t i a g l a e t c a urity thailand 4€¦ · danairat t. cyber security use cases 1. analyzing and...

95
Danairat T. อ.ดนัยรัฐ ธนบดีธรรมจารี +668-1559-1446 Line ID: danairat FB: https://www.facebook.com/tdanairat Part 1 Introduction to Thailand 4.0 Part 2 Digital Transformation Part 3 People Transformation Thailand 4.0 The Digital Transformation Digital Initiatives Digital Platform Business Services& Business Objectives Cloud Digital Organization Business Process as a Service

Upload: others

Post on 31-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

อ.ดนยรฐ ธนบดธรรมจาร+668-1559-1446 Line ID: danairatFB: https://www.facebook.com/tdanairat

Part 1 Introduction to Thailand 4.0

Part 2 Digital Transformation

Part 3 People Transformation

Thailand 4.0 The Digital Transformation

Digital Initiatives

Digital Platform

Business Services &

Business Objectives

N

e

w

S

e

r

v

i

c

e

s

O

p

t

i

m

i

z

e

d

S

e

r

v

i

c

e

s

R

e

t

i

r

e

d

S

e

r

v

i

c

e

s

C

E

O

C

F

O

C

O

O

C

M

O

B

i

g

D

a

t

a

D

i

g

i

t

a

l

S

e

c

u

r

i

t

y

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data

Monetization

New

Customer

s,

Channels

IoT, Smart Devices

Business

Process

Optimization/O

utsourcing

Smart Workforce

Enterprise

Metamorp

hosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 2: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Part 1

Page 3: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Introduction to Digital Society

อ.ดนยรฐ ธนบดธรรมจารLine ID: Danairat

FB: Danairat Thanabodithammachari+668-1559-1446

The Metamorphosis, Cloud, Big Data, IoT/IoE, Smart Workforce

ย 1งยน

ม 1งค 1ง ม 1นคง

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Servic

es

Optimize

d Services

Retire

d

Servic

es

C

E

O C

F

O

C

O

O

C

M

O

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers,

Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 4: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

เทคโนโลยดจทลเปล�ยนรปแบบวถชวตและการประกอบธรกจ

Pansak Siriruchatapong, 2016

Page 5: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Application Areas

Smart CitiesSmart

EnvironmentSmart Energy

Smart Agriculture

E-Health Retail LogisticsIndustrial Control

Internet of Things

Monika, 2015

Page 6: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

New Digital Touch PointsNot only application software

Page 7: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Smart Farming

Monika, 2015

Page 8: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Drones will continue to

revolutionize photography

and videography but real

innovation will derive from

utility in vertical

applications such as

delivery, care, exploration,

etc.

Image Credit: Alec Momont

Page 9: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Mixed Reality

Image via MagicLeap

Page 10: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

3D Printing

suefeng.com/blog/3d-printing-and-additive-manufacturing/

Page 11: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Smart Home

Monika, 2015

Page 12: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Self Driving Car

www.google.com/selfdrivingcar/

EV Car

suncountryhighway.com/

Page 13: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Smart Healthcare

Monika, 2015

Page 14: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

1.

Blo

od

Pre

ssu

re

He

art

ra

te T

rack

ing

4.

He

alt

h T

rack

ing

He

alt

h c

he

ck u

p r

eco

rds

1.

Blo

od

Pre

ssu

re

Sle

ep

Tra

ckin

g

4.

He

alt

h T

rack

ing

He

alt

h c

he

ck u

p r

eco

rds

3. Public/Private

Hospital executes

Health Program

integrated

EHR/EMR Systems

2. Government

creates/revises

National Health

Program

1.

Blo

od

Pre

ssu

re

Co

ach

Tra

ckin

g

4.

