgO*_$WgDI$S< È¾Ê 7Sh*`7-I*IT*`>;`GR'5R$EEC$TE7EI+LO<c6 _Mf;ET*ETD*T;%O*>[LO<<S-W ¥ODT*;ODb;LI; È¾Ê¦a6D_EfI9WgLZ6_9T9Wg_=;c=c6 ¯ª>[LO<<S-W+R+lT$S6+lT;I; Ç½É 9W+g R LYOg LTE MEYO+RLYOg LTECT$$IT9W+g Tl _=;_@YOg MGW$_GWDg * 'ITCcC-S6_+;¤ïáßëêà©ãñáïïáà¥MEYOcC CT7E2T;$TELO<<S -W c C c 6 $l T M;6 MEY O +l T $S 6 +l T ;I;_EYg O *9Wg + RCW $ TEETD*T;_= ; È¾Ê MGTD';_-YgOIT$V+$TE+69R_<WD;b;7GT6 MGS $ 9ES @ D O D T *; O D'IECW M ;Xg * _EYg O *Ll T'S 9Wg c 6 ES<'ITCL;b++T$>[LO<<S-W`GRc6CW$TEMTEYO $S<'5R$EEC$TE7EI+LO< D$_I;b;<T*$E5W 9Wg $V + $TE+69R_<W D ;b;7GT6MGS $ 9ES @ D CW $ TE =ER$O<:Z E $V + 9Wg +l T $S 6 CT$`GR>[ L O<<S -W O T+ _Mf;ITcCCW È¾Ê 9Sh*;Wh@<IT'T_,GWgD%O*+lT;I; È¾ÊOD[E RMIT*¯ª³_EYOg *`GRcC@<ITCW$TE_%WD; ETD*T;`<<_DV;g _DOMEYOEIC_EYOg *9Wcg C'IE_=;È¾Ê
Â°ÂŞ>[ L O<<S Â‰ -W + R+S 6 $TE$S < _EYg O *9Wg CW ;S D Ll T 'S Â‰ 9Wg $V + $TEOT++RcC _ 'D_= 6 _>D7 O LT:TE5R-;ODT*cE +Z6=ERL*'a6DEIC%O*$TELYgOLTEĂˆÂžĂŠ'YO $TEbM'ITCa=E*bLCT$%Xh;7O>[b-ETD*T;$TE >[LO<<SÂ‰-W 6S*;Sh;_EYgO*9Wg_%T_*YgO;c%'lT;VDTC%O* ĂˆÂžĂŠ 7O*;lTCTEICOD[b;ETD*T;%O*>[LO<<SÂ‰-W _I;`7+RCW$1MCTDMEYOER_<WD<%O<S*'S<MTC_=6 _>D_EYgO*6S*$GTI7OLT:TE5R MEYO>[LO<<SÂ‰-W _Mf;ITcC'IELYgOLTE_EYgO*6S*$GTI_@ETR>G%O* $TELYgOLTE+R9lTbM_$V6>G$ER9<b;9T*G<`GRcC 'ZC $S<=ERaD-;9LgW T:TE5R+Rc6E<S +T$$TE_=6_>D _EYOg *6S*$GTIÂĽ.X*g _=;L8T;$TE59_gW =;c=c6DT$CT$ÂŚ $TE7S6LV;b+%O*>[LO<<SÂ‰-W9Wg+RcCLYgOLTE_EYgO*9Wg CW'ITCGR_OWD6OO;'IE@V+TE5T<;%O_9f++EV* L8T;$TE5 `GR$TEMTEYO$S<>[<EVMTE `GR'5R $EEC$TE7EI+LO<
>[G*9Z;b;ETD*T;9T*$TE_*V;%O*$V+$TE`GR$TE LO<<SÂ‰-W.Xg*_=;$TE_@VgC'Z5'TbM$S<$ER<I;$TE $TE+S69lTETD*T;9T*$TE_*V;ODT*`9+EV*
ÂłÂŞETD*T;%O*>[ L O<<S Â‰ -W ` <<bMC + R 9l T bM 7 O *b- _ IGT`GRCW 7 ; 9Z ; b;$TELO<<S Â‰ -W `GR$ER<I;$TE+S69lTETD*T;9T*$TE_*V;_@VgC%Xh; ODT*CT$MEYOcC b;=`E$%O*$TE_=GWDg ;`=G*'*=1V_L:cCc6IT +RCW7;9Z;_@VgCCT$%Xh;ODT*cE$f7TC+T$MGS$2T; _-V*=ER+S$Kb;LMET-OT5T+S$E`GR=ER_9JOYg;e `L6*bM_Mf;IT7;9Z;9W_g @VCg %X;h ÂĽ8TCWÂŚ;S;h _=;+lT;I; 9Wg ; O D`GRLTCTE8<EV M TE+S 6 $TEc6 O D T *CW =ERLV9:V>G`GRb;_$YO<9Z$$E5W%O*$TE7EI+LO< G[$'TETD_6VC>[L O<<SÂ‰-WLTCTE8L*LSÂ‰Â‰T5GI*M;T bM ' 5R$EEC$TE7EI+LO<9ET<I T _EYg O *b6CW `;Ia;C9Wg+R8[$LYgOLTEb; ĂˆÂžĂŠ.Xg*+R9lTbMLTCTE 8MTEYO$S<'5R$EEC$TE7EI+LO<`GR>[<EVMTEc6 ÂąÂŞb;9WgLZ6Ă‡Â˝Ă‰+R8[$ETD*T;6ID%O'ITC GI*M;T 9Wg.lT_6VC Â¤ĂžĂŤĂĽĂ¨ĂĄĂŽĂŹĂ¨Ă?Ă°ĂĄ Ă¨Ă?ĂŞĂŁĂąĂ?ĂŁĂĄÂĽ b;=7Oec= Â´ÂŞCW ' ITC_-Yg O CaD*ERMI T *ETD*T;%O* MEYOcC .V7WhEW_.VE-c6ER<Z8X*ETD*T;%O*>[LO<<SÂ‰-W >[L O<<SÂ‰-W`<<bMC$<S 'Z5BT@$TELO<<SÂ‰-WMEYOcC -I*=ÂŻÂ˛Â˛Â´ÂŞÂŻÂ˛Â˛Âľ%O*LMET-OT5T+S$E.Xg*=++Z<S; $TEER<Z M EY O IS 6 >G$ER9<I T ETD*T;%O* _=;=9Wg Â° `GI9WgCW$TE_%WD;ETD*T; ĂˆÂžĂŠ IT8X* >[ L O<<S Â‰ -W ` <<bMC ` L6*8X * 'Z 5 BT@$TELO< `C+RDS*'*CWLVg*9Wg+R7O*=ES<=EZ* b;BT@EIC <SÂ‰-W_=;$TEDT$`GR.S<.O;>[LO<<SÂ‰-WLI;bMÂ‰ 'Z 5 BT@%O*ETD*T;%O*>[ L O<<S Â‰ -W b ;= ;Wh CW OT++RcCc6=1V<7S V*T;`7$7T*c=+T$9W_g 'D9lTb;= $TE@S4;Tc=CT$$TE_%WD;8X*_EYOg *'ITC_LWDg *9SIg c= $O;eODT*CT$`7`;;O;IT+R9lTbM>[L O<<SÂ‰-W G6G* `GRb;MGTDe'ES*h CW$TEbM%O C[GETDGR_OWD6 c6$GS<CT8TC7;_O*IT$TE=0V<S7V*T;7EI+LO< `GR$ER6TK9lT$TE9Wg_$WgDI%O*;Sh;LO6'GO*$S< 9Wg_,@TR_+TR+*_@VgC%Xh; LVg*9Wg7;c6ETD*T;7O>[b-*<$TE_*V;MEYOcC Â˛ÂŞ b;=ER_9J9WgCW$TEb-ETD*T;%O*>[LO< <SÂ‰-W`<<bMC`GICW>G7O<ES<_=;ODT*cE<T* LEZ= +T$$TEL;9;T$S<>[9Wg_$WgDI%O*%O*=ER_9J