COBIT 5. COBIT 5 Online Collaborative Environment
|
|
- Irene Hunt
- 6 years ago
- Views:
Transcription
1 COBIT 5 Product Family COBIT 5 Enabler Guides COBIT 5 COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information Security COBIT 5 for Assurance COBIT 5 for Risk Other Professional Guides COBIT 5 Online Collaborative Environment Source: COBIT 5 for Information Security, figure 1 COBIT 5 Principles 1. Meeting Stakeholder Needs 5. Separating From COBIT 5 Principles 2. Covering the Enterprise End-to-end 4. Enabling a Holistic Approach 3. Applying a Single Integrated Framework Source: COBIT 5, figure Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: info@isaca.org Web site:
2 COBIT 5 Goals Cascade Overview Stakeholder Drivers (Environment, Technology Evolution, ) Stakeholder Needs Influence Benefits Realisation Risk Resource Cascade to Enterprise Goals Cascade to IT-related Goals Cascade to Enabler Goals Source: COBIT 5, figure 4 Selected Guidance From the COBIT 5 Family These charts and figures are elements of COBIT 5 and its supporting guides. This excerpt is available as a complimentary PDF ( and for purchase in hard copy ( It provides an overview of the COBIT 5 guidance, its five principles and seven enablers. We encourage you to share this document with your enterprise leaders, team members, clients and/or consultants. COBIT enables enterprises to maximize the value and minimize the risk related to information, which has become the currency of the 21 st century. COBIT 5 is a comprehensive framework of globally accepted principles, practices, analytical tools and models that can help any enterprise effectively address critical business issues related to the governance and management of information and technology. Additional information is available at
3 and in COBIT 5 Objective: Value Creation Benefits Realisation Risk Resource Enablers Scope Roles, Activities and Relationships Source: COBIT 5, figure 8 Key Roles, Activities and Relationships Roles, Activities and Relationships Owners and Stakeholders Delegate Accountable Governing Body Set Direction Monitor Instruct and Align Report Operations and Execution Source: COBIT 5, figure 9 COBIT 5 and Key Areas Business Needs Evaluate Direct Feedback Monitor Plan (APO) Build (BAI) Run (DSS) Monitor (MEA) Source: COBIT 5, figure 15
4 Skills/Competencies Information security governance Information security strategy formulation Information risk management Information security architecture development Information security operations Information assessment and testing and compliance Source: COBIT 5 for Information Security, Figure 20 Information Security Skills/Competencies Example Stakeholders for Information Security-related Information (Small/Medium Enterprise) Information Security Strategy Information Security Budget Information Security Plan Policies Information Type Stakeholder Internal: Enterprise Board U I U I A Chief executive officer (CEO) U A U I U Chief financial officer (CFO) A U U U Chief information security officer (CISO) O U O O A A A A U U Information security steering committee (ISSC) A O A U U I U I U U Business process owner U O U U U Head of human resources (HR) U U Internal: IT Chief information officer (CIO)/IT manager U O U U U U I U U Information security manager (ISM) U U U O U O O O O O External Investors I Insurers I I I Regulators I I I Business Partners I I Vendors/Suppliers I External Auditors I I I I I An indication of the nature of the relationship of the stakeholder for each information type: A Approver O Originator I Informed of information type U User of information type Information Security Requirements Awareness Material Information Security Review Reports Information Security Service Catalogue Information Risk Profile Information Security Dashboard Source: COBIT 5 for Information Security, Figure 17
5 Chief executive officer (CEO) Chief information officer (CIO) Chief financial officer (CFO) Chief risk officer (CRO) Chief technology officer (CTO) Chief operating officer (COO) Board of directors (indirect report) Advantages and Disadvantages of Potential Paths for Information Security Reporting Role Advantages Disadvantages Source: COBIT 5 for Information Security, Figure 14 Information risk is elevated to the highest level in the enterprise. Information security issues and solutions can be aligned with all IT initiatives. Information security issues can be addressed from a financial business impact point of view. Information risk is elevated to a position that can also look at risk from strategic, financial, operational, reputational and compliance perspectives. Information security can be partnered and included in future technology road maps. Information security issues and solutions can be addressed from the standpoint of impact to the business operations. Information risk is elevated to the highest level in the enterprise. Information risk needs to be presented in a format that is understandable to the CEO. Given the multitude of responsibilities of the CEO, information risk might be monitored and managed at too high a level of abstraction or might not be fully understood in its relevant details. Information risk may not be addressed due to other IT initiatives and deadlines taking precedence over information security. There is a potential conflict of interest. The work performed by information security professionals may be IT-focussed and not information security-focussed. In other words, there may be an insufficient business focus. Information risk may not be addressed due to financial initiatives and deadlines taking precedence over information security. There is a potential conflict of interest. This role does not exist in most enterprises. It is most often found in financial service organisations. In enterprises in which a CRO is not present, organisational risk decisions may be decided by the CEO or board of directors. Information risk may not be addressed due to technology directions taking precedence over information security. Information risk may not be addressed due to operational initiatives and deadlines taking precedence over information security. Information risk needs to be presented in a format that is understandable to board members, and hence may become too high-level to be relevant. Policy Framework Policy Framework Information Security Principles Information Security Policy Specific Information Security Policies Information Security Procedures Information Security Requirements and Documentation Input Mandatory Information Security Standards, Frameworks and Models Generic Information Security Standards, Frameworks and Models Source: COBIT 5 for Information Security, Figure 10
6 COBIT 5 Reference Model es for of Enterprise IT Evaluate, Direct and Monitor EDM01 Ensure Framework Setting and Maintenance EDM02 Ensure Benefits Delivery EDM03 Ensure Risk EDM04 Ensure Resource EDM05 Ensure Stakeholder Transparency Align, Plan and Organise Monitor, Evaluate and Assess APO01 Manage the IT Framework APO02 Manage Strategy APO03 Manage Enterprise Architecture APO04 Manage Innovation APO05 Manage Portfolio APO06 Manage Budget and Costs APO07 Manage Human Resources APO08 Manage Relationships APO09 Manage Service Agreements APO10 Manage Suppliers APO11 Manage Quality APO12 Manage Risk APO13 Manage Security MEA01 Monitor, Evaluate and Assess Performance and Conformance Build, Acquire and Implement BAI01 Manage Programmes and Projects BAI02 Manage Requirements Definition BAI03 Manage Solutions Identification and Build BAI04 Manage Availability and Capacity BAI05 Manage Organisational Change Enablement BAI06 Manage Changes BAI07 Manage Change Acceptance and Transitioning MEA02 Monitor, Evaluate and Assess the System of Internal Control BAI08 Manage Knowledge BAI09 Manage Assets BAI10 Manage Configuration Deliver, Service and Support DSS01 Manage Operations DSS02 Manage Service Requests and Incidents DSS03 Manage Problems DSS04 Manage Continuity DSS05 Manage Security Services DSS06 Manage Business Controls MEA03 Monitor, Evaluate and Assess Compliance With External Requirements es for of Enterprise IT Source: COBIT 5, figure 16
7 COBIT 5 Enterprise Enablers 2. es 3. Organisational Structures 4. Culture, Ethics and Behaviour 1. Principles, Policies and Frameworks 5. Information 6. Services, Infrastructure and Applications Resources 7. People, Skills and Competencies Source: COBIT 5, figure 12 COBIT 5 Enablers: Generic Enabler Dimension Stakeholders Goals Life Cycle Good Practices Internal Stakeholders External Stakeholders Intrinsic Quality Contextual Quality (Relevance, Effectiveness) Accessibility and Security Plan Design Build/Acquire/ Create/Implement Use/Operate Evaluate/Monitor Update/Dispose Practices Work Products (Inputs/Outputs) Enabler Performance Are Stakeholders Needs Addressed? Are Enabler Goals Achieved? Metrics for Achievement of Goals (Lag Indicators) Is Life Cycle Managed? Are Good Practices Applied? Metrics for Application of Practice (Lead Indicators) Source: COBIT 5, figure 13
8 The Seven Phases of the Implementation Life Cycle 6 Did we get there? 5 How do we get there? 7 How do we keep the momentum going? Realise benefits Embed new Execute plan approaches Review effectiveness Operate and use Operate Sustain and measure Implement improvements Monitor and evaluate Build improvements Identify role players Plan programme 4 What needs to be done? 1 What are the drivers? Initiate programme Establish desire to change Recognise need to act state Define target Assess current state Form implementation team outcome Communicate Define problems and opportunities Define road map 3 Where do we want to be? 2 Where are we now? Programme management (outer ring) Change enablement (middle ring) Continual improvement life cycle (inner ring) Source: COBIT 5, figure 17 and COBIT 5 Implementation, figure 6 Summary of the COBIT 5 Capability Model Generic Capability Attributes Performance Attribute (PA) 1.1 Performance PA 2.1 PA 2.2 Performance Work Product PA 3.1 Definition PA 3.2 Deployment PA 4.1 PA 4.2 Control PA 5.1 Innovation PA 5.2 Incomplete Performed Managed Established Predictable Optimising COBIT 5 Assessment Model Performance Indicators Outcomes COBIT 5 Assessment Model Capability Indicators Base Practices (/ Practices) Work Products (Inputs/ Outputs) Generic Practices Generic Resources Generic Work Products Source: COBIT 5, figure 19
COBIT 5. COBIT 5 Online Collaborative Environment
COBIT 5 Product Family COBIT 5 Enabler Guides : Enabling es : Enabling Information Other Enabler Guides COBIT 5 Professional Guides Implementation for Information for Assurance for Risk Other Professional
More informationCOBIT 5. COBIT 5 Online Collaborative Environment
COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information
More informationCOBIT 5. COBIT 5 Online Collaborative Environment
COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information
More informationInformation and Technology. Governance. System for
2019 strategy goals size Role of IT Sourcing model for IT Compliance requirements Etc. Design Factors SME Risk DevOps Etc. Priority governance management objectives Specific guidance from focus areas Target
More informationTranslate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.
Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or
More informationCOBIT 5 Foundation Exam
COBIT 5 Foundation Exam Sample Paper Multiple Choice Instructions 1. All 50 questions should be attempted. 2. All answers are to be marked on the answer sheet provided. 3. Please use a pencil and NOT ink
More informationSeptember 17, 2012 Pittsburgh ISACA Chapter
September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more
More informationISACA All Rights Reserved.
Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems, PGD Computer Auditing Accredited COBIT 5 Trainer ISACA 2016. Business Value Value
More informationAnnex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5
Annex (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex 2 RACI chart for EDM0, Retrieved from COBIT5 Description: R Responsible The one(s) who performs the
More informationIf It s not a Business Initiative, It s not COBIT 5
If It s not a Business Initiative, It s not COBIT 5 Steve Romero CISSP PMP CPM Romero Consulting Core Competencies C22 CRISC CGEIT CISM CISA 1 9/13/2013 1 COBIT Page 11 COBIT 5 product family 2 COBIT Page
More informationIT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu
February 13, 2017 1 IT Assurance and COBIT 5 Enablers Enablers are factors that, individually and collectively, influence whether something will work. 2. Processes 3. Organizational Structures 4. Culture,
More informationSelftestengine COBIT5 36q
Selftestengine COBIT5 36q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers.
More informationBraindumps COBIT5 50q
Braindumps COBIT5 50q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers. If there
More informationLog of Changes Implemented to the COBIT 5 Product Family
Log of Changes Implemented to the COBIT 5 Product Family All of the edits detailed below up to were available to all downloaders as of. Anyone receiving the pdf files on or after already have the corrections
More informationIT and Security Governance. Jacqueline Johnson
IT and Security Governance Jacqueline Johnson Background Control Objectives for Information and related Technology Developed by IT Governance Institute (ITGI) Not incremental High level standard 5 principles
More informationCobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on
Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on Cobit 5! John Krogh Twitter: @jakrogh Blog: www.johnakrogh.com! proven experience proven tactics
More informationand COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved.
Comparing COBIT4.1 and COBIT 5 ROBERT E STROUD CGEIT CRISC ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 1 2012 ISACA. All Rights Reserved. Comparing COBIT 4.1 and
More informationAssessment of IT Operations. Frameworks* An Overview
Assessment of IT Operations Leveraging Industry Standard Frameworks* An Overview *COBIT 5, ITIL,CMM,other SPEAKER BIOGRAPHY Sameer Gupta is a director in KPMG's Consulting Practice and has over 25 years
More informationCOBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force
COBIT 5 for Information Security Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force First, a bit of background Just to level the playing field COBIT 5 Objectives o ISACA Board of Directors: tie together
More informationChanges Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub
Governance and Management of Information and Related Technologies Guide 2017 Revision History Changes Reviewed by Date Version Author JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology:
More informationIT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies
IT Assurance Services And Role Of CA In BPO-KPO IT Enabled Services And Emerging Technologies Chapter 2: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1 IT Assurance Services and Role of CA in BPO-KPO
More informationIntroduction to COBIT 5
Introduction to COBIT 5 Executive Summary Information is a key resource for all enterprises, and from the time that information is created to the moment that it is destroyed, technology plays a significant
More information2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval
Presented by 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any
More informationAchieving Organisational Goals. Accomplishing Strategic Initiatives. Implementation of Organisational Objectives. Stakeholder Management
Achieving Organisational Goals Accomplishing Strategic Initiatives Implementation of Organisational Objectives High Quality Training Courses presented by Internationally Recognised Expert Speakers Stakeholder
More informationTechnology s Role in Enterprise Risk Management
FEATURE Technology s Role in Enterprise Risk Management www.isaca.org/currentissue The new COSO ERM framework document, Enterprise Risk Management Integrating With Strategy and, 1 is expected to have a
More informationCITIBANK N.A JORDAN. Governance and Management of Information and Related Technologies Guide
CITIBANK N.A JORDAN Governance and Management of Information and Related Technologies Guide 2018 Table of Contents 1. OVERVIEW... 2 2. Governance of Enterprise IT... 3 3. Principles of Governance of Enterprise
More informationEnterprise Governance of IT
Enterprise Governance of IT Prof. dr. Wim Van Grembergen University of Antwerp (UA) Antwerp Management School (AMS) IT Alignment and Governance Research Institute (ITAG) wim.vangrembergen@ua.ac.be What
More informationService Strategy Quick Reference Guide
Service Strategy Quick Reference Guide To enable service providers to think and act in a strategic manner to achieve strategic goals or objectives through the use of strategic assets Value Creation through
More informationGovernance and Management of Information and Related Technologies Guide. Prepared for Jordan Ahli Bank
Governance and Management of Information and Related Technologies Guide Prepared for Jordan Ahli Bank 2017 Revision History Changes Reviewed by Approval Date Version Author ISACA Peter Tessin Feb 2017
More informationFeature. Unlocking Hidden Value in ERP System Acquisitions Using Risk Management. Risk. Monitoring. Residual Risk Acceptance.
Feature Gregory Zoughbi, CISA, CISM, CGEIT, CRISC, COBIT 4.1 (F), ABCP, CISSP, ITIL Expert, PMP, TOGAF 9 (C), is an advisor to chief information officers (CIOs) and chief executive officers (CEOs) on the
More informationSub-section Content. 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx
Sub-section Content 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx 2 Job Purpose - To assist in the maintenance and development of
More informationPrinciples, Policies and Frameworks. Processes. Organisational Structures. Culture, Ethics and Behaviour. Information
Feature Steven De Haes, Ph.D., is an associate professor at the University of Antwerp and Antwerp Management School (Belgium), co-editor-in-chief of the International Journal on IT/Business Alignment and
More informationRisk Management Strategy
Risk Management Strategy 2017-2019 Created by: Role Name Title Author / Editor Kevin McMahon Head of Risk Management & Resilience Lead Executive Margo McGurk Director of Finance & Performance Approved
More informationAchieving Business/IT Alignment through COBIT 5
Achieving Business/IT Alignment through COBIT 5 Prof. dr. Wim Van Grembergen University of Antwerp Antwerp Management School wim.vangrembergen@ua.ac.be Intro: EGIT and COBIT 5 Definition of EGIT Enterprise
More informationIT Management & Governance Tool Assess the importance and effectiveness of your core IT processes
IT & Governance Tool Assess the importance and effectiveness of your core IT processes STRATEGY& GOVERNANCE IT & Governance Framework APPS EDM01 ITRG04 DATA &BI ITRG06 IT Governance Application Portfolio
More informationGain strategic insight into business services to help optimize IT.