He

alt

h T

rack

ing

He

alt

h c

he

ck u

p r

eco

rds

Big Data

Cloud

Suggested

Health Improvement

(Secured Personal Access)

Government Officer

Doctor

Nurse

Officer

Integrated Medical

Device

Integrated Medical

Device

Integrated Medical

Device

Integrated Medical

Device

Integrated Medical

Device

แนวทางประชารฐ กบ Healthcare Big Data

Page 15: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Connected Health

ประชาชนแขงแรง

รานขายยา

โรงพยาบาลและคลนก

แนะนาออกกาลงกาย และการพกผอน

การเลอกซKอยา

ขอมลสขภาพ และการรกษา

อปกรณดานสขภาพ

แบงปนขอมล รวดเรวและปลอดภย(Secure Speed Data Sharing)

Page 16: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Big Data Introduction

Volume

Variety Velocity

DB Table

Delimited Text

XML, HTML

Free Form Text

Image, Music, VDO, Binary

Batch

Near real time

Real time

GB

TB

PB

XB

ZB

Page 17: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Page 18: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Page 19: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Retails Store Use Cases

1. Golden zones2. More expensive items

with bigger margins3. Endcaps4. Buy level5. Traffic builder6. Action alley7. Front of shop8. Signpost brands9. Hanging signs and shelf

signs10. Range reduction

Less can be more. Average household uses 300 products in a year

independent.co.uk

Page 20: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Retails Store Use Cases

Store Layout ProfitsCustomer Density

independent.co.uk

Page 21: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

การเตอนภยพบต

Sensor ปรมาณน'าฝน น'าในเข-อน ปรมาตรเข-อน, แสดงแนวโนมสภาวะนาทวม Nearly Real-Time

Page 22: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Outbreak with Early Detection

Management of Outbreak with Early Detection

Page 23: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

New Digital Touch PointsNot only application software

Page 24: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Cyber Security Use Cases

Mobile Workforce, Jail-Break

Smart Devices

Social Network Web Sites

Web Sites

Top E-CommerceWeb Sites/

SaaSProviders

Future

Public Smart Devices

Big Data

Hadoop

Top Mobile Malware

(Jail-Break)

Top No SSL

E-Commerce

Top Trojan on

Public Smart TV

or Public Smart Device

Top Executive Posted

each Social Network

Page 25: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Cyber Security Use Cases

1. Analyzing and Enhancing Mobile Workforce Access

Management Security

2. Analyzing and Advising Senior Officers who are most active in

Social Network Web sites

3. Web Sites Ports Scan Detection

4. DDOS Pattern Detection using Hadoop and Flume for Web Site

Log Streaming and Real-time Analytics

5. Trojan Detection by Hadoop Weblog Analytics

6. Detecting Top E-Commerce Web Sites Hacker

7. Analyzing SME Cloud Migration Security

8. Detecting Security Thread on SmartTV User Agent, Motion

Censor

9. Analyzing Jail-Break and Root Mobile Device

10. Detecting New Cyber Criminals in New Technology eg. M2M

Network Area

Page 26: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Today Digital Business

Digital Transformation

Smart

Workplace

Page 27: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Pansak Siriruchatapong, 2016

Page 28: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Pansak Siriruchatapong, 2016

Page 29: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation

อ.ดนยรฐ ธนบดธรรมจารLine ID: Danairat

FB: Danairat Thanabodithammachari+668-1559-1446

The Metamorphosis, Cloud, Big Data, IoT/IoE, Smart Workforce

ย 1งยน

ม 1งค 1ง ม 1นคง

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Servic

es

Optimize

d Services

Retire

d

Servic

es

C

E

O C

F

O

C

O

O

C

M

O

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers,

Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 30: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Agenda

• Digital Transformation Reference Model

• Digital Transformation Domains

• Digital Transformation Worksheet• Summary

Page 31: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

http://sloanreview.mit.edu/article/the-nine-elements-of-

digital-transformation/

http://www.forbes.com/sites/gilpress/2015/03/09/5-things-to-

do-when-you-lead-a-digital-transformation/#1d8021a2624d

Page 32: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

https://www.capgemini-

consulting.com/digital-transformation

Page 33: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

http://www.digitaltransformationbook.com/tag/harvard-business-review/

Page 34: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation

Digital transformation is the process of transforming

an vision, missions, services, organizations, digital

initiatives with business processes and technologies

to the organization.

