"Introduction to IT Governance with CobiT4.1 and CobiTQuickstart"



Similar documents
S11 - Implementing IT Governance An Introduction Debra Mallette

Information Security Governance:

Governance and Management of Information Security

The Value of Vulnerability Management*

ow to use CobiT to assess the security & reliability of Digital Preservation

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

IT Audit in the Cloud

Understanding COBIT 5. based on ISACA Materials Prepared by: Deb Mallette, CGEIT, CISA, CSSBB, IMG BSMS EPDM, Process Consultant

Better secure IT equipment and systems

Domain 1 The Process of Auditing Information Systems

COBIT 4.1 TABLE OF CONTENTS

2009 Solvay Brussels School and IT Governance institute

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

Cloud Computing An Auditor s Perspective

G11 EFFECT OF PERVASIVE IS CONTROLS

Defending Against Data Beaches: Internal Controls for Cybersecurity

Certified Information Systems Auditor (CISA)

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Internal Audit Report on. IT Security Access. January January - English - Information Technology - Security Access - FINAL.

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Achieving SOX Compliance with Masergy Security Professional Services

Project Management and ITIL Transitions

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

COBIT 5 Process Assessment Method (PAM) Debra Mallette, CGEIT, CISA, CSSBB Governance Risk and Compliance -G22

Information Security Management Systems

Firewall Administration and Management

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Practical Guidance for Auditing IT General Controls. September 2, 2009

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

ITAG RESEARCH INSTITUTE

Newcastle University Information Security Procedures Version 3

April 20, Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices)

Computer Security: Principles and Practice

ITIL AND COBIT EXPLAINED

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Procuring Penetration Testing Services

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

CobiT Strategy and Long Term Vision

Developing National Frameworks & Engaging the Private Sector

Central Agency for Information Technology

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

INFORMATION TECHNOLOGY FLASH REPORT

Lot 1 Service Specification MANAGED SECURITY SERVICES

ICTEC. IT Services Issues HELSINKI UNIVERSITY OF TECHNOLOGY 2007 Kari Hiekkanen

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits.

Information Security and Risk Management

Information Security Program CHARTER

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Auditing for Non-IT Specialist

HIPAA Compliance Evaluation Report

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Moving Forward with IT Governance and COBIT

Chapter 1 The Principles of Auditing 1

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Cybersecurity The role of Internal Audit

IT Compliance After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Effectively Assessing IT General Controls

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Top Ten Technology Risks Facing Colleges and Universities

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Italy. EY s Global Information Security Survey 2013

State of Oregon. State of Oregon 1

A Managed Storage Service on a Hybrid Cloud

Four Top Emagined Security Services

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

WHITE PAPER. Mitigate BPO Security Issues

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP

Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3

Security Management. Keeping the IT Security Administrator Busy

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Office of Inspector General

How To Use Risk It

Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI

Combine ITIL and COBIT to Meet Business Challenges

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

ISO 27002:2013 Version Change Summary

Remote Services. Managing Open Systems with Remote Services

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Comply, Improve, Transform: Regulatory Compliance Management for Software Development. Jim Duggan

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK

IBX Business Network Platform Information Security Controls Document Classification [Public]

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Transcription:

"Introduction to Governance with CobiT4.1 and CobiTQuickstart" ISACA Joint Session San Francisco Chapter and Silicon Valley Chapter April 23, 2008 Debra Mallette CISA (Information Systems Audit and Control Association Certified Information Systems Auditor) CSSBB (American Society of Quality Certified Six Sigma Black Belt) IL V2.0 Foundation Certified Managed Change Master (LaMarshand Associates)

Agenda Time 8:00-8:30 8:30 10:00 10:00-10:15 10:15 12:00 12:00 1:00 1:00 1:45 1:45 2:30 2:30 2:45 3:00 4:00 4:00 4:30 4:30 5:00 Topic Registration Introductions, Overview, Navigation, Exploration of Differences Break Governance & Management Control Flows Lunch Group Exercises Using CobiTQuickstartto Identify Governance & Management Control Flow Translating Audit Findings into Persuasive Management Communications Reversing the Control Flows Break Systematic Approach to Implementing & Improving Governance & Management Control Flows Review with Burning Questions Course Evaluations, Certificates 2

Introductions Your name ISACA involvement Governance, Management and/or Audit responsibilities (Auditor, manager, consultant/professional services) Why are you here? What would you like to get out of the class? Burning question? 3

COB 4.1 Please Label your materials! 4

Guided Tour COB 4.1 Contents (Cover) Governance Institute Table of Contents (p 4) How to Use your book Framework navigation (p 26 & 27) Tabs Framework Relationship to Job Aid Executive Overview (p 5) COB Control s for Information and related Technology (P 5, Executive Overview, about half-way down) Management need for Control s: (bottom of page): Business s are achieved Undesired events are prevented or detected and corrected Analogy to Brakes on the car: Go fast, safely Governance Focus areas (Figure 2, p 6 next slide): Strategic alignment: is aligned with the business Value Delivery enables the business and maximizes benefits Resource Management: resources are used responsibly Risk Management: risks are managed appropriately Performance Measurement: objective feedback 5

Questions and Answers What does the acronym CobiT stand for? Control s for Information and related Technology What are the objectives for Governance? is aligned with the business enables buesiness and mximizes benefits resources are used responsibly risks are managed appropriately What are the Governance Focus areas? Strategic alignment, Value delivery, Resource Management, Risk management and Performance Measurement What are the CobiT Domains? Plan & Organize Acquire & Implement Deliver & Support Monitor and Evaluation How many processes are in each Domain? Plan & Organize = 10 Acquire & Implement = 7 Deliver & Support = 13 Monitor & Evaluate = 4 What are the resources controlled? Applications Information Infrastructure People 6

Questions and Answers Which Domains contain processes that control the majority of the resources? Acquire & Implement Deliver & Support What are the CobiTInformation criteria? Effectiveness, Efficiency, Confidentiality, Integrity, Availability, Compliance & Reliability Which processes might the organization focus on improving if Availability is of concern? PO9: Assess & Manage Risks AI7: Manage Change DS4: Ensure Continuous Service DS12: Manage the physical environment Which processes might the organization focus on for achieving Sarbanes/Oxley (COSO) compliance? See Table: Mapping Processes to Governance Focus Areas, COSO, CobiT Resources and CobiTInformation Criteria: Appendix II. 7

Questions & Answers Which of the COB Processes addresses: Strategic Planning and Portfolio Management: PO1 Risk Management: PO9 Financial Management: PO5 & DS6 Policy and Process Definition and Implementation: PO6 Regulatory Compliance: ME3 Project Management: PO10 System Test: AI7 Managing Change to the Production Environment: AI6 Contract and Vendor Management: AI5 & DS2 Help Desk: DS8 Business Continuity: DS4 Disaster Recovery: DS4 Configuration Management: DS9 (for production environment) Asset Management: Unclear usually combination of DS9 & DS6 Security: DS5 Performance Measurement: DS3 Internal Audit: ME2 Governance: ME4 Training: DS7 Roles & Responsibilities: All Processes Access management: DS12 for Physical Access, DS11 for Data/Information Access, DS 5 for User Access and Identity Management 8

COB Quickstart Please Label your materials! 9

COB and COB Quickstart Business s Governance s PO1 Define a Strategic Plan PO2 Define the information architecture PO3 Determine the technological direction PO4 Define Processes, Org. & Relationships PO5 Manage the investment PO6 Communicate Mgmt aims and direction PO7 Manage Human Resources PO8 Manage Quality PO9 Assess and Manage Risks PO10 Manage Projects ME1 Monitor and Evaluate Performance ME2 Monitor and Evaluate Internal Control ME3 Ensure Regulatory Compliance ME4 Provide Governance Information Criteria effectiveness efficiency confidentiality integrity availability compliance reliability PLAN AND ORGANISE MONOR AND EVALUATE RESOURCES Applications Information Infrastructure People ACQUIRE AND IMPLEMENT DS1 Define and Manage Service levels DS2 Manage Third party Services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS6 Identify and Allocate Costs DS7 Educate and Train Users DS8 Manage Service Desk and Incidents DS9 Manage the Configuration DS10 Manage Problems DS11 Manage Data DS12 Manage the Physical Environment DS13 Manage Operations DELIVER AND SUPPORT AI1 Identify Automated Solutions AI2 Acquire and Maintain Application Software AI3 Acquire and Maintain Technology infrastructure AI4 Enable Operation and Use AI5 Procure Resources AI5 Manage Changes AI6 Install and Accredit Solutions and Changes 10

COB Quickstart Questions 1. Which processes are in CobiT 4.1, and not CobiT Quickstart? 1. (DS6 : Identify and Allocate Costs 2. (DS7: Educate and Train Users 2. Processes are further subdivided into detailed control objectives. There are 210 in CobiT and 59 in CobiT Quickstart. 3. There are overarching Generic Process Controls that should be considered together with the process control objectives to have a complete view of control requirements are: (See page 14 in CobiT 4.1) PC1: Process Goals and s PC2: Process Ownership PC3: Process Repeatability PC4:_Roles & Responsibilities PC5:_Policy, Plans and Procedures PC6: Process Performance Improvement List 5-7 observations about the differences between COB 4.1 and COB Quickstart based on DS5: Ensure Systems Security. 1. See next page 11

Differences between CobiT4.1 & Cobit Quickstart Quickstart does not list all Control s Quickstart is missing the maturity model 4.1 Doesn t call out Application Controls as critical supporting reference. 4.1 had more metrics 4.1 talks about inputs and outputs Quickstart shows less detail in the RACI chart (includinwhat RACI means) Quickstart combines Implementation with the Model and 4.1 does not. (Can we download Implementing Governance from the site?) Quickstart uses the term Good Practices rather than Control s listed in the manual. Quickstart isn t targeted toward auditors targeted management Quickstart seems to be based on the size/complexity criteria. May be organizations that meet the size/complexity criteria that still need to go to full CobiT and beyond. Quickstart self-assessment takes a different approach than Implementation Guidelines for full CobiT. 12

Management Control Flows Control Flows for Enterprise Governance and Management: Connecting Alignment Focus on Creating and Preserving Value to Measured Results Flow is Top Down 2 Paths: Value-Delivery and Risk Management Ref. Governance Implementation Guide, 2nd edition, Page 14 13

COB Quickstart DS5: Ensure Systems Security (p45) DS5 Ensure systems security. COBI T Quickstart Process Define security principles and procedures, and monitor, detect, report and resolve security vulnerabilities and incidents. Processes and Good Practices COBI T Quickstart Management Practices 42 Implement procedures to control access based on the individual s need to view, add, change or delete data. Especially consider access rights by service providers, suppliers and customers, and change passwords of standard users. 43 Make sure one person is responsible for managing all user accounts and security tokens (passwords, cards, devices, etc.) and that appropiate emergency procedures are defined. Periodically review/confirm his/her actions and authority. 44 Log important security violations (system and network, access, virus, misuse, illegal software). Ensure they are reported immediately and acted upon in a timely manner. 45 Ensure that all users (internal, external and temporary) and their activity on I T Systems are uniquely identifyable. 46 Implement virus protection, update security patches, enforce use of legal software. Put preventive, detective and corrective measure to protect from malware. Install and configure firewalls to control network access and information flow. 14 CO Ref DS5.3 DS5.4 DS5.4 DS13.4 DS5.5 DS5.6 DS5.3 AC6 DS5.9 DS5.10 Control Metric - Elapsed time to grant, change and remove access rights - Number of violations during emergency situations. - Time since last update of violations log. - Number of generic accounts Key Metrics - Time since last security patch - Number of preventive and detective measures per month Process Metrics - Number of incidents due to unauthorised access - Number of security violations

Diagram the Control Flows Top => Strategic Bottom => Performance Measurement is Process Management Practices Deliver Value Manage Risk Manage Resources Improve Performance & Process 15

COB Quickstart s DS5: Ensure Systems Security (Page 45 in Quickstart) Define Strategy (Goal) Ensure Security Process s Create Value Preserve Value Good Things Happening Bad Things Not Happening Management Practices) Exploit Opportunities Resolve Problems Continuous Improvement Measure Results Number of incidents due to unauthorized access Number of security violations 16

COB Quickstart s DS5: Ensure Systems Security (Page 45 in book) Define Strategy Ensure Security (Goal) Process s Create Value Define security principles and procedures Preserve Value Monitor, detect, report and resolve security vulnerabilities and incidents Good Things Happening Bad Things Not Happening Management Practices) Exploit Opportunities Resolve Problems Continuous Improvement Measure Results Number of incidents due to unauthorized access Number of security violations 17

COB Quickstart s DS5: Ensure Systems Security (Page 45 in book) Define Strategy Ensure Security (Goal) Process s Create Value Define security principles and procedures Repeatable, low cost onboarding Reduce time to implementation to adopt process improvements Good Things Happening A Person is Managing user accounts and security tokens Preserve Value Monitor, detect, report and resolve security vulnerabilities and incidents Bad Things Not Happening Report and immediately act on important security violations Management Practices) Exploit Opportunities All users and their activity are uniquely identifiable Continuous Improvement Log important security violations, identify preventive actions Resolve Problems Implement virus protection, update security patches, enforce use of legal software, install firewalls Measure Results Number of incidents due to unauthorized access Number of security violations 18

Now let s do this with CobiT4.1 19

Governance Focus Areas Governance Focus Areas: Strategic Alignment Value Delivery Governance Performance Measurement Risk Management Resource Management Ref. COB 4.1 Page 6 and Page 26 20

