Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA



Similar documents
S11 - Implementing IT Governance An Introduction Debra Mallette

2009 Solvay Brussels School and IT Governance institute

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

CobiT Strategy and Long Term Vision

ow to use CobiT to assess the security & reliability of Digital Preservation

Information Security Governance:

PwC Luxembourg. Models for the governance of your investments with Portfolio Management September 2009

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP

Terms of Reference for an IT Audit of

IT Charter and IT Governance Framework

G11 EFFECT OF PERVASIVE IS CONTROLS

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

BUILD YOUR CYBERSECURITY SKILLS WITH NRB

Auditors Need to Know June 13th, ISACA COBIT 5 for Assurance

Certification and Training

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Revised October 2013

IT Service Management ITIL, COBIT

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

ISACA. Trust in, and value from, information systems.

Certified Information Security Manager (CISM)

sample exam ITMP.EN IT Management Principles (ITMP.EN) edition 2010 content introduction 3 exam 4 answer key 9 evaluation 16

Roles, Activities and Relationships

Chayuth Singtongthumrongkul

Integrating the Project Portfolio Management and Service Portfolio Management: The Governance of Enterprise IT Perspective

Application for CISA Certification

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

Domain 1 The Process of Auditing Information Systems

IT Governance Implementation Workshop

Setting goals and measuring the value of Enterprise IT Architecture using COBIT 5 framework

COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES

Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI

Frameworks for IT Management

Application for CISM Certification

Understanding COBIT 5. based on ISACA Materials Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

April 20, Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices)

ISO 27001:2005 & ISO 9001:2008

SECURING PAYMENTS IN THE CYBER WORLD

ITIL AND COBIT EXPLAINED

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Focus. The newsletter dedicated to the COBIT user community. Applying COBIT With Limited Resources. By Matthew Altman

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Information Security Management Systems

Benchmark of controls over IT activities Report. ABC Ltd

BCS Specialist Certificate in Business Relationship Management Syllabus. Version 1.9 March 2015

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Candidate s Guide to the CISM Exam and Certification

Somewhere Today, A Project is Failing

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Governance and Management of Information Security

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Advanced IT Audit Training

COBIT 5 Implementation Certifi cate. Training Course & Exam

IT Compliance After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)

IS Audit and Assurance Guideline 2402 Follow-up Activities

ITAG RESEARCH INSTITUTE

IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE

Ann Geyer Tunitas Group. CGEIT Domains

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Presentation on COBIT Education

Increasing IT Value and Reducing Risk. More for Less with COBIT5. IT Governance and Strategy

ISACA is responding to the PCAOB questions principally from an information technology (IT) perspective.

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

Integrating CMMI with COBIT and ITIL

IT Audit in the Cloud

Work Toward Your Bachelor s Degree

1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Information Security Specialist Training on the Basis of ISO/IEC 27002

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

INFORMATION SECURITY STRATEGIC PLAN

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

IT Governance Dr. Michael Shaw Term Project

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

IS Management, ITIL, ISO, COBIT...

CLASSIFICATION SPECIFICATION FORM

ITIL Foundation Certification Course

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Based on 2008 Survey of 255 Non-IT CEOs/Executives

Security Transcends Technology

Combine ITIL and COBIT to Meet Business Challenges

TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs)

INFORMATION TECHNOLOGY FLASH REPORT

for Information Security

The Value of Information Security Certifications

Transcription:

Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1

The International Association 2

ISACA More than 70,000 members in 170 chapters established in over 60 countries worldwide, Cover a variety of professional IT-related positions to name just a few: IS auditor, IS security professional, consultant, educator, regulator, chief information officer internal auditor Etc.. More info www.isaca.org 3

4

ISACA is also Member services including: Education & Conferences Professional Resources K-NET Standards Bookstore Discussion Forum Glossary The IT Governance Institute (ITGI) actively promotes research and publications in three main domains IT governance, IT control and assurance, and Security management. More info www.isaca.org 5

Research and publications 6

Research and publications 7

The IT Governance Institute 8

The IT Governance Institute 9

Publications Books Journal K-net More info www.isaca.org 10

The Belux Chapter 11

ISACA Belux Chapter ISACA Belgium, Rue du choux 47 3 ème étage 1000 Bruxelles, Belgique Tel : 02/219.82.82 12

Additional activities in Belgium 13

Partnership with Belgian universities Isaca Belux and Solvay Business School are delighted to strengthen their cooperation to offer selected education sessions for ISACA Belux members to be chosen from the Executive Master in ICT Audit & Security program : A1. IT Systems management (30 hours) A2. Internal and IT audit (30 h) A3. Review of the IT process (Practical use of COBIT) (30 h) A4. IT Legislation and IT forensics (30 h) A5. Application Review and Data Analysis (Workshop) (30 h) A6. Audit of New Technologies (Workshop - 15 h) (A3 is a prerequisite for A6) / A7. Service Management - ITIL (15 h) B6 Soft skills for IT Professionals (15 h) C1: Strategy management (16 h) C2: Leadership skills (16 h) 14

Certification 15

CISM The Certified Information Security Manager (CISM ) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. Requirements: Successfully pass the CISM exam. Adhere to ISACA's Code of Professional Ethics. Agree to comply with the Continuing Education Policy. Work experience in the field of information security. More info www.isaca.org 16

CISA Job Practice Areas IS Audit Process 10% IT Governance 15% Systems and Infrastructure Lifecycle Management 16% IT Service Delivery and Support 14% Protection of Information Assets 31% Business Continuity and Disaster Recovery 14% Exam dates: Saturday 9 June 2007 Saturday 8 December 2007 17

CISM Job Practice Areas Information Security Governance (23%) Information Risk Management (22%) Information Security Program Development (17%) Information Security Program Management (24%) Incident Management & Response (14%) Exam dates: Saturday 9 June 2007 Saturday 8 December 2007 18

Exam passers 19

IT Governance 20

What is IT Governance? Leadership, process and structure to ensure the enterprise s s IT enables and supports the enterprise's strategies and objectives by defining: 1. what key decisions need to be made; 2. who is responsible for making them; 3. how they are made; and 4. the process and supporting structures for making them, including monitoring adherence to the process and the effectiveness of decisions Focusing on five areas Performance Measurement Strategic Alignment Value Delivery IT Governance Domains Resource Management Risk Management 21

What is IT Governance? DOMAINS 1. Strategic Alignment Aligning with the business and providing collaborative solutions 2. Value Delivery Executing the value proposition throughout the delivery cycle focussing on IT expenses and proof of value 3. Resource Management Optimising the development and use of available resources: knowledge, infrastructure and partners 4. Risk Management Safeguarding assets, disaster recovery and compliance 5. Performance Measurement Monitoring results for corrective action through scorecards 2005 Doing something about it 2003 Not doing something about it ITGI Survey of 700 CEO/CIO s worldwide by PwC Oct 2005 Performance Measurement Strategic Alignment Value Delivery IT Governance Domains Resource Management Risk Management 22

The Four Ares - continually asking: The strategic question. Is the investment: In line with our vision? Consistent with our business principles? Contributing to our strategic objectives? Providing optimal value, at affordable cost, at an acceptable level of risk? In the value question. Do we have: A clear and shared understanding of the expected benefits? Clear accountability for realising the benefits? Relevant metrics? An effective benefits realisation process? Some fundamental questions Are we doing the right things? Are we getting the benefits? about the value enabled by IT Are we doing them the right way? Are we getting them done well? The architecture question. Is the investment: In line with our architecture? Consistent with our architectural principles? Contributing to the population of our architecture? In line with other initiatives? The delivery question. Do we have: Effective and disciplined delivery and change management processes? Competent and available technical and business resources to deliver: the required capabilities; and the organisational changes required to leverage the capabilities? 23 Source: The Information Paradox

CobiT 24

25

The use of management frameworks 26

Val-IT 27

Val IT Initiative a a value lens into COBIC OBIT Performance Measurement Strategic Alignment Value Delivery IT Governance Domains Resource Management Risk Management Are we doing them the right way? Are we doing the right things? IM Are we doing the right things? PM Are we getting the benefits? Are we doing them well? Are we getting the benefits? VG Val IT Governance & management of a portfolio of business change programmes Are we doing them the right way? Are we doing them well? COBIT Governance & management of a portfolio of technology projects, services, systems & supporting infrastructure Are we doing them the right way? AI Are we doing the right things? PO Are we getting the benefits? ME Are we doing them well? DS 28

Val IT Relationship between Processes & Practices Establish governance framework VG1-4, 6-7 VG VG8 Provide strategic direction Establish portfolio parameters VG5, 9-11 PM1-5 Maintain resource profile Maintain funding profile PM6 PM7-10 PM Evaluate & prioritize investments Move selected investments to active portfolio PM11 Manage overall portfolio PM12-13 Monitor & report on portfolio performance PM14 IM Identify business req ts IM1-2 IM3, 5-7 Define candidate programme Launch programme Analyse alternatives IM4 Manage programme execution IM9 Monitor & report on programme performance IM10 IM 11-12 IM14 Assign accountability Retire programme IM15 Document business case IM8, 13 29

Val IT Initiative- Deliverables Available for free download from: www.isaca.org or www.itgi.org 30

IT Audit 31

Background of IT Auditing Started in assisting financial auditors in accessing the data Auditing data Audit general controls Auditing applications controls Today additional requirements for IT Audit Audit the complete IT Process Audit specific environments Security audits Focus an Risk and on Internal Controls 32

Audit Mission and Planning To perform an audit planning, the IS auditor should 1. Gain an understanding of the business mission, business objectives, business processes, information and processing requirements such as availability, integrity and security and information architecture requirements. In general terms, processes and technology. 2. Perform risk analysis. 3. Conduct an internal control review. 4. Set the audit scope and audit objective(s). 5. Develop the audit approach or audit strategy. 6. Assign resources to audit and address engagement logistics. 33

Information Security 34

35

Security Research and publications Security Governance Security technology Security Knowledge Centre K-NET contains over 6,000 peer-reviewed web site resources Pertaining to knowledge covering IT Governance, Assurance, Security and Control. Glossary Security Management Committee Establishes and oversees the execution of an ISACA strategy for serving the information security management profession. Discussion Forum (Information Security Manager ) Career, Forum, Conferences, etc... More info www.isaca.org 36

Further references 37

www.itgi.org www.isaca.org www.isaca.be 38

Jean-Luc Allard Chairman of the Education Committee at ISACA Belux Chapter Managed telecommunication and Information Systems at the Belgian Air Force Active involvement with the Belgian Shadow Committee for developing standards such as ISO/IEC 13335, 27005, 2700x Member of the Belgian Chamber of IT Expert Witnesses (BCIE) for risk management and information security management Wide experience in Security Governance as a delegate of Belgium in NATO and WEU workgroups dealing with information security management Past Senior Security Consultant at Cybertrust (Ubizen) where he was involved with the development of a process and method for information security risk management (based on EBIOS) and application with a dozen of clients in countries such as Belgium, United States, Saudi Arabia, The Grand Duchy of Luxembourg, the Netherlands. Activity domains included Banking, Finance, Stock Exchange, Media, Telecommunications, Industry, Sciences, and Energy Industrial Engineer in Electronics, ETSE Anderlecht (Belgium); Capitaine-Commandant d Aviation E.R., Technical Officer (Telecommunications) by the Belgian Air Force; CISM Certified Information Security Manager (ISACA); CISA Certified Information System Auditor (ISACA). 39

Georges Ataya MSCS, PBA, CISA, CISM, CISSP Professor and Academic Director at Solvay Business School (www.solvay.edu/it) Postgraduate in ICT Audit & Security Executive Master in IT Governance International Vice President of the IT Governance Institute (www.itgi.org) Managing Partner of ICT Control SA-NV (www.ictcontrol.eu) Member of the Belgian association for Board Directors and the International commission of the Institute for French Board Directors. Participated in the development of various publications. Georges@ataya.net www.ataya.info +32 475 705709 40

Questions? 41