IT and Security Governance. Jacqueline Johnson

Size: px
Start display at page:

Download "IT and Security Governance. Jacqueline Johnson"

Transcription

1 IT and Security Governance Jacqueline Johnson

2 Background Control Objectives for Information and related Technology Developed by IT Governance Institute (ITGI) Not incremental High level standard 5 principles 2 Jacqueline Johnson 06/04/2012

3 Principle 1. Meeting Stakeholder Needs WHO? 3

4 Principle 1. Goal cascade steps 1. Stakeholder drivers to Stakeholder Needs 2. Stakeholder Needs to Enterprise Goals 3. Enterprise Goals to IT related Goals 4. IT related Goals to Enabler Goals 4

5 Principle 1. Goal cascade step 2- Stakeholder Needs to Enterprise Goals BSC Enterprise goals BENEFITS REALISATION Financial -II- -II- -II- STAKEHOLDER VALUE OF BUSINESS INVESTMENTS PORTFOLIO OF COMPETITIVE PRODUCTS AND SERVICES MANAGED BUSINESS RISKS SAFEGUARDING OF ASSETS COMPLIANCE WITH EXTERNAL LAWS AND REGULATIONS P P RISK OPTIMISATION -II- FINANCIAL TRANSPARENCY P S P P RESOURCE OPTIMISATION S S 5 3/28/2012

6 Principle 1. Goal cascade step 2- Stakeholder Needs to Enterprise Goals Stakeholder concern Enterprise goal 1 Enterprise goal 2 Enterprise goal 3 How do I know whether I'm compliant with all applicable regulations? How do I best build and structure my IT department? Compliance with external laws and regulations Managed business risks (safeguarding of assets) Financial transparency What are (control) requirements for information? X X X Did I address IT related risk? X X Am I running an efficient and resilient IT operation? X X 6 3/28/2012

7 Principle 1. Goal cascade step 3- Enterprise Goals to IT Goals BSC IT Goals Enterprise goals Enterprise goals Financial Alignment of IT and business strategy COMPLIANCE WITH EXTERNAL LAWS AND REGULATIONS MANAGED BUSINESS RISKS SAFEGUARDING OF ASSETS -II- -II- IT compliance and support for business compliance with external laws and regulations Commitment of executive management for making IT related decisions -II- Managed IT related business risks S -II- Realised benefits from IT enabled investments and services portfolio -II- Transparency of IT costs, benefits and risk P P Internal Security of information and processing infrastructure and applications P 7 3/28/2012

8 Principle 1. Goal cascade step 4- IT Goals to Cobit processes B SC IT Goals BA1 Manage Programmes and Projects DDS1 Manage Operations DDS2 Manage Assets DDS3 Manage Configurati on DDS4 Manage Service Requests and Incidents Fina ncial - II- II- II- II- II Alignment of IT and business strategy IT compliance and support for business compliance with external laws and regulations Commitment of executive management for making IT related decisions Managed IT related business risks Realised benefits from IT enabled investments and services portfolio Transparency of IT costs, benefits and risk S S S S S P P P P S S P 8 3/28/2012

9 Principle 1. Stake holders needs Goals cascade 9

10 Principle 2. Covering the Enterprise End-to-end 10

11 Principle 3. Applying a Single Integrated Framework Integration of frameworks for governance and management both regarding business and IT. Enterprise: COSO, COSO ERM, ISO/IEC 9000, ISO/IEC IT-related: ISO/IEC 38500, ITIL, ISO/IEC series, TOGAF, PRINCE2, CMMI Links standards and framework 11

12 Principle 4. Enabling a Holistic Approach enablers overview 12

13 Principle 4. Enabling a Holistic Approach- enablers dimensions 13

14 Principle 5. Separating Governance From Management Governance Governance is the system or mechanism by which organisations are Evaluated, Directed and Monitored (EDM). Responsible: board of directors. Management Management Plans, Builds, Runs and Monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives (PBRM). Responsible: CEO. 14

15 Principle 5. Separating Governance From Management- PRM COBIT 5 process reference model 15

16 Process Reference Model sample på process- DS1 The high-level measurable objectives of performing the process and the likely outcomes of effective implementation of the process The activities that, when consistently performed, contribute to achieving the process purpose 16 Jacqueline Johnson 06/04/2012