Digital Business

Smart Workplace

Page 35: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Page 36: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

Finance App

Page 37: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

CRM App

Database

OtherApps

Database

HR App

Database

Finance App

Page 38: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

CRM App

Database

OtherApps

Database

HR App

Database

Finance App

IT Silos make inefficient to scale the business

Page 39: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

CRM App

Database

OtherApps

Database

HR App

Database

Finance App

IT Silos make inefficient to scale the business

Page 40: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

CRM App

Database

OtherApps

Database

HR App

Database

Finance App

IT Silos make inefficient to scale the business

Page 41: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

IT Silos

Database

Core App

Database

CRM App

Database

OtherApps

Database

HR App

Database

Finance App

IT Silos make inefficient to scale the business

Page 42: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

พฒนาการของการใชไอทในองคกร

• ตางคนตางทา แลวมาเช1อมกนทหลง

• ระบบงานกระจดกระจาย เช1อมตอกนขาดมาตรฐาน

• เปล1ยนแปลงยาก

• ขยายระบบยาก

• ใชเวลามากในการจดการ และแกปญหา

• มความเส1ยงสง

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

Silo

Page 43: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

พฒนาการของการใชไอทในองคกร

Security

SFAProduct LMSInv

MGMTB2Bproduct SCM product DBERP

MES-

Dev

SFASFA-

Test

SFA-

Stage

Product

Product

ERP-

StageERP-

Prod

MES-

StageMES-

Prod

productDB-

Stage B2B-

StageB2B-

Dev

Security Security Security

Pt. to Pt. Integrations

SFAProduct LMSInv

MGMT

product SCM product DBERPMES-

DevProduct ERP-

Stage

productDB-

Stage

• ตางคนตางทา แลวมาเช1อมกนทหลง

• ระบบงานกระจดกระจาย เช1อมตอกนขาดมาตรฐาน

• เปล1ยนแปลงยาก

• ขยายระบบยาก

• ใชเวลามากในการจดการ และแกปญหา

• มความเส1ยงสง

Rationalization• จดกลมกระบวนการ

ทางาน และ ทรพยากรไอท

• มมาตรฐานในการรบสงขอมล

• ประหยดคาใชจายดาน SW License และ support

• ลดตนทนดาน IT project time/costs/risks

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

Silo Standardization

Page 44: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

พฒนาการของการใชไอทในองคกร

Security

SFAProduct LMSInv

MGMTB2Bproduct SCM product DBERP

MES-

Dev

SFASFA-

Test

SFA-

Stage

Product

Product

ERP-

StageERP-

Prod

MES-

StageMES-

Prod

productDB-

Stage B2B-

StageB2B-

Dev

Security Security Security

Pt. to Pt. Integrations

SFAProduct LMSInv

MGMT

product SCM product DBERPMES-

DevProduct ERP-

Stage

productDB-

Stage

• ตางคนตางทา แลวมาเช1อมกนทหลง

• ระบบงานกระจดกระจาย เช1อมตอกนขาดมาตรฐาน

• เปล1ยนแปลงยาก

• ขยายระบบยาก

• ใชเวลามากในการจดการ และแกปญหา

• มความเส1ยงสง

Rationalization• ตดกระบวนการทางาน

ท-ซ'าซอน

• ลดทรพยากรทางไอทท-ไมจาเปน

• ผลตบรการดานไอทได เรวข'น

• เพ-มความปลอดภยดานไอท

• จดกลมกระบวนการทางาน และ ทรพยากรไอท

• มมาตรฐานในการรบสงขอมล

• ประหยดคาใชจายดาน SW License และ support

• ลดตนทนดาน IT project time/costs/risks

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

Silo Standardization Optimization

Page 45: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

พฒนาการของการใชไอทในองคกร

Security

SFAProduct LMSInv

MGMTB2Bproduct SCM product DBERP

MES-

Dev

SFASFA-

Test

SFA-

Stage

Product

Product

ERP-

StageERP-

Prod

MES-

StageMES-

Prod

productDB-

Stage B2B-

StageB2B-

Dev

Security Security Security

Pt. to Pt. Integrations

SFAProduct LMSInv

MGMT

product SCM product DBERPMES-

DevProduct ERP-

Stage

productDB-

Stage

• ตางคนตางทา แลวมาเช1อมกนทหลง

• ระบบงานกระจดกระจาย เช1อมตอกนขาดมาตรฐาน

• เปล1ยนแปลงยาก

• ขยายระบบยาก

• ใชเวลามากในการจดการ และแกปญหา

• มความเส1ยงสง

IT-as-a-ServiceRationalization• แบงกลมบรการ

ทางดานไอทโดยมงการตอยอดบรการใหมๆ ใหเรวท1สด

• ผลตบรการไดเรว และปลอดภย

• การวางแผนทาง IT ทาควบคไปกบการวางแผนทางธรกจ

• เจาหนาท1ไอททางานไดเตมประสทธภาพ

• ตดกระบวนการทางานท-ซ'าซอน

• ลดทรพยากรทางไอทท-ไมจาเปน

• ผลตบรการดานไอทได เรวข'น

• เพ-มความปลอดภยดานไอท

• จดกลมกระบวนการทางาน และ ทรพยากรไอท

• มมาตรฐานในการรบสงขอมล

• ประหยดคาใชจายดาน SW License และ support

• ลดตนทนดาน IT project time/costs/risks

PaaS

SaaS

IaaS

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

FBT PAY GNTS

TRDS

Client