ĂˆÂžĂŠ_=;LVg*9Wg>[LO<<SÂ‰-W7O*$TE_;;bM>[b- 9WgCW$TEb-ETD*T;%O*>[LO<<SÂ‰-W`<<bMC @<IT *<$TE_*V ; 9ET<8X * _EYg O *9Wg CW ' ITCLl T 'S Â‰ %O* CW>G$TE7O<ES<'O;%T*6W D$7SIODT*_-;b; *<$TE_*V;9Wg>[LO<<SÂ‰-WbM'ITCL;b+CT$9WgLZ6 LMET-OT5T+S$ELCT'C$TE+S6$TEG*9Z;ÂĽĂ†ĂŤĂłĂ˘Ă°ĂąĂŞĂ˘ĂŤĂą >[ L O<<S Â‰ -W 7 O *MTEY O $S < >[ < EV M TE`GR'5R ĂŠĂžĂŤĂžĂ¤Ă˘ĂŞĂ˘ĂŤĂą ÂžĂ°Ă°ĂŹĂ ĂŚĂžĂąĂŚĂŹĂŤÂŚ CW$TEbMET*ISG`$ $EEC$TE7EI+LO<$O;`7_;Vg;e _@YgOLET*'ITC ETD*T;%O*>[ L O<<S Â‰ -W 9Wg b M % O C[ G _-V * GX $ 9Wg _ = ; _%Tb+`GRG6'ITC_Mf;9Wg`7$7T*9Sh*;WhLBTIV-T-W@ =ERaD-;`GRCW;IS7$EEC9Wg6W9WgLZ6;S<IT$TELYgOLTE <SÂ‰-W+Rc67V67TC@S4;T$TE_MGT;Whb;_-V*$TE;lT %O*>[ L O<<S Â‰ -W _ = ; $TE_@Vg C 'ITC_-Yg O CSg ; %O* c==0V<S7Vb-_@YgO9Wg+R9lTbMETD*T;$TELO<<SÂ‰-WCW 'Z5'TOS;+R_=;=ERaD-;7O>[b-*<$TE_*V;7Oc=
In the recent article, we, FAP, have shared with you the information, gathered at the beginning of 2016, about concerns and questions raised about changes in the new auditorâ€™s report. Although there were still some concerns on additional responsibilities and costs and the disclosure of the Key Audit Matter (KAM) the overall feedback obtained was generally positive on the benefits of users. As the extended auditorâ€™s report is new to most countries using ISA, it is common that parties will have questions and concerns. IAASB issued a publication on 9 April 2016 about questions, main concerns on the new auditorâ€™s report that were gathered from discussions with various international stakeholders in the countries where the new report were implemented such as UK, Netherland, South Africa and Australia. You can access the full article via the below link. https://www.iaasb.org/system/files/publications/files/IAASB-KAM-Publication-for-AuditCommittees-and-Finance-Executives_0.pdf
Â?ÂşnÂŤÂšĂ ÂŠÂŤÂłÂ˘ÂłÂ¤Â—ÂŽmÂłÂšÂ›Â˜Â†Â¨ÂłÂ˘Â‹Â›Â˛Â›ÂžÂ–Ă…Â˘Ă‚Â•nÂ˜ÂśĂ† KWWSVZZZLDDVERUJV\VWHPILOHVSXEOLFDWLRQVILOHV,$$6% .$03XEOLFDWLRQIRU$XGLW&RPPLWWHHVDQG)LQDQFH([HFXWLYHVBSGI ÂżÂŚÂąÂžÂ?ÂŁÂżÂ&#x;Â¤mĂ€Â•ÂŁ,$$6% ÂžÂ˘Â¸Ă†ÂŽÂ¨Â˛ÂšÂ˜ÂśĂ† ÂžÂ˘ÂŞÂłÂŁÂš B o a r d r o o m | 47
ÂżĂŹĂžĂŻĂĄĂŻĂŹĂŹĂŞ ,<S<;Wh_ET;lT_L;O_EYgO*ĂŠĂžĂŤĂžĂ¤ĂŚĂŤĂ¤Ă‘Ă˘Ă ĂĽĂŤĂŹĂŠĂŹĂ¤ĂśÂŁĂ ĂŚĂ°ĂŻĂ˛ĂĂąĂŚĂŹĂŤ b;'OGSC; ÂżĂŹĂžĂŻĂĄĂ?Ă˘ĂłĂŚĂ˘Ă´ +X*ODT$`;R;lT M;S*LYOÂŻ _GC9Wg _$WgDI%O*$S<_EYgO*_9'a;aGDWbM9Z$9T;c6OT; 'YOĂ?Ă˛ĂĂ˘ĂŻĂŚĂŤĂąĂ˘ĂŠĂŠĂŚĂ¤Ă˘ĂŤĂ Ă˘ÂˇĂ?ĂžĂąĂĽĂ°ÂŠĂ ĂžĂŤĂ¤Ă˘ĂŻĂ°ÂŠĂ?ĂąĂŻĂžĂąĂ˘Ă¤ĂŚĂ˘Ă° a6DĂ‹ĂŚĂ Ă¨ÂżĂŹĂ°ĂąĂŻĂŹĂŞ `GRĂ?ĂŚĂ°Ă˘ĂŹĂŁĂąĂĽĂ˘Ă?ĂŹĂ&#x;ĂŹĂąĂ°Âˇ Ă‘Ă˘Ă ĂĽĂŤĂŹĂŠĂŹĂ¤ĂśĂžĂŤĂĄĂąĂĽĂ˘Ă‘ĂĽĂŻĂ˘ĂžĂąĂŹĂŁĂžĂ‡ĂŹĂ&#x;ĂŠĂ˘Ă°Ă°ĂƒĂ˛ĂąĂ˛ĂŻĂ˘a6DĂŠĂžĂŻĂąĂŚĂŤĂƒĂŹĂŻĂĄ9Wg'Z5=EVÂ‰Â‰TMOC_O;$`GR'Z59E*DJ'S;:CT;;9ÂŻIV9DT$Eb;*T;Ă†ĂŒĂ Ă ĂŚĂŻĂ˘Ă ĂąĂŹĂŻÂżĂŻĂŚĂ˘ĂŁĂŚĂŤĂ¤ÂąÂŹÂŻÂÂŽÂłc6`;R;lTbMOT;_@YgO9Wg+R_EWD;E[_@YgObM@EOCES<CYO$S<BSD'Z$'TC9WgOT++R_$V6%Xh;+T$_9'a;aGDWb;O;T'7 As in this Boardroom we present the topic of Managing Technology & Disruption, therefore in this column we want to recommend 2 books which are Superintelligence: Paths, Dangers, Strategies and Rise of the Robots: Technology and the Threat of a Jobless Future that two speakers in IOD Director Briefing 4/2016 Mr. Prinya Hom-anek and Mr. Songyot Kanthamanon recommended for understanding and be ready to managing technology & disruption.
2TODQHMSDKKHFDMBD Paths, Dangers, Strategies by Nick Bostrom
M;S*LYO_GC;W7h *Sh 'lT8TCcIIT +R_$V6ORcE%X;h 8T _'EYOg *+S$E_$*$ITC;ZKD =Â‰Â‰T=ER6VK2+R-ID_MGYOC;ZKDMEYO+R9lTGTDC;ZKD$S;`;;V'<OL7EOC c6O:V<TDLET*'ITC_%Tb+_EYgO*@Yh;2T;%O*C;ZKD `GR L7V=Â‰Â‰Tb;$TEb- -WIV7b;O;T'7 ITLCO*C;ZKDCW'ITCLTCTE8<T*ODT*9WgLS7IcCCW .Xg*_=; LVg*9Wg`<*`D$'ITCLTCTE89Wg_M;YO$IT%O*C;ZKD `GR8T_$V6IT_'EYgO*+S$E _$*$ITC;ZKDODT*9Wg_EWD$ITĂ?Ă˛ĂĂ˘ĂŻĂŚĂŤĂąĂ˘ĂŠĂŠĂŚĂ¤Ă˘ĂŤĂ Ă˘+R9lTbM_$V6OlT;T+ODT* CMTJTG_$V;$IT9WgC;ZKD_ET+RLTCTE8'I<'ZCc6 C;ZKD+R_=;_MCYO; $OGVGT9Wg8[$_'EYgO*+S$E$lTM;6-R7T-WIV7cI6S*;Sh;_CYgO_ETDS*CW'ITCc6_=EWD< 9Wg+R_=GWgD;`=G*`GR'I<'ZCc6$O;_ET7O*_EVgCG*CYO_6WjDI;Wh Superintelligence asks the questions: what happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful possibly beyond our control. As the fate of the gorillas now depends more on humans than on the species itself, so would the fate of humankind depend on the actions of the machine superintelligence. But we have one advantage: we get to make the first move. Source : https://www.amazon.com/Superintelligence-Dangers-Strategies-Nick-Bostrom/ dp/1501227742
48 | B o a r d r o o m
Rise of the Robots:
Technology and the Threat of a Jobless Future by Martin Ford
*T;b;O;T'7'YOORcE CW7lT`M;**T;CT$@OLlTMES<9Z$';MEYOcC `GRb'E+R _=;>[9Wg8[$_GYO$ _ETOT+'V6`GR'T6MIS*IT+RCW$TE=1VIS7VOZ7LTM$EEC_,$_-;b;O6W7 8X*`CIT*T;<T*=ER_B9+RMTDc= `7DS*CWOW$MGT$MGTD*T;9Wg_$V6%Xh;bMC _@YgOEO*ES< ;IS7$EECb;O;T'7CTE7V;AOE6>[$O7Sh*Ă?ĂŚĂŠĂŚĂ ĂŹĂŤĂ“ĂžĂŠĂŠĂ˘Ăś`D*IT=Â‰MT9Wg_$V6%Xh;cCc6 OD[9 $gW TE_@VCg %X;h %O*+lT;I;MZ; D;7`7_=;_@ETR_9'a;aGDW9@gW 4S ;T%X;h CW$TE;lT_'EYOg *+S$E CT9lT*T;`9;9WgC;ZKD`GR>GV7>G*T;c66W$IT*T;9WgGTLCSD_-;9;TD;S$%TI@;S$*T; OOAAJMEYO`C`7;$S _%WD;a=E`$EC'OC@VI_7OE+R8[$`9;9W6g I DMZ; D;7`GRa=E`$EC 9Wg9S;LCSD$IT9lTbM*T;%O*>[b-`E**T;`GR>[9Wg9lT*T;b;LlT;S$*T;+R8[$<W<`GR'ODe MTDc=`CITLO*:ZE$V+bMÂ‰'YO:ZE$V+9T*$TEJX$KT`GR9T*$TE`@9DDS*MT*c$G+T$ $TEBSD'Z$'TC_MGT;S;h `7>G$ER9<9W_g $V6%X;h +T$$TE_@VCg %X;h %O*MZ; D;7'OY $TEIT**T; +lT;I;CT$`GR'ITCcC_LCOBT'L*>GbM_$V6>G$ER9<ODT*bMÂ‰MGI*7O_JEK2$V+ aG$ CTE7V; AOE6 O:V<TDb;M;S*LYO_GC;WhIT ORcE9lTbM_'EYgO*+S$E-TÂ‰,GT6`GR MZ;D;7=ERL<'ITCLlT_Ef+EICc=8X*$TE_EWD$EO*%O*@;S$*T;;S$IV-T$TE';IT*`>; ;aD<TD`GR+R_>-VÂ‰M;T$S<LVg*_MGT;Sh;ODT*cE What are the jobs of the future? How many will there be? And who will have them? We might imagineâ€”and hopeâ€”that todayâ€™s industrial revolution will unfold like the last: even as some jobs are eliminated, more will be created to deal with the new innovations of a new era. In Rise of the Robots, Silicon Valley entrepreneur Martin Ford argues that this is absolutely not the case. As technology continues to accelerate and machines begin taking care of themselves, fewer people will be necessary. Artificial intelligence is already well on its way to making â€œgood jobsâ€? obsolete: many paralegals, journalists, office workers, and even computer programmers are poised to be replaced by robots and smart software. As progress continues, blue and white collar jobs alike will evaporate, squeezing working- and middle-class families ever further. At the same time, households are under assault from exploding costs, especially from the two major industriesâ€”education and health careâ€”that, so far, have not been transformed by information technology. The result could well be massive unemployment and inequality as well as the implosion of the consumer economy itself. In Rise of the Robots, Ford details what machine intelligence and robotics can accomplish, and implores employers, scholars, and policy makers alike to face the implications. Source: http://www.goodreads.com/book/show/22928874-rise-of-the-robots
B o a r d r o o m | 49
_Df;IS;9WgÂł7ZGT'C9T*Ă†ĂŒĂ c6+6S *T;CO<=ER$TJ;WD<S7E bMh `$g> [ h> g T;MGS $L[ 7EMGS$L[ 7E Ă ĂŚĂŻĂ˘Ă ĂąĂŹĂŻ Ă€Ă˘ĂŻĂąĂŚĂŁĂŚĂ ĂžĂąĂ˘ Ă?ĂŻĂŹĂ¤ĂŻĂžĂŞ ÂĽĂ Ă€Ă?ÂŚ EZ; ÂŻÂŻÂ ÂŻÂŻÂą 5 MO* ÂżĂžĂŠĂŠĂŻĂŹĂŹĂŞ aE*`EC_E_;.O*LET-=ERL*'`CA T?;+R7$$ERM;lT_ `7$f DS*CW>[CTEIC*T;_=;+lT;I;CT$ _%TCTb;*T;+RCW.ZCBT@ 9W_g ET`O<8TDcIb;ERMIT*9WOg <EC$S;b;`7GREZ; .X*g >[E I C*T; LTCTE87V6CYO_OT$GS<<T;c6@EOC9Sh*CWÂżĂžĂ Ă¨ĂĄĂŻĂŹĂ`GR CZC8TDE[=<OGG[;Ă Ă€Ă? $S<a.AT`6*9Wg >[EIC*T;LTCTE8 8TDc=Ă˛ĂĂŠĂŹĂžĂĄĂ°ĂŹĂ ĂŚĂžĂŠc=c6ODT*L;Z$L;T;
ÂŽÂ?ÂšÂ´Â´ĂşÂąÂ´Â´Âś In the evening of 6 October, Institute of Directors (IOD) organized the Award Presentation Event for the participants of the Director Certificate Program (DCP 220-224) at the Renaissance Bangkok Ratchaprasong Hotel. During the event, photo boards were organized for the participants to post photos and take them home. In addition, there was a photo corner containing photos taken during the class, which participants could also take home. Another area was set aside for DCP alumni to take photos with friends. The event also included some enjoyable performances given by DCP alumni. One that received a lot of laughs was presented by DCP alumni children; it dealt with corporate governance. The evening concluded with presentations of certificates to the recently graduated DCP participants and some group photos.
