COBIT 5. COBIT 5 Online Collaborative Environment

Size: px
Start display at page:

Download "COBIT 5. COBIT 5 Online Collaborative Environment"

Transcription

1 COBIT 5 Product Family COBIT 5 Enabler Guides COBIT 5 COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information Security COBIT 5 for Assurance COBIT 5 for Risk Other Professional Guides COBIT 5 Online Collaborative Environment Source: COBIT 5 for Information Security, figure 1 COBIT 5 Principles 1. Meeting Stakeholder Needs 5. Separating From COBIT 5 Principles 2. Covering the Enterprise End-to-end 4. Enabling a Holistic Approach 3. Applying a Single Integrated Framework Source: COBIT 5, figure Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: info@isaca.org Web site:

2 COBIT 5 Goals Cascade Overview Stakeholder Drivers (Environment, Technology Evolution, ) Stakeholder Needs Influence Benefits Realisation Risk Resource Cascade to Enterprise Goals Cascade to IT-related Goals Cascade to Enabler Goals Source: COBIT 5, figure 4 Selected Guidance From the COBIT 5 Family These charts and figures are elements of COBIT 5 and its supporting guides. This excerpt is available as a complimentary PDF ( and for purchase in hard copy ( It provides an overview of the COBIT 5 guidance, its five principles and seven enablers. We encourage you to share this document with your enterprise leaders, team members, clients and/or consultants. COBIT enables enterprises to maximize the value and minimize the risk related to information, which has become the currency of the 21 st century. COBIT 5 is a comprehensive framework of globally accepted principles, practices, analytical tools and models that can help any enterprise effectively address critical business issues related to the governance and management of information and technology. Additional information is available at

3 and in COBIT 5 Objective: Value Creation Benefits Realisation Risk Resource Enablers Scope Roles, Activities and Relationships Source: COBIT 5, figure 8 Key Roles, Activities and Relationships Roles, Activities and Relationships Owners and Stakeholders Delegate Accountable Governing Body Set Direction Monitor Instruct and Align Report Operations and Execution Source: COBIT 5, figure 9 COBIT 5 and Key Areas Business Needs Evaluate Direct Feedback Monitor Plan (APO) Build (BAI) Run (DSS) Monitor (MEA) Source: COBIT 5, figure 15

4 Skills/Competencies Information security governance Information security strategy formulation Information risk management Information security architecture development Information security operations Information assessment and testing and compliance Source: COBIT 5 for Information Security, Figure 20 Information Security Skills/Competencies Example Stakeholders for Information Security-related Information (Small/Medium Enterprise) Information Security Strategy Information Security Budget Information Security Plan Policies Information Type Stakeholder Internal: Enterprise Board U I U I A Chief executive officer (CEO) U A U I U Chief financial officer (CFO) A U U U Chief information security officer (CISO) O U O O A A A A U U Information security steering committee (ISSC) A O A U U I U I U U Business process owner U O U U U Head of human resources (HR) U U Internal: IT Chief information officer (CIO)/IT manager U O U U U U I U U Information security manager (ISM) U U U O U O O O O O External Investors I Insurers I I I Regulators I I I Business Partners I I Vendors/Suppliers I External Auditors I I I I I An indication of the nature of the relationship of the stakeholder for each information type: A Approver O Originator I Informed of information type U User of information type Information Security Requirements Awareness Material Information Security Review Reports Information Security Service Catalogue Information Risk Profile Information Security Dashboard Source: COBIT 5 for Information Security, Figure 17

5 Chief executive officer (CEO) Chief information officer (CIO) Chief financial officer (CFO) Chief risk officer (CRO) Chief technology officer (CTO) Chief operating officer (COO) Board of directors (indirect report) Advantages and Disadvantages of Potential Paths for Information Security Reporting Role Advantages Disadvantages Source: COBIT 5 for Information Security, Figure 14 Information risk is elevated to the highest level in the enterprise. Information security issues and solutions can be aligned with all IT initiatives. Information security issues can be addressed from a financial business impact point of view. Information risk is elevated to a position that can also look at risk from strategic, financial, operational, reputational and compliance perspectives. Information security can be partnered and included in future technology road maps. Information security issues and solutions can be addressed from the standpoint of impact to the business operations. Information risk is elevated to the highest level in the enterprise. Information risk needs to be presented in a format that is understandable to the CEO. Given the multitude of responsibilities of the CEO, information risk might be monitored and managed at too high a level of abstraction or might not be fully understood in its relevant details. Information risk may not be addressed due to other IT initiatives and deadlines taking precedence over information security. There is a potential conflict of interest. The work performed by information security professionals may be IT-focussed and not information security-focussed. In other words, there may be an insufficient business focus. Information risk may not be addressed due to financial initiatives and deadlines taking precedence over information security. There is a potential conflict of interest. This role does not exist in most enterprises. It is most often found in financial service organisations. In enterprises in which a CRO is not present, organisational risk decisions may be decided by the CEO or board of directors. Information risk may not be addressed due to technology directions taking precedence over information security. Information risk may not be addressed due to operational initiatives and deadlines taking precedence over information security. Information risk needs to be presented in a format that is understandable to board members, and hence may become too high-level to be relevant. Policy Framework Policy Framework Information Security Principles Information Security Policy Specific Information Security Policies Information Security Procedures Information Security Requirements and Documentation Input Mandatory Information Security Standards, Frameworks and Models Generic Information Security Standards, Frameworks and Models Source: COBIT 5 for Information Security, Figure 10