Customs

RREIPS Integrated A/C Refunds

RBADef

PaymentsExcise

CR

PKI

ECI ADD AWA ELS

Client StaffRemote

StaffTAX

AGENTS

GCI

Call Centres

WOC

CCD

TASS

StaffPhone

ComplianceStaff

BOA

Refmaterial

Bus. Intel

NTS A/c

B EP

CDCCCWMS

BANK

DDDR

1

Data…….

Penalty

Business

IVR

1

Silo Standardization Optimization Modularity

Page 46: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Strategy vs. Digital Transformation

Digital Strategy Digital Transformation

Project or Program Level Enterprise Wide Level

Quick Term Win Medium to Long Term Win

Bottom-up or Top-Down approach Top-down approach

Technology Leads The Changes Process or Culture Leads The Changes

Serve the needs of one particular

business group

Serve the needs of an enterprise or

inter-enterprise

Eg. Create Digital Channel and Social Analytic for

Marketing Business Unit,

Image processing for Production Business Unit

Eg. Re-define company mission, transforming

organization and revise business processes with related

policies and adopt new technologies into cross-function

business units

Related Technologies: Cloud Computing, Big Data, Smart Devices (Mobile, IoT/IoE, 3D Printing, etc.), Social

Network/AI Technology, Cyber-physical system (CPS), Advanced System Architectures and Securities

Page 47: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

“Innovation”

“Efficiency”

“Sustainability”

Vision,

Mission

Statements

Big DataDigital

SecurityCloud

1. วสยทศน พนธกจ ยทธศาสตร

Page 48: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

“Innovation”

“Efficiency”

“Sustainability”

Vision,

Mission

Statements

Dig

ita

l

Init

iati

ves?

Big DataDigital

SecurityCloud

Page 49: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Vision,

Mission

Statements

Digital Transformation Reference Model

The Business Services and Business Objectives

• New Services• Optimized Services• Retired Services

1. วสยทศน พนธกจ ยทธศาสตร2. นโยบายบรการ เปาประสงค

Page 50: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Business Services and Business Objectives

• Provide new digital services to increase

customer retention 15% by 1 year

• Increase revenue by 30% annually via next best

action alert (for commercial organization)

• Introduce existing products into a new market

to increase market share 15% by 1 year

• Improve internal communications to reduce

operation risk 10% by 1 year

• Decrease expenses 25% by 1 year via digital

adoption

• Retire low value services to reduce cost 15% by

1 year

New

Services

Optimized

Services

Retired

Services

New

Services

New

Services

Optimized

Services

Optimized

Services

New

Services

Retired

Services

Samples

Page 51: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Business Services and Business Objectives

• User:________, Service Name: ___________, Objective:____________, Released Date: _______

New

Services

Optimized

Services

Retired

Services

New

Services

New

Services

Optimized

Services

Optimized

Services

New

Services

Retired

Services

• User :________, Service Name: ___________, Objective:____________, Released Date: _______

• User :________, Service Name: ___________, Objective:____________, Released Date: _______

• User :________, Service Name: ___________, Objective:____________, Released Date: _______

• User :________, Service Name: ___________, Objective:____________, Released Date: _______

• User :________, Service Name: ___________, Objective:____________, Released Date: _______

The Brainstorm Workshop

Page 52: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Digital Organization

Vision,

Mission

Statements

Capabilities Definition• Knowledge• Experiences• Skills• Characters• Behavior

Organizations need to be established after identified capabilities and functions required from manned and unmanned workforce

1. วสยทศน พนธกจ ยทธศาสตร2. นโยบายบรการ เปาประสงค3. หนวยงานท-เก-ยวของ

Page 53: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Organization

• Start paperless organization in some process

• Always online

• Fellowship vs. Employee

• Machines and Decision engines

• Unmanned Staffs

Page 54: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Digital Transformation Reference Model

Business processes and digital touch points need to be designed together.

1. วสยทศน พนธกจ ยทธศาสตร2. นโยบายบรการ เปาประสงค3. หนวยงานท-เก-ยวของ4. กลยทธ และกระบวนการทางาน

Page 55: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

BPaaS and Digital Initiatives

• Business Process for customers need to be more flexible

• Business Process for operation need to be more

automation

• Business Process for back office (HR, payroll, finance) need

to be more control

• Digital initiatives and Business process in “To Be” state

• Enterprise Metamorphosis will redefine a new vision

Digital Initiatives

Data Monetization

New Customers,

Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Business Process as a ServiceMore ControlMore Flexible

Page 56: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Business Process Development4 phases of business process development

www.samarin.biz

Page 57: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Business Process, IoT and Social Integration

• Enrich citizen profile

• Improve citizen relationship

• Improve business rules and approval conditions

• Enhance operational transparency

Michael Moyal, Blue Corw, 2008

Sensor

Page 58: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

แบบการปรบปรงบรการในหนวยงาน

ช1อบรการ: เปาประสงค:

หนวยงานท1รบผดชอบ:

Version: Date/Time:

จดตดตามข Kนตอนการทางาน, สารสนเทศ

ประเดนตดคางดานกระบวนการทางาน:

ประเดนตดคางดานเทคโนโลย :

1. ___________, __________

2. ___________, __________

3. ___________, __________

4. ___________, __________

1. ___________

2. ___________

3. ___________

4. ___________

หนวยงานท1 1 F1_P01 F1_P02 F1_P03

F2_P01 F2_P02 F2_P03

F3_P01 F3_P02

1

2

3

4หนวยงานท1 2

หนวยงานท1 3

ใหม

ปรบปรงยกเลก

Page 59: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

แบบการปรบปรงบรการในหนวยงาน

ช1อบรการ: เปาประสงค:

หนวยงานท1รบผดชอบ:

Version: Date/Time:

จดตดตามข Kนตอนการทางาน, สารสนเทศ

ประเดนตดคางดานกระบวนการทางาน:

ประเดนตดคางดานเทคโนโลย :

1. จดทาชดเอกสารและแผนท�, ชดเอกสาร 6 ฉบบ2. ___________, __________

3. ___________, __________

4. ___________, __________

1. ประกาศทางน �าชลประทานใหแลวเสรจตามระยะเวลา ม ๕

2. เพ�มประสทธภาพในการประกาศทางน �า

หนวยงานท1 1 F1_P01 F1_P02 F1_P03

F2_P01 F2_P02 F2_P03

F3_P01 F3_P02

1

2

3

4หนวยงานท1 2

หนวยงานท1 3

ใหม

ปรบปรงยกเลก

การประกาศทางน �าชลประทาน ม ๕

สานกงานชลประทาน

1การสงตอเอกสารชา2การตรวจสอบเอกสารลาชา3 แผนท�แนบทายผด

1.การใชขอมลฐานแผนท�ไมตรงกน (Base Map)2. ระบบตดตามงานไมสมบรณ

x4.1 5-Aug-2016

Page 60: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Digital Transformation Reference Model1. วสยทศน พนธกจ ยทธศาสตร2. นโยบายบรการ เปาประสงค3. หนวยงานท-เก-ยวของ4. กระบวนการทางาน5. เทคโนโลย

Page 61: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Enterprise RepositoryOwner: Business Units

Page 62: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Owner: Technology Unit

Owner: Business Unit with supported by Technology Unit

Enterprise Repository

Page 63: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Enterprise RepositoryOwner: Technology Units

• #

• Applications / Touch Points / Database / Data

Store Name

• Total Connections

• Concurrent Connections

• Required Response Time (sec.)

