 2007 IT Governance Institute. All rights reserved. www.itgi.org1 IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation.

Slides:



Advertisements
Similar presentations
COBIT® 5 for Assurance Introduction
Advertisements

IT Management Frameworks
ISACA All rights reserved. Unlocking the Value of Technology Investments Speaker Name/Title Date.
COBIT 5 and GRC Date.
Presented by. © 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored.
PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
IT Governance Framework
 2007 IT Governance Institute. All rights reserved. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation.
© 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval.
TI BISNIS ITG using COBIT &
COBIT - II.
IT Governance Capability Maturity within Government
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Copyrighted Material © 2002 All rights reserved. No part of this CD-ROM may be reproduced or used in any form, including graphic, electronic, photocopying,
By Collin Smith COBIT Introduction By Collin Smith
International Auditing and Assurance Standards Board Accounting Estimates, Including Fair Value Accounting Estimates, and Related Disclosures ISA Implementation.
© ITGI not for commercial use. 1 C OBI T ® Presentation Package The C OBI T ® framework explained in a complete PowerPoint presentation, to be used.
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Information Systems Controls for System Reliability -Information Security-
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
International Auditing and Assurance Standards Board The Clarified ISAs, Audit Documentation, and SME Audit Considerations ISA Implementation Support Module.
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
© ITGI, ISACA - not for commercial use. John R. Robles Guidance for Information.
1 Homologues Group Meeting Slovenia, October 2009 Republika SlovenijaEuropean Union Ljubljana, October 2009 Introduction to IT audits PART II IT.
Basic principles of IT Governance
Chapter 3 Internal Controls.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Considering Internal Control
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
© ITGI not for commercial use. 1 C OBI T ® Presentation Package Sample 10 Slides of 80-slide Deck The C OBI T ® framework explained in a complete.
© 2014 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected by Copyright and written permission should be obtained.
Nature and Type of Audit Evidence
Chapter 9: Introduction to Internal Control Systems
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
2/20/2016 Leveraging IT Governance and COBIT Chip Council, PhD, CGEIT, CISM, CISA Matt Schmidt, MS, CISSP, CISA Adjunct Professors, University of Minnesota.
Doc.: IEEE /0747r0 Submission May 2006 Lee Armstrong, Armstrong Consulting, Inc.Slide 1 TGp May Opening Presentation Notice: This document has.
Doc.: IEEE /0913r1 Submission Sep 19-23, 2005 TK Tan (Philips) Slide 1 WNG SC Committee Report IEEE , Orange County, California, September.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
COBIT® 5 for Assurance Introduction
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
COBIT 5 Executive Summary
COBIT 5 and GRC Date.
November 2005 Liaison Report from P1901
IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition
Gas Utility Operations Best Practices Program
COBIT 5 Executive Summary
COBIT® 5 for Assurance Introduction
IEEE White Space Radio Cognitive Plane
COBIT® 5 for Assurance Introduction
Siemens, Roke Manor (Recording Secretary )
TGu Ad Hoc Agenda Date: Authors: February 2007
December 5, 2018.
© 2012 ISACA. All rights reserved
COBIT 5 and GRC Date.
COBIT® 5 for Assurance Introduction
COBIT 5 and GRC Date.
COBIT 5 and GRC Date.
TGu Requirements Check
Stephen McCann (Chair)
Presentation transcript:

 2007 IT Governance Institute. All rights reserved. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation of the C OBI T ® framework in this PowerPoint presentation is designed for use by professors whose classes cover topics such as: Information systems management Information security management Auditing Information systems auditing Accounting information systems SAMPLE 8 slides of 35 slide deck

Disclaimer The IT Governance Institute TM (ITGI TM ) and the author of IT Governance Using C OBI T ® and Val IT TM : Presentation, 2 nd Edition, have designed the publication primarily as an educational resource for educators. ITGI, ISACA ® and the authors make no claim that use of this product will assure a successful outcome. The publication should not be considered inclusive of all proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, controls professionals should apply their own professional judgement to the specific control circumstances presented by the particular systems or IT environment. Note this publication is an update of C OBI T in Academia: C OBI T Presentation Package.  2007 IT Governance Institute. All rights reserved.

Disclosure  2007 IT Governance Institute. All rights reserved. This publication is intended solely for academic use and shall not be used in any other manner (including for any commercial purpose). Reproductions of selections of this publication are permitted solely for the use described above and must include the following copyright notice and acknowledgement: ‘Copyright © 2007 IT Governance Institute. All rights reserved. Reprinted by permission.’ IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition, may not otherwise be used, copied or reproduced, in any form by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of ITGI. Any modification, distribution, performance, display, transmission or storage, in any form by any means (electronic, mechanical, photocopying, recording or otherwise) of IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition, is strictly prohibited. No other right or permission is granted with respect to this work. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition ISBN  2007 IT Governance Institute. All rights reserved.

Acknowledgements Researcher – Ed O’Donnell, University of Kansas, USA Contributors – Roger Stephen Debreceny, Ph.D., FCPA, University of Hawaii, USA – Steven DeHaes, University of Antwerp Management School, Belgium – Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium – Robert Parker, CISA, CA, CMC, FCA, Canada – V. Sambamurthy, Ph.D., Michigan State University, USA – Scott Lee Summers, Ph.D., Brigham Young University, USA – John Thorp, The Thorp Network, Canada – Wim Van Grembergen, Ph.D., University of Antwerp Management School, Belgium – Ramesh Venkataraman, Ph.D., Indiana University, USA  2007 IT Governance Institute. All rights reserved.

The full presentation includes... Driving forces for IT governance and Control Objectives for Information and related Technology (C OBI T ® ) An introduction to: The C OBI T framework C OBI T supporting materials An explanation of where C OBI T fits with other frameworks and standards  2007 IT Governance Institute. All rights reserved.

Internationally accepted good practices Management-oriented Supported by tools and training Freely available at Sharing knowledge and leveraging expert volunteers Continually evolving Maintained by reputable not- for-profit organisation Maps 100 percent to COSO MORE C OBI T 4.1—The IT Governance Framework The only IT management and control framework that covers the end-to-end IT life cycle Brian, this originally stated “4”, but I’ve changed to 4.1, since specificity is preferred. Please change back if necessary. IT Processes IT Management Processes IT Governance Processes CobiT best practices repository for IT Processes IT Management Processes IT Governance Processes C OBI T best practices repository for  2007 IT Governance Institute. All rights reserved.

Goals Responsibilities Control Objectives Requirements BusinessIT Governance Information the business needs to achieve its objectives Information executives and board need to exercise their responsibilities Direction and Resourcing How Does C OBI T Link to IT Governance? IT Governance  2007 IT Governance Institute. All rights reserved.

Acquire and Implement Deliver and Support Monitor and Evaluate Criteria Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability Data Application systems Technology Facilities People IT Resources Business Objectives Plan and Organise C OBI T Framework IT Life Cycle  2007 IT Governance Institute. All rights reserved.