6 COBIT 5 Reference Model es for of Enterprise IT Evaluate, Direct and Monitor EDM01 Ensure Framework Setting and Maintenance EDM02 Ensure Benefits Delivery EDM03 Ensure Risk EDM04 Ensure Resource EDM05 Ensure Stakeholder Transparency Align, Plan and Organise Monitor, Evaluate and Assess APO01 Manage the IT Framework APO02 Manage Strategy APO03 Manage Enterprise Architecture APO04 Manage Innovation APO05 Manage Portfolio APO06 Manage Budget and Costs APO07 Manage Human Resources APO08 Manage Relationships APO09 Manage Service Agreements APO10 Manage Suppliers APO11 Manage Quality APO12 Manage Risk APO13 Manage Security MEA01 Monitor, Evaluate and Assess Performance and Conformance Build, Acquire and Implement BAI01 Manage Programmes and Projects BAI02 Manage Requirements Definition BAI03 Manage Solutions Identification and Build BAI04 Manage Availability and Capacity BAI05 Manage Organisational Change Enablement BAI06 Manage Changes BAI07 Manage Change Acceptance and Transitioning MEA02 Monitor, Evaluate and Assess the System of Internal Control BAI08 Manage Knowledge BAI09 Manage Assets BAI10 Manage Configuration Deliver, Service and Support DSS01 Manage Operations DSS02 Manage Service Requests and Incidents DSS03 Manage Problems DSS04 Manage Continuity DSS05 Manage Security Services DSS06 Manage Business Controls MEA03 Monitor, Evaluate and Assess Compliance With External Requirements es for of Enterprise IT Source: COBIT 5, figure 16

7 COBIT 5 Enterprise Enablers 2. es 3. Organisational Structures 4. Culture, Ethics and Behaviour 1. Principles, Policies and Frameworks 5. Information 6. Services, Infrastructure and Applications Resources 7. People, Skills and Competencies Source: COBIT 5, figure 12 COBIT 5 Enablers: Generic Enabler Dimension Stakeholders Goals Life Cycle Good Practices Internal Stakeholders External Stakeholders Intrinsic Quality Contextual Quality (Relevance, Effectiveness) Accessibility and Security Plan Design Build/Acquire/ Create/Implement Use/Operate Evaluate/Monitor Update/Dispose Practices Work Products (Inputs/Outputs) Enabler Performance Are Stakeholders Needs Addressed? Are Enabler Goals Achieved? Metrics for Achievement of Goals (Lag Indicators) Is Life Cycle Managed? Are Good Practices Applied? Metrics for Application of Practice (Lead Indicators) Source: COBIT 5, figure 13

8 The Seven Phases of the Implementation Life Cycle 6 Did we get there? 5 How do we get there? 7 How do we keep the momentum going? Realise benefits Embed new Execute plan approaches Review effectiveness Operate and use Operate Sustain and measure Implement improvements Monitor and evaluate Build improvements Identify role players Plan programme 4 What needs to be done? 1 What are the drivers? Initiate programme Establish desire to change Recognise need to act state Define target Assess current state Form implementation team outcome Communicate Define problems and opportunities Define road map 3 Where do we want to be? 2 Where are we now? Programme management (outer ring) Change enablement (middle ring) Continual improvement life cycle (inner ring) Source: COBIT 5, figure 17 and COBIT 5 Implementation, figure 6 Summary of the COBIT 5 Capability Model Generic Capability Attributes Performance Attribute (PA) 1.1 Performance PA 2.1 PA 2.2 Performance Work Product PA 3.1 Definition PA 3.2 Deployment PA 4.1 PA 4.2 Control PA 5.1 Innovation PA 5.2 Incomplete Performed Managed Established Predictable Optimising COBIT 5 Assessment Model Performance Indicators Outcomes COBIT 5 Assessment Model Capability Indicators Base Practices (/ Practices) Work Products (Inputs/ Outputs) Generic Practices Generic Resources Generic Work Products Source: COBIT 5, figure 19

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides : Enabling es : Enabling Information Other Enabler Guides COBIT 5 Professional Guides Implementation for Information for Assurance for Risk Other Professional

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 COBIT 5 Enabler Guides COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

Information and Technology. Governance. System for

Information and Technology. Governance. System for 2019 strategy goals size Role of IT Sourcing model for IT Compliance requirements Etc. Design Factors SME Risk DevOps Etc. Priority governance management objectives Specific guidance from focus areas Target

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

COBIT 5 Foundation Exam

COBIT 5 Foundation Exam COBIT 5 Foundation Exam Sample Paper Multiple Choice Instructions 1. All 50 questions should be attempted. 2. All answers are to be marked on the answer sheet provided. 3. Please use a pencil and NOT ink

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

ISACA All Rights Reserved.