Closed-loop measurement and control solutions To support your IT objectives Gain strategic insight into business services to help optimize IT. Highlights Gain insight and visibility across the IT project
More informationDoes Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell. PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE
Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE LHS Business Control Tel: +44 (0)7774 145638 47 Grangewood
More informationISACA. The recognized global leader in IT governance, control, security and assurance
ISACA The recognized global leader in IT governance, control, security and assurance High-level session overview 1. CRISC background information 2. Part I The Big Picture CRISC Background information About
More informationImplementation of Service Integration in a Multiprovider Environment Using COBIT 5
Knowledge. Proficiency. Implementation Implementation of Service Integration in a Multiprovider Environment Using COBIT 5 MARTIN ANDENMATTEN / CISA, CGEIT, CRISC, ITIL Master Published in COBIT Focus 28
More informationGOVERNANCE OF INFORMATION TECHNOLOGY (IT)
GOVERNANCE OF INFORMATION TECHNOLOGY (IT) Preface "Доверяй, но проверяй. Доверяй, но проверяй Trust, but verify GOVERNANCE OF INFORMATION TECHNOLOGY (IT) Chapter 1 "For there are very few so foolish that
More informationISO/IEC Service Management. Your implementation guide
ISO/IEC 20000-1 Service Management Your implementation guide ISO/IEC 20000-1 Service Management Implementation Guide What is ISO/IEC 20000-1? ISO/IEC 20000-1 is the international standard for Service Management
More informationCOBIT 5: IT is complicated. IT governance does not have to be
COBIT 5: IT is complicated. IT governance does not have to be ค ณวรางคณา ม ส กะส งข - นายกสมาคมผ ตรวจสอบและควบค มระบบสารสนเทศภาคพ น กร งเทพฯ และ Director, Assurance RCS PricewaterhouseCoopers ABAS Ltd.
More informationCOBIT 5.0: Capability Level of Information Technology Directorate General of Treasury
COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury Dian Utami Setya 1, Wella 2 Department of Information System, Faculty of Engineering and Informatics, Universitas Multimedia
More informationCORPORATE GOVERNANCE KING III COMPLIANCE
CORPORATE GOVERNANCE KING III COMPLIANCE Analysis of the application as at March 2013 by AngloGold Ashanti Limited (AngloGold Ashanti) of the 75 corporate governance principles as recommended by the King
More informationNational Stock Exchange of India Limited
National Stock Exchange of India Limited ISACA ISACA (isaca.org) helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards,
More informationPortfolio, Program and Project Management Using COBIT 5
DISCUSS THIS ARTICLE Portfolio, Program and Project Using COBIT 5 By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP COBIT Focus 11 September 2017 Many
More informationAgenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)
The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview
More informationIS STRATEGY & ICT GOVERNANCE PLAN FOR VICROADS
IS STRATEGY & ICT GOVERNANCE PLAN FOR VICROADS A Proposal Report Assignment: A02 - IS Strategy & ICT Governance Report Subject: IS Strategy & Governance (ISYS900038 Sem 1 2014) Group X: Ahmed Dédeche Prashanth
More informationBusiness Risk Services
Business Risk Services Corporate Governance Internal Control Review Risk Management Internal Audit Fraud & Forensics Compliance Policies & Procedures Our Firm... Grant Thornton - Al-Qatami, Al-Aiban and
More informationAuditing culture and risk culture in financial services firms. Making the intangible, tangible and auditable
Auditing culture and risk culture in financial services firms Making the intangible, tangible and auditable Auditing culture in financial services firms Restoring trust in the financial services industry
More informationThe future CFO role. Preliminary research results from an ACCA
The future CFO role. Preliminary research results from an ACCA and IMA study November 2014 This short excerpt provides preliminary results based on a survey of 1631 ACCA and IMA members in 2014 on the
More informationCertificate in Enterprise Risk Management
Certificate in Enterprise Risk Management Who should attend? Risk managers Managers and Directors responsible for the risk management function or process Senior Internal Auditors and audit managers Other
More informationGovernance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL
Governance SPICE Using COSO and COBIT Process Assessment Models Linking Governance to Sustainable Value Creation BPM GOSPEL (LLP-LDV-TOI-2010-HU-001) This project has been funded with support from the
More informationCGEIT Certification Job Practice
CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge
More informationCOBIT 5 for Business Benefits Realization: A Preview. Sushil Chatterji, CGEIT
COBIT 5 for Business Benefits Realization: A Preview Sushil Chatterji, CGEIT AGENDA About the Publication Business Benefits: Why the time is NOW Short primer on Enterprise and IT Strategic Planning Business
More informationThe Insight Driven Organization
The Insight Driven Organization Deloitte Best Managed Symposium April 12, 2016 Deloitte LLP and affiliated entities An organization which embeds analysis, data and reasoning into all their decision making
More informationHead of Business Strategy
Empower Limited Job Description empower.co.tz info@empower.co.tz +255 758 778 886 9th Floor Tanzanite Park, Victoria, Dar es Salaam, Tanzania Roles and Responsibilities Head of Business Strategy Strategic
More informationInternal Audit of ICT Governance in WFP. Office of the Inspector General Internal Audit Report AR/15/11
Fighting Hunger Worldwide Internal Audit of ICT Governance in WFP Office of the Inspector General Internal Audit Report AR/15/11 Contents Page I. Executive summary 3 II. Context and scope 5 III. Results
More informationThis Scottish Governance Code has been created for the third sector, by the third sector.
1 FOREWORD This Scottish Governance Code has been created for the third sector, by the third sector. Scotland's Third Sector Governance Forum brings together individuals and organisations with knowledge
More informationISO/IEC JTC 1 N 10998
ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 Information technology Secretariat: ANSI (USA) Document type: Title: Status: Text for PDTR ballot or comment Text of 2nd PDTR 38502, Governance of IT - Framework and
More informationPurpose of the role (What the role does; how the role contributes to the team/department/division goals)
Team Leader Shared Services SBS Banking Shared Services Team Leader Specification Role Title: Team Leader, Shared Services Business Unit: Suncorp Business Services Location: Brisbane Division: SBS Bank
More informationInfrastructure Solution Architect
Role Reporting Information Role Title Infrastructure Solution Architect Position Number Role Reports Directly To Infrastructure Delivery and Support Leader EnergyAustralia Group Executive Manager Chief
More informationCOMMERCIAL OPTIMISATION:
COMMERCIAL OPTIMISATION: How to ensure full value capture from oil and gas value chains December 2017 Management Consulting at Charles River Associates INTRODUCTION The term lower for longer, once just
More informationBuilding an. Effective Board
Building an Effective Board Who we are Established in 1996, Effective Governance is now Australasia s largest and most experienced independent corporate governance consulting firm. Our mission is to deliver
More informationHead of Architecture (Enterprise Architect) Grade: Assistant Director Strategy & Architecture
College/Service: Post: Reference: Grade: Reporting To: Responsible For: Exeter IT Head of Architecture (Enterprise Architect) P58848 G Assistant Director Strategy & Architecture Architecture Team ORGANISATIONAL
More informationMay 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS
May 2018 Latest update ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and ISO/IEC FDIS 20000-1 Mapping guide ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and
More informationISC: UNRESTRICTED AC Attachment. Virtual Desktop Information Technology
Virtual Desktop Information Technology February 4, 2015 THIS PAGE INTENTIONALLY LEFT BLANK ISC: UNRESTRICTED Table of Contents Executive Summary... 5 1.0 Background... 6 1.1 Explanation of the Technology
More informationQUEENSLAND URBAN UTILITIES Position Description
QUEENSLAND URBAN UTILITIES Position Description ROLE TITLE: DIVISION: BRANCH: LOCATION: ROLE CLASSIFICATION: MANAGER: Manager Analytics Enablement Planning and Digital & Analytics Enablement Information
More information6. IT Governance 2006
6. IT Governance 2006 Introduction The Emerging Enterprise Model 3 p IT is an integral part of the business p IT governance is an integral part of corporate governance 4 Challenges for the IT IT gets more
More informationSeven Consulting Benefits Management Capability Overview
