Getting Started With Governance of Enterprise IT (GEIT)

Size: px
Start display at page:

Download "Getting Started With Governance of Enterprise IT (GEIT)"

Transcription

1 Getting Started With Governance of Enterprise IT (GEIT) AN ISACA WHITE PAPER Implementing a governance of enterprise IT (GEIT) system successfully will bring myriad benefits, including lower costs, greater control, and overall increased efficiency and effectiveness. The primary purpose of using a GEIT system is to deliver value to stakeholders. If that value cannot be delivered, or if its delivery is not well understood, the resources consumed to implement GEIT are wasted. A proven GEIT framework identifies the steps that are needed to perform this value delivery and how to measure its impact and ongoing effectiveness. Given the uniqueness of enterprises around the world, a framework is the appropriate tool to use. A framework allows, even requires, customization to fit the enterprise it serves, as opposed to standards, which command compliance. Enterprises with strong governance operate with lower costs and make more efficient and effective use of their resources. External parties assess enterprises with strong governance as having greater internal control and lower general levels of risk. This last fact has been documented in studies that look at the cost of capital. Enterprises with strong governance actually pay lower interest in the capital markets when accessing funds. This paper will describe the use of a framework to implement GEIT, the resources needed to do so and the benefits that can be expected.

2 ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: Web site: Provide feedback: Participate in the ISACA Knowledge Center: Follow ISACA on Twitter: Join ISACA on LinkedIn: ISACA (Official), Like ISACA on Facebook: With more than 115,000 constituents in 180 countries, ISACA ( helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for information systems audit, assurance, security, risk, privacy and governance professionals. ISACA offers the Cybersecurity Nexus, a comprehensive set of resources for cybersecurity professionals, and COBIT, a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor (CISA ), Certified Information Security Manager (CISM ), Certified in the Governance of Enterprise IT (CGEIT ) and Certified in Risk and Information Systems Control (CRISC ) credentials. The association has more than 200 chapters worldwide. DISCLAIMER ISACA has designed and created Getting Started With Governance of Enterprise IT (GEIT) white paper (the Work ) primarily as an educational resource for governance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, governance professionals should apply their own professional judgment to the specific circumstances presented by the particular systems or information technology environment ISACA. All rights reserved.

3 ACKNOWLEDGMENTS ISACA Board of Directors Robert E Stroud CGEIT, CRISC, CA, USA, International President Steven A. Babb CGEIT, CRISC, ITIL, Vodafone, UK, Vice President Garry J. Barnes CISA, CISM, CGEIT, CRISC, BAE Systems Detica, Australia, Vice President Robert A. Clyde CISM, Clyde Consulting LLC, USA, Vice President Ramses Gallego CISM, CGEIT, CCSK, CISSP, SCPM, Six Sigma Black Belt, Dell, Spain, Vice President Theresa Grafenstine CISA, CGEIT, CRISC, CGAP, CGMA, CIA, CPA, US House of Representatives, USA, Vice President Vittal R. Raj CISA, CISM, CGEIT, CRISC, CFE, CIA, CISSP, FCA, Kumar & Raj, India, Vice President Tony Hayes CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Past International President Gregory T. Grocholski CISA, SABIC, Saudi Arabia, Past International President Debbie A. Lew CISA, CRISC, Ernst & Young LLP, USA, Director Frank K.M. Yam CISA, CIA, FHKCS, FHKIoD, Focus Strategic Group Inc., Hong Kong, Director Alexander Zapata Lenis CISA, CGEIT, CRISC, ITIL, PMP, Grupo Cynthus S.A. de C.V., Mexico, Director Knowledge Board Steven A. Babb CGEIT, CRISC, ITIL Vodafone, UK, Chairman Rosemary M. Amato CISA, CMA, CPA, Deloitte Touche Tohmatsu Ltd., The Netherlands Neil Patrick Barlow CISA, CISM, CRISC, CISSP, Capital One, UK Charlie Blanchard CISA, CISM, CRISC, CIPP/US, CIPP/E, CISSP, FBCS, ACA, Amgen Inc., USA Sushil Chatterji CGEIT, Edutech Enterprises, Singapore Phil J. Lageschulte CGEIT, CPA, KPMG LLP, USA Anthony P. Noble CISA, Viacom, USA Jamie Pasfield CGEIT, ITIL V3, MSP, PRINCE2, Pfizer, UK Ivan Sanchez Lopez CISA, CISM, ISO LA, CISSP, DHL Global Forwarding & Freight, Germany Framework Committee Sushil Chatterji CGEIT, Edutech Enterprises, Singapore, Chairman David Cau GRCP, ITIL V3, MSP, Deloitte, France Joanne De Vito De Palma CISM, BCMM Assessor, PFI, USA Jimmy Heschl CISA, CISM, CGEIT, ITIL Expert, Red Bull, Austria Katherine McIntosh CISA, CIA, Central Hudson Gas & Electric Corp., USA Andre Pitkowski CGEIT, CRISC, APIT Informatica, Brazil Paras Kesharichand Shah CISA, CGEIT, CRISC, CA, Vital Interacts, Australia Sylvia Tosar CGEIT, PMP, Uruguay Tichaona Zororo CISA, CISM, CGEIT, CRISC, CIA, CRMA, EGIT Enterprise Governance of IT (PTY) LTD., South Africa ISACA. All rights reserved.