ISACA All Rights Reserved. Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems, PGD Computer Auditing Accredited COBIT 5 Trainer ISACA 2016. Business Value Value

More information

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5

Annex 1 (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex (Integrated frameworks on Business/IT alignment) Annex 2 Goals Cascade, adapted from COBIT5 Annex 2 RACI chart for EDM0, Retrieved from COBIT5 Description: R Responsible The one(s) who performs the

More information

If It s not a Business Initiative, It s not COBIT 5

If It s not a Business Initiative, It s not COBIT 5 If It s not a Business Initiative, It s not COBIT 5 Steve Romero CISSP PMP CPM Romero Consulting Core Competencies C22 CRISC CGEIT CISM CISA 1 9/13/2013 1 COBIT Page 11 COBIT 5 product family 2 COBIT Page

More information

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu

IT Audit Process. Prof. Mike Romeu. February 13, IT Audit Process. Prof. Mike Romeu February 13, 2017 1 IT Assurance and COBIT 5 Enablers Enablers are factors that, individually and collectively, influence whether something will work. 2. Processes 3. Organizational Structures 4. Culture,

More information

Selftestengine COBIT5 36q

Selftestengine COBIT5 36q Selftestengine COBIT5 36q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers.

More information

Braindumps COBIT5 50q

Braindumps COBIT5 50q Braindumps COBIT5 50q Number: COBIT5 Passing Score: 800 Time Limit: 120 min File Version: 16.5 http://www.gratisexam.com/ Isaca COBIT 5 COBIT 5 Foundation I have correct many of questions answers. If there

More information

Log of Changes Implemented to the COBIT 5 Product Family

Log of Changes Implemented to the COBIT 5 Product Family Log of Changes Implemented to the COBIT 5 Product Family All of the edits detailed below up to were available to all downloaders as of. Anyone receiving the pdf files on or after already have the corrections

More information

IT and Security Governance. Jacqueline Johnson

IT and Security Governance. Jacqueline Johnson IT and Security Governance Jacqueline Johnson Background Control Objectives for Information and related Technology Developed by IT Governance Institute (ITGI) Not incremental High level standard 5 principles

More information

Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on

Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on Cobit 5! Not just for your Auditor!! Fusion (Cobit as an approach to Business & IT Alignment)! Integra(on Cobit 5! John Krogh Twitter: @jakrogh Blog: www.johnakrogh.com! proven experience proven tactics

More information

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved.

and COBIT 5 ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 2012 ISACA. All Rights Reserved. Comparing COBIT4.1 and COBIT 5 ROBERT E STROUD CGEIT CRISC ISACA STRATEGIC ADVISORY BOARD VICE PRESIDENT STRATEGY & INNOVATION CA TECHNOLOGIES 1 2012 ISACA. All Rights Reserved. Comparing COBIT 4.1 and

More information

Assessment of IT Operations. Frameworks* An Overview

Assessment of IT Operations. Frameworks* An Overview Assessment of IT Operations Leveraging Industry Standard Frameworks* An Overview *COBIT 5, ITIL,CMM,other SPEAKER BIOGRAPHY Sameer Gupta is a director in KPMG's Consulting Practice and has over 25 years

More information

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force COBIT 5 for Information Security Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force First, a bit of background Just to level the playing field COBIT 5 Objectives o ISACA Board of Directors: tie together

More information

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub

Changes Reviewed by Date. JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology: Issa Laty. CIO, Jordan- Mohammad Aburoub Governance and Management of Information and Related Technologies Guide 2017 Revision History Changes Reviewed by Date Version Author JO Technology Manager - Samer Huwwari JO Manager, Risk & Control Technology:

More information

IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies

IT Assurance Services And Role Of CA In BPO-KPO. IT Enabled Services And Emerging Technologies IT Assurance Services And Role Of CA In BPO-KPO IT Enabled Services And Emerging Technologies Chapter 2: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1 IT Assurance Services and Role of CA in BPO-KPO

More information

Introduction to COBIT 5

Introduction to COBIT 5 Introduction to COBIT 5 Executive Summary Information is a key resource for all enterprises, and from the time that information is created to the moment that it is destroyed, technology plays a significant

More information

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval

2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval Presented by 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any

More information

Achieving Organisational Goals. Accomplishing Strategic Initiatives. Implementation of Organisational Objectives. Stakeholder Management

Achieving Organisational Goals. Accomplishing Strategic Initiatives. Implementation of Organisational Objectives. Stakeholder Management Achieving Organisational Goals Accomplishing Strategic Initiatives Implementation of Organisational Objectives High Quality Training Courses presented by Internationally Recognised Expert Speakers Stakeholder

More information

Technology s Role in Enterprise Risk Management

Technology s Role in Enterprise Risk Management FEATURE Technology s Role in Enterprise Risk Management www.isaca.org/currentissue The new COSO ERM framework document, Enterprise Risk Management Integrating With Strategy and, 1 is expected to have a

More information

CITIBANK N.A JORDAN. Governance and Management of Information and Related Technologies Guide

CITIBANK N.A JORDAN. Governance and Management of Information and Related Technologies Guide CITIBANK N.A JORDAN Governance and Management of Information and Related Technologies Guide 2018 Table of Contents 1. OVERVIEW... 2 2. Governance of Enterprise IT... 3 3. Principles of Governance of Enterprise

More information

Enterprise Governance of IT

Enterprise Governance of IT Enterprise Governance of IT Prof. dr. Wim Van Grembergen University of Antwerp (UA) Antwerp Management School (AMS) IT Alignment and Governance Research Institute (ITAG) wim.vangrembergen@ua.ac.be What

More information

Service Strategy Quick Reference Guide

Service Strategy Quick Reference Guide Service Strategy Quick Reference Guide To enable service providers to think and act in a strategic manner to achieve strategic goals or objectives through the use of strategic assets Value Creation through

More information

Governance and Management of Information and Related Technologies Guide. Prepared for Jordan Ahli Bank

Governance and Management of Information and Related Technologies Guide. Prepared for Jordan Ahli Bank Governance and Management of Information and Related Technologies Guide Prepared for Jordan Ahli Bank 2017 Revision History Changes Reviewed by Approval Date Version Author ISACA Peter Tessin Feb 2017

More information

Feature. Unlocking Hidden Value in ERP System Acquisitions Using Risk Management. Risk. Monitoring. Residual Risk Acceptance.

Feature. Unlocking Hidden Value in ERP System Acquisitions Using Risk Management. Risk. Monitoring. Residual Risk Acceptance. Feature Gregory Zoughbi, CISA, CISM, CGEIT, CRISC, COBIT 4.1 (F), ABCP, CISSP, ITIL Expert, PMP, TOGAF 9 (C), is an advisor to chief information officers (CIOs) and chief executive officers (CEOs) on the

More information

Sub-section Content. 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx

Sub-section Content. 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx Sub-section Content 1 Preliminaries - Post title: Head of Group Risk - Reports to: CRO - Division: xxx - Department: xxx - Location: xxx 2 Job Purpose - To assist in the maintenance and development of

More information

Principles, Policies and Frameworks. Processes. Organisational Structures. Culture, Ethics and Behaviour. Information

Principles, Policies and Frameworks. Processes. Organisational Structures. Culture, Ethics and Behaviour. Information Feature Steven De Haes, Ph.D., is an associate professor at the University of Antwerp and Antwerp Management School (Belgium), co-editor-in-chief of the International Journal on IT/Business Alignment and

More information

Risk Management Strategy

Risk Management Strategy Risk Management Strategy 2017-2019 Created by: Role Name Title Author / Editor Kevin McMahon Head of Risk Management & Resilience Lead Executive Margo McGurk Director of Finance & Performance Approved

More information

Achieving Business/IT Alignment through COBIT 5

Achieving Business/IT Alignment through COBIT 5 Achieving Business/IT Alignment through COBIT 5 Prof. dr. Wim Van Grembergen University of Antwerp Antwerp Management School wim.vangrembergen@ua.ac.be Intro: EGIT and COBIT 5 Definition of EGIT Enterprise

More information

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes IT & Governance Tool Assess the importance and effectiveness of your core IT processes STRATEGY& GOVERNANCE IT & Governance Framework APPS EDM01 ITRG04 DATA &BI ITRG06 IT Governance Application Portfolio

More information

Gain strategic insight into business services to help optimize IT.

Gain strategic insight into business services to help optimize IT. Closed-loop measurement and control solutions To support your IT objectives Gain strategic insight into business services to help optimize IT. Highlights Gain insight and visibility across the IT project

More information

Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell. PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE

Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell. PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE Does Assurance Add Value? (We Don t Know What We Don t Know Until We Know It) John Mitchell PhD, MBA, CEng, CITP, FBCS, CFIIA, CISA, CGEIT, QiCA, CFE LHS Business Control Tel: +44 (0)7774 145638 47 Grangewood

More information

ISACA. The recognized global leader in IT governance, control, security and assurance

ISACA. The recognized global leader in IT governance, control, security and assurance ISACA The recognized global leader in IT governance, control, security and assurance High-level session overview 1. CRISC background information 2. Part I The Big Picture CRISC Background information About

More information

Implementation of Service Integration in a Multiprovider Environment Using COBIT 5

Implementation of Service Integration in a Multiprovider Environment Using COBIT 5 Knowledge. Proficiency. Implementation Implementation of Service Integration in a Multiprovider Environment Using COBIT 5 MARTIN ANDENMATTEN / CISA, CGEIT, CRISC, ITIL Master Published in COBIT Focus 28

More information

GOVERNANCE OF INFORMATION TECHNOLOGY (IT)

GOVERNANCE OF INFORMATION TECHNOLOGY (IT) GOVERNANCE OF INFORMATION TECHNOLOGY (IT) Preface "Доверяй, но проверяй. Доверяй, но проверяй Trust, but verify GOVERNANCE OF INFORMATION TECHNOLOGY (IT) Chapter 1 "For there are very few so foolish that

More information

ISO/IEC Service Management. Your implementation guide

ISO/IEC Service Management. Your implementation guide ISO/IEC 20000-1 Service Management Your implementation guide ISO/IEC 20000-1 Service Management Implementation Guide What is ISO/IEC 20000-1? ISO/IEC 20000-1 is the international standard for Service Management

More information

COBIT 5: IT is complicated. IT governance does not have to be

COBIT 5: IT is complicated. IT governance does not have to be COBIT 5: IT is complicated. IT governance does not have to be ค ณวรางคณา ม ส กะส งข - นายกสมาคมผ ตรวจสอบและควบค มระบบสารสนเทศภาคพ น กร งเทพฯ และ Director, Assurance RCS PricewaterhouseCoopers ABAS Ltd.

More information

COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury

COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury COBIT 5.0: Capability Level of Information Technology Directorate General of Treasury Dian Utami Setya 1, Wella 2 Department of Information System, Faculty of Engineering and Informatics, Universitas Multimedia

More information

CORPORATE GOVERNANCE KING III COMPLIANCE

CORPORATE GOVERNANCE KING III COMPLIANCE CORPORATE GOVERNANCE KING III COMPLIANCE Analysis of the application as at March 2013 by AngloGold Ashanti Limited (AngloGold Ashanti) of the 75 corporate governance principles as recommended by the King

More information

National Stock Exchange of India Limited

National Stock Exchange of India Limited National Stock Exchange of India Limited ISACA ISACA (isaca.org) helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards,

More information

Portfolio, Program and Project Management Using COBIT 5

Portfolio, Program and Project Management Using COBIT 5 DISCUSS THIS ARTICLE Portfolio, Program and Project Using COBIT 5 By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP COBIT Focus 11 September 2017 Many

More information

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM) The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview

More information

IS STRATEGY & ICT GOVERNANCE PLAN FOR VICROADS

IS STRATEGY & ICT GOVERNANCE PLAN FOR VICROADS IS STRATEGY & ICT GOVERNANCE PLAN FOR VICROADS A Proposal Report Assignment: A02 - IS Strategy & ICT Governance Report Subject: IS Strategy & Governance (ISYS900038 Sem 1 2014) Group X: Ahmed Dédeche Prashanth

More information

Business Risk Services

Business Risk Services Business Risk Services Corporate Governance Internal Control Review Risk Management Internal Audit Fraud & Forensics Compliance Policies & Procedures Our Firm... Grant Thornton - Al-Qatami, Al-Aiban and

More information

Auditing culture and risk culture in financial services firms. Making the intangible, tangible and auditable

Auditing culture and risk culture in financial services firms. Making the intangible, tangible and auditable Auditing culture and risk culture in financial services firms Making the intangible, tangible and auditable Auditing culture in financial services firms Restoring trust in the financial services industry

More information

The future CFO role. Preliminary research results from an ACCA

The future CFO role. Preliminary research results from an ACCA The future CFO role. Preliminary research results from an ACCA and IMA study November 2014 This short excerpt provides preliminary results based on a survey of 1631 ACCA and IMA members in 2014 on the

More information

Certificate in Enterprise Risk Management

Certificate in Enterprise Risk Management Certificate in Enterprise Risk Management Who should attend? Risk managers Managers and Directors responsible for the risk management function or process Senior Internal Auditors and audit managers Other

More information

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL

Governance SPICE. Using COSO and COBIT Process Assessment Models BPM GOSPEL Governance SPICE Using COSO and COBIT Process Assessment Models Linking Governance to Sustainable Value Creation BPM GOSPEL (LLP-LDV-TOI-2010-HU-001) This project has been funded with support from the