17 Process Capability Levels Optimizing The process is continuously improved to meet relevant current and projected business goals Predictable The process is enacted consistently within defined limits Level 5 Optimizing process PA 5.1 Process innovation attribute PA 5.2 Process optimization attribute Level 4 Predictable process PA 4.1 Process measurement attribute PA 4.2 Process control attribute Established A defined process is used based on a standard process Level 3 Established process PA 3.1 Process definition attribute PA 3.2 Process deployment attribute Level 1 Performed process PA 1.1 Level 2 Managed process PA 2.1 PA 2.2 Performance management attribute Work product management attribute Process performance attribute Performed The process is implemented and achieves its process purpose Managed The process is managed and work products are established, controlled and maintained Level 0 Incomplete process Incomplete The process is not implemented or fails to achieve its purpose 17 Jacqueline Johnson 06/04/2012

18 Process Attributes- Level 1 PA 1.1 Process performance extent to which the process purpose is achieved. full achievement means that the process achieves its defined outcomes. 18 Jacqueline Johnson 06/04/2012

19 Process Attributes- Level 2 PA 2.1 Performance management A measure of the extent to which the performance of the process is managed. As a result of full achievement of this attribute: a. Objectives for the performance of the process are identified. b. Performance of the process is planned and monitored. c. Performance of the process is adjusted to meet plans. d. Responsibilities for performing the process are defined, assigned and communicated. e. Resources necessary for performing the process are identified, available, allocated and used. f. Effective communication between the involved parties and clear assignment of responsibility. PA 2.2 Work product management A measure of the extent to which the work products produced by the process are appropriately managed. As a result of full achievement of this attribute: a. Requirements for the work products of the process are defined. b. Requirements for documentation and control of the work products are defined. c. Work products are appropriately identified, documented and controlled. d. Work products are reviewed in accordance with planned arrangements and adjusted as necessary to meet requirements. 19 Jacqueline Johnson 06/04/2012

20 Completion scale 20 Jacqueline Johnson 06/04/2012

21 Process Attribute Ratings and Capability Levels Level 5 - Optimizing PA 5.2 Optimization PA 5.1 Innovation L / F Level 4 - Predictable PA 4.2 Control PA 4.1 Measurement L / F F Level 3 - Established PA 3.2 Deployment PA 3.1 Definition L / F F F Level 2 - Managed PA 2.2 Work product management PA 2.1 Performance management L / F F F F Level 1 - Performed PA 1.1 Process performance L / F F F F F Level 0 - Incomplete 21 Jacqueline Johnson 06/04/2012

22 Comparison between COBIT 4.1 and COBIT 5 levels 22 Jacqueline Johnson 06/04/2012

23 COBIT implementation 1. Commitment, mandate and support reg. improvement project from top business management 2. Scope, mapping fr. drivers to processes Assessment of status via process capability assessment 3. Agree targets, time, processes and level 4. Prepare implementation and operational plans 5. Implementation of solution. Stipulate metrics 6. Verification of target reached 7. Identification of improvement to project and maintaining 23 Jacqueline Johnson 06/04/2012

24 Informtion Security Management

25 ISO27001, ISO27002 and ISO27014 ISO ( audit standard) Removal of access The access rights of all employees, contractors and third party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change. ISO27002 (implementation guide)3.3 Removal of access Upon termination, the access rights of an individual to assets associated with information systems and services should be reconsidered. This will determine whether it is necessary to remove access rights. Changes of an employment should be reflected in removal of all access rights that were not approved for the new employment. The access rights that should be removed or adapted include physical and logical access, keys, identification cards, information processing facilities, subscriptions, and removal from any documentation that identifies them as a current member of the organization. If a departing employee, contractor or third party user has known passwords for accounts remaining active, these should be changed upon termination or change of employment, contract or agreement. 25 Jacqueline Johnson 06/04/2012

26 Plan, Do, Check and Act 26 Jacqueline Johnson 06/04/2012

27 Risk assessment - placing IT Security Policy Standards Procedures Risk Assessment 27

28 Risk assessment 1. Scope in the company 2. Assets 3. Vulnerabilities 4. Threats 5. Consequenences 6. Likelyhood 28 Jacqueline Johnson 06/04/2012

29 Risk management 1. "Degree of assurance" 2. Analysis of existing security controls 3. Gap analyse 4. Identification of new security controls 5. Policies and procedures 6. Implementation and risk reduction 7. Rik acceptance (residual risk) 29

30 Statement of applicability Mandatory Explain why the company has chosen the stipulated controls, connected to the risk analysis and why areas has been discarded. Documentation of compliance Should be able to make public 30

31 Certification (3 years) Desktop review statement of applicability risk assessment security policy procedures Compliance Interview Samples, are the controls implemented Observing Final recommendation Certification Non compliances 31

32 Thank you! Jacqueline Johnson

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval Presented by 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides : Enabling es : Enabling Information Other Enabler Guides COBIT 5 Professional Guides Implementation for Information for Assurance for Risk Other Professional

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

COBIT 5: IT is complicated. IT governance does not have to be

COBIT 5: IT is complicated. IT governance does not have to be COBIT 5: IT is complicated. IT governance does not have to be ค ณวรางคณา ม ส กะส งข - นายกสมาคมผ ตรวจสอบและควบค มระบบสารสนเทศภาคพ น กร งเทพฯ และ Director, Assurance RCS PricewaterhouseCoopers ABAS Ltd.