• Actual Response Time (sec.)

• Development Software Languages /

Framework (for App)

• Package / In-House (for App)

• Private / Public / Hybrid Cloud

• OS / Platform (Windows, Linux, Docker, etc.)

• Monitoring Tool Name

• Sign On / Security System Name

• % growth / year

• Initial Cost(Baht)

• M.A. Cost /year (Baht)

• Remarks

Page 64: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

Who

How

What

Why

When

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 65: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Modelwith Business Sustainability framework

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

CEO

CFOCOOCMO

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Revenue RiskCost

Page 66: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

Leadership skill,

SWOT, Sig Sigma

Service Science

Organization Dev.

PMBOK,

BPM,

DMBOK

CMMI,

ITIL

with enterprise frameworks

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 67: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Modelwith TOGAF framework

Business

Architecture

App & Data

Architecture

Technology

Architecture

Architecture

Vision

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

CEO

CFOCOOCMO

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 68: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Modelwith FEA 2.0 framework

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

CEO

CFOCOOCMO

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 69: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Modelwith Balanced Scorecard framework

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

CEO

CFOCOOCMO

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Learning &

Growth

Internal

ProcessCustomer FinancialFinancial

Page 70: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Principle

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

ServicesRetired

Services

C

E

O

C

F

O

C

O

O

C

M

O

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

เกดประสทธ ผล (Productivity)

มประสทธ ภาพ (Efficiency)

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

ServicesRetired

Services

C

E

O

C

F

O

C

O

O

C

M

O

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Get right things

Get things right

Page 71: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Principle

มองใหเปนธรรมดา

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

ServicesRetired

Services

C

E

O

C

F

O

C

O

O

C

M

O

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

สายน �า

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

ServicesRetired

Services

C

E

O

C

F

O

C

O

O

C

M

O

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Cost

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

ServicesRetired

Services

C

E

O

C

F

O

C

O

O

C

M

O

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

Page 72: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

ย 1งยน

ม 1งค 1ง ม 1นคง

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise Metamorphosis

Digital Organization

Business Process as a Service

More ControlMore Flexible

Vision,

Mission

Statements

Page 73: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Domains

# Domain Increasing of Revenue (ม 1งค 1ง)

Resource Optimization (ย 1งยน)

Reduce Risk (ม 1นคง)

1 Finance Increase Revenue Create Services Portfolio

Compliance with laws regulations

2 Customer New Products,Service, Promotion Innovation

Reuse Business Channels

Service Continuity and Availability, Retired Services

3 Internal Create NewBusiness Process

Eliminate Production Cost

Standardize Change Control, Eliminateunnecessary laws

4 Learning and Growth

Seek more Talent People

Standardize Skill Required

Enterprise Knowledge Repository, Work from home, Smart workplace

Page 74: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Domains

# Domain Increasing of Revenue

Resource Optimization

Reduce Risk

1 Finance

2 Customer

3 Internal

4 Learning and Growth

Page 75: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Worksheet

Who

(Who care)

What Service

Type

Why

(Objectives)

When

(to be

released)

Digital Data

Source

CEO Business

Performance

Report Service

Stake holder

benefits 100%

Jun 2016 ERP System, Fin.

Spreadsheets

CMO Omni Channel

Service

Increase

awareness 30%

Jun 2016 Social Network,

Twitter

COO Reduce waste

in Plant

Reduce cost

(opex) 15%

Dec 2018 Plant state data

CFO Eliminate the

low value

business

service

Support Risk

Control and

reduce cost

(opex) by 15%

Apr 2016 ERP System, Fin.

