Personal Copy of: Mr. Wim J. Van 't Einde
|
|
|
- Natalie Gibson
- 10 years ago
- Views:
Transcription
1 Enabling Processes
2 : ENABLING PROCESSES ISACA With 95,000 constituents in 160 countries, ISACA ( is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the non-profit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA ), Certified Information Security Manager (CISM ), Certified in the Governance of Enterprise IT (CGEIT ) and Certified in Risk and Information Systems Control TM (CRISC TM ) designations. ISACA continually updates COBIT, which helps IT professionals and enterprise leaders fulfil their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. Disclaimer ISACA has designed this publication, COBIT 5: Enabling Processes (the Work ), primarily as an educational resource for governance of enterprise IT (GEIT), assurance, risk and security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, readers should apply their own professional judgement to the specific GEIT, assurance, risk and security circumstances presented by the particular systems or information technology environment. Copyright 2012 ISACA. All rights reserved. For usage guidelines, see ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: [email protected] Web site: Feedback: Participate in the ISACA Knowledge Center: Follow ISACA on Twitter: Join the COBIT conversation on Twitter: #COBIT Join ISACA on LinkedIn: ISACA (Official), Like ISACA on Facebook: COBIT 5: Enabling Processes ISBN Printed in the United States of America 2
3 ACKNOWLEDGEMENTS ACKNOWLEDGEMENTS ISACA wishes to recognise: COBIT 5 Task Force ( ) John W. Lainhart, IV, CISA, CISM, CGEIT, IBM Global Business Services, USA, Co-chair Derek J. Oliver, Ph.D., CISA, CISM, CRISC, CITP, DBA, FBCS, FISM, MInstISP, Ravenswood Consultants Ltd., UK, Co-chair Pippa G. Andrews, CISA, ACA, CIA, KPMG, Australia Elisabeth Judit Antonsson, CISM, Nordea Bank, Sweden Steven A. Babb, CGEIT, CRISC, Betfair, UK Steven De Haes, Ph.D., University of Antwerp Management School, Belgium Peter Harrison, CGEIT, FCPA, IBM Australia Ltd., Australia Jimmy Heschl, CISA, CISM, CGEIT, ITIL Expert, bwin.party digital entertainment plc, Austria Robert D. Johnson, CISA, CISM, CGEIT, CRISC, CISSP, Bank of America, USA Erik H.J.M. Pols, CISA, CISM, Shell International-ITCI, The Netherlands Vernon Richard Poole, CISM, CGEIT, Sapphire, UK Abdul Rafeq, CISA, CGEIT, CIA, FCA, A. Rafeq and Associates, India Development Team Floris Ampe, CISA, CGEIT, CIA, ISO 27000, PwC, Belgium Gert du Preez, CGEIT, PwC, Canada Stefanie Grijp, PwC, Belgium Gary Hardy, CGEIT, IT Winners, South Africa Bart Peeters, PwC, Belgium Dirk Steuperaert, CISA, CGEIT, CRISC, IT In Balance BVBA, Belgium Workshop Participants Gary Baker, CGEIT, CA, Canada Brian Barnier, CGEIT, CRISC, ValueBridge Advisors, USA Johannes Hendrik Botha, MBCS-CITP, FSM, getitright Skills Development, South Africa Ken Buechler, CGEIT, CRISC, PMP, Great-West Life, Canada Don Caniglia, CISA, CISM, CGEIT, FLMI, USA Mark Chaplin, UK Roger Debreceny, Ph.D., CGEIT, FCPA, University of Hawaii at Manoa, USA Mike Donahue, CISA, CISM, CGEIT, CFE, CGFM, CICA, Towson University, USA Urs Fischer, CISA, CRISC, CPA (Swiss), Fischer IT GRC Consulting & Training, Switzerland Bob Frelinger, CISA, CGEIT, Oracle Corporation, USA James Golden, CISM, CGEIT, CRISC, CISSP, IBM, USA Meenu Gupta, CISA, CISM, CBP, CIPP, CISSP, Mittal Technologies, USA Gary Langham, CISA, CISM, CGEIT, CISSP, CPFA, Australia Nicole Lanza, CGEIT, IBM, USA Philip Le Grand, PRINCE2, Ideagen Plc, UK Debra Mallette, CISA, CGEIT, CSSBB, Kaiser Permanente IT, USA Stuart MacGregor, Real IRM Solutions (Pty) Ltd., South Africa Christian Nissen, CISM, CGEIT, FSM, CFN People, Denmark Jamie Pasfield, ITIL V3, MSP, PRINCE2, Pfizer, UK Eddy J. Schuermans, CGEIT, ESRAS bvba, Belgium Michael Semrau, RWE Germany, Germany Max Shanahan, CISA, CGEIT, FCPA, Max Shanahan & Associates, Australia Alan Simmonds, TOGAF9, TCSA, PreterLex, UK Cathie Skoog, CISM, CGEIT, CRISC, IBM, USA Dejan Slokar, CISA, CGEIT, CISSP, Deloitte & Touche LLP, Canada Roger Southgate, CISA, CISM, UK Nicky Tiesenga, CISA, CISM, CGEIT, CRISC, IBM, USA Wim Van Grembergen, Ph.D., University of Antwerp Management School, Belgium Greet Volders, CGEIT, Voquals N.V., Belgium Christopher Wilken, CISA, CGEIT, PwC, USA Tim M. Wright, CISA, CRISC, CBCI, GSEC, QSA, Kingston Smith Consulting LLP, UK 3
4 : ENABLING PROCESSES ACKNOWLEDGEMENTS (CONT.) Expert Reviewers Mark Adler, CISA, CISM, CGEIT, CRISC, Commercial Metals Company, USA Wole Akpose, Ph.D., CGEIT, CISSP, Morgan State University, USA Krzysztof Baczkiewicz, CSAM, CSOX, Eracent, Poland Roland Bah, CISA, MTN Cameroon, Cameroon Dave Barnett, CISSP, CSSLP, USA Max Blecher, CGEIT, Virtual Alliance, South Africa Ricardo Bria, CISA, CGEIT, CRISC, Meycor GRC, Argentina Dirk Bruyndonckx, CISA, CISM, CGEIT, CRISC, MCA, KPMG Advisory, Belgium Donna Cardall, UK Debra Chiplin, Investors Group, Canada Sara Cosentino, CA, Great-West Life, Canada Kamal N. Dave, CISA, CISM, CGEIT, Hewlett Packard, USA Philip de Picker, CISA, MCA, National Bank of Belgium, Belgium Abe Deleon, CISA, IBM, USA Stephen Doyle, CISA, CGEIT, Department of Human Services, Australia Heidi L. Erchinger, CISA, CRISC, CISSP, System Security Solutions, Inc., USA Rafael Fabius, CISA, CRISC, Uruguay Urs Fischer, CISA, CRISC, CPA (Swiss), Fischer IT GRC Consulting & Training, Switzerland Bob Frelinger, CISA, CGEIT, Oracle Corporation, USA Yalcin Gerek, CISA, CGEIT, CRISC, ITIL Expert, ITIL V3 Trainer, PRINCE2, ISO/IEC Consultant, Turkey Edson Gin, CISA, CISM, CFE, CIPP, SSCP, USA James Golden, CISM, CGEIT, CRISC, CISSP, IBM, USA Marcelo Hector Gonzalez, CISA, CRISC, Banco Central Republic Argentina, Argentina Erik Guldentops, University of Antwerp Management School, Belgium Meenu Gupta, CISA, CISM, CBP, CIPP, CISSP, Mittal Technologies, USA Angelica Haverblad, CGEIT, CRISC, ITIL, Verizon Business, Sweden Kim Haverblad, CISM, CRISC, PCI QSA, Verizon Business, Sweden J. Winston Hayden, CISA, CISM, CGEIT, CRISC, South Africa Eduardo Hernandez, ITIL V3, HEME Consultores, Mexico Jorge Hidalgo, CISA, CISM, CGEIT, ATC, Lic. Sistemas, Argentina Michelle Hoben, Media 24, South Africa Linda Horosko, Great-West Life, Canada Mike Hughes, CISA, CGEIT, CRISC, 123 Consultants, UK Grant Irvine, Great-West Life, Canada Monica Jain, CGEIT, CSQA, CSSBB, Southern California Edison, USA John E. Jasinski, CISA, CGEIT, SSBB, ITIL Expert, USA Masatoshi Kajimoto, CISA, CRISC, Japan Joanna Karczewska, CISA, Poland Kamal Khan, CISA, CISSP, CITP, Saudi Aramco, Saudi Arabia Eddy Khoo S. K., Prudential Services Asia, Malaysia Marty King, CISA, CGEIT, CPA, Blue Cross Blue Shield NC, USA Alan S. Koch, ITIL Expert, PMP, ASK Process Inc., USA Gary Langham, CISA, CISM, CGEIT, CISSP, CPFA, Australia Jason D. Lannen, CISA, CISM, TurnKey IT Solutions, LLC, USA Nicole Lanza, CGEIT, IBM, USA Philip Le Grand, PRINCE2, Ideagen Plc, UK Kenny Lee, CISA, CISM, CISSP, Bank of America, USA Brian Lind, CISA, CISM, CRISC, Topdanmark Forsikring A/S, Denmark Bjarne Lonberg, CISSP, ITIL, A.P. Moller - Maersk, Denmark Stuart MacGregor, Real IRM Solutions (Pty) Ltd., South Africa Debra Mallette, CISA, CGEIT, CSSBB, Kaiser Permanente IT, USA Charles Mansour, CISA, Charles Mansour Audit & Risk Service, UK Cindy Marcello, CISA, CPA, FLMI, Great-West Life & Annuity, USA Nancy McCuaig, CISSP, Great-West Life, Canada John A. Mitchell, Ph.D., CISA, CGEIT, CEng, CFE, CITP, FBCS, FCIIA, QiCA, LHS Business Control, UK Makoto Miyazaki, CISA, CPA, Bank of Tokyo-Mitsubishi, UFJ Ltd., Japan 4
5 ACKNOWLEDGEMENTS ACKNOWLEDGEMENTS (CONT.) Expert Reviewers (cont.) Lucio Augusto Molina Focazzio, CISA, CISM, CRISC, ITIL, Independent Consultant, Colombia Christian Nissen, CISM, CGEIT, FSM, ITIL Expert, CFN People, Denmark Tony Noblett, CISA, CISM, CGEIT, CISSP, USA Ernest Pages, CISA, CGEIT, MCSE, ITIL, Sciens Consulting LLC, USA Jamie Pasfield, ITIL V3, MSP, PRINCE2, Pfizer, UK Tom Patterson, CISA, CGEIT, CRISC, CPA, IBM, USA Robert Payne, CGEIT, MBL, MCSSA, PrM, Lode Star Strategy Consulting, South Africa Andy Piper, CISA, CISM, CRISC, PRINCE2, ITIL, Barclays Bank Plc, UK Andre Pitkowski, CGEIT, CRISC, OCTAVE, ISO27000LA, ISO31000LA, APIT Consultoria de Informatica Ltd., Brazil Geert Poels, Ghent University, Belgium Dirk Reimers, Hewlett-Packard, Germany Steve Reznik, CISA, ADP, Inc., USA Robert Riley, CISSP, University of Notre Dame, USA Martin Rosenberg, Ph.D., Cloud Governance Ltd., UK Claus Rosenquist, CISA, CISSP, Nets Holding, Denmark Jeffrey Roth, CISA, CGEIT, CISSP, L-3 Communications, USA Cheryl Santor, CISSP, CNA, CNE, Metropolitan Water District, USA Eddy J. Schuermans, CGEIT, ESRAS bvba, Belgium Michael Semrau, RWE Germany, Germany Max Shanahan, CISA, CGEIT, FCPA, Max Shanahan & Associates, Australia Alan Simmonds, TOGAF9, TCSA, PreterLex, UK Dejan Slokar, CISA, CGEIT, CISSP, Deloitte & Touche LLP, Canada Jennifer Smith, CISA, CIA, Salt River Pima Maricopa Indian Community, USA Marcel Sorouni, CISA, CISM, CISSP, ITIL, CCNA, MCDBA, MCSE, Bupa Australia, Australia Roger Southgate, CISA, CISM, UK Mark Stacey, CISA, FCA, BG Group Plc, UK Karen Stafford Gustin, MLIS, London Life Insurance Company, Canada Delton Sylvester, Silver Star IT Governance Consulting, South Africa Katalin Szenes, CISA, CISM, CGEIT, CISSP, University Obuda, Hungary Halina Tabacek, CGEIT, Oracle Americas, USA Nancy Thompson, CISA, CISM, CGEIT, IBM, USA Kazuhiro Uehara, CISA, CGEIT, CIA, Hitachi Consulting Co., Ltd., Japan Johan van Grieken, CISA, CGEIT, CRISC, Deloitte, Belgium Flip van Schalkwyk, Centre for e-innovation, Western Cape Government, South Africa Jinu Varghese, CISA, CISSP, ITIL, OCA, Ernst & Young, Canada Andre Viviers, MCSE, IT Project+, Media 24, South Africa Greet Volders, CGEIT, Voquals N.V., Belgium David Williams, CISA, Westpac, New Zealand Tim M. Wright, CISA, CRISC, CBCI, GSEC, QSA, Kingston Smith Consulting LLP, UK Amanda Xu, PMP, Southern California Edison, USA Tichaona Zororo, CISA, CISM, CGEIT, Standard Bank, South Africa ISACA Board of Directors Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, International President Christos K. Dimitriadis, Ph.D., CISA, CISM, CRISC, INTRALOT S.A., Greece, Vice President Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, Vice President Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Vice President Niraj Kapasi, CISA, Kapasi Bangad Tech Consulting Pvt. Ltd., India, Vice President Jeff Spivey, CRISC, CPP, PSP, Security Risk Management, Inc., USA, Vice President Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, CSEPS, RSM Bird Cameron, Australia, Vice President Emil D Angelo, CISA, CISM, Bank of Tokyo-Mitsubishi UFJ Ltd. (retired), USA, Past International President Lynn C. Lawton, CISA, CRISC, FBCS CITP, FCA, FIIA, KPMG Ltd., Russian Federation, Past International President Allan Neville Boardman, CISA, CISM, CGEIT, CRISC, CA (SA), CISSP, Morgan Stanley, UK, Director Marc Vael, Ph.D., CISA, CISM, CGEIT, CISSP, Valuendo, Belgium, Director 5
6 : ENABLING PROCESSES ACKNOWLEDGEMENTS (CONT.) Knowledge Board Marc Vael, Ph.D., CISA, CISM, CGEIT, CISSP, Valuendo, Belgium, Chairman Michael A. Berardi Jr., CISA, CGEIT, Bank of America, USA John Ho Chi, CISA, CISM, CRISC, CBCP, CFE, Ernst & Young LLP, Singapore Phillip J. Lageschulte, CGEIT, CPA, KPMG LLP, USA Jon Singleton, CISA, FCA, Auditor General of Manitoba (retired), Canada Patrick Stachtchenko, CISA, CGEIT, Stachtchenko & Associates SAS, France Framework Committee ( ) Patrick Stachtchenko, CISA, CGEIT, Stachtchenko & Associates SAS, France, Chairman Georges Ataya, CISA, CISM, CGEIT, CRISC, CISSP, Solvay Brussels School of Economics and Management, Belgium, Past Vice President Steven A. Babb, CGEIT, CRISC, Betfair, UK Sushil Chatterji, CGEIT, Edutech Enterprises, Singapore Sergio Fleginsky, CISA, Akzo Nobel, Uruguay John W. Lainhart, IV, CISA, CISM, CGEIT, CRISC, IBM Global Business Services, USA Mario C. Micallef, CGEIT, CPAA, FIA, Malta Anthony P. Noble, CISA, CCP, Viacom, USA Derek J. Oliver, Ph.D., CISA, CISM, CRISC, CITP, DBA, FBCS, FISM, Ravenswood Consultants Ltd., UK Robert G. Parker, CISA, CA, CMC, FCA, Deloitte & Touche LLP (retired), Canada Rolf M. von Roessing, CISA, CISM, CGEIT, CISSP, FBCI, Forfa, AG, Germany Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, CSEPS, RSM Bird Cameron, Australia Robert E. Stroud, CGEIT, CA Inc., USA ISACA and IT Governance Institute (ITGI ) Affiliates and Sponsors American Institute of Certified Public Accountants Commonwealth Association for Corporate Governance Inc. FIDA Inform Information Security Forum Institute of Management Accountants Inc. ISACA chapters ITGI France ITGI Japan Norwich University Solvay Brussels School of Economics and Management Strategic Technology Management Institute (STMI) of the National University of Singapore University of Antwerp Management School Enterprise GRC Solutions Inc. Hewlett-Packard IBM Symantec Corp. 6
7 TABLE OF CONTENTS TABLE OF CONTENTS List of Figures... 9 Chapter 1. Introduction Chapter 2. The Goals Cascade and Metrics for Enterprise Goals and IT-related Goals COBIT 5 Goals Cascade Step 1. Stakeholder Drivers Influence Stakeholder Needs...13 Step 2. Stakeholder Needs Cascade to Enterprise Goals...13 Step 3. Enterprise Goals Cascade to IT-related Goals...15 Step 4. IT-related Goals Cascade to Enabler Goals...15 Using the COBIT 5 Goals Cascade Benefits of the COBIT 5 Goals Cascade...15 Using the COBIT 5 Goals Cascade Carefully...16 Using the COBIT 5 Goals Cascade in Practice...16 Metrics Enterprise Goal Metrics...16 IT-related Goal Metrics...17 Chapter 3. The COBIT 5 Process Model Enabler Performance Management Chapter 4. The COBIT 5 Process Reference Model Governance and Management Processes Model Chapter 5. COBIT 5 Process Reference Guide Contents Inputs and Outputs Generic Guidance for Processes Evaluate, Direct and Monitor (EDM)...29 Align, Plan and Organise (APO)...49 Build, Acquire and Implement (BAI) Deliver, Service and Support (DSS) Monitor, Evaluate and Assess (MEA) Appendix A. Mapping Between COBIT 5 and Legacy ISACA Frameworks Appendix B. Detailed Mapping Enterprise Goals IT-related Goals Appendix C. Detailed Mapping IT-related Goals IT-related Processes
8 : ENABLING PROCESSES Page intentionally left blank 8
9 LIST OF FIGURES LIST OF FIGURES Figure 1 COBIT 5 Product Family...11 Figure 2 The Governance Objective: Value Creation...13 Figure 3 COBIT 5 Goals Cascade Overview...14 Figure 4 COBIT 5 Enterprise Goals...14 Figure 5 IT-related Goals...15 Figure 6 Enterprise Goal Sample Metrics...16 Figure 7 IT-related Goal Sample Metrics...17 Figure 8 COBIT 5 Enabler: Processes...19 Figure 9 COBIT 5 Governance and Management Key Areas...23 Figure 10 COBIT 5 Process Reference Model...24 Figure 11 Outputs...26 Figure 12 COBIT 4.1 Process Controls and Related ISO/IEC Process Capability Attributes...27 Figure 13 ISACA Frameworks Included in COBIT Figure 14 COBIT 4.1 Control Objectives Mapped to COBIT Figure 15 Val IT 2.0 Key Management Practices Covered by COBIT Figure 16 Risk IT Key Management Practices Covered by COBIT Figure 17 Mapping COBIT 5 Enterprise Goals to IT-related Goals Figure 18 Mapping COBIT 5 IT-related Goals to Processes
10 : ENABLING PROCESSES Page intentionally left blank 10
CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask AN ISACA CLOUD VISION SERIES WHITE PAPER
AN ISACA CLOUD VISION SERIES WHITE PAPER CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask Cloud computing is gaining momentum. As cloud offerings gain maturity, cloud service providers are becoming
Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance
COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this
CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world.
COBIT 5 Design Paper Exposure Draft ISACA With more than 86,000 constituents in more than 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy
The preceding pages provide a preview of the information contained in COBIT 5 for Risk.
With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT risk approach in order to effectively identify related
2ND USING COBIT AND VAL IT TM. The Need for IT Governance. The Road Map to IT Governance. Implementation Action Planning EDITION
2ND EDITION USING COBIT AND VAL IT TM The Need for IT Governance The Road Map to IT Governance Implementation Action Planning IT GOVERNANCE IMPLEMENTATION GUIDE, 2 ND EDITION IT Governance Institute The
CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world.
ISACA Model Curriculum for IS Audit and Control, 3 rd Edition ISACA With 95,000 constituents in 10 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community,
Mapping of ITILv3 With COBIT 4.1
Mapping of ITILv3 With COBIT 4.1 COBIT MAPPING: MAPPING OF ITIL V3 WITH COBIT 4.1 IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) is a non-profit, independent research entity
Social Media: Business Benefits and Security, Governance and Assurance Perspectives
An ISACA Emerging Technology White Paper Social Media: Business Benefits and Security, Governance and Assurance Perspectives Abstract Initiated as a consumer-oriented technology, social media is increasingly
ITAF. 3 rd Edition. A Professional Practices Framework for IS Audit/Assurance
ITAF 3 rd Edition A Professional Practices Framework for IS Audit/Assurance About ISACA With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust
4.0. Control Objectives. Management Guidelines. Maturity Models
4.0 Control Objectives Management Guidelines Maturity Models COBIT 4.0 The IT Governance Institute The IT Governance Institute (ITGI) (www.itgi.org) was established in 1998 to advance international thinking
4.1. Excerpt. Executive Summary. Framework
4.1 Excerpt Executive Summary Framework COBIT 4.1 The IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) was established in 1998 to advance international thinking and standards
Application Controls Defined. Design and Implementation of Application Controls. Operation and Maintenance of Application Controls
A Management Guide Application Controls Defined Design and Implementation of Application Controls Operation and Maintenance of Application Controls Application Controls and IT General Controls Application
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
Microsoft SQL Server Database Audit/Assurance Program
Microsoft SQL Server Database Audit/Assurance Program ISACA With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy
PRIVACY& BIG DATA AN ISACA WHITE PAPER AUGUST 2013
PRIVACY& BIG DATA AN ISACA WHITE PAPER AUGUST 2013 Improved decision making, faster time to market, better customer service and increased profits are just some of the benefits contributing to the explosion
4.1. Framework. Control Objectives. Management Guidelines. Maturity Models
4.1 Framework Control Objectives Management Guidelines Maturity Models COBIT 4.1 The IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) was established in 1998 to advance international
IS Standards, Guidelines and Procedures for Auditing and Control Professionals
IS Standards, Guidelines and Procedures for Auditing and Control Professionals Code of Professional Ethics IS Auditing Standards, Guidelines and Procedures IS Control Professionals Standards Current as
Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives
An ISACA Emerging Technology White Paper Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives Abstract In today s information-driven business
IS Audit and Assurance Guideline 2402 Follow-up Activities
IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply
IT GOVERNANCE ROUNDTABLE: IT GOVERNANCE TRENDS
IT GOVERNANCE ROUNDTABLE: IT GOVERNANCE TRENDS IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing
G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING
IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
Business Continuity Management: Emerging Trends
An ISACA Emerging Technology White Paper December 2012 Business Continuity Management: Emerging Trends Abstract As the pace of change in information technology (IT) accelerates, business continuity management
Aligning CobiT 4.1, ITIL V3 and ISO/IEC 27002 for Business Benefit. A Management Briefing From ITGI and OGC
Aligning CobiT 4.1, ITIL V3 and ISO/IEC 27002 for Business Benefit A Management Briefing From ITGI and OGC IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) is a non-profit,
Athens, 2 December 2011 Hellenic American Union Conference Center
Athens, 2 December 2011 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 1 st ISACA Athens Chapter Conference on December 2 nd, 2011. The
G11 EFFECT OF PERVASIVE IS CONTROLS
IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically
for Information Security
for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals
Advanced Persistent Threat Awareness
Advanced Persistent Threat Awareness Study Results Advanced persistent threat (APT) has been a term used frequently during security threat discussion; however, confusion exists as to what an APT is and
BIGDATA ANALY TICS GENERATING VALUE FROM ABSTRACT. An ISACA White Paper January 2014
An ISACA White Paper January 2014 GENERATING VALUE FROM BIGDATA ANALY TICS ABSTRACT Many enterprises are moving quickly to adopt big data analytics specifically, the application of advances in analytics
How To Manage Virtualization
An ISACA Emerging Technology White Paper Virtualization: Benefits and Challenges Abstract Virtualization is a high-tech buzzword in broad use today, but its increasing importance is based on more than
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
Did Someone Say Value? Delivering Enterprise Value the Metrics Way
Volume 3, July 2011 Come join the discussion! Sandeep Khanna will respond to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 15 July 2011. Did Someone Say
Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com
COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.
IT GOVERNANCE USING COBIT AND VAL IT TM :
IT GOVERNANCE USING COBIT AND VAL IT TM : Taking professional practices to higher education IT GOVERNANCE USING COBIT AND VAL IT TM IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org)
Geolocation: Sustainability
An ISACA White Paper Geolocation: Risk, Issues and Sustainability Strategies Abstract Geolocation data, revealing an individual s physical location, are obtained using tracking technologies such as global
Security, Audit and Control Features Oracle PeopleSoft
Technical and Risk Management Reference Series Security, Audit and Control Features Oracle PeopleSoft 3 rd Edition Security, Audit and Control Features Oracle PeopleSoft, 3 rd Edition ISACA With 95,000
ENTERPRISE VALUE: GOVERNANCE. Getting Started With Value Management OF IT INVESTMENTS. An Executive Primer Based on the Val IT Framework 2.
ENTERPRISE VALUE: GOVERNANCE OF IT INVESTMENTS Getting Started With Value Management An Executive Primer Based on the Val IT Framework 2.0 BASED ON C OBIT GETTING STARTED WITH VALUE MANAGEMENT IT Governance
AN INFORMATION SECURITY SURVIVAL KIT
ND EDITION 2 AN INFORMATION SECURITY SURVIVAL KIT Current Security Risks 44 Steps Towards Security Information Security Survival Kits ND EDITION 2 AN INFORMATION SECURITY SURVIVAL KIT 2007 IT Governance
ENTERPRISE VALUE: GOVERNANCE. The Val IT Framework 2.0 Extract OF IT INVESTMENTS BASED ON C OBIT
ENTERPRISE VALUE: GOVERNANCE OF IT INVESTMENTS The Val IT Framework 2.0 Extract BASED ON C OBIT THE VAL IT FRAMEWORK 2.0 EXTRACT IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org)
An Introduction to the Business Model for Information Security
An Introduction to the Business Model for Information Security ORGANIZATION Design/Strategy CULTURE GOVERNING ARCHITEC TURE PROCESS EMERGENCE ENABLING & SUPPORT PEOPLE HUMAN FAC TORS TECHNOLOGY A R C H
S 2 E C O N D E D I T I O N
2 SECOND EDITION IT governance is the term used to describe how those persons entrusted with governance of an entity will consider IT in their supervision, monitoring, control and direction of the entity.
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Roles, Activities and Relationships
and in COBIT 5 Objective: Value Creation Benefits Realisation Risk Resource Enablers Scope Roles, Activities and Relationships Source: COBIT 5, figure 8 Key Roles, Activities and Relationships Roles, Activities
IT Control Objectives
IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud 2 IT Control Objectives for Cloud Computing ISACA With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading
2 Security Considerations for Cloud Computing
1 2 Security Considerations for Cloud Computing About ISACA With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community,
An Introduction to the Business Model for Information Security
An Introduction to the Business Model for Information Security ORGANIZATION Design/Strategy CULTURE GOVERNING ARCHITEC TURE PROCESS EMERGENCE ENABLING & SUPPORT PEOPLE HUMAN FAC TORS TECHNOLOGY A R C H
Security, Audit and Control Features Oracle E-Business Suite
Technical and Risk Management Reference Series Security, Audit and Control Features Oracle E-Business Suite 3 rd Edition Excerpt Preface Through Chapter 2. Introduction to Oracle E-Business Suite and ERP
Data Leak Prevention. An ISACA White Paper
An ISACA White Paper Data Leak Prevention Abstract Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe.