Director Diploma Examination 50/2016 Ă ĂŻÂŤĂ?Ă˛ĂŤĂ˘ĂąĂŻĂžĂ?ĂžĂ˘ĂŤĂ¤ĂŻĂžĂąĂžĂŤĂžĂ¨Ă˛ĂŠ ĂŠĂŻÂŤĂ?Ă˛ĂĂžĂ ĂĽĂžĂŚĂ?Ă˛Ă¨ĂžĂŤĂ§ĂžĂŤĂžĂĂŹĂŻĂŤ ĂŠĂŻĂ°ÂŤĂ?Ă˛ĂĂžĂŻĂžĂŤĂžĂŤĂ‘ĂžĂŤĂłĂŚĂŻĂ˛Ă ĂĽ ĂŠĂŻÂŤĂ‘ĂĽĂžĂŤĂžĂ´ĂžĂąĂ‰Ă˘ĂŻĂąĂ´ĂžĂąĂąĂžĂŤĂžĂŻĂžĂ¨
50 | B o a r d r o o m
BTDb;*T;IS;;Sh;DS*CW$TE`L6*+T$9Z$EZ; 9Sh*EO* _7;_G;6;7EW .Xg*LET*'ITCL;Z$L;T;_=;ODT*CT$a6D _,@TR$TE`L6*+T$_DTI-; G[$MGT;%O*>[>T;MGS$L[7E Ă Ă€Ă? BT'BTKTOS*$FK 9Wg%Xh;CT`L6* EO*=ERLT;_LWD* `GRDS*CW$TE`L6*9Wg'V6Ă ĂŹĂŤĂ Ă˘ĂĂąCTODT*6Wb;$TELET*Ă€Ă„ Ă€Ă˛ĂŠĂąĂ˛ĂŻĂ˘_@YgO';EZ;MGS*LET*'ITC6W*TC_@YgO_6f$e.Xg*LET* EODDVhC`GR_EWD$_LWD*MSI_ETRbM`$>[-C_=;ODT*CT$`GR =69TD6ID$TE8TDE[=MC[$S;b;`7GREZ; .Xg*9T;LTCTE8 -C<EEDT$TJ_MGT;Sh;b;'OGSC;;Wh
Director Certification Program 220/2016 ;TD $V7V@S4;-GIZ4V ;ÂŤLÂŤ +E[Â‰JEWIS;_$V6>G ;TD ,S7E-SD9W=LZIEE5 ;TD -GIV9DLZ%OZ6C ;T* 5F6W+S;9E`+C+ESL 6EÂŤ _6;-SDOS'E_6-_6-T-SD ;TD 6OG<ZÂ‰CSg; ;TD :lTE*'+ZDOV;9E ;T* <ZÂ‰3V$T:WERaE+;@*K ;TD =ERIV;9E'ZaEIT9
;ÂŤLÂŤ =9C$E<[E5LV; ;TD @*JBS'+V;6TLC<S7V_+EVÂ‰ ;TD @*KES7;_MGYO*:lTE*_+EVÂ‰ ;ÂŤLÂŤ @EE5;WD7S;L8TIWES2 ;TD @GJS$6Vk_+EVÂ‰JVEV ;TD @Z9:V;S;9`=G*$[G ;TD aE+;_CYO*'EZ: ;TD IELV9:VkGWGT<[E5@*J ;T* JJV:ELTCS''W ;TD JVEV@S4;*TCI*Jc@ES-
;TD LC@E:WERaE+;@*K ;TD LCJS$6VkMCCI* ;TD LISL6VkOSJ6TE5 @GÂŤ7ÂŤ7ÂŤ LS;7VIV+S$%5T ;TD LTaE+;@Z9::EECI*J ;TD LZE;T8$V77VES7;_6;TD LZEJS$6Vkc$EIV9D-SD_+EVÂ‰ ;ÂŤLÂŤ MF9SD@*KIV9DBT;Z
Director Certification Program 221/2016 ;TD aONTE=Z D@S;:I*J ;T* $;$ISGDIEE5<Z7E ;«L« $;$OEOXh*LCEE8a$KT ;TD $V77V@*KOSJI@V-D;7 ;TD +S$EES2_GVJaOBTL ;TD +VEIS4;;ZEV7T;;9 ;TD +ZC@GEVCLT'E ;TD -T-SD-SD=ERLV9:Vk ;«L« 5T5W_>YO$%lT ;TD 9E*JS$6VkcIDES-@T;V-
;TD 9IV-:;R-T;S;9 ;T* ;9W-I;L;V9 >J« ;@«IVJVK0ITCIT5V-D ;TD ;BTJS$6Vka'7EIV<[GD ;TD =ET$TE'Za59SD ;«L« =EWDT;Z-LTDR_LIW ;TD =T,TDR+V;6TI*J ;TD @-EO;S;7JVG= ;TD @EOC@*K*TC6lTE*' ;«L« @S9:M9SD$ZG+S;9E
;«O« @V-_D;9E7S;=ER_LEV2 ;«L« BS9-E6TJEWOV;9ETIT;V;TD BT;ZIS4;>*LZIEE5$ZG ;T* CE$7$ZG:EECaD:V; ;TD IV9DT-SD_-V6-[$V+ @G«E«9«IV@T$K;OD+V;6T ;T* LEETOD[a@:Vk ;TD LT'EV;9E7S*'RI-VET;;9 @G«E«9«LZ-W@MIS*cC7EW @G«O«@*J:E,TD$lT_M;V6
Director Certification Program 222/2016 Êï«ÀåÞæñÞñÐÞâñÞëä Êï«ÀåÞïëÐïæóæèìïë Êï«ÀåïæðñìíåâïÀåæñÑòë Êïð«ÀðæééÞÈìåÞéêæªÊìëãæéð Êï«Äïâäìïö¾ëáïâôÔåæñâ Êï«ÅâëëæëäÅÞòäâïòáßïÞñâë Êï«ÇÞêâð¾«ÈÞíéÞë
Êï«ÇâÞëªÉìòæðÄïÞæëáìïäâ Êð«ÈåæëâÈåæëâËôâ Êð«ÈæêÀåÞôðòÄöæ Êð«ÊâéæëáÞÑòë Êïð«ÊìëñÞëÞÍìïëíòëöÞéâïñ Áï«ËæôâñÑåÞêêÞ Êï«ÍâñâïÔÞÞäâëðâë
Êï«ÍåæíåÞñÓìïÞíæíÞñ Êï«ÍæàåÞæÀåòâëðòèðÞôÞáæ Êï«ÐæêìëÁÞóæá¾éâõÞëáâï¾èâïìöá Êï«ÑÞèÞðåæÈòïìêâ Êï«ÑåÞáÞÀåÞëíïÞðæñ Êð«Ñåò÷ÞïÔæë Êð«ÔÞåÔÞåÊæë B o a r d r o o m | 51
Director Certification Program 223/2016 ;TD _+EVÂ‰+ZEW$T;;9 ;TD _9O6_$WDE7V@EOCC[G ;T* +S;9;$R@O6VL$ZG ;TD -T7V-TDaE+;ES7;T*$[E ;T* -ZGWJZBIEE:;R$ZG ;T* 5S2:;SÂ‰7ER$[G_EYO*aE+; ;Â«LÂ« 7I*@E@RI*>G ;TD ;E_-K2`L*EZ+V ;Â«LÂ« ;T7DTOZDIVES@Â«OÂ« ;VCV77LZIEE5ES2 ;Â«LÂ« =5TGWIV_JKLZIEE5
Director Certification Program 224/2016 ;T* aLCLZ6T7S;+S;9E@*J ;Â«LÂ« %S77VDTOV;9EIV-SD ;TD +VER@GMVESÂ‰ES7; ;TD 6G_M7ER$[G ;TD 8TIE*TC$;$IEE5 ;TD 9IW@*KIV-SD6VK2 >JÂ«6EÂ«:;IEE:;@GIV-SD JÂ«6EÂ«;FCGLOT6a,C ;TD <ZÂ‰-SDCMT9ES@DLVEV ;TD BIESÂ‰-;OZ6CJVEV ;T* ES-;W_@fÂ‰OXi*BT$E5 ;T* ES7;TO;ZBTL;S;9 ;T* _EWDCIVL[7ET;Z$[G 6EÂ« I_EJETIWERIS4; @GÂ«7Â«7Â«IV-SDLS*%=ERc@
52 | B o a r d r o o m
;TD IVIS4;-TÂ‰_-V*@T;V;TD IVLZ9:Vk@[;JVEV ;TD IWER@S;:ZIE@S;: ;TD JES5DLSCF9:Vk_6-%+E ;TD JZB-SDIV;V+$ZG-SD ;TD LC_$WDE7V_GVJF9:VkB[I6G 6EÂ« LC@EIO*IZ4V@E-SD ;TD LS;7VI*JJVEV$ZG ;TD LZ%LS;7DJRLV;:Z @Â«9Â« M;Z;JS;L;T'C ;TD O*'$TEJEWIV+V7E @GÂ«7Â«9Â«O7V_9@=Â‰+CT;;9 ;T* OEO;*'IV--Z-TÂ‰ 6EÂ« _O$@*K7Sh*JEWL*I; ;TD _O$IS4;@VEVDRIEL$ZG
;TD =ERaD-;LZ%JEW$TE ;T* =ERETGWES7;=ERLT9@E ;TD >D*JEWI5V;TD @*J:E9IWLV; ;TD BT5Z_6-M*L$ZG ;TD CTa;-Â‰CS-/VCTIEE5 EJÂ«6EÂ«DJJS$6Vka$cJD$T;;9 ;TD IS-ER,S7EIVEVDR ;TD JEJS$6Vk`L;LC<S7V @Â«7Â«OÂ«JS$6VkE@W_@WDI@;V;Â«LÂ« JZBIEE58;OC_$WDE7VB[CV
;TD LC-TDOX*@V9S$K@S;:Z ;T* LCE_9V6:EEC@V<[G ;TD LCMCTD9SJ;SD 6EÂ« LS52V7V7EW9V@D<Z7E ;Â«LÂ« LZ6F6W_GVJ_$KC ;TD LZ:WE_@-EaGMR$ZG ;Â«LÂ« LZBT@E'5T9ES@D ;TD LZELV9:Vk9O*+S;9E ;Â«LÂ« O;ZK2T_-TIIVJVK2
Áï«ÉÞßåÞÔÞñàåÞïÞðïæïìç© Íïâðæáâëñ ìã Àåæâã ÂëñâïñÞæëêâëñ Ìããæàâï¥ÀÂÌ¦Äïìòí
B o a r d r o o m | 53
Experiences Sharing of CAC Certification Process
IS;9WgÂś$S;DTD;9Wg>T;CT9T*L8T<S;$EEC$TE <EVK9S c9Db;2T;R_G%T;Z$TEa'E*$TE`;IEIC=1V<7S V %O*BT'_O$-;c9Db;$TE7 O 7 T ;$TE9Z + EV 7 ÂĽĂ€ÂžĂ€ÂŚc6EIC$S<LCT'C<EVKS9c9D+69R_<WD;c9D b;$TE+S6LSCC;TĂ‚ĂľĂĂ˘ĂŻĂŚĂ˘ĂŤĂ Ă˘Ă°Ă?ĂĽĂžĂŻĂŚĂŤĂ¤ĂŹĂŁĂ€ÂžĂ€ Ă€Ă˘ĂŻĂąĂŚĂŁĂŚĂ ĂžĂąĂŚĂŹĂŤĂ?ĂŻĂŹĂ Ă˘Ă°Ă°_@YgObM'ITC_%Tb+_$WgDI$S< _EYgO*$TE=ER_CV;'ITC_LWgD*6T;'OEES=-S; `GR _EYgO*OYg;e9Wg_$WgDI%O*$S<$ER<I;$TEES<EO*EIC9Sh* $TE+S69lT_;YhOMTMEYO7SIODT*_O$LTE7T*e9WgDS*CW 'ITC_%Tb+'GT6_'GYOg ;OD[ b;*T;;W_h ETc6E<S _$WDE7V +T$IV9DT$EÂŻ9T;c6`$'Z5$ZG_I-_+;IS4;IV9D 9Wg=EX$KTa'E*$TEĂ€ÂžĂ€`GR'Z5O;ZIS4;+*DV;6W >[O Tl ;ID$TELlT;S$*T;7EI+LO<<EVK9S =[;.V_C;7c9D +lT$S6ÂĽCMT-;ÂŚCTEIC<EEDTD`GR7O<%O.S$8TC 7T*e +T$>[_%TEICLSCC;T .Xg*CW>[L;b+_%TEIC ODT*G;MGTC_$V;$IT9WgMO*=ER-ZC_ET+RLTCTE8 ES<cMI +X*c6<S;9X$ Ă“Ă ĂŒ $TELSCC;Tb;'ESh*;Wh _@YgObM>[9WgL;b+ `7cCCWaO$TL_%TEICLSCC;Tb; 'ESh*;Whc6CWaO$TLES<A*c69WgĂĽĂąĂąĂÂˇÂŹÂŹĂąĂĽĂžĂŚÂŞĂ ĂžĂ ÂŤĂ ĂŹĂŞ
On 9 September, IOD and the Thai Listed Companies Association organized the Executive Briefing 2/2016: Experiences Sharing of the CAC Certification Process Seminar. The objective of the seminar was to teach CAC members how to evaluate the risk of corruption and discuss relevant topics about the process of CAC certification, including how to prepare a document, with an example of the document that most members misunderstand The seminar was honored to have as a guest speakers Mr. Kulvech Janvatanavit, CAC Consultant, and Mr. Anuwat Jongyindee, Head of Internal Audit, The Siam Cement Public Company Limited. The seminar was very well received, with many participants suggesting that it be offered again. Those who missed it can watch it at http://thai-cac.com.
Mr. Anuwat Jongyindee, Head of Internal Audit, SCG
Mr. Kulvech Janvatanavit, CAC Consultant
Mr. Rapee SuCharitakul, Secretary-General, SEC
Ms. Waratchya Srimachand, Assistant Secretary-General, SEC
54 | B o a r d r o o m
_;YgO*+T$_Mf;ITMGS$$TE<EVMTE$V+$TE9Wg6W9Wg+R+S69lT%Xh;bMC_@YgOb-`9;9Wg MGS$$TE$lT$S<6[`G$V+$TE9Wg6WLlTMES<<EVKS9+69R_<WD;=ÂŻÂ˛Â˛Â˛CW'ITC _$WgDI%O*$S<$TE=1V<S7V*T;%O*$EEC$TEa6D7E* 9T*L8T<S;$EEC$TE <EVK9S c9D+X*c6EI C$S<LlT;S$*T;'5R$EEC$TE$ÂŤGÂŤ7ÂŤ`GR7GT6MGS$9ES@D `M*=ER_9Jc9D +S6$TE=ER-ZC_LI;TER6S<$EEC$TE_EYgO* Ă€ĂŹĂŻĂĂŹĂŻĂžĂąĂ˘ Ă„ĂŹĂłĂ˘ĂŻĂŤĂžĂŤĂ Ă˘Ă€ĂŹĂĄĂ˘_CYgOIS;9WgÂŽÂ°$S;DTD;_@YgOLET*'ITC_%Tb+`GR ES<9ET<'ITC_=;CT%O*Ă€Ă„Ă€ĂŹĂĄĂ˘7GO6+;<9<T9%O*'5R$EEC$TE 9Wg_=GWgD;`=G*c=b;2T;R>[;lT%O*$V+$TEL['ITCDSg*DY; The Corporate Governance Code will be revised from the Corporate Governance Code for listed company 2012. This is directly relevant for the practices of company Boards of Directors. IOD, the Securities and Exchange Commission, and The Stock Exchange of Thailand jointly organized a conference on 13 September to inform boards of directors about the Corporate Governance Code and the role of board of Directors with regard to corporate governance after it is set.