Introduction to Seven Consulting Seven Consulting Benefits Management Capability Overview COPYRIGHT SEVEN CONSULTING 2018 ALL RIGHTS RESER Delivering for Australia s most respected organisations since
More informationISO Changing the Conversation Mark T. Gasser Nicholas E. Fioravante
ISO 55000 Changing the Conversation Mark T. Gasser Nicholas E. Fioravante NFMT 2015 ADENGA Introduction and Overview of the Standard Business Case for Asset Management An Asset Management Program Lesson
More informationKing IV Application Register
King IV Register 1. The governing body should lead ethically and effectively. The directors hold one another accountable for decision-making based on integrity, competence, responsibility, fairness and
More informationDigital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience
Digital Insight Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd. Contents Introduction Business
More informationMay 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS
May 2018 Latest update ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and ISO/IEC FDIS 20000-1 Mapping guide ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and
More informationSTATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL
Governance Digi.Com Berhad Annual Report 2017 73 STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL IN ACCORDANCE WITH PARAGRAPH 15.26 (b) OF THE MAIN MARKET LISTING REQUIREMENTS OF BURSA MALAYSIA SECURITIES
More informationEnterprise Architecture and COBIT
Enterprise and COBIT The Open Group October 22, 2003 www.realirm.co.za reducing risk, adding value, driving change Agenda 2 Introduction Case Study Enterprise and IT Governance Conclusion Business Orientation
More informationSFIA Accredited Consultant
CONTEXT Typically works as an external consultant (independently or for a SFIA partner organisation). May work as an internal consultant within a large / complex user organisation. PURPOSE To advise organisations
More informationInternational Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015
International Civil Aviation Organization WORKING PAPER 15/01/2015 rev. 0 FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 Agenda Item 5: Review and elaborate on concepts,
More informationPosition Description
Position Description Position: Reports to: Location: Division: Business Unit: Team: Job Family: Loyalty Campaigns Manager Marketing Manager Christchurch Retail & Water Group Marketing Marketing Marketing
More information2. Ofqual level 6 descriptors
Learning Outcomes and Assessment Criteria The learning outcomes and assessment criteria for the Chartered Manager Degree Apprenticeship have been based upon the following: 1. DfEdefinition - level 6 descriptor
More informationUniversity of Birmingham. Protocol for the Governance of University Wholly Owned Subsidiary Companies and Companies
University of Birmingham Protocol for the Governance of University Wholly Owned Subsidiary Companies and Companies Introduction Where the University Retains an Interest. 1.The University recognises that
More informationThe Value of IT Frameworks
The Value of IT Frameworks Recent views from Chief Information Officers Results from the CIONET survey of European CIO s on the business value of IT Frameworks What s next. Table of Contents _ 2 Introduction...
More informationOur Blueprint. Balfour Beatty s Sustainability Strategy LEAN, EXPERT, TRUSTED, SAFE. Version 2.0
Our Blueprint Balfour Beatty s Sustainability Strategy LEAN, EXPERT, TRUSTED, SAFE Version 2.0 Our Sustainability Blueprint 02 Foreword Our ambition is to continue to position sustainability at the heart
More informationTrends in Sustainability Reporting. 3 June 2013
Trends in Sustainability Reporting 3 June 2013 Agenda Introduction Current sustainability trends Integrated reporting Calculating the value of sustainability programs Questions Current sustainability reporting
More informationUnderstanding the Challenge and Incredible Potential of IT Governance
Understanding the Challenge and Incredible Potential of IT Governance REALIZING THE MOST VALUE FROM TECHNOLOGY THROUGH BUSINESS GOV ERNANC E O F IT Governance defined gov er nance noun (ˈgə-vər-nən(t)s)
More informationCorporate Social Responsibility
Corporate Social Responsibility Effective date: June 2013 1 Table of Contents 1. Our business... 3 1.1 Ethical conduct... 3 1.2 Customers... 3 1.3 Business partners and suppliers... 4 1.4 Environment...
More informationISO Collaborative Business Relationship Management Your implementation guide
ISO 44001 Collaborative Business Relationship Management Your implementation guide ISO 44001 Collaborative Business Relationships enhances the performance and competitiveness of your organization Collaborative
More informationRole Description Director, Human Resources
Role Description Director, Human Resources Cluster Separate Agency Agency NSW Education Standards Authority Division/Branch/Unit Strategy and Delivery Location Sydney CBD Classification/Grade/Band PSSE
More informationINTERTEK GROUP PLC INTERTEK S MODERN SLAVERY STATEMENT 2017
INTERTEK GROUP PLC INTERTEK S MODERN SLAVERY STATEMENT 2017 This statement has been published in accordance with the UK s Modern Slavery Act 2015. It sets out the steps taken by Intertek Group plc and
More informationRole and person profile
Role and person profile Post title: Director of Regulation Location: Manchester Business Area: Research and Compliance Department: Compliance Reports to: Director of Research and Compliance Responsible
More informationCOBIT 5 and ITIL Adaptation at a Saudi Municipality
DISCUSS THIS ARTICLE COBIT 5 and ITIL Adaptation at a Saudi Municipality By Govind Kulkarni, COBIT 5, CSQA, ITIL Expert, PMP COBIT Focus 25 May 2015 Arabic English French Italian Portuguese Spanish The
More informationPOSITION OVERVIEW. Media & PR Manager Marketing and Communications Manager Accounts Assistant
POSITION OVERVIEW TITLE: REPORTS TO: DIRECT REPORTS: Chief Operating Officer Chief Executive Commercial and Sponsorship Manager Media & PR Manager Marketing and Communications Manager Accounts Assistant
More informationTIGER BRANDS LIMITED REGISTER OF APPLICATION OF THE KING IV PRINCIPLES IN THE REPORT ON CORPORATE GOVERNANCE FOR SOUTH AFRICA 2016
TIGER BRANDS LIMITED REGISTER OF APPLICATION OF THE KING IV PRINCIPLES IN THE REPORT ON CORPORATE GOVERNANCE FOR SOUTH AFRICA 2016 LEADERSHIP, ETHICS AND CORPORATE CITIZENSHIP Leadership Principle 1. The
More informationECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme
ECQA Certified Profession Governance SPICE Model used by the Internal Financial Control Assessor Training Programme Contact: János Ivanyos Memolux Ltd. +36 1 467403 ivanyos@memolux.hu www.training.ia-manager.org
More informationStrate Compliance with King III. Prepared by: Company Secretary
Strate Compliance with King III Prepared by: Company Secretary 1 ETHICAL LEADERSHIP AND CORPORATE RESPONSIBILITY Responsible leadership 1.1 The board should provide effective leadership based on an ethical
More informationCitizenship Plan July 2013
Citizenship Plan July 2013 Introduction At Barclays, Citizenship means taking into account the needs of all our stakeholders in everything that we do and taking decisions which, in the long-term, are positive
More informationSUSTAINABILITY STRATEGY
SUSTAINABILITY STRATEGY FOREWORD From the outset our business has followed a sustainable path, not only in terms of how we manage our business and create value for our shareholders, but also how we approach
More informationManager Service Performance & Integration
Manager Service Performance & Integration Technology Services & Solutions (TSS), Shared Services Branch (SSB) The Manager Service Performance and Integration (SP&I) is accountable for ensuring the seamless
More informationJob Description. Regional Health Informatics - Enterprise Architect. Tier 3 or 4
Job Description Job Title: Regional Health Informatics - Enterprise Architect Date: August 2017 Responsible to: Location: Job Status: No. of reports: Delegated Financial Authority: (If applicable) Regional
More informationSecurity Today. Shon Harris. Security consultant, educator, author
Security Today Shon Harris Security consultant, educator, author 360 Security Model Holistic Approach to Security Every Organization has these EXACT issues The responsibility of securing an organization
More information