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

COBIT 5 for Business Benefits Realization: A Preview. Sushil Chatterji, CGEIT

COBIT 5 for Business Benefits Realization: A Preview. Sushil Chatterji, CGEIT COBIT 5 for Business Benefits Realization: A Preview Sushil Chatterji, CGEIT AGENDA About the Publication Business Benefits: Why the time is NOW Short primer on Enterprise and IT Strategic Planning Business

More information

The Insight Driven Organization

The Insight Driven Organization The Insight Driven Organization Deloitte Best Managed Symposium April 12, 2016 Deloitte LLP and affiliated entities An organization which embeds analysis, data and reasoning into all their decision making

More information

Head of Business Strategy

Head of Business Strategy Empower Limited Job Description empower.co.tz info@empower.co.tz +255 758 778 886 9th Floor Tanzanite Park, Victoria, Dar es Salaam, Tanzania Roles and Responsibilities Head of Business Strategy Strategic

More information

Internal Audit of ICT Governance in WFP. Office of the Inspector General Internal Audit Report AR/15/11

Internal Audit of ICT Governance in WFP. Office of the Inspector General Internal Audit Report AR/15/11 Fighting Hunger Worldwide Internal Audit of ICT Governance in WFP Office of the Inspector General Internal Audit Report AR/15/11 Contents Page I. Executive summary 3 II. Context and scope 5 III. Results

More information

This Scottish Governance Code has been created for the third sector, by the third sector.

This Scottish Governance Code has been created for the third sector, by the third sector. 1 FOREWORD This Scottish Governance Code has been created for the third sector, by the third sector. Scotland's Third Sector Governance Forum brings together individuals and organisations with knowledge

More information

ISO/IEC JTC 1 N 10998

ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 N 10998 ISO/IEC JTC 1 Information technology Secretariat: ANSI (USA) Document type: Title: Status: Text for PDTR ballot or comment Text of 2nd PDTR 38502, Governance of IT - Framework and

More information

Purpose of the role (What the role does; how the role contributes to the team/department/division goals)

Purpose of the role (What the role does; how the role contributes to the team/department/division goals) Team Leader Shared Services SBS Banking Shared Services Team Leader Specification Role Title: Team Leader, Shared Services Business Unit: Suncorp Business Services Location: Brisbane Division: SBS Bank

More information

Infrastructure Solution Architect

Infrastructure Solution Architect Role Reporting Information Role Title Infrastructure Solution Architect Position Number Role Reports Directly To Infrastructure Delivery and Support Leader EnergyAustralia Group Executive Manager Chief

More information

COMMERCIAL OPTIMISATION:

COMMERCIAL OPTIMISATION: COMMERCIAL OPTIMISATION: How to ensure full value capture from oil and gas value chains December 2017 Management Consulting at Charles River Associates INTRODUCTION The term lower for longer, once just

More information

Building an. Effective Board

Building an. Effective Board Building an Effective Board Who we are Established in 1996, Effective Governance is now Australasia s largest and most experienced independent corporate governance consulting firm. Our mission is to deliver

More information

Head of Architecture (Enterprise Architect) Grade: Assistant Director Strategy & Architecture

Head of Architecture (Enterprise Architect) Grade: Assistant Director Strategy & Architecture College/Service: Post: Reference: Grade: Reporting To: Responsible For: Exeter IT Head of Architecture (Enterprise Architect) P58848 G Assistant Director Strategy & Architecture Architecture Team ORGANISATIONAL

More information

May 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS

May 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS May 2018 Latest update ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and ISO/IEC FDIS 20000-1 Mapping guide ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and

More information

ISC: UNRESTRICTED AC Attachment. Virtual Desktop Information Technology

ISC: UNRESTRICTED AC Attachment. Virtual Desktop Information Technology Virtual Desktop Information Technology February 4, 2015 THIS PAGE INTENTIONALLY LEFT BLANK ISC: UNRESTRICTED Table of Contents Executive Summary... 5 1.0 Background... 6 1.1 Explanation of the Technology

More information

QUEENSLAND URBAN UTILITIES Position Description

QUEENSLAND URBAN UTILITIES Position Description QUEENSLAND URBAN UTILITIES Position Description ROLE TITLE: DIVISION: BRANCH: LOCATION: ROLE CLASSIFICATION: MANAGER: Manager Analytics Enablement Planning and Digital & Analytics Enablement Information

More information

6. IT Governance 2006

6. IT Governance 2006 6. IT Governance 2006 Introduction The Emerging Enterprise Model 3 p IT is an integral part of the business p IT governance is an integral part of corporate governance 4 Challenges for the IT IT gets more

More information

Seven Consulting Benefits Management Capability Overview

Seven Consulting Benefits Management Capability Overview Introduction to Seven Consulting Seven Consulting Benefits Management Capability Overview COPYRIGHT SEVEN CONSULTING 2018 ALL RIGHTS RESER Delivering for Australia s most respected organisations since

More information

ISO Changing the Conversation Mark T. Gasser Nicholas E. Fioravante

ISO Changing the Conversation Mark T. Gasser Nicholas E. Fioravante ISO 55000 Changing the Conversation Mark T. Gasser Nicholas E. Fioravante NFMT 2015 ADENGA Introduction and Overview of the Standard Business Case for Asset Management An Asset Management Program Lesson

More information

King IV Application Register

King IV Application Register King IV Register 1. The governing body should lead ethically and effectively. The directors hold one another accountable for decision-making based on integrity, competence, responsibility, fairness and

More information

Digital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience

Digital Insight CGI IT UK Ltd. Digital Customer Experience. Digital Employee Experience Digital Insight Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd. Contents Introduction Business

More information

May 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS

May 2018 Latest update. ISO/IEC Understanding the requirements of ISO/IEC :2011 and ISO/IEC FDIS May 2018 Latest update ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and ISO/IEC FDIS 20000-1 Mapping guide ISO/IEC 20000 Understanding the requirements of ISO/IEC 20000-1:2011 and

More information

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL Governance Digi.Com Berhad Annual Report 2017 73 STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL IN ACCORDANCE WITH PARAGRAPH 15.26 (b) OF THE MAIN MARKET LISTING REQUIREMENTS OF BURSA MALAYSIA SECURITIES

More information

Enterprise Architecture and COBIT

Enterprise Architecture and COBIT Enterprise and COBIT The Open Group October 22, 2003 www.realirm.co.za reducing risk, adding value, driving change Agenda 2 Introduction Case Study Enterprise and IT Governance Conclusion Business Orientation

More information

SFIA Accredited Consultant

SFIA Accredited Consultant CONTEXT Typically works as an external consultant (independently or for a SFIA partner organisation). May work as an internal consultant within a large / complex user organisation. PURPOSE To advise organisations

More information

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 International Civil Aviation Organization WORKING PAPER 15/01/2015 rev. 0 FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 Agenda Item 5: Review and elaborate on concepts,

More information

Position Description

Position Description Position Description Position: Reports to: Location: Division: Business Unit: Team: Job Family: Loyalty Campaigns Manager Marketing Manager Christchurch Retail & Water Group Marketing Marketing Marketing

More information

2. Ofqual level 6 descriptors

2. Ofqual level 6 descriptors Learning Outcomes and Assessment Criteria The learning outcomes and assessment criteria for the Chartered Manager Degree Apprenticeship have been based upon the following: 1. DfEdefinition - level 6 descriptor

More information

University of Birmingham. Protocol for the Governance of University Wholly Owned Subsidiary Companies and Companies

University of Birmingham. Protocol for the Governance of University Wholly Owned Subsidiary Companies and Companies University of Birmingham Protocol for the Governance of University Wholly Owned Subsidiary Companies and Companies Introduction Where the University Retains an Interest. 1.The University recognises that

More information

The Value of IT Frameworks

The Value of IT Frameworks The Value of IT Frameworks Recent views from Chief Information Officers Results from the CIONET survey of European CIO s on the business value of IT Frameworks What s next. Table of Contents _ 2 Introduction...

More information

Our Blueprint. Balfour Beatty s Sustainability Strategy LEAN, EXPERT, TRUSTED, SAFE. Version 2.0

Our Blueprint. Balfour Beatty s Sustainability Strategy LEAN, EXPERT, TRUSTED, SAFE. Version 2.0 Our Blueprint Balfour Beatty s Sustainability Strategy LEAN, EXPERT, TRUSTED, SAFE Version 2.0 Our Sustainability Blueprint 02 Foreword Our ambition is to continue to position sustainability at the heart

More information

Trends in Sustainability Reporting. 3 June 2013

Trends in Sustainability Reporting. 3 June 2013 Trends in Sustainability Reporting 3 June 2013 Agenda Introduction Current sustainability trends Integrated reporting Calculating the value of sustainability programs Questions Current sustainability reporting

More information

Understanding the Challenge and Incredible Potential of IT Governance

Understanding the Challenge and Incredible Potential of IT Governance Understanding the Challenge and Incredible Potential of IT Governance REALIZING THE MOST VALUE FROM TECHNOLOGY THROUGH BUSINESS GOV ERNANC E O F IT Governance defined gov er nance noun (ˈgə-vər-nən(t)s)

More information

Corporate Social Responsibility

Corporate Social Responsibility Corporate Social Responsibility Effective date: June 2013 1 Table of Contents 1. Our business... 3 1.1 Ethical conduct... 3 1.2 Customers... 3 1.3 Business partners and suppliers... 4 1.4 Environment...

More information

ISO Collaborative Business Relationship Management Your implementation guide

ISO Collaborative Business Relationship Management Your implementation guide ISO 44001 Collaborative Business Relationship Management Your implementation guide ISO 44001 Collaborative Business Relationships enhances the performance and competitiveness of your organization Collaborative

More information

Role Description Director, Human Resources

Role Description Director, Human Resources Role Description Director, Human Resources Cluster Separate Agency Agency NSW Education Standards Authority Division/Branch/Unit Strategy and Delivery Location Sydney CBD Classification/Grade/Band PSSE

More information

INTERTEK GROUP PLC INTERTEK S MODERN SLAVERY STATEMENT 2017

INTERTEK GROUP PLC INTERTEK S MODERN SLAVERY STATEMENT 2017 INTERTEK GROUP PLC INTERTEK S MODERN SLAVERY STATEMENT 2017 This statement has been published in accordance with the UK s Modern Slavery Act 2015. It sets out the steps taken by Intertek Group plc and

More information

Role and person profile

Role and person profile Role and person profile Post title: Director of Regulation Location: Manchester Business Area: Research and Compliance Department: Compliance Reports to: Director of Research and Compliance Responsible

More information

COBIT 5 and ITIL Adaptation at a Saudi Municipality

COBIT 5 and ITIL Adaptation at a Saudi Municipality DISCUSS THIS ARTICLE COBIT 5 and ITIL Adaptation at a Saudi Municipality By Govind Kulkarni, COBIT 5, CSQA, ITIL Expert, PMP COBIT Focus 25 May 2015 Arabic English French Italian Portuguese Spanish The

More information

POSITION OVERVIEW. Media & PR Manager Marketing and Communications Manager Accounts Assistant

POSITION OVERVIEW. Media & PR Manager Marketing and Communications Manager Accounts Assistant POSITION OVERVIEW TITLE: REPORTS TO: DIRECT REPORTS: Chief Operating Officer Chief Executive Commercial and Sponsorship Manager Media & PR Manager Marketing and Communications Manager Accounts Assistant

More information

TIGER BRANDS LIMITED REGISTER OF APPLICATION OF THE KING IV PRINCIPLES IN THE REPORT ON CORPORATE GOVERNANCE FOR SOUTH AFRICA 2016

TIGER BRANDS LIMITED REGISTER OF APPLICATION OF THE KING IV PRINCIPLES IN THE REPORT ON CORPORATE GOVERNANCE FOR SOUTH AFRICA 2016 TIGER BRANDS LIMITED REGISTER OF APPLICATION OF THE KING IV PRINCIPLES IN THE REPORT ON CORPORATE GOVERNANCE FOR SOUTH AFRICA 2016 LEADERSHIP, ETHICS AND CORPORATE CITIZENSHIP Leadership Principle 1. The

More information

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme

ECQA Certified Profession. Governance SPICE Model. Internal Financial Control Assessor Training Programme ECQA Certified Profession Governance SPICE Model used by the Internal Financial Control Assessor Training Programme Contact: János Ivanyos Memolux Ltd. +36 1 467403 ivanyos@memolux.hu www.training.ia-manager.org

More information

Strate Compliance with King III. Prepared by: Company Secretary

Strate Compliance with King III. Prepared by: Company Secretary Strate Compliance with King III Prepared by: Company Secretary 1 ETHICAL LEADERSHIP AND CORPORATE RESPONSIBILITY Responsible leadership 1.1 The board should provide effective leadership based on an ethical

More information

Citizenship Plan July 2013

Citizenship Plan July 2013 Citizenship Plan July 2013 Introduction At Barclays, Citizenship means taking into account the needs of all our stakeholders in everything that we do and taking decisions which, in the long-term, are positive

More information

SUSTAINABILITY STRATEGY

SUSTAINABILITY STRATEGY SUSTAINABILITY STRATEGY FOREWORD From the outset our business has followed a sustainable path, not only in terms of how we manage our business and create value for our shareholders, but also how we approach

More information

Manager Service Performance & Integration

Manager Service Performance & Integration Manager Service Performance & Integration Technology Services & Solutions (TSS), Shared Services Branch (SSB) The Manager Service Performance and Integration (SP&I) is accountable for ensuring the seamless

More information

Job Description. Regional Health Informatics - Enterprise Architect. Tier 3 or 4

Job Description. Regional Health Informatics - Enterprise Architect. Tier 3 or 4 Job Description Job Title: Regional Health Informatics - Enterprise Architect Date: August 2017 Responsible to: Location: Job Status: No. of reports: Delegated Financial Authority: (If applicable) Regional

More information

Security Today. Shon Harris. Security consultant, educator, author

Security Today. Shon Harris. Security consultant, educator, author Security Today Shon Harris Security consultant, educator, author 360 Security Model Holistic Approach to Security Every Organization has these EXACT issues The responsibility of securing an organization

More information