Executive Briefing 3/2016: Thailandâ€™s Private Sector Collective Action Coalition against Corruption: CAC
9T*L8T<S;$EEC$TE<EVK9S c9Db;2T;R_G%T;Z$TEa'E*$TE`;IEIC =1V<7S %V O*BT'_O$-;c9Db;$TE7O7T;$TE9Z+EV7ÂĽĂ€ÂžĂ€ÂŚc6EI C$S< LCT'C<EVK9S c9D+69R_<WD;c9D+S6$V+$EECĂ‚ĂľĂ˘Ă Ă˛ĂąĂŚĂłĂ˘ÂżĂŻĂŚĂ˘ĂŁĂŚĂŤĂ¤ %Xh;b;IS;9WgÂŻÂŽ$S;DTD;ÂŻÂ˛Â˛Âś_@YgObM$EEC$TE`GR>[<EVMTE%O* <EV KS 9 9Wg L ;b+_% T E I Ca'E*$TEc6 ES < A * ETDGR_OW D 6_$Wg D I$S < a'E*$TE`GR7O<%O.S$8TC9WOg T+_$V6%X;h _@YOg 9W+g Rc6_=;+Z6_EVCg 7; b;$TE=ER$TJ_+7;TEC5 _ % T E I Ca'E*$TE`;IE I C=1V <S 7V BT'_O$-;c9Db;$TE7O7T;$TE9Z+EV7 `GR;lTc=L[$TEDYg;%O ES<EO*7Oc=b;O;T'7a6D*T;LSCC;Tb;'ES*h ;W_h ETc6E<S $TEL;S<L;Z; +T$Ă€Ă˘ĂŤĂąĂ˘ĂŻĂŁĂŹĂŻĂ†ĂŤĂąĂ˘ĂŻĂŤĂžĂąĂŚĂŹĂŤĂžĂŠĂ?ĂŻĂŚĂłĂžĂąĂ˘Ă‚ĂŤĂąĂ˘ĂŻĂĂŻĂŚĂ°Ă˘ÂĽĂ€Ă†Ă?Ă‚ÂŚ`GR LlT;S$*T;'5R$EEC$TE= O*$S;`GR=ET<=ETC$TE9Z+EV7`M*-T7V ÂĽ=ÂŤ=ÂŤ-ÂŤÂŚ IOD and the Thai Listed Companies Association organized Executive Briefing 3/2016: Thailandâ€™s Private Sector Collective Action Coalition against Corruption: CAC on 21 September for board and managing directors interested in the CAC project. During the seminar a detailed presentation on persuading companies to join the project was presented. The seminar was supported by the Center for International Private Enterprise (CIPE) and Office of the National Anti-Corruption commission (NACC) CG Workshop 2016 â€œEnhancing Good Corporate Governance based on CGR Scorecardâ€?
9T*L8T<S;$EEC$TE<EVKS9c9Dc6EIC$S<7GT6MGS$9ES@D`M*=ER_9Jc9D+S6Ă€Ă„Ă”ĂŹĂŻĂ¨Ă°ĂĽĂŹĂÂŽ`GRÂŻÂŹÂŻÂÂŽÂłĂ‚ĂŤĂĽĂžĂŤĂ ĂŚĂŤĂ¤Ă„ĂŹĂŹĂĄĂ€ĂŹĂŻĂĂŹĂŻĂžĂąĂ˘Ă„ĂŹĂłĂ˘ĂŻĂŤĂžĂŤĂ Ă˘ Ă&#x;ĂžĂ°Ă˘ĂĄĂŹĂŤĂ€Ă„Ă?Ă?Ă ĂŹĂŻĂ˘Ă ĂžĂŻĂĄb;IS;9WgÂŻÂł$S;DTD;ÂŻÂ˛Â˛Âś`GRIS;9WgÂ°7ZGT'CÂŻÂ˛Â˛Âś_@YgObM>[_$WgDI%O*b;$TE9lTĂ€Ă„%O*<EVKS97T*ec69lT'ITCE[+S$$S< a'E*$TEĂ€Ă„Ă?`GR-Wh`+*MGS$_$53a'E*$TEĂ€Ă„Ă?=ER+lT=ÂŻÂÂŽÂłbM_%Tb+7E*$S;.Xg**T;b;'ESh*;WhCW>[bM'ITCL;b+_=;+lT;I;CT$ IOD and the Stock Exchange of Thailand organized CG Workshop 1 and 2/2016 on the topic â€œEnhancing Good Corporate Governance based on the CGR Scorecardâ€?. Held on 26 September 2016 and 3 October 2016, the workshop aimed to inform company staff members involved in corporate governance about the CGR project guideline 2016
Family Business Club Dinner
_CYgO7;_6YO;7ZGT'C9Wg>T;CTĂ†ĂŒĂ EIC$S<ÂžĂŒĂ‹ +S6*T;LSCC;TĂƒĂžĂŞĂŚĂŠĂś ÂżĂ˛Ă°ĂŚĂŤĂ˘Ă°Ă°Ă€ĂŠĂ˛Ă&#x;Ă ĂŚĂŤĂŤĂ˘ĂŻa6Dc6ES<_$WDE7V+T$IV9DT$E9WgCW'ITC_-WgDI-TÂ‰'Z5 BT;ZIS4; _<fÂ‰_ETRCT;$EEC$TE>[+S6$TE`GR'Z5OE=IW5 $TÂ‰+a;CSD 9Wg=EX$KT+T$<EVKS9<EVKS9_OOO;PVIIV9ÂĽ=ER_9Jc9DÂŚ+lT$S6CT<EEDTDb; MSI%O$TE<EVMTELY<9O6ĂƒĂžĂŞĂŚĂŠĂśÂżĂ˛Ă°ĂŚĂŤĂ˘Ă°Ă°ODT*CYOOT-W@9Sh*;Wh>[_%TEIC *T;c6bM'ITCL;b+ODT*CT$8TCW$V+$EECOYg;b69Wg;TL;b+9T*_ET+R`+* bM9ET<MEYOLTCTE87V67TC%TILTE+T$_If<c.7Ă†ĂŒĂ In the beginning of October, IOD, together with AON, held the Family Business Club Dinner The event and was honored to have Mr. Panuwat Benrohman, Managing Director, AON, and Mr. Ornpawee Karnchanomai, Consultant from AON, provide an overview on the topic â€œHow to professionally manage a family businessâ€?. There was overwhelming interest to attend this event. If a similar event is planned in the near future, we will inform members through the IOD communications channels. B o a r d r o o m | 55
Welcome New Member
ÂŽĂ“Ă‰ĂŽĂ›ĂŽĂ‰ĂšĂ†Ă‘Â˛ĂŠĂ’Ă‡ĂŠĂ— | Name Mr. Mr. Mr. Mr. Mr. Mr. Mr. 3L< 3L< 3L< 3L" 3L< 3L< 38Â˛ 3L" 3L< 3L< 3L"DLA 3L< 3L< 3L< 3L< 3L< 3L< 3L< .=Â˛ 3L< 3L< 8K3WG 3L"DLA 3L"DLA 3L< 3L<
David HUI Weng Kim Mihir Rajiv Rasmus Subin dL8? N//N N=1K/ #L=RA==#dLW=Ăž} #N=#= %?N/ %S#N=L &R<8L" -=" ->;? -K(*8"C -K*8==C -K*AR,N 1AĂż 1K8%K< 1N8< W18BK.Nc 23= 2L3O 2L3O 38Â˛8ÄŠ%K< 5-K..L 5=Ăž; 5/N8K,3 6.R"
Korunic Cheong Gil Hwan Trivedi Mangal Ellefsen Bhatia 8K,3LG3RS? DR31=;Y3R? #O=#N// W=Ä G"DAKD.N8"B Y82N<G. #/R=:K1= 1G"5=J<S= G"XA L}#3L8LD3 G"GL#;-O=K/3 2==;AK,3J 5}#A=}L5=JEKC(L"S= ;K2<;#K31= #Ä–?BK.NcB=ĂżDR? 6L-N/8ÄŠW%*A"B .L?L? 38=AĂžWBC EAK"8ÄŠ8K,3A"B Y?WB=JAĂż 8Ä™,N8K32R8>12Nc 3dLBN=ĂžR? AĂž=<BN=Ăž #N/#=R"8= 5=Ăż.L331 ?NĂž/DK##LR?
