by ict6sigma.net May 1, 2019 Agenda for Today Driving Digital - - PowerPoint PPT Presentation

by ict6sigma net
SMART_READER_LITE
LIVE PREVIEW

by ict6sigma.net May 1, 2019 Agenda for Today Driving Digital - - PowerPoint PPT Presentation

by ict6sigma.net May 1, 2019 Agenda for Today Driving Digital Transformation for Thailand 4.0 Challenges for ICT Professionals Training Program Structure Applying to Study A Brief Presentation of Training Programs


slide-1
SLIDE 1

by ict6sigma.net

May 1, 2019

slide-2
SLIDE 2

Agenda for Today

  • Driving Digital Transformation for Thailand 4.0
  • Challenges for ICT Professionals
  • Training Program Structure
  • Applying to Study
  • A Brief Presentation of Training Programs and

Instructors

  • Conclusion

2

slide-3
SLIDE 3

3

  • 1. Driving Digital Transformation

for Thailand 4.0

1.1 The World of Digital Transformation 1.2 Thailand 4.0

slide-4
SLIDE 4

1.1 The World of Digital Transformation

What Happens in an Internet Minute in 2019?

4

slide-5
SLIDE 5

5

✓ We are all connected ✓ Digital communities ✓ Smart environment ✓ Everything is digitized

New World

slide-6
SLIDE 6

6

New Economy

✓ Information service industries ✓ Company- and society-wide

applications

✓ Worldwide interchange of

data/documents

✓ Time based competition

slide-7
SLIDE 7

7

The Major Driving Force

slide-8
SLIDE 8

8

  • Social networking
  • Mobile networking
  • Data analytics
  • Cloud computing
  • Internet-of-Things

and more

The Big Five to Power Digital Business

slide-9
SLIDE 9

9

Paths to Digital Transformation

slide-10
SLIDE 10

10

Building Blocks of the Digital Transformation

slide-11
SLIDE 11
  • 1. 2 Thailand 4.0

From Thailand 1.0 to 4.0

11

slide-12
SLIDE 12

Thailand 4.0 : New Growth Industry

12

slide-13
SLIDE 13

Thailand 4.0 : Transforming towards the Value-based Economy

  • Commodities
  • Innovation
  • Industries
  • Technology
  • Trade in Goods
  • Trade in Services

13

slide-14
SLIDE 14
  • 2. Challenges for ICT Professionals

Cybersecurity, Information Security, Network Security Service Science, Project Management, Business Process Management Blockchain, Bitcoin Data Science, Big Data Analytics Cloud Computing, SaaS, IaaS, PaaS

14

slide-15
SLIDE 15

15

Where to Seek New Knowledge

  • Search in Google, YouTube,

Wikipedia, …

  • Study with a Trusted Academic

Institution

slide-16
SLIDE 16

16

Project for ICT Professionals with Certification

  • Retraining and Coaching ICT Professionals
slide-17
SLIDE 17

17

  • 3. Training Program Structure
  • Target Group
  • Training Programs
  • Training Process
  • Training Instructors
  • Training Venue
  • Training Schedule
slide-18
SLIDE 18

18

Target Group

  • Graduates in ICT, Computer Science,

Computer Engineering, or Related Area

  • Working in ICT Industry for Some Years
  • Taking Responsibility of Building and

Deploying Technology to Serve His / Her Enterprise

slide-19
SLIDE 19

19

Training Programs

  • ICT Project Management Best Practices
  • Agile Software Development Best Practices
  • Information Security Management Best Practices
  • Data Science for Business Transformation
  • Blockchain and Cryptocurrency for Business Transformation
  • Business Process Management Best Practices

and More

slide-20
SLIDE 20

20

Training Process

  • Lecturing
  • Case Studies
  • Group / Case Discussion
  • Coaching
slide-21
SLIDE 21

21

Training Instructors

  • Prof. Dr. Supachai Tangwongsan
  • Assoc. Prof. Dr. Sudsanguan Ngamsuriyaroj
  • Asst. Prof. Dr. Thanwadee Sunetnanta
  • Dr. Apirak Hoonlor
  • Dr. Siwaruk Siwamogsatham
  • Dr. Kridiwat Suttiwaree
  • Dr. Chakan Pramkaew
slide-22
SLIDE 22

22

Training Venue

  • Cosy Conference Room in a Classy Hotel
  • Near BTS or MRT
slide-23
SLIDE 23

23

Training Schedule

  • Starting from June 25, 2019
  • Each Program Will Take 5 Weeks to Complete
  • One Week Takes 2 Sessions, and 3 Hours per

Session

  • Evening Class from 6 - 9 p.m. , Tuesday,

Thursday, Friday or Saturday

slide-24
SLIDE 24

24

  • 4. Applying to Study
  • Apply via

www.ict6sigma.net

  • r

www.ict.mahidol.ac.th/retraining

  • Get Confirmation
  • Make Electronic Payment
slide-25
SLIDE 25

25

Take a Break

slide-26
SLIDE 26

26

  • 5. A Brief Presentation of Training

Programs and Instructors

  • 1. ICT Project Management Best Practices

by Prof. Dr. Supachai Tangwongsan

  • 2. Information Security Management Best Practices

Jointly Presented by Assoc. Prof. Dr. Sudsanguan Ngamsuriyaroj & Dr. Siwaruk Siwamogsatham

  • 3. Agile Software Development Best Practices

by Asst. Prof. Dr. Thanwadee Sunetnanta

  • 4. Data Science for Business Transformation

by Dr. Apirak Hoonlor

  • 5. Business Process Management Best Practices

by Dr. Kridiwat Suttiwaree

  • 6. Blockchain and Cryptocurrency for Business Transformation

by Dr. Chakan Pramkaew

slide-27
SLIDE 27

27

ICT Project Management Best Practices

slide-28
SLIDE 28

28

The Advantages of Using Best Practices in Project Management

Time & Cost Savings Advantages of Using Best Practices Better Monitoring and Controlling Transfer of Knowledge Better Process Quality Better Communication Better Teamwork Better Position on Market A More Efficient and Objective Audit

slide-29
SLIDE 29

29

10 Sessions in the Training Program

  • 4 Sessions in Review of Fundamentals
  • 3 Sessions in Case Study
  • 2 Sessions in Group/Case Discussion

Problem / Solving

  • Coaching and Conclusion
slide-30
SLIDE 30

30

Project Life Cycle

slide-31
SLIDE 31

31

Project Management Process Groups and Knowledge Area Mapping

slide-32
SLIDE 32

32

Project Management Process Groups and Knowledge Area Mapping (Cont.)

slide-33
SLIDE 33

33

Case Studies in

  • Project Change Management
  • Project Risk Management
  • Project Crisis Management

and more

slide-34
SLIDE 34

INFORMATION SECURITY MANAGEMENT BEST PRACTICES

slide-35
SLIDE 35

35

  • Assoc. Prof. Dr. Sudsanguan Ngamsuriyaroj
  • Faculty of ICT, Mahidol University
  • Email: sudsanguan.nga@mahidol.ac.th

Admin Roles:

  • Former Deputy Director of Mahidol Computing Center
  • Former Deputy Dean of Faculty of ICT

Research: Security, Cloud Computing, IoT Recent Research Projects

  • Measurement and Analytics System for Electricity Usage in a Building, Energy Policy and Planning Office, Ministry
  • f Energy
  • Walking Gait Measurement via Knee Movement and Foot Pressure Plantar, Research and Innovation Fund,

Mahidol University

slide-36
SLIDE 36

Course Objectives

▪ Provide essential knowledge and practical lessons necessary for IT professionals to manage and secure modern information systems ▪ Stimulate profound comprehension and innovative thinking about information security management through case studies and group discussions ▪ Develop fruitful collaborative platforms among participants and distinguished instructors from notable organizations for future collaborations

slide-37
SLIDE 37

List of Instructors

❑ Dr. Siwaruk Siwamogsatham,

Director of National Security and Dual-Use Technology Center, NSTDA

❑ Dr. Komain Pibulyarojana,

Managing Director, T-NET

❑ Dr. Banchong Harangsri,

Senior IT Security Specialist, T-NET

❑ Dr. Supakorn Kungpisdan,

Director of Cyber Security, R.V. Connex

❑ Dr. Urachada Ketprom,

Director of the Strategy Office, ETDA

❑ Mr. Narudom Roongsiriwong,

Senior Vice President, Head of IT Security, Kiatnakin Bank

slide-38
SLIDE 38

Course Outlines

1) Introduction

❑ Course Introduction ❑ Computer Security Basics ❑ Networking Activities

2) Emerging Technologies & Threats

❑ Mobile Devices/5G/Social Network

❑ M-Banking/M-Payment/Cashless ❑ AI, IoT, Cloud, Blockchain

  • Dr. Siwaruk

Siwamogsatham, NSTDA

  • Dr. Komain

Pibulyarojana, T-NET

slide-39
SLIDE 39

Course Outlines

3) ISO 27001 Framework

❑ PDCA Model ❑ Asset Inventory & Risk Assessment ❑ Risk Treatment and Control Measures ❑ Checking, Monitoring, Corrections, Revisions

4) Contingency Planning

❑ Business Continuity Plan (BCP) ❑ Incident Response Plan (IRP) ❑ Disaster Recovery Plan (DRP)

  • Dr. Banchong

Harangsri, T-NET

slide-40
SLIDE 40

Course Outlines

5) Case Studies: Risk Management 7) Case Studies: Compliance and Audit

  • Dr. Supakorn Kungpisdan,

R.V.Connex

6) Case Studies: Cyber Forensics and Incident Responses 8) Thai IT Laws and Regulations

❑ New Data Protection Laws ❑ Compliance Guidelines for Organizations

  • Dr. Urachada Kretprom,

ETDA

  • Mr. Narudom

Roongsiriwong, Kietnakin Bank

slide-41
SLIDE 41

Course Outlines

9) Group Discussions

❑ A supposed security incident scenario will be given to

each group for discussions. A comprehensive framework for solving the problem and strengthening security of the system shall be proposed and presented in class

10) Presentation & Conclusion

slide-42
SLIDE 42

Data Science for Business Transformation

slide-43
SLIDE 43

Apirak Hoonlor apirak.hoo@mahidol.edu

Research Interests

  • 1. Data Mining
  • 2. Data Science
  • 3. AI Application

Current Research Projects

  • 1. Graph Mining Algorithm
  • 2. Multi-Agent for Comp.

Resource Provisioning

  • 3. Decision Support System

Work Experience with public and private sectors

  • 1. Provide professional

training in Data Analytics, Machine Learning, Data Science

  • 2. Perform (and provide

consult on) Data Analytics

  • 3. Assist in Bigdata Platform

development

  • 4. Create prototypes of the

Data Management and AI related applications

slide-44
SLIDE 44

Data Science can be the best asset for your Business Transformation

slide-45
SLIDE 45

Ref: 7wData, "Driving Digital Transformation with Data Science as a Service"

slide-46
SLIDE 46

Are you asking the right question?

  • Without a question, there is no answer. Without an answer, there is

no change.

  • One question can lead to many more.
  • Learn what types of questions can be answered using the current

Data Science technology.

  • Learn from case study what kind of questions were asked and what

technology were used to find the answer.

  • Being coached to set the problem and assess (and validate) the

solutions.

slide-47
SLIDE 47

No one size fits all

  • An asset Data Science Application in one organization

can be a liability in the other.

  • Do not use it because it is trendy
  • Use it because it is the "right" solution
  • Learn from lectures what is possible and what is not
  • Learn from the case study how one applies the

technology

  • Being coach to find the right fit yourself.
slide-48
SLIDE 48

Current Technology for (and Case Studies of)

Unification of Data & Analytics Platform Analytics-based segmentation Predictive Marketing Data-driven decision-making Trend Analysis etc.

slide-49
SLIDE 49

AGILE SOFTWARE DEVELOPMENT BEST PRACTICES

RETRAINING AND COACHING ICT PROFESSIONALS

slide-50
SLIDE 50

MUICT

  • Asst. Prof. Thanwadee Sunetnanta – Ph.D. in Distributed Software

Engineering, Imperial College, University of London, UK

  • Dr. Morakot Choetkiertikul – Ph.D. in Computer Science, University
  • f Wollongong, Australia
  • Dr. Chaiyong Ragkhitwetsagul – Ph.D. in Computer Science,

University College London, UK

50

Some of our research and academic services experiences:

  • ISO/IEC 29110 Consultant
  • Consultant for Central Institute of Forensic Science
  • Quantitative CMMI Assessment with Rational Tools on Jazz for Remote Project Health Monitoring (received

IBM Faculty Award 2010)

  • A Study for Digital Cluster Development in Thailand
  • Development of Quantitative Prototype Tool for Measuring Benefits of Software Process Improvement Using

ISO/IEC 29110 Standard

  • The Development of Startup Profile for Enhancing Startup Scaling
  • Developing AI solutions for supporting software development teams to increase project success rates
slide-51
SLIDE 51

TREE SWING RISK FROM TRADITIONAL SOFTWARE PROCESS

51

slide-52
SLIDE 52

AGILE VERSUS TRADITIONAL SOFTWARE PROCESS

From: The Agile Sketchpad by Dawn Griffiths and David Griffiths

52

slide-53
SLIDE 53

10 BENEFITS OF AGILE FROM CIO.COM

 Incorrect approaches are quickly identified  Decisions are made quickly  Collaboration results in many benefits  Change is recognized as inevitable and is embraced  The final product contains the most useful features  The environment is more appealing for millennials  The production code is of higher quality  The business is more satisfied with the end result  The technical documentation takes less time and is correct  Application maintenance is easier

53

Source: https://www.cio.com/article/3078178/10-reasons-you-should-be-using-agile.html

slide-54
SLIDE 54

5 BIGGEST PITFALLS OF NEW AGILE ADOPTERS

54

Source: https://www.cbtnuggets.com/blog/2017/12/5-biggest-pitfalls-of-new-agile-adopters/

slide-55
SLIDE 55

SOME AGILE MISCONCEPTIONS

 Agile development’s primary goal is speed, to churn out applications

quickly

 Agile means no planning  Agile means less discipline  Agile means no documentation  Agile is a project management approach  Agile doesn’t work for fixed deadline projects  Agile development only requires new tools  Agile adoption only involves developers

and more…

55

Source: Internet

slide-56
SLIDE 56

AGILE MINDSET AND PRACTICES

56

AGILE

Customer satisfaction Face-to-face Changing requirements Simplicity Self-organizing team Regular reflection Teamwork

Product Backlog Lean Sprint Retrospective Priority Scrum Master Product Owner User Story Velocity Kanban Persona Burndown Pair Programming Test-Driven Timeboxing Meeting

slide-57
SLIDE 57

TRAINING TOPICS

 Agile Mindset for Process Transformation  Managing Agile Projects with Scrum  Value-Driven Delivery  Working with Stakeholders and Requirements in Agile  Agile Adaptive Planning  Managing Agile Team Performance  Measuring and Controlling Agile Projects  XP Practice for Agile Development  Agile Testing  Continuous Improvement with Agile

57

slide-58
SLIDE 58

Business Process Management (BPM)

Ideas for today, tomorrow, & beyond

Updated April 26, 2019

slide-59
SLIDE 59

Kridiwat Suttiwaree

B.Eng.1st Hons. (1995) Department of Electrical Engineering and Electronics, School of Electronics and Communications Engineering The University of Liverpool, Merseyside, UK. Awarded Edgar Walfard Merchant Prize

  • Ph.D. (1999)

Department of Electrical Engineering and Electronics Computer Electronics and Robotics (CER) Research Group The University of Liverpool, Merseyside, UK.

slide-60
SLIDE 60

The “4R” Technique for Re-training & Coaching

(1) Review (4) Remark (2) Revolve (3) Reshape Review your understanding on all BPM disciplines & aspects Revolve yourself in-class around selected real- world challenging cases: proving the successful implementation of BPM Remark the end of Re- training & Coaching with BPM Modernization addressing 5G &IoT roles Reshape your existing Super Processes to better deliver value to your customers 4 Sessions of Fundamental 2 Sessions of Case Studies 2 Sessions of Your Problem Solving 2 Sessions of Group Coaching

slide-61
SLIDE 61

The Look & Feel of BPM

  • Holistically, BPM can be referred to as a :-
  • Philosophy

→ that emphasizes on “understanding & optimizing” business processes

  • Methodology

→ that ensures a “continuous process improvement” throughout the lifecycle backed by directives, guidance, activities, techniques, and so on.