4 INTRODUCTION WHAT IS THE PURPOSE OF THIS PUBLICATION AND HOW IS IT ORGANIZED? Practitioners need a practical guide to using GEIT frameworks without the need to become framework experts themselves. This guide will provide that pathway and lead users through the available GEIT material to quickly gain the value of using GEIT. This guide is organized around the steps that a project team follows in implementing a GEIT system. As such, it can be used as a field guide to executing GEIT. WHAT IS GEIT AND WHAT FRAMEWORKS ARE AVAILABLE? Governance of enterprise information technology (GEIT) is a discipline concerned primarily with organizing the resources of an enterprise for the purpose of satisfying stakeholders. GEIT is meant to bring alignment between high-level strategic objectives with operational level activities and work outcomes. The formal definition of GEIT in COBIT 5 1 mentions three key elements: evaluate, direct and monitor. These key elements make up the activities of GEIT and are what enterprise leaders focus on. COBIT 5 Implementation 2 has a much more detailed discussion of GEIT. ISACA s COBIT 5 is a comprehensive governance and management framework that allows the user to structure and align the enterprise resources with the requirements of their stakeholders. The International Organization for Standardization (ISO) published a standard titled ISO/International Electrotechnical Commission (IEC) 38500:2015, Information technology-governance of IT for the organization and ISO/IEC TR 38502:2014 Information technology-governance of IT-Framework and model. ISO is also developing a standard titled ISO/IEC TS 38501, Information technology-governance of IT-Implementation guide, which is planned for publication in early As outlined in appendix E of the framework, COBIT 5 is aligned with the six principles of ISO/IEC The ISO/IEC 3850X approach is to provide principles-based guidance on the governance of IT for the organization, a subset of enterprise governance. AXELOS owns Information Technology Infrastructure Library (ITIL ). AXELOS is a joint venture between the British Cabinet Office and Capita plc. AXELOS also owns PRINCE2, a project management methodology. ITIL is quite popular for determining what specific tasks can be used to accomplish specific service delivery objectives. The Committee of Sponsoring Organizations of the Treadway Commission (COSO) publishes a controls framework. Its most recent version was published in ISACA recently published a white paper, Relating the COSO Internal Control Integrated Framework and COBIT 3, which explains the relationship between COSO and COBIT 5 and how they can effectively be used with each other. The frameworks are complementary and compatible as guidance to support the assessment and improvement of internal control practices and activities within the governance and management arrangements of an enterprise. However, the use of both frameworks continues to require professional judgment and work by enterprise management and its auditors/advisors to comprehend, adapt and apply the principles and guidance to specific enterprise goals and enterprise capabilities. Relating the COSO Internal Control Integrated Framework and COBIT provides support for such professional judgment. 1 ISACA, COBIT 5, USA, 2012, 2 ISACA, COBIT 5 Implementation, USA, ISACA, Relating the COSO Internal Control Integrated Framework and COBIT, USA, 2014, ISACA. All rights reserved.