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved.

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved. Comparing COBIT4.1 and COBIT 5 ROBERT E STROUD CGEIT CRISC ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 1 2012 ISACA. All Rights Reserved. Comparing COBIT 4.1 and

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides COBIT 5 COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

ISACA All Rights Reserved.

ISACA All Rights Reserved. Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems, PGD Computer Auditing Accredited COBIT 5 Trainer ISACA 2016. Business Value Value

More information

Enterprise Governance of IT

Enterprise Governance of IT Enterprise Governance of IT Prof. dr. Wim Van Grembergen University of Antwerp (UA) Antwerp Management School (AMS) IT Alignment and Governance Research Institute (ITAG) wim.vangrembergen@ua.ac.be What

More information

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex 2 RACI chart for EDM0, Retrieved from COBIT5 Description: R Responsible The one(s) who performs the

More information

Introduction to COBIT 5

Introduction to COBIT 5 Introduction to COBIT 5 Executive Summary Information is a key resource for all enterprises, and from the time that information is created to the moment that it is destroyed, technology plays a significant

More information

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force COBIT 5 for Information Security Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force First, a bit of background Just to level the playing field COBIT 5 Objectives o ISACA Board of Directors: tie together

More information

If It s not a Business Initiative, It s not COBIT 5

If It s not a Business Initiative, It s not COBIT 5 If It s not a Business Initiative, It s not COBIT 5 Steve Romero CISSP PMP CPM Romero Consulting Core Competencies C22 CRISC CGEIT CISM CISA 1 9/13/2013 1 COBIT Page 11 COBIT 5 product family 2 COBIT Page

More information

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL Governance SPICE Using COSO and COBIT Process Assessment Models Linking Governance to Sustainable Value Creation BPM GOSPEL (LLP-LDV-TOI-2010-HU-001) This project has been funded with support from the

More information

ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns

ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns ISO Standards in Strengthening Organizational Resilience, Mitigating Risk & Addressing Sustainability Concerns 13 December 2016 Joe Muratore Copyright 2012 BSI. All rights reserved. Enterprise Risk Management

More information

CGEIT QAE ITEM DEVELOPMENT GUIDE

CGEIT QAE ITEM DEVELOPMENT GUIDE CGEIT QAE ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS PURPOSE OF THE CGEIT ITEM DEVELOPMENT GUIDE 3 PURPOSE OF THE CGEIT QAE... 3 CGEIT EXAM STRUCTURE... 3 WRITING QUALITY ITEMS... 3 MULTIPLE-CHOICE ITEMS...

More information

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme ECQA Certified Profession Governance SPICE Model used by the Internal Financial Control Assessor Training Programme Contact: János Ivanyos Memolux Ltd. +36 1 467403 ivanyos@memolux.hu www.training.ia-manager.org

More information

Service Strategy Quick Reference Guide

Service Strategy Quick Reference Guide Service Strategy Quick Reference Guide To enable service providers to think and act in a strategic manner to achieve strategic goals or objectives through the use of strategic assets Value Creation through

More information

Achieving Business/IT Alignment through COBIT 5

Achieving Business/IT Alignment through COBIT 5 Achieving Business/IT Alignment through COBIT 5 Prof. dr. Wim Van Grembergen University of Antwerp Antwerp Management School wim.vangrembergen@ua.ac.be Intro: EGIT and COBIT 5 Definition of EGIT Enterprise

More information

Information and Technology. Governance. System for

Information and Technology. Governance. System for 2019 strategy goals size Role of IT Sourcing model for IT Compliance requirements Etc. Design Factors SME Risk DevOps Etc. Priority governance management objectives Specific guidance from focus areas Target

More information

The Role of ISO Standards in Governance, Risk and Compliance Management for Today s Business

The Role of ISO Standards in Governance, Risk and Compliance Management for Today s Business The Role of ISO Standards in Governance, Risk and Compliance Management for Today s Business HKQAA Symposium 2017 Dr Nigel H Croft May 2017 (C) Nigel H Croft 2017 - All rights reserved 1 Governance The

More information

COBIT 5 Foundation Exam

COBIT 5 Foundation Exam COBIT 5 Foundation Exam Sample Paper Multiple Choice Instructions 1. All 50 questions should be attempted. 2. All answers are to be marked on the answer sheet provided. 3. Please use a pencil and NOT ink

More information

Feature. Unlocking Hidden Value in ERP System Acquisitions Using Risk Management. Risk. Monitoring. Residual Risk Acceptance.

Feature. Unlocking Hidden Value in ERP System Acquisitions Using Risk Management. Risk. Monitoring. Residual Risk Acceptance. Feature Gregory Zoughbi, CISA, CISM, CGEIT, CRISC, COBIT 4.1 (F), ABCP, CISSP, ITIL Expert, PMP, TOGAF 9 (C), is an advisor to chief information officers (CIOs) and chief executive officers (CEOs) on the

More information

ISO/IEC Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance

ISO/IEC Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance DISCUSS THIS ARTICLE ISO/IEC 27001 Process Mapping to COBIT 4.1 to Derive a Balanced Scorecard for IT Governance By Christopher Oparaugo, CISM, CGEIT, CRISC COBIT Focus 14 December 2015 The balanced scorecard

More information

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 International Civil Aviation Organization WORKING PAPER 15/01/2015 rev. 0 FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 Agenda Item 5: Review and elaborate on concepts,

More information

The Anatomy and Lifecycle of a Metric

The Anatomy and Lifecycle of a Metric A metric is the expression of the state and/or quality of a critical aspect of your IT and security infrastructure and is the basis for directing investments to areas of high risk, as well as a forum for

More information

Log of Changes Implemented to the COBIT 5 Product Family

Log of Changes Implemented to the COBIT 5 Product Family Log of Changes Implemented to the COBIT 5 Product Family All of the edits detailed below up to were available to all downloaders as of. Anyone receiving the pdf files on or after already have the corrections

More information

Appendix A - Service Provider RACI Model

Appendix A - Service Provider RACI Model Portfolio es: R A C / I P.1 Portfolio Strategy Centralized management of one or more portfolios (major programs), which includes identifying, prioritizing, authorizing, managing, and controlling projects,

More information

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson

COSO ERM: Integrating with Strategy and Performance. Michael Parkinson COSO ERM: Integrating with Strategy and Performance Michael Parkinson Content The COSO Frameworks Risk (Enterprise) Risk Management The COSO risk management framework A few highlights Questions for management

More information

Portfolio, Program and Project Management Using COBIT 5

Portfolio, Program and Project Management Using COBIT 5 DISCUSS THIS ARTICLE Portfolio, Program and Project Using COBIT 5 By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP COBIT Focus 11 September 2017 Many

More information

Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell. PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE

Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell. PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE LHS Business Control Tel: +44 (0)7774 145638 47 Grangewood

More information

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu February 13, 2017 1 IT Assurance and COBIT 5 Enablers Enablers are factors that, individually and collectively, influence whether something will work. 2. Processes 3. Organizational Structures 4. Culture,

More information

Enterprise Security Architecture A Top-down Approach. Contextual Security Architecture. Logical Security Architecture. Physical Security Architecture

Enterprise Security Architecture A Top-down Approach. Contextual Security Architecture. Logical Security Architecture. Physical Security Architecture featu eature feature Enterprise Security A Top-down Approach Implementing security architecture is often a confusing process in enterprises. Traditionally, security architecture consists of some preventive,

More information

CGEIT ITEM DEVELOPMENT GUIDE

CGEIT ITEM DEVELOPMENT GUIDE CGEIT ITEM DEVELOPMENT GUIDE Updated March 2017 TABLE OF CONTENTS Content Page Purpose of the CGEIT Item Development Guide 3 CGEIT Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies

IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies IT Assurance Services And Role Of CA In BPO-KPO IT Enabled Services And Emerging Technologies Chapter 2: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1 IT Assurance Services and Role of CA in BPO-KPO

More information

Risk Management Strategy

Risk Management Strategy Risk Management Strategy 2017-2019 Created by: Role Name Title Author / Editor Kevin McMahon Head of Risk Management & Resilience Lead Executive Margo McGurk Director of Finance & Performance Approved

More information

29/11/2017. Risk Management Policy

29/11/2017. Risk Management Policy 1 Purpose APA Group (APA) is Australia s leading energy infrastructure business delivering smart, reliable and safe solutions through our deep industry knowledge and interconnected infrastructure. Risk

More information

Selftestengine COBIT5 36q

Selftestengine COBIT5 36q Selftestengine COBIT5 36q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers.