  • Technology

→ that orchestrates the “mapping & documenting” across the spectrum of all underlined business processes

Definition of a Business Process

  • Simply speaking, it is a set of steps taken in day-to-day work activities that is performed

to accomplish a desired outcome.

slide-62
SLIDE 62

Types of Processes [Super Processes]

  • Management Processes
  • Operational Processes (Core Value Streams / Primary Processes)
  • Supporting Processes (Secondary Processes)

Process Improvement & Re-engineering

  • A continuous look for “waste & ways” to streamline and improve business

processes through various techniques as well as re-think, re-design work activities in such a way to better support business missions.

slide-63
SLIDE 63

The Benefits of BPM

  • Lowering costs
  • Increasing revenue
  • Improving accountability
  • Speeding time to market
  • Improving customer satisfaction
  • Improving product and service quality
  • Improving reliability of information
slide-64
SLIDE 64

BPM Involvement – the 7 Factors

  • Factors

Key Considerations

1.Scope horizon of focus: process, department, entire company 2.Goals process understanding, improving, optimizing, etc. 3.Methods to be used six-sigma, lean, PDCA, generic BPM cycle, best-in-class 4.Skills required consulting, training, educating, existing skill sets 5.Tools to be used software for mapping, documenting, simulation, etc. 6.Investments to make training, tools, time, etc. 7.Sponsorship described by: executive level, department level, process owner level, employee level

slide-65
SLIDE 65

BPM Lifecycle

  • Phase 1:

Process Planning & Strategy (Primary & Secondary Processes)

  • Phase 2:

Analysis of Business Processes (Qualitative & Quantitative Analyses)

  • Phase 3:

Design & Modeling of Business Processes (Representational Structure)

  • Phase 4:

Process Implementation (Systematic v.s. Non-Systematic Implementation)

  • Phase 5:

Process Monitoring & Control (Business Process Historical Analytics)

  • Phase 6:

Process Refinement & Improvement (Performance of the i) processes themselves, as well as for their underlined ii) management principles and iii) the implication to the organization as a whole)

slide-66
SLIDE 66

The Contribution of 5G & IoT towards BPM

  • 5G :
  • Business process change / adaptation due to the “Mobility” & “Seamless

High Speed Data Transferability” nature of the 5th generation wireless cellular communication technology

  • Its implication to modernizing the organizational business processes
  • IoT:
  • Next “Dimension” of business process and business data “Consolidation” to

gaining competitive advantage and further enhancing the business performance as well as promoting supply and demand visibilities

slide-67
SLIDE 67

(1) Review (4) Remark (2) Revolve (3) Reshape

Conclusion: Re-training & Coaching Proposed Framework

slide-68
SLIDE 68

Blo lockchain and Cry ryptocurrency for Business Transformation

slide-69
SLIDE 69

Chakan Pramkaew, Ph.D. Research Interests: Cryptography and Blockchain Current Work: Blockchain Architect at NDID

slide-70
SLIDE 70
slide-71
SLIDE 71

# game theory

# Proof of Work

What Is Blockchain

# Proof of Stake

# consensus protocol

# bitcoin

?

# crypto key # ethereum

# hash function

# distributed ledger

slide-72
SLIDE 72

Motivating example: smart property

Bitcoin and Cryptocurrency Technologies, https://www.coursera.org/learn/cryptocurrency

slide-73
SLIDE 73

https://cdn-images-1.medium.com/max/1600/0*nv6M-Qgh8PAVJT06.

slide-74
SLIDE 74

Our course

  • Cryptography
  • Cryptocurrency
  • Blockchain
  • Cryptoeconomics
  • Game Theory
  • Consensus
  • Proof of Work
  • Proof of Stake
  • Enterprise Blockchain
  • Anonymity
  • Blockchain Applications
  • Case Studies
  • Group/Case Discussion
  • Problem/Solving
  • Etc.
slide-75
SLIDE 75

75

  • 6. Conclusion
slide-76
SLIDE 76

76