THE IMPORTANCE OF IT IN THE DESIGN, IMPLEMENTATION AND SUSTAINABILITY OF INTERNAL CONTROL OVER DISCLOSURE AND FINANCIAL REPORTING
IT CONTROL OBJECTIVES FOR SARBANES-OXLEY THE IMPORTANCE OF IT IN THE DESIGN, IMPLEMENTATION AND SUSTAINABILITY OF INTERNAL CONTROL OVER DISCLOSURE AND FINANCIAL REPORTING IT CONTROL OBJECTIVES FOR SARBANES-OXLEY
Active Software Escrow s Usefulness for Companies Embracing COBIT 5 By Andrew Stekhoven
Volume 3, July 2012 Come join the discussion! Andrew Stekhoven will be responding to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 23 July 2012. Active Software Escrow
ENTERPRISE VALUE: GOVERNANCE. The Business Case OF IT INVESTMENTS BASED ON C OBIT
ENTERPRISE VALUE: GOVERNANCE OF IT INVESTMENTS The Business Case BASED ON C OBIT VAL IT The IT Governance Institute The IT Governance Institute (ITGI TM ) (www.itgi.org) was established in 1998 to advance
Calculating Cloud ROI: From the Customer Perspective
An ISACA Cloud Computing Vision Series White Paper July 2012 Calculating Cloud ROI: From the Customer Perspective Abstract Marketing hype claims that cloud computing can help any enterprise meet most IT
Presented by. Denis Darveau CISM, CISA, CRISC, CISSP
Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework
Focus. The newsletter dedicated to the COBIT user community. Applying COBIT With Limited Resources. By Matthew Altman
COBIT Focus July 2008, Volume 3 The newsletter dedicated to the COBIT user community Applying COBIT With Limited Resources By Matthew Altman Many midsize and small businesses, IT departments, and organizations
Aligning COBIT, ITIL and ISO 17799 for Business Benefit: Management Summary. A Management Briefing from ITGI and OGC
Aligning COBIT, ITIL and ISO 17799 for Business Benefit: Management Summary A Management Briefing from ITGI and OGC The IT Governance Institute The IT Governance Institute (ITGI) (www.itgi.org) was established
Critical Elements of Information Security Program Success
Critical Elements of Information Security Program Success Information Systems Audit and Control Association With more than 50,000 members in more than 140 countries, the Information Systems Audit and Control
Information Security Management
Defining Information Security Management Position Requirements n Guidance for Executives and Managers Defining Information Security Management Position Requirements ISACA With more than 86,000 constituents
Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC 20006-2803
3701 ALGONQUIN ROAD, SUITE 1010 TELEPHONE: 847.253.1545 ROLLING MEADOWS, ILLINOI S 60008, USA FACSIMILE 847.253.1443 WEB SITES: www.isaca.org and www.itgi.org November 21, 2003 Office of the Secretary
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
Business Benefits Business Benefits
AN ISACA Cloud Vision Series WHITE PAPER Security Security as as a a Service: Service: Business Benefits Business Benefits With Security, Governance and With Assurance Security, Perspectives Governance
Big Data: Impact, Benefits, Risk and Governance
Big Data: Impact, Benefits, Risk and Governance Urs Fischer, CPA (Swiss), CRISC, CISA, CIA Fischer IT GRC Consulting & Training Urs Fischer Agenda 1. Introduction 2. Impact on the Enterprise 3. Business
IT CONTROL OBJECTIVES
IT CONTROL OBJECTIVES FOR SARBANES-OXLEY, 2 ND EDITION THE IMPORTANCE OF IT IN THE DESIGN, IMPLEMENTATION AND SUSTAINABILITY OF INTERNAL CONTROL OVER FINANCIAL REPORTING AND DISCLOSURE EXPOSURE DRAFT 30
OCTOBER 2010. Russell-Parametric Cross-Sectional Volatility (CrossVol ) Indexes Construction and Methodology
OCTOBER 2010 Russell-Parametric Cross-Sectional Volatility (CrossVol ) Indexes Construction and Methodology SEPTEMBER 2010 Russell-Parametric Cross-Sectional Volatility (CrossVol) Indexes Construction
Guidance to Validate Internal Control Assertions in Indian Financial Reporting
Guidance to Validate Internal Control Assertions in Indian Financial Reporting TABLE OF CONTENTS Acknowledgements... 3 Section 1 Executive Summary... 4 Need for This publication... 4 Objective Statement...
41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.
Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***
Preliminary results of survey on public projects performed May - July 2014
DEC-212/7/D/HS4/1752, financed by the National Science Centre of Poland. Preliminary results of survey on public projects performed May - July 214 with kind support of PMI Government Community of Practice
Security, Audit and Control Features Oracle Database
Technical and Risk Management Reference Series Security, Audit and Control Features Oracle Database 3 rd Edition Excerpt Executive Summary Through Chapter 4. Oracle Database System Architecture Overview
Understanding COBIT 5. based on ISACA Materials www.isaca.org/cobit. Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant
Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant Understanding COBIT 5 based on ISACA Materials www.isaca.org/cobit ISACA Silicon Valley Chapter Spring 1 Why COBIT is important
Guidance for Information Security Managers
Guidance for Information Security Managers : Guidance for Information Security Managers : 2 Information Security Governance Guidance for Information Security Managers IT Governance Institute The IT Governance
Reporting practices for domestic and total debt securities
Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on
USAGE OF METRICS AND ANALYTICS IN EMEA MOVING UP THE MATURITY CURVE
USAGE OF METRICS AND ANALYTICS IN EMEA MOVING UP THE MATURITY CURVE USAGE OF METRICS AND ANALYTICS IN EMEA MOVING UP THE MATURITY CURVE When we asked business executives about the importance of human capital
COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.
COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that
ISACA Privacy Principles and Program Management Guide Preview Yves LE ROUX Principal consultant [email protected]
ISACA Privacy Principles and Program Management Guide Preview Yves LE ROUX Principal consultant [email protected] 1 2014 CA. ALL RIGHTS RESERVED. ISACA 2 2014 CA. ALL RIGHTS RESERVED. Privacy Guidance
The value of accredited certification
Certified Once Accepted Everywhere The value of accredited certification Survey Report Published May 212 In 21/11, the IAF carried out a global survey to capture market feedback on the value of certification.
BT Premium Event Call and Web Rate Card
BT Managed Event and BT Self-Managed Event (also referred to as Express, Plus and Premium) Conference Bridge and Call for Booked Audio Conferencing Services will comprise the following for each phone-conference:
Mobile Payments: Risk, Security and Assurance Issues
An ISACA Emerging Technology White Paper November 2011 Mobile Payments: Risk, Security and Assurance Issues Abstract Mobile payments as a financial transaction medium emerged around a decade ago. Adoption
IFI 2011-2013 SPONSOR & PARTNER OPPORTUNITIES CELEBRATING 50 YEARS
IFI 2011-2013 SPONSOR & PARTNER OPPORTUNITIES CELEBRATING 50 YEARS IFI practice. The International Federation of Interior Architects/ Designers (IFI) is the global voice and authority for professionals
CobiT Strategy and Long Term Vision
CobiT Strategy and Long Term Vision Urs Fischer VP Head IT Risk Mgmt, Security & ICS SwissLife Seite 2 1 Seite 3 Seite 4 2 Session Objective Provide those interested stakeholders with a clear and single
E-Seminar. Financial Management Internet Business Solution Seminar
E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7
BROWN BROTHERS HARRIMAN (LUXEMBOURG) S.C.A. Wells Fargo (Lux) Worldwide Fund
Argen na CITIBANK, N.A. BUENOS AIRES BRANCH Australia Austria HSBC BANK AUSTRALIA LIMITED FOR THE HONGKONG AND SHANGHAI DEUTSCHE BANK AG, VIENNA BRANCH Belgium DEUTSCHE BANK AG, AMSTERDAM BRANCH Brazil
World Consumer Income and Expenditure Patterns
World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income
IOOF QuantPlus. International Equities Portfolio NZD. Quarterly update
IOOF QuantPlus NZD Quarterly update For the period ended 31 March 2016 Contents Overview 2 Portfolio at glance 3 Performance 4 Asset allocation 6 Overview At IOOF, we have been helping Australians secure
Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
IT Governance Implementation Workshop
IT Governance Implementation Workshop 3 Full day power packed workshop facilitated by Mr. Gary Allan Banister and Mr. Sreechith Radhakrishnan About the Programme Information is created, used, retained,
U.S. Trade Overview, 2013
U.S. Trade Overview, 213 Stephanie Han & Natalie Soroka Trade and Economic Analysis Industry and Analysis Department of Commerce International Trade Administration October 214 Trade: A Vital Part of the
Global AML Resource Map Over 2000 AML professionals
www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain
Appendix 1: Full Country Rankings
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
COBIT Helps Organizations Meet Performance and Compliance Requirements
DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,
ow to use CobiT to assess the security & reliability of Digital Preservation
ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education
SunGard Best Practice Guide
SunGard Best Practice Guide What Number Should I Use? www.intercalleurope.com Information Hotline 0871 7000 170 +44 (0)1452 546742 [email protected] Reservations 0870 043 4167 +44 (0)1452