3L< 3L< 3L< 3L< .=Â˛ 3L< 3L" 3L< 3L< 6BÂ˛.=
8"BY8<; 8"CDAKD.Nc 8?L= 8K3W18 W:L ;3/=Ăż <R8LA.O <S1LY= =K*8? ??N/L
ALB:S/N :LY3;K< EAK_"E?O DR:L[%<N# 4R}W<O_<; 3N2NR? 8K,3R? &S&SN %R;B=Ăż E"C=K/3A"B
56 | B o a r d r o o m
Chief Executive Officer Chief Operating Officer Executive Director Partner President & CEO Executive Director CEO ==;L=4=ĂžEL= ==;L=4=ĂžEL= ==;L=6S#K.L= ==;L=/=A#DG4X?J==;L=GND=J ==;L= Independent Director 6SGdL3A<L= ==;L=4=ĂžEL= Director Executive Director 5=J2L3==;L= ==;L= ==;L=4=ĂžEL= ==;L=4=ĂžEL= W?L3RL=4=ĂžCK1 ==;L=4=ĂžEL= 5=J2L3==;L= ==;L=4=ĂžCK1 ==;L=/=A#DG4 ==;L=4=ĂžCK1 ==;L=GND=J Chairman ==;L=4=ĂžEL= 5=J2L3==;L=4=ĂžEL= ==;L=6S#K.L= ==;L=GND=J =G"6SGdL3A<L=E?KDS/=4=ĂžEL=#K.L= .L3AL;;K_3"K`3DS" ==;L= ==;L= ==;L=4=ĂžEL= Non-Executive Director ==;L=4=ĂžEL= CEO,Director 6SGdL3A<L=7L<L=W"Ăž3 ==;L=4=ĂžCK1 ==;L=4=ĂžEL= ==;L=GND=J
Krungthai-AXA Life Insurance Plc. Advance Info Service Public Company Limited Complete Shipping And Logistic Co.,Ltd PricewaterhouseCoopers ABAS Ltd. Tata Steel (Thailand) Public Company Limited FLSmidth Thailand Co.,Ltd Suvitech Co., Ltd. 4=ĂžCK1[1<X55/G?G=5GW=%K_3#dLK.ÂŹ;EL%3Â 4=ĂžCK1AG?N/O`G3D/=K%K_3Y5=.KD#dLK.ÂŹ;EL%3Â 4=ĂžCK18=Ăż[&&=Ăż3Y5=.KD#dLK. 4=ĂžCK16?N/[99 L#dLK.ÂŹ;EL%3Â L=1 LW=Ä GXE "5=JW1B[1< 4=ĂžCK1GL=WG^;[G#dLK. Y="8<L<L4L?D==8DN12N5=JD" DdL3K"L38K,3L8ÄŠ"3=ÂŹG"L=;EL%3Â 4=ĂžCK1GN;X8^WG^&N4N%K_3X;W3#W;31#dLK. 4=ĂžCK1GN3W/G=X3%K_3W3N?WG3#OW3O<=Ăž"#dLK.ÂŹ;EL%3Â 4=ĂžCK1DRA8Ä‹=2==;AK,3J#dLK. 4=ĂžCK11L8LY#dLK.ÂŹ;EL%3Â 4=ĂžCK1WG==Ăż_XG3.4=LA3ÂŹ5=JW1B[1<Â#dLK. 4=ĂžCK1DN"EWGDW/1#dLK.ÂŹ;EL%3Â 4=ĂžCK1N"DW1W?G;#dLK. 4=ĂžCK13dL`/L?3=W8%=#dLK. 4=ĂžCK11=Ăž8W8ÄŠ?[GY?#ND/ND=R5#dLK. 4=ĂžCK1Y?W.3X?3.W=D&NW.3&#dLK. 4=ĂžCK1[1<X55/G?G=5GW=%K_3#dLK.ÂŹ;EL%3Â 4=ĂžCK1&K3W1W;1K?D#dLK. 4=ĂžCK1Y?4G?G3W3^%K_3D#dLK.ÂŹ;EL%3Â 4=ĂžCK1GL=WG^;[G#dLK. 4=ĂžCK1WW&G=L#dLK. 4#Â˛XG^?[?.W;^11K?DÂŹ[1<X?3.Â#dLK. 4=ĂžCK15=Ăż.LYH?.NÄ?"#dLK. 4=ĂžCK1[1<ÂąW<G=;K3W&=L;NGN3.KD1=Ăż_#dLK.ÂŹ;EL%3Â DdL3K"L3GdL3A<L=E?KDS/=L=4=ĂžEL=#K.L=.L3AL; ;K3_ "K`3DS"D;L;AĂž1<L?K<5 G"K3=L%GL-L#K= personal 4=ĂžCK1;ELDL=L;W4WAGW=%#dLK. 23LL=DX/3.L=.%L=W/G=.ÂŹ[1<Â#dLK.ÂŹ;EL%3Â 4=ĂžC1K [1<4=Ăž/N%&OWO<A=Ăž/O`8=Ăž`3/NÄ?"#dLK.ÂŹ;EL%3Â 4=ĂžCK1WGGR1K<#dLO. Siam City Concrete Co.,Ltd 4=ĂžCK1.OWG%XG?&K88?L<W%3ÂŹ5=JW1B[1<Â#dLK. 4=ĂžCK11OAĂż[.W=^#dLK.ÂŹ;EL%3Â 4=ĂžCK1?N3W.ÂŹ5=JW1B[1<Â#dLK.ÂŹ;EL%3Â 4=ĂžCK1DX8?%;OW.O<#dLK.ÂŹ;EL%3Â
Name 3L< 3L< 3L< 3L< 3L< 3L< 3L< 3L< 3L< 3L"DLA 3L< 3L< .=Â˛ 3L< 3L<
A=8"C A=AR,N AĂžAK,3 D;%L< D<L; D>C.Nc DLY=% DR=8? WDD== WDLA?KC- G3K3/ GL3R:L8 GR>C) WG8? YGFL=
DR2L331 GK#$=Ăž<B=Ăż8"B AL"-L3R=KC A=R-8K32R?KC- G":K.ODR Y%%K<3N=K3.= %<LAĂžAK,3R? 5?Q`;GL=;< GL/;L"S= $K/=?;K< ?L:DRD0N/ SAĂž3N%R? BK?<8"C BN=Ăž8K32 A"BDR=8ÄŠW%C*
Position ER3D A3 ==;L=4=ĂžEL= ==;L=1O_W536S4=ĂžEL= ==;L=1O_W536S4=ĂžEL= ==;L=6S#K.L= ==;L=1O_W536S4=ĂžEL= ==;L=GND=J ==;L=/=A#DG4 ==;L=4=ĂžEL= ==;L=4=ĂžEL= 6S% A<==;L=6S#K.L= ==;L= ==;L= ==;L=4=ĂžEL= 5=J2L3W#LE3L1O_4=ĂžEL=
4=ĂžCK1[8=&AGW/G=WHLDSW5G=DG3&K?/NÄ?"ÂŹ5=JW1B[1<Â#dLK. 4=ĂžCK1W#;D8LAĂž?W?O_<3#dLK.ÂŹDdL3K"L3ZE} Â Safe Fertility Center Co.,Ltd 4=ĂžCK1W.GJX8?1N3K;=R5#dLK.ÂŹ;EL%3Â 4=ĂžCK1D<L;?L=GR/DLE==;#dLK. 4=ĂžCK18Ä‹AL<[GG3&K?/NÄ?"#dLK. 4=ĂžCK1[1<W8=&NW.319Äš.D#dLK.ÂŹ;EL%3Â 4=ĂžCK1&OWGD?^G&GN3Y9#dLK.ÂŹ;EL%3Â 4=ĂžCK1WG^38Ä‹&OW&9/O`XG3.WG^3[A=G3W;31G?W&G=AĂžD#dLK. 4=ĂžCK1=Ăž%W=DW/G=G"#dLK. 4=ĂžCK123LL=DN=[1<#dLK.ÂŹ;EL%3Â 4=ĂžCK1&O3N2X?3.DW5#dLK. 4=ĂžCK1W8<D4L<#dLK. 4=ĂžCK1E?K1=K8<GL=WG%4OÂŹ5=JW1B[1<Â#dLK.ÂŹ;EL%3Â 4=ĂžCK1[1<=K45=JK3:K</ G#dLK.ÂŹ;EL%3Â
D;L%NDL;K}3N/4N R ?
Company Bank of Ayudhya Public Company Limited 4=ĂžCK13S1=Ăž&#dLK.ÂŹ;EL%3Â 4=ĂžCK11L3/JAK3GR/DLE==;#dLK.ÂŹ;EL%3Â
Name Mr. 3L< 3L< 3L< 3L< 3L< 3L< 3L< .=Â˛ 3L"DLA 3L< 3L<X81< 3L"DLA 3L<
Hirotake 9 L9Ä…Ä‡3 GKC(L= -=" 5=J#KC 8"B8? DRA==-%K< GKBAĂž3 #Ä–+L;LD %<L:=- }L-BK.Nc 8"CBK.Nc AK%3K3 AĂż=J
Taguchi W/^;4R}WO<=/N ?NÄ?;5/N W.%L23L=R#N= /K`"Z# =K/3XD"D=A" Y?EJAK,3R? =K;3RC< GN"Y82Nc%K< W?Q_G33:LA==;Y3;K<8ÄŠ4S?< AĂž1<L= BR:#==<L B=Ăż%3J%K<Y%
3L"DLA Mr. Mr. 3L< 3L<
G=K}}L Johson Lam tuck N//N8"C [=1N8<
W$?N;8=AY=.; Lim Keong 8A";L?L [=>C
Position Non-Executive Director ==;L=4=ĂžCK1 ==;L=GND=J ==;L=4=ĂžCK1 =G"==;L=6S#K.L= =G"==;L=6S#K.L= ==;L=4=ĂžCK1 ==;L=GND=J ==;L=GND=JX?J==;L=/=A#DG4 W?L3RL=4=ĂžCK1 ==;L=GND=JX?J5=J2L3-J==;L=/=A#DG? 5=J2L3-J==;L=4=ĂžCK1 ==;L===;L=4=ĂžEL=6Â˛GÂ˛8K,3L2R=N# ==;L===;L=4=ĂžEL===;L=4=ĂžEL=AL;WDO_<" 5=J2L3W#LE3L1O_4=ĂžEL= ==;L=GND=JX?J==;L=/=A#DG4 ==;L=6S#K.L= ==;L=6S#K.L= ==;L=6S#K.L= 5=J2L3==;L=
B o a r d r o o m | 57
Â¦Ã˜Ã˜Ã”ÃˆÃŽÃ†Ã™ÃŠÂ²ÃŠÃ’Ã‡ÃŠÃ— | Name Mr. Mr. Mr. Mr. Mr. Mr. 3L< .=Â² 3L"DLA 3L< 3L"DLA 3L"DLA 3L< 3L< 3L< 3L< 3L" 3L" 3L"DLA 3L"DLA
Arun Francis Salvador Michel Opas Peter Pierre Oliver WC; #= .A"/L 8ÄŠ8ÄŠ2 :K.O :LAÃ¾/L AÃ¾Y=#3 AÃ¾%K< D;BK.Nc D==WD=Ã¾} DN=Ã¾32= DR8= DRA:K1= G2NC*L
Singh Rego Roeffaers Lopansri Wiesner Schnerb ;L[=W?NB 23JX81< D;N/DRA==WG33N2N W#O<;#==<L ?O`DR? D/N2Y=5=- DK31K.G3RAK/= L}#3LL= D"A3BK.Nc A"B13"BK.Nc GdL3A<8==W"Ã¾3"L; #N/=L3RW=LJE
Chief Information Officer Regional Finance Director CEO Executive Director Advisor Chief to CTO =G"==;L=6S#K.L= Non-executive Director 6SGdL3A<L=ZE} =G"==;L=6S#K.L=GLARYD =G"==;L=6S#K.L=7L<L=W"Ã¾3X?J4=Ã¾EL= 6SGdL3A<L=DL<"L34=Ã¾EL=G"= Vice President W?L3RL=-J==;L=/=A#DG4 6SGdL3A<L= 6S% A<==;L=6S#K.L= PA to Management Management Committe 6S#K.L=7L<4=Ã¾EL=1K_A[5 Corporate and Commercial Department
4=Ã¾CK1W;L[?9 [&XG^3&8Ä‹1OAL<#dLK. 4=Ã¾CK1W;L[?9 [&XG^3&#dLK.Â¬;EL%3Â Cobra International Company Limited 4=Ã¾CK1;L?O=R5#dLK.Â¬;EL%3Â 4=Ã¾CK1L=4N3=R"W18#dLK.Â¬;EL%3Â Cobra International Company Limited 4=Ã¾CK1GN/K?[1<AÃ¾BA==;#dLK. 4=Ã¾CK1234R=Ã¿WH?1X==R5#dLK.Â¬;EL%3Â 4=Ã¾CK1AÃ¾1<RL=4N3XE "5=JW1B[1<#dLK. 4=Ã¾CK123LL=DN=[1<#dLK.Â¬;EL%3Â 4=Ã¾CK14GD9L=;LX=#dLK. 4=Ã¾CK11OGL=&OG3/=K%K_3#dLK.Â¬;EL%3Â 4=Ã¾CK1L=4N3=R"W18#dLK.Â¬;EL%3Â 4=Ã¾CK1#OWG^;WG^;X=;;O_#dLK.Â¬;EL%3Â Hitachi Asia (Thailand) Co.,Ltd 4=Ã¾CK11=Ã¾DG=5GW=%K_3#dLK. 4=Ã¾CK1XG^?[?.W;^11K?DÂ¬[1<X?3.Â#dLK. 4=Ã¾CK1GL=&OXG?#dLK.Â¬;EL%3Â 4=Ã¾CK1X8?1W3=L#dLK. 4=Ã¾CK1/N??NOXG3.N44N3DGN3W/G=W3%K_3X3?#dLK.
R 58 | B o a r d r o o m
B o a r d r o o m | 59
Published on Jan 13, 2017
Digital Disruption Lessons Learned from ATM Malware Attacks Frequently Asked Question - Data Analytics A-B-C What Finance Executives and Aud...