Spreadsheets

CIO Creating new

channel for

executives

Digital

innovation

program

alignment

Apr 2016 CRM App, Plant

Data, ERP Data

Business

Partners

Automate

Reports Service

Increase

productivity

20%

July 2016 CRM App, Plant

Data, ERP Data

New

Services

Optimized

Services

Retired

Services

Optimized

Services

New

Services

New

Services

Samples

Page 76: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Worksheet

Who

(Who care)

What Service

Type

Why

(Objectives)

When

(to be

released)

Digital Data

Source

Page 77: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Initiatives Projects 2016 2017 2018 2019

H1 H2 H1 H2 H1 H2 H1 H2

Executive

Intelligence and

external integration

Data Interoperability

Information Service for

Business Partner

Dev Stabilization DevOps Standards

Business Process

Optimization

&

Application

Consolidation

Identify Processes and PMO

Core Processes

Optimization

Applications Consolidation

Open Data for PPP

Business Intelligence

Digital Platform Cloud, Big Data Platform

Governance Framework

IoT and Social Integration

Network and Office

Automation

Digital Transformation Master Plan(DX Master Plan)

Standardization & Optimization

Growth

Page 78: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

Digital Touch points

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big Data Digital Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Customer

Recommendation EngineOperation Smart Devices/IoT Secure Smart Workforce

Organizations

Vision,

Mission

Statements

New

Skills

Optimized

Skills

Retired

Skills

New

Behaviors

3. Combine Manned

and Unmanned Power

2. Identify (Digital) Services

1. Redefine Vision/Missions

Optimized

Behaviors

Retired

Behaviors

Behaviors

4. Deploy Behavior

Processing

5. Establish

Digital

Technology

5 Key Steps towards Metamorphosis

Page 79: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

5 Key Steps towards Metamorphosis

1. Redefine Vision/Missions: เร-มจากการประเมนสถานะผลการดาเนนงานของทานเม-อเปรยบเทยบกบคแขงในยค Digital พรอมท'งสถานการณทางเศรษฐกจและวกฤตการณตาง ๆ ท-เกดข'นมาวเคราะหวา Vision และ Missions ของเราเดม ๆท-มอยสามารถรบมอกบส-งท-เขามาใหม ๆ ไดหรอไม หรอมความจาเปนตองปรบวสยทศนใหมใหสอดรบกบภมทศนท-ไดเปล-ยนไปแลว

2. Identify (Digital) Services: เร-มจากการมองส-อ Digital มาใชในการขบเคล-อนบรการใหม ๆ เพ-อใหเกดความเทาทนในการใหบรการในยคปจจบน โดยจะตองไมลมท-จะร'อถอนบรการบางอยางท-ไมกอใหเกดคณคาออกไปดวย เพ-อไมใหเกดการหนวงเหน-ยวในระดบข 'นตอนการทางาน

3. Combine Manned and Unmanned Power: เร-มวเคราะหและแยกแยะออกมาเปน Skills ตาง ๆ ท-จาเปนเพ-อทาใหงานสาเรจ โดยบางงานเราสามารถใชอปกรณเคร-องมอเขามาชวยมนษยทา เชนงานท-ตองทาซ'า ๆ หรอเขาไปในท-เส-ยงภยอนตราย และเราตอง Retire Skills ท-ไมกอใหเกดคณคาออกไปบางเพ-อแลกกบการอยรอดหรอการกาวเดนตอไปได

Page 80: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

5 Key Steps towards Metamorphosis

4. Deploy Behavior Processing: ในยค Digital แทบทกส-งจะเช-อมโยงถงกนหมด และท'งผใหบรการและลกคาผรบบรการ โดยเราจะตองกลบมาพจารณาถงพฤตกรรมตาง ๆ ท-เกดข'น ท 'งดานผรบบรการ และดานผใหบรการ ถงเง-อนไขท-มผลตอการตดสนใจใชบรการ หรอเลกใชบรการ โดยในบางหนวยงานเร-มสนใจการวเคราะหพฤตกรรมผรบบรการมากข'นจนสามารถรบลกคาท-เปน Unmanned Customers ไดดวย (เชน Machine-2-Machine) ในทางกลบกนผใหบรการกตองปรบตวใหมพฤตกรรมใหมเชนกน โดยจะตองเลกพฤตกรรมท-ไมกอใหเกดคณคาตอการเดนทางสความสาเรจออกไปดวย

5. Establish Digital Technology: เราไมสามารถปฏเสธการใช Digital Technologies (Social Network, Big Data, Cloud, Mobile, etc.) ไดอกตอไปเพราะเคร-องมอเหลาน'ไดเขามาเปนสวนหน-งของชวตประจาวนแลว แตอยางไรกตามเราจะตองไมลมดานความปลอดภยในการใชงาน เพราะส-งท-ทาใหเกดความสะดวกไดมาก ๆ เม-อเกดเหตขดของข'นมากจะเปนภยรายแรงมาก ๆ เชนกน