More information

Index. client-supplier paradigm 202

Index. client-supplier paradigm 202 276 Index A Accounting Standard (AS) 80 Acquire & Implement (AI) 63, 64, 69, 70 Activity-Based Costing (ABC) 226 Administrative Roles and Responsibilities 35 ALEX 135, 137, 138, 139, 140, 141 alignment

More information

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub Governance and Management of Information and Related Technologies Guide 2017 Revision History Changes Reviewed by Date Version Author JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology:

More information

COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury

COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury Dian Utami Setya 1, Wella 2 Department of Information System, Faculty of Engineering and Informatics, Universitas Multimedia

More information

"IT Governance Helping Business Survival

IT Governance Helping Business Survival "IT Governance Helping Business Survival Steve Crutchley CEO & Founder Consult2Comply www.consult2comply.com Introduction Steve Crutchley Founder & CEO of Consult2Comply 39 Years IT & Business Experience

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Continuity Management Policy Version FINAL 1.0 Ratified by Dudley CCG Audit Committee Date ratified 17/03/16 Name of originator(s) / author(s) David Morris, Midlands and Lancashire CSU/ Sue Johnson,

More information

Assessment of IT Operations. Frameworks* An Overview

Assessment of IT Operations. Frameworks* An Overview Assessment of IT Operations Leveraging Industry Standard Frameworks* An Overview *COBIT 5, ITIL,CMM,other SPEAKER BIOGRAPHY Sameer Gupta is a director in KPMG's Consulting Practice and has over 25 years

More information

TABLE OF CONTENTS 2. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT 15

TABLE OF CONTENTS 2. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT 15 . INTRODUCTION. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT.. THE ORGANIZATION AS A SYSTEM...... Business processes...................................................... The value chain...... Value

More information

6. IT Governance 2006

6. IT Governance 2006 6. IT Governance 2006 Introduction The Emerging Enterprise Model 3 p IT is an integral part of the business p IT governance is an integral part of corporate governance 4 Challenges for the IT IT gets more

More information

PG&E Gas Operations. Gas Safety Excellence API 1173

PG&E Gas Operations. Gas Safety Excellence API 1173 PG&E Gas Operations Gas Safety Excellence API 1173 Gas Safety Excellence Framework PG&E Confidential 2 Our Strategic Drivers Why did PG&E Gas Operations launch and sustain Gas Safety Excellence? Provide

More information

Evidence Management for the COBIT 5 Assessment Programme By Jorge E. Barrera N., CISA, CGEIT, CRISC, COBIT (F), ITIL V3F, PMP

Evidence Management for the COBIT 5 Assessment Programme By Jorge E. Barrera N., CISA, CGEIT, CRISC, COBIT (F), ITIL V3F, PMP Volume 3, July 2013 Come join the discussion! Jorge E. Barrera N. will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 22 July 2013. Evidence Management for

More information

Head of Architecture (Enterprise Architect) Grade: Assistant Director Strategy & Architecture

Head of Architecture (Enterprise Architect) Grade: Assistant Director Strategy & Architecture College/Service: Post: Reference: Grade: Reporting To: Responsible For: Exeter IT Head of Architecture (Enterprise Architect) P58848 G Assistant Director Strategy & Architecture Architecture Team ORGANISATIONAL

More information

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP

BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP BC & RISK MANAGEMENT: CONVERGENCE IS REAL David Halford Forsythe Solutions Group Frank Perlmutter Strategic BCP WHY THE CONVERGENCE OF BUSINESS CONTINUITY & RISK MANAGEMENT? The convergence of BC and RM

More information

Managing Suppliers Quality

Managing Suppliers Quality Managing Suppliers Quality Why quality of supplier is more important than costs. Why digital transformation requires modernization of traditional supplier management practices. 20.11.2018 Prague Zdeněk

More information

Braindumps COBIT5 50q

Braindumps COBIT5 50q Braindumps COBIT5 50q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers. If there

More information

Understanding the Challenge and Incredible Potential of IT Governance

Understanding the Challenge and Incredible Potential of IT Governance Understanding the Challenge and Incredible Potential of IT Governance REALIZING THE MOST VALUE FROM TECHNOLOGY THROUGH BUSINESS GOV ERNANC E O F IT Governance defined gov er nance noun (ˈgə-vər-nən(t)s)

More information

ITIL V3 Managing Across the Lifecycle

ITIL V3 Managing Across the Lifecycle ITIL V3 Managing Across the Lifecycle Course Length: 5 Days Course Overview This hands-on course leads to a Certificate in ITIL V3 Service Management - Managing Across the Lifecycle. This certification

More information

Risk Analysis of IT Applications Using FMEA and AHP SAW Method With COBIT 5

Risk Analysis of IT Applications Using FMEA and AHP SAW Method With COBIT 5 Analysis of IT Applications Using FMEA AHP SAW Method With COBIT 5 Amrina Friska Apriliana 1, Riyanarto Sarno 2, Yutika Amelia Effendi 3 1 Department of Information Technology ment, 2,3 Department of Informatics

More information

Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on

Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on Cobit 5! John Krogh Twitter: @jakrogh Blog: www.johnakrogh.com! proven experience proven tactics

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing INTERNATIONAL STANDARD ISO/IEC 27007 First edition 2011-11-15 Information technology Security techniques Guidelines for information security management systems auditing Technologies de l'information Techniques

More information

Exploring Differences between Large and Medium Organizations Corporate Governance of Information Technology

Exploring Differences between Large and Medium Organizations Corporate Governance of Information Technology Exploring Differences between Large and Medium Organizations Corporate Governance of Information Technology UWCISA Symposium Professor Carla Wilkin, Department of Accounting, Monash University Paul Couchman

More information

IT risks and controls

IT risks and controls Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2017 Agenda I IT GOVERNANCE IT evolution, objectives, roles

More information

The purpose of this document is to define the overall IT Strategy for the period 2016 to 2021

The purpose of this document is to define the overall IT Strategy for the period 2016 to 2021 Information Technology IT STRATEGY The purpose of this document is to define the overall IT Strategy for the period 2016 to 2021 The IT Strategy will align with the wider University Strategy. It will be

More information

Topics. Background Approach Status

Topics. Background Approach Status 16 th September 2014 Topics Background Approach Status Background e-governance in India National e-governance Plan 2006 31 Mission Mode Projects Quality Assurance in e-governance Quality Assessment of

More information

Senior Manager. Develop and design effective enterprise solutions that meet the business requirements while ensuring alignment to the IT strategy.

Senior Manager. Develop and design effective enterprise solutions that meet the business requirements while ensuring alignment to the IT strategy. Position title: Senior Enterprise Architect Security, Risk & IAM Reporting to: Networks, Communications, Security & IAM Architecture Manager Division: IT Evaluated level of the position: ICE 2 Stratum

More information

Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5

Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5 Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5 Kemkanit Sanyanunthana Abstract The purpose of this research is to study the management system of information

More information

Chapter 2 Strategic Planning of IT

Chapter 2 Strategic Planning of IT Chapter 2 Strategic Planning of IT Do today what others will not think until tomorrow because nothing endures but change Heraclitus, 450 B.C. Against a backdrop of globalisation, mergers & acquisitions,

More information

10 metrics for improving the level of management. Pekka Forselius, Senior Advisor, FiSMA ry Risto Nevalainen, Senior Advisor, FiSMA ry

10 metrics for improving the level of management. Pekka Forselius, Senior Advisor, FiSMA ry Risto Nevalainen, Senior Advisor, FiSMA ry 10 metrics for improving the level of management Pekka Forselius, Senior Advisor, FiSMA ry Risto Nevalainen, Senior Advisor, FiSMA ry Contents Introduction to selecting measures Classification of metrics

More information

ISACA. The recognized global leader in IT governance, control, security and assurance

ISACA. The recognized global leader in IT governance, control, security and assurance ISACA The recognized global leader in IT governance, control, security and assurance High-level session overview 1. CRISC background information 2. Part I The Big Picture CRISC Background information About

More information

RISK MANAGEMENT IN ELECTRONIC PAYMENTS. Olutimilehin Oyesanya (Phillips Consulting) CISSP, CISA, COBIT 5 Assessor, PMP, ISO LA, ISO LI

RISK MANAGEMENT IN ELECTRONIC PAYMENTS. Olutimilehin Oyesanya (Phillips Consulting) CISSP, CISA, COBIT 5 Assessor, PMP, ISO LA, ISO LI RISK MANAGEMENT IN ELECTRONIC PAYMENTS Olutimilehin Oyesanya (Phillips Consulting) CISSP, CISA, COBIT 5 Assessor, PMP, ISO 27001 LA, ISO 20000 LI Phillips Consulting Who we are Our Technology Division

More information

Embed with SFIA Secrets from the missing Framework

Embed with SFIA Secrets from the missing Framework the missing Framework Simon Roller Reviewed January 2016 Why is value so hard to sustain? What is the secret to making best practice stick? How do you make process improvement and good governance last

More information

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM) The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview

More information

The COSO Risk Framework: A reference for internal control? Transition from COSO I to COSO II

The COSO Risk Framework: A reference for internal control? Transition from COSO I to COSO II The COSO Risk Framework: A reference for internal control? Transition from COSO I to COSO II S P E A K E R : D O T T. FA B I O A C C A R D I C O U R S E O F B U S I N E S S A U D I T I N G U N I V E R

More information

Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner

Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner Title: Configuration Management: The Core of IT Operations Session #: 495 Speaker: Donna Scott Company: Gartner Predicts 2006 Increasing regulatory requirements will drive IT investment by as much as a

More information

ISO/IEC Service Management. Your implementation guide

ISO/IEC Service Management. Your implementation guide ISO/IEC 20000-1 Service Management Your implementation guide ISO/IEC 20000-1 Service Management Implementation Guide What is ISO/IEC 20000-1? ISO/IEC 20000-1 is the international standard for Service Management

More information

Critical Success Factor in ERM Implementation

Critical Success Factor in ERM Implementation Critical Success Factor in ERM Implementation Mohd Shahari Idris 4 th & 5 th June 2014, Mandarin Oriental Hotel, KL Integrating Risk and Objectives VISION MISSION STRATEGY MAP ENTERPRISE RISK MANAGEMENT

More information

Firm Profile TURNING RISKS INTO OPPORTUNITIES

Firm Profile TURNING RISKS INTO OPPORTUNITIES Firm Profile TURNING RISKS INTO OPPORTUNITIES You can measure opportunity with the same yardstick that measures the risk involved. They go together. Earl Nightingale TRUSTED ADVISORS RiSK Opportunities

More information

Developing a successful governance strategy. By Muhammad Iqbal Hanafri, S.Pi., M.Kom. IT GOVERNANCE STMIK BINA SARANA GLOBAL

Developing a successful governance strategy. By Muhammad Iqbal Hanafri, S.Pi., M.Kom. IT GOVERNANCE STMIK BINA SARANA GLOBAL Developing a successful governance strategy By Muhammad Iqbal Hanafri, S.Pi., M.Kom. IT GOVERNANCE STMIK BINA SARANA GLOBAL it governance By NATIONAL COMPUTING CENTRE The effective use of information technology

More information

Using Risk Management to achieve good IT Governance. Carl Sackey CISA, CISM, CRISC, ISO LA/LI

Using Risk Management to achieve good IT Governance. Carl Sackey CISA, CISM, CRISC, ISO LA/LI Using Risk Management to achieve good IT Governance Carl Sackey CISA, CISM, CRISC, ISO 27001 LA/LI In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance

More information

Contents. viii. List of figures. List of tables. OGC s foreword. 6 Organizing for Service Transition 177. Chief Architect s foreword.

Contents. viii. List of figures. List of tables. OGC s foreword. 6 Organizing for Service Transition 177. Chief Architect s foreword. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 ix xi xii 1.1 Overview 3 1.2 Context 3 1.3 Goal and scope of Transition

More information

Enterprise SPICE Good to Go!

Enterprise SPICE Good to Go! Enterprise SPICE Good to Go! Dr. Linda Ibrahim International Project Leader Enterprise SPICE (ISO/IEC 15504) Presented at SPICE 2010 Pisa, Italy - May 2010 Enterprise SPICE Good to Go - Ibrahim SPICE 2010

More information

https://www.e-janco.com

https://www.e-janco.com E-mail: support@e-janco.com https://www.e-janco.com Summary Table of Contents IT INFRASTRUCTURE, STRATEGY, AND CHARTER SUMMARY...1 Benefits of IT Infrastructure Management...1 Base Assumptions and Objectives...2

More information

Further excellence. Freedom of association. How can you enhance social responsibility within your supply chain? Social responsibility Audit solutions

Further excellence. Freedom of association. How can you enhance social responsibility within your supply chain? Social responsibility Audit solutions Human rights Compliance Labour conditions Safety Further excellence Trust Health Accountability Freedom of association How can you enhance social responsibility within your supply chain? Social responsibility

More information

IT and Enterprise Governance By Michael J. A. Parkinson, CISA, CIA, and Nicholas J. Baker, CPA

IT and Enterprise Governance By Michael J. A. Parkinson, CISA, CIA, and Nicholas J. Baker, CPA Copyright 2005 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT and Enterprise Governance By Michael J. A. Parkinson, CISA, CIA, and Nicholas J. Baker, CPA Enterprise

More information

Applying Integrated Assurance Management Scenarios for Governance Capability Assessment

Applying Integrated Assurance Management Scenarios for Governance Capability Assessment Applying Integrated Assurance Management Scenarios for Governance Capability Assessment János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, ivanyos@trusted.hu Abstract. The well established

More information

METHODOLOGICAL RECOMMENDATIONS FOR INFORMATION SYSTEMS AUDIT

METHODOLOGICAL RECOMMENDATIONS FOR INFORMATION SYSTEMS AUDIT New edition since 27 April, 2006 Methodological Recommendations for Information Systems Audit APPROVED BY THE AUDITOR GENERAL S Order No. V-65 of 27 April 2006 METHODOLOGICAL RECOMMENDATIONS FOR INFORMATION

More information

Job Description. No of Direct Reports : 0. Titles of Direct Reports: Size of Department: 5. Budget Responsibility (direct) :

Job Description. No of Direct Reports : 0. Titles of Direct Reports: Size of Department: 5. Budget Responsibility (direct) : Job Description Job Title : Department : Compliance Analyst Information Technology Reporting to (Job Title) : Director of Risk, Security & Compliance No of Direct Reports : 0 Titles of Direct Reports:

More information

Guidelines on the protection of personal data in IT governance and IT management of EU institutions

Guidelines on the protection of personal data in IT governance and IT management of EU institutions Guidelines on the protection of personal data in IT governance and IT management of EU institutions Postal address: rue Wiertz 60 - B-1047 Brussels Offices: rue Montoyer 30 - B-1000 Brussels E-mail : edps@edps.europa.eu

More information

INTERNAL AUDIT DIVISION

INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/057 Audit of the Omgeo system in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results relating to the effective and efficient

More information

Assistant Regional Asset Manager EU, Wider Europe and Americas. Department/Country Global Estates. Duration of job

Assistant Regional Asset Manager EU, Wider Europe and Americas. Department/Country Global Estates. Duration of job Role Profile Job Description Job Title Ref no: Assistant Regional Asset Manager EU, Wider Europe and Americas Directorate or Region Resources/Busines s Support Services Department/Country Global Estates

More information

Infrastructure Solution Architect

Infrastructure Solution Architect Role Reporting Information Role Title Infrastructure Solution Architect Position Number Role Reports Directly To Infrastructure Delivery and Support Leader EnergyAustralia Group Executive Manager Chief

More information

Vacancy reference: Applications close: Friday 27 April 2018

Vacancy reference: Applications close: Friday 27 April 2018 ENTERPRISE ARCHITECT At Unitywater we operate in a flexible, inclusive and exciting environment where no two days are ever the same. We continually pursue efficiencies and innovation to meet challenging

More information

Certificate in Internal Audit IV

Certificate in Internal Audit IV Certificate in Internal Audit IV The Senior Audit Role auditing key business activities Who should attend? Senior Auditors Audit Managers and those about to be appointed to that role Auditors that need

More information

What, Why and how? Transition to TickITplus... Welcome and Introduction

What, Why and how? Transition to TickITplus... Welcome and Introduction Transition to TickITplus... What, Why and how? Welcome and Introduction Peter Lawrence MSc FBCS CITP FCQI CQP Chairman Joint TickIT Industry Standards Committee Agenda Morning Welcome and benefits of TickITplus

More information

Business Continuity. Building a Program Fit for Purpose

Business Continuity. Building a Program Fit for Purpose Business Continuity. Building a Program Fit for Purpose Tim Janes. Director Fulcrum Risk Services Tuesday 2 September. 11.30-12.45 T Janes. BC SLIDES. RIMS Risk Forum Aust 2014 v1.0 Building a BC Program

More information

Plans for a Balanced Scorecard Approach to Information Security Metrics

Plans for a Balanced Scorecard Approach to Information Security Metrics MetriCon 3.0 Workshop Presentation Plans for a Balanced Scorecard Approach to Information Security Metrics Kevin Peuhkurinen The Great-West Life Assurance Company Background The Information Security Office

More information

Enterprise Risk Management Program Development Update. Finance & Audit Committee Meeting September 25, 2015

Enterprise Risk Management Program Development Update. Finance & Audit Committee Meeting September 25, 2015 Enterprise Risk Management Program Development Update Finance & Audit Committee Meeting September 25, 2015 Enterprise Risk Management Presentation Topics Enterprise Risk Management ( ERM ) Overview Lead

More information

Understanding Model Representations and Levels: What Do They Mean?

Understanding Model Representations and Levels: What Do They Mean? Pittsburgh, PA 15213-3890 Understanding Model Representations and Levels: What Do They Mean? Mary Beth Chrissis Mike Konrad Sandy Shrum Sponsored by the U.S. Department of Defense 2004 by Carnegie Mellon

More information

The Chartered Project Professional Standard

The Chartered Project Professional Standard The Chartered Project Professional Standard Contents Page 3 1. Introduction Page 4 Page 4 Page 5 Page 6 Page 9 Page 9 Page 9 Page 9 Page 10 2. Achieving the chartered standard 2.1. Eligibility 2.2. Requirements

More information

COBIT. IT Governance CEN 667

COBIT. IT Governance CEN 667 COBIT IT Governance CEN 667 1 Project proposal (week 4) Goal of the projects are to find applicable measurement and metric methods to improve processes: For 27000 series of standards 27001 and 27004 For

More information