Nicholas Sprague University of Tulsa. What is COBIT? History Components Framework Why do we care? Benefits.

Slides:



Advertisements
Similar presentations
COBIT® 5 for Assurance Introduction
Advertisements

COBIT 5 and GRC Date.
COBIT 5 for Information Security Introduction
Presented by. © 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
COBIT - II.
IT Governance Capability Maturity within Government
IT Infrastructure Library ITIL vs COBIT. ANDRIAN EDUARD BANGGA IKHSAN BASKARA JOOVANNY PASUHUK RANGGA FAJARULLAH TEAM.
By Collin Smith COBIT Introduction By Collin Smith
Expanded Version of COSO a presentation by Steve Wadleigh Expanded Version of COSO a presentation by Steve Wadleigh Standards for Internal Control in the.
Aust. AM Collaborative Group (AAMCOG) An introduction to ISO “What to do” guide 20th October 2014.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Business Transformation Health Check
Enterprise Architecture
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
Project Human Resource Management
Introduction to IT Auditing
Developing Enterprise Architecture
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
Continual Service Improvement Process
COBIT Information Security An Introduction Tanvir Orakzai,PhD
The Challenge of IT-Business Alignment
This Lecture Covers Review of Internal Control Definitions.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Overview of COBIT5 and Impact on Local Content for IT By Mrs Tokunbo Martins Director Banking Supervision (Central Bank of Nigeria)
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
ITIL Framework. What is ITIL ? ITIL stands for the Information Technology Infrastructure Library. ITIL is the international de facto management framework.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
COBIT 5 Introduction 28 February 2012.
Comparing COBIT 4.1 and COBIT 5 Comparing COBIT 4.1 and COBIT 5 Presented by.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
Presented by Peter Tessin, CISA, CRISC, MSA, PMP Technical Research Manager.
Institute of Internal Auditors COBIT Presentation October 9, 2001.
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
BA 559: IT Governance Ben Tsao. What is COBIT?  Control Objectives for Information and Related Technology  Control framework for IT  A set of best.
#325 - CobiT and Service Delivery Debra Mallette, CISA, CSSBB Kaiser Permanente IT.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
COBIT 5 Update FEI/CFIT Meeting December 15, 2011
Presented by. Information! Information is a key resource for all enterprises. Information is created, used, retained, disclosed and destroyed. Technology.
COBIT 5 Executive Summary © 2012 ISACA. All rights reserved.1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
COBIT 5 Executive Summary
Overview of IT Governance & ITSM
COBIT® 5 for Assurance Introduction
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Comparing COBIT 4.1 and COBIT 5
COBIT 5 Executive Summary
COBIT 5 and GRC Date.
COBIT 5 Executive Summary
COBIT® 5 for Assurance Introduction
COBIT® 5 for Assurance Introduction
Comparing COBIT 4.1 and COBIT 5
Comparing COBIT 4.1 and COBIT 5
COBIT 5 Executive Summary
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
December 5, 2018.
COBIT 5 and GRC Date.
COBIT® 5 for Assurance Introduction
COBIT 5 and GRC Date.
COBIT 5 and GRC Date.
Comparing COBIT 4.1 and COBIT 5
Requirements Development in CMMI
Presentation transcript:

Nicholas Sprague University of Tulsa

What is COBIT? History Components Framework Why do we care? Benefits

Control Objectives for Information and Related Technology Released by ISACA for IT management and governance It is a supporting toolset that allows SAs to bridge the gap between control requirements, technical issues, and business risks that starts from the stakeholders’ needs with regard to information and technology

1996: 1 st edition released 1998: 2 nd addition added “Management Guidelines” 2000: 3 rd edition released 2003: online version became available 2005: 4 th edition released 2007: version 4.1 released 2012: COBIT 5 released; draws from the BMIS

Framework Process descriptions Control objectives Management guidelines Maturity models

Organizes IT governance objectives and good practices by IT domains and processes Links these domains and processes to business requirements

Reference process model and common language for everyone in an organization Maps to the following responsibility areas: Plan Build Run Monitor

Provides a complete set of high level requirements to be considered by management for effective control of each IT process Plan and organize Acquire and implement Deliver and support Monitor and evaluate

Assign responsibility Agree on objectives Measure performance Illustrate interrelationships with other processes

Assess maturity and capability per process and address gaps

Maintain high quality information to support business decisions Achieve strategic goals and realize business benefits through the effective use of IT Achieve operational excellence through reliable technology applications Maintain IT related risk at an acceptable level Optimize the cost of IT services and technology Remain compliant with laws, regulations, contractual agreements, and policies

Information is a key resource for all enterprises, and there is a huge dependency on technology. Information technologies are pervasive in enterprises and need to be governed in a holistic manner, taking in the full end-to-end business and IT functional areas of responsibility

ervices.php ervices.php it.htm it.htm rtifications/COBIT.aspx rtifications/COBIT.aspx Laminate.pdf Laminate.pdf Center/Research/Documents/COBIT5-Framework- ED-27June2011.pdf Center/Research/Documents/COBIT5-Framework- ED-27June2011.pdf