COBIT Framework Source:

Slides:



Advertisements
Similar presentations
1 NameMatrix Number Francis YeeHT036029M George Goh Alex LimHT052467E Hoe Swee SimHT052560I Vijay.
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Alignment of Enterprise Governance and IT Governance
Analisa Proses. Terjemahan model analisis menjadi desain software.
 2007 IT Governance Institute. All rights reserved. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation.
Sistem Pengenalian (Kontrol) Intern & CoBIT IT Governance Pertemuan 3-4 Matakuliah: A0294/Audit SI Lanjutan Tahun: 2009.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Title Slide Higher Education Office of Information Technology Management Methodology By James M. Dutcher.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
TI BISNIS ITG using COBIT &
The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International Survey.
© ITGI, ISACA - not for commercial use. A High-level Overview of the C OBI T Principles, Structure, and Framework John R. Robles
Centro de Convenciones, August 22-23, 2006
COBIT - II.
IT Governance Capability Maturity within Government
Roger Southgate Past President of ISACA London Chapter Member of the BSI Committees for Service Management and IT Governance Leader.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Demystifying ITIL Greg Charles, Ph.D. Area Principal Consultant, CA
Managing Information Technology Service Delivery
By Collin Smith COBIT Introduction By Collin Smith
Software life cycle processes Purpose n A new international standard (ISO/IEC 12207:1995(E) that –establishes a common framework for software life cycle.
Managing the Information Technology Resource Jerry N. Luftman
Overview of IT Governance and
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Information Technology Infrastructure Library (ITIL)
IT Service Delivery and Support Overview IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA, MS, CIA, CISA, CISSP) 1.
Introduction to IT Auditing
Information Governance & the IT Auditor
Evolving IT Framework Standards (Compliance and IT)
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
COBIT - IT Governance.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Roles and Responsibilities
How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp April 2004 Greet Volders Managing Consultant.
Challenges in Infosecurity Practices at IT Organizations
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
Presented By Tay Un Soo Senior VP, Bank of Commerce President of ISACA - Malaysia Chapter 1999 National Accountants Conference THRIVING IN THE DIGITAL.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Impacts of the self- assessment on the SAIs Dainius Jakimavičius Director Information Technology Department.
© ITGI not for commercial use. 1 C OBI T ® Presentation Package Sample 10 Slides of 80-slide Deck The C OBI T ® framework explained in a complete.
Database Administration COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
IT Governance – Leveraging Best Practices for Governance Success
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
1 Discussion of “The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International.
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
#325 - CobiT and Service Delivery Debra Mallette, CISA, CSSBB Kaiser Permanente IT.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
#245 - CobiT and Software Development Debra Mallette, CISA, CSSBB Kaiser Permanente IT & Monica Jain, CSQA Convansys.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Alignment of COBIT to Botswana IT Audit Methodology
Presentation transcript:

COBIT Framework Source:

COBIT Business Objectives Information Effectiveness Efficiency Confidentiality Integrity Availability Compliancy Reliability IT-resources People Application systems Technology Facilities Data

Cobit Framework IT Processes Defined Within Four Domains Information Planning and Organization Acquisition and Implementation Delivery and Support Monitoring

Planning and Organization P01define a strategic IT plan P02define the information architecture P03determine the technological direction P04define IT organization and relationships P05manage the IT investment P06communicate management aims and direction P07manage human resources P08ensure compliance with external requirements P09assess risks P10manage projects P11manage quality

Acquisition and Implementation AI1identify solutions AI2acquire and maintain application software AI3acquire and maintain technology architecture AI4develop and maintain IT procedures AI5install and accredit system AI6manage changes acquire and maintain

Delivery and Support DS1define service levels DS2manage third party services DS3manage performance and capacity DS4ensure continuous service DS5ensure system security DS6identify and attribute cost DS7educate and train users DS8assist and advise IT customers DS9manage the configuration DS10manage problems and incidents DS11manage data DS12manage facilities DS13manage operations

Monitoring M1monitor the processes M2asses internal control adequacy M3obtain independent assurance M4provide for independent audit

Standards for Information Systems Auditing