Page 81: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Digital Transformation Reference Model

Digital Initiatives

Digital Platform

Business Services &

Business ObjectivesNew

Services

Optimized

Services

Retired

Services

Big DataDigital

Security

“Innovation”

“Efficiency”

“Sustainability”

Cloud

Data Monetization

New Customers, Channels

IoT, Smart Devices

Business Process

Optimization/Outsourcing

Smart Workforce

Enterprise

Metamorphosis

Digital Organization

Business Process as a ServiceMore ControlMore Flexible

Vision,

Mission

Statements

The Summary

Page 82: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation

อ.ดนยรฐ ธนบดธรรมจารLine ID: Danairat

FB: Danairat Thanabodithammachari+668-1559-1446

Page 83: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Where the transformation starts!?

Peopleคน

Enterpriseองคกร

VS.

No right and no wrong

The Digital Transformation

Page 84: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

ความสข

ส1งท1ยงไมร

The Happiness is now

Page 85: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

ความสข

ส1งท1ยงไมร

The Happiness is now

ทาประโยชนหรอรอกอน?

Page 86: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

1. เหนวาสขคอเดnยวนK

The Happiness is now

ส1งท1ยงไมร

Page 87: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

1. เหนวาสขคอเดnยวนK

The Happiness is now

ความใววางใจ, ความรก, การเปนคาพด

ส1งท1ยงไมร

Page 88: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

ส1งท1ยงไมร

Page 89: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ส1งท1ยงไมร

Page 90: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

5. เรยนรวธการเรยนร (เพราะส1งท1ไมรยงมอยเสมอ)

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ไมทะนงตน, ยอมรบในส-งท-ตนยงไมร, พฒนาตนใหมทกษะในการเรยนร, รจกตวเอง, ประมาณตนได

Page 91: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

5. เรยนรวธการเรยนร (เพราะส1งท1ไมรยงมอยเสมอ)

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ไมทะนงตน, ยอมรบในส-งท-ตนยงไมร, พฒนาตนใหมทกษะในการเรยนร, รจกตวเอง, ประมาณตนได

Page 92: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

5. เรยนรวธการเรยนร (เพราะส1งท1ไมรยงมอยเสมอ)

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ไมทะนงตน, ยอมรบในส-งท-ตนยงไมร, พฒนาตนใหมทกษะในการเรยนร, รจกตวเอง, ประมาณตนได

Page 93: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

5. เรยนรวธการเรยนร (เพราะส1งท1ไมรยงมอยเสมอ)

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ไมทะนงตน, ยอมรบในส-งท-ตนยงไมร, พฒนาตนใหมทกษะในการเรยนร, รจกตวเอง, ประมาณตนได

Begin at yourself

then your people

Connect the

knowledge

Core Services

and Objectives

Vision and Missions

Learn

how to

learn

Page 94: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

People Transformation Reference Model

2. คดเสรมคณคา

3. ทาประโยชนเพ1ม

1. เหนวาสขคอเดnยวนK

5. เรยนรวธการเรยนร (เพราะส1งท1ไมรยงมอยเสมอ)

4. เช1อมโยงความร

The Happiness is now

ไมรงแกตนเอง, ไมกลาวโทษผอ-น, ทาประโยชนใหเกดข'นจรง

ความสขสงตอใหผคน

ความใววางใจ, ความรก, การเปนคาพด

เตมความรท-จาเปน, ไมตองรไปเสยทกอยาง, เดนหนาหาความรท-เกดประโยชน

ไมทะนงตน, ยอมรบในส-งท-ตนยงไมร, พฒนาตนใหมทกษะในการเรยนร, รจกตวเอง, ประมาณตนได

Page 95: t i a g l a e t c a urity Thailand 4€¦ · Danairat T. Cyber Security Use Cases 1. Analyzing and Enhancing Mobile Workforce Access Management Security 2. Analyzing and Advising

Danairat T.

Thank you

อ.ดนยรฐ ธนบดธรรมจารLine ID: Danairat

FB: Danairat Thanabodithammachari+668-1559-1446