Control Flows Connecting Governance Focus Areas Control Flows for Enterprise Governance and Management: Connecting Alignment Focus on Creating and Preserving Value to Measured Results Flow is Top Down 2 Paths: Value-Delivery and Risk Management Ref. Governance Implementation Guide, 2nd edition, Page 14 21

Control Flows Connecting Governance Focus Areas Control Flows for Enterprise Governance and Management: Connecting Alignment Focus on Creating and Preserving Value to Measured Results Strategic Alignment Value Delivery Risk Management Resource Management Performance Measurement Flow is Top Down 2 Paths: Value-Delivery and Risk Management Ref. Governance Implementation Guide, 2nd edition, Page 14 22

Aligning Business Strategy with Performance Measurement Business (Goal) Define Strategy (Goal) Create Value Strategic Alignment Preserve Value Process (Goal) Value Delivery Good Things Happening Risk Management Bad Things Not Happening Exploit Opportunities Resolve Problems Activity Goal or Control Resource Management Continuous Improvement Measure Results Performance Measurement 23

Relationship Amongst Process, Goals and Measures* Define goals Business Goal Goal Process Goal Activity Goal Improve and re-align Maintain enterprise reputation and leadership is measured by Number of incidents causing public embarrassment Ensure services can resist and recover from attacks is measured by Number of actual incidents with business impact Detect and resolve unautho-rised access to information, applications & infrastructure is measured by Number of actual incidents because of unauthorised access Understanding security requirements, vulnerabilities and threats is measured by Frequency of review of the type of security events to be monitored Measure achievement Indicate performance * This is figure 19 in COB 4.1. The Example is based on DS5 Ensure Systems Security 24

Leveraging the Relationship Amongst Process, Goals and Measures* Strategic Alignment Value Delivery Risk Management Define goals Business Goal Goal Process Goal Activity Goal Improve and re-align Maintain enterprise reputation and leadership is measured by Number of incidents causing public embarrassment Ensure services can resist and recover from attacks is measured by Number of actual incidents with business impact Detect and resolve unautho-rised access to information, applications & infrastructure Number of actual incidents because of unauthorised access Understanding security requirements, vulnerabilities and threats Resource Management is measured by is measured by Frequency of review of the type of security events to be monitored Measure achievement Indicate performance Performance Measurement * This is figure 19 in COB 4.1. The Example is based on DS5 Ensure Systems Security 25

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Preserve Value Process (Goal) Good Things Happening Bad Things Not Happening Exploit Opportunities Resolve Problems Activity Goal or Control Continuous Improvement Measure Results # of incidents causing public embarrassment 26

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Bad Things Not Happening Exploit Opportunities Resolve Problems Activity Goal or Control Continuous Improvement Measure Results # of actual incidents with business impact 27

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Exploit Opportunities Bad Things Not Happening Detect & Resolve Unauthorized access to information, applications and infrastructure Resolve Problems Activity Goal or Control Continuous Improvement Measure Results # and type of suspected and actual access violations 28

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Exploit Opportunities Bad Things Not Happening Detect & Resolve Unauthorized access to information, applications and infrastructure Resolve Problems Activity Goal or Control Continuous Improvement Measure Results Gap 29

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Optimize authorized access to information, applications & infrastructure Exploit Opportunities Bad Things Not Happening Detect & Resolve Unauthorized access to information, applications and infrastructure Resolve Problems Activity Goal or Control Continuous Improvement Measure Results Time to grant, change and remove access privileges # and type of suspected and actual access violations 30

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Optimize authorized access to information, applications & infrastructure Bad Things Not Happening Detect & Resolve Unauthorized access to information, applications and infrastructure Activity Goal or Control Exploit Opportunities Effective, Efficient & Standardized User Identity and Authorization Management Continuous Improvement Resolve Problems Emergency Response to Malware (viruses, worms, Spyware, spam) attacks Measure Results 31

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Optimize authorized access to information, applications & infrastructure Bad Things Not Happening Prevent, Detect & Resolve Attacks through Unauthorized access Activity Goal or Control Exploit Opportunities Effective, Efficient & Standardized User Identity and Authorization Management Continuous Improvement Resolve Problems Emergency Response to Malware (viruses, worms, Spyware, spam) attacks Measure Results Number of access rights authorized, revoked, reset or changed Number and type of malicious code prevented 32

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Optimize authorized access to information, applications & infrastructure Bad Things Not Happening Prevent, Detect & Resolve Attacks through Unauthorized access Activity Goal or Control Exploit Opportunities Effective, Efficient & Standardized User Identity and Authorization Management Continuous Improvement Resolve Problems Emergency Response to Malware (viruses, worms, Spyware, spam) attacks Monitor User Identity and Authorization Process Post incident response reviews Measure Results 33

Example DS5: Ensure Systems Security Business (Goal) Define Strategy Maintain Enterprise reputation and Leadership (Goal) Create Value Trusted automated business Transactions and Information exchanges Preserve Value Ensure that services can resist and recover from attacks Process (Goal) Good Things Happening Optimize authorized access to information, applications & infrastructure Bad Things Not Happening Prevent, Detect & Resolve Attacks through Unauthorized access Activity Goal or Control Exploit Opportunities Effective, Efficient & Standardized User Identity and Authorization Management Continuous Improvement Resolve Problems Emergency Response to Malware (viruses, worms, Spyware, spam) attacks Monitor User Identity and Authorization Process Post incident response reviews Measure Results Time to grant, change or remove access privileges # of incidents with business impact 34

Now it is your turn Start with CobiTQuickstart Expand focus and direction with CobiT4.1 35

Define Strategy (Goal) Create Value Preserve Value Process s Good Things Happening Bad Things Not Happening Management Practices) Exploit Opportunities Resolve Problems Continuous Improvement Measure Results 36

(PO5 Manage the Investment) Business (Goal) Define Strategy Provide transparency and accountability into Total-cost-ofownership to realize business benefits (Goal) Create Value Create measurable benefits and metrics Preserve Value Availability of the service defined by the business need Prevent unauthorized spending Process (Goal) Activity Goal or Control Good Things Happening Monitoring, tracking and Improving strategy and Investment decisions Exploit Opportunities Prioritize Investment decisions Continuous Improvement Measure Results Bad Things Not Happening No interruption of service Resolve Problems Impact of prioritized Investment decisions can be Continuously improved through Cost and investment management Quantitatively tracked variances Of costs and benefits 37

References See Table: Linking Business Goals to Goals Appendix I of CobiT 4.1 See Table: Linking Goals to Processes & Information Criteria See Figure 19 Use Management Guidelines 38

Linking Business Goals to Goals & Information Criteria 39

Linking Goals to COB Processes & Information Criteria 40

Recap Report out 41

Lunch Look to the Archetype? Yes! Google search on archetypes. 42

Closing the Loop from Audit findings to Strategic Action Reversing the Control Flows When performing Audit/Assurance, connect findings with observed Measured Results and Continuous Improvement Successes. Add Value Delivered to Risks Managed Messages Risks Mitigated Best Practices Audit/ Assurance 43 Corrective Actions Findings

Translating Observations into persuasive Communications Listen for: Management Focus: Risks Mitigated Best Practices If you Start Here Audit/ Assurance 44 Traditional Focus: Corrective Actions Findings

Use COB to translate Audit Findings & Observations into Persuasive Communications Management Messages Risks Mitigated Best Practices Listen/Look for: Business & s Resources Information Criteria Quality s Risk Management s COB Control s Improvement Initiatives Continuous Improvement Measure Results Audit/Assurance Messages Corrective Actions Findings Strategy & Tactics Plans & s Role/Responsibilities Policy/Process/SOP s Metrics Monitor and Evaluate Plan & Organize Control +/- 80% resources PMBOK Prince2 Deliver and Support Acquire and Implement IL CMMI Risks Mitigated Best Practices Audit/ Assurance 45 Corrective Actions Findings

Template to collect Management Messages in Audit/Assurance Visit: Business (Goal) Define Strategy (Goal) Create Value Preserve Value Process (Goal) Good Things Happening Exploit Opportunities Bad Things Not Happening Resolve Problems Activity Goal or Control Continuous Improvement Measure Results Audit/Assurance 46 Scope

Systematic approach to Implementing Improvement Start 1. Assess framework suitability Use Audits Findings 2. Evaluate current state 3. Determine target state 4. Analyze gaps Repeat Monthly Repeat Quarterly 5. Define and Implement improvements 6. Develop integrated program See QuickstartPage 21 For more robust guidance see Governance Implementation Guide, 2 nd edition 47

Quickstart on Assessing Suitability CD & see pgs 17 & 18 48

Evaluate current state Self-Assessment CD CobiTQuickstart see page 19 & 20 for instructions 49

Review with Burning Questions What s after SOX? ISO 9001 + Privacy/Security + Financial Controls Global/International Standard for a framework? 50

Thank You For more information, please see www.isaca.org www.itgi.org Speaker Contact information debra.mallette@kp.org Cell phone: 510-295-3217 51