5 The Open Group publishes The Open Group Architecture Framework (TOGAF ), which is currently at version 9.1. TOGAF focuses on determining what the enterprise architecture should look like and then maintaining that architecture in a flexible enough manner such that the enterprise can adapt to change readily. WHAT ARE THE BENEFITS OF USING GEIT? GEIT ensures greater alignment of IT functionality with business needs. The most commonly experienced outcomes of implementing GEIT are improvements in management of IT-related risk and communication and relationships between business and IT. GEIT can also help to transition IT s role to a more proactive one. This can be done through the use of mechanisms such as GEIT boards, an appropriate organization structure encompassing roles for managing business relationships and standardized processes to effectively bridge the business demand with the IT supply. IT innovation offers ample opportunities for IT to play a more proactive role. For example, GEIT enablers, such as optimal investment management processes, can help ensure a balance between IT innovation and run-the-business initiatives. GEIT initiatives must take a balanced and holistic view of the five GEIT focus areas: strategic alignment, risk management, value delivery, resource management, performance measurement. During an economic crisis, when there is a strong focus on managing cost, effective GEIT can ensure that this focus is balanced with a view on investments that can generate cost savings and are ultimately self-funding. Successfully implementing GEIT depends on several factors: change management, communication, proper scoping and identification of achievable objectives. The outcomes of a successful GEIT implementation produce both shorter-term, tangible benefits, such as reduced cost, and longer-term benefits, such as enhanced management of IT-related risk, improved relationships between business and IT, and increased business competitiveness. A strong presence of GEIT can also contribute to lowered financial costs because lenders assess the risk level of the enterprise due to increased control. IMPLEMENTING A GEIT FRAMEWORK Commitment from the enterprise leadership at the highest level (C-suite, board of directors, etc.) is necessary to ensure a successful implementation. After that commitment is secured, a comprehensive GEIT implementation may proceed. In the sections below, a step-by-step approach for implementing GEIT is presented. UNDERSTANDING WHEN TO IMPLEMENT A FRAMEWORK Securing commitment to implement GEIT requires a clear discussion of pain points that an enterprise is experiencing. From the pain points identified, a business case for the implementation of GEIT can be built. This business case will be used to identify the scope of the GEIT implementation project and to help understand the resources that it will require. The implementation is a simple matter of confirming that the reasons prompting the desire to adopt or upgrade the framework are worthwhile. If not, the resources expended are likely to be for naught. Pain points and their related trigger points are discussed further in the COBIT 5 Implementation guide ISACA. All rights reserved.

6 1. Write business case for implementing GEIT. STEPS TO IMPLEMENT GEIT Follow an established project methodology to ensure reasonable use of resources and control of implementation project deliverables, budget and timing. Initially, for an enterprise to implement a new GEIT system, commitment must be secured from the highest levels. GEIT implementation can only succeed when the C-suite, board of directors and others of the highest authority drive the need for it. After commitment to implementing GEIT is in place, the real work begins. A project team must be assembled, and they should temporarily take ownership of getting the appropriate GEIT elements in place. This implementation team should then develop a project plan based on the seven implementation steps from the COBIT 5 Implementation guide. Figure 1 is taken from COBIT 5 and shows the seven project phases. Getting the Environment and Resources in Place The enterprise must be ready for a significant GEIT implementation. Getting resources in place is necessary, but more important is making certain staff understands the urgency of the project and what is needed. This is getting change enablement in place. Figure 1 Implementation Phases 6 Did we get there? 7 How do we keep the momentum going? Realise benefits 5 How do we get there? Embed new Execute plan approaches Review effectiveness Operate and use Operate Sustain and measure Implement improvements Monitor and evaluate Build Identify role players Plan programme 4 What needs to be done? 1 What are the drivers? Initiate programme Establish desire to change Recognise need to act improvements state Define target Assess current state Form implementation team outcome Communicate Define problems and opportunities Define road map 3 Where do we want to be? 2 Where are we now? Programme management (outer ring) Change enablement (middle ring) Continual improvement life cycle (inner ring) Source: ISACA, COBIT 5, USA, 2012, figure ISACA. All rights reserved.

7 1. Establish the project teams authority. 2. Communicate vision. 3. Empower all team members to carry out their charge. One of the earliest actions the project team will undertake is selecting a framework. Assuming COBIT 5 will be used, the framework must be carefully understood and then modified as needed to fit the enterprise. All of the materials presented in COBIT 5 are examples and not meant to be a prescriptive approach or the complete solution. Carefully determine which elements are needed, and communicate those to the project sponsor(s). Determining what the enterprise needs is done through a complete examination of stakeholder requirements. These requirements determine all enterprise goals that follow. These enterprise goals will make clear what other goals, IT and other resources (enablers), will be required. The COBIT 5 framework contains a deeper discussion on the goals cascade. It is shown in figure 2. Figure 2 Goals Cascade Stakeholder Drivers (Environment, Technology Evolution, ) 1. Assemble project team. 2. Assess current drivers and pain and trigger points for implementing GEIT. 3. Consider all seven enablers when considering resources to support. Creating a Plan Establish an implementation plan, and secure approval from the highest level of authority to implement it. This acts as a project charter, and provides authority to the project team members in conducting the implementation. This authority is necessary because resources will be needed from various areas in the enterprise and their superiors must be committed to their availability. 1. Project team should create project plan, showing all sub-plans (communication, procurement, etc.) that will be needed to implement GEIT. 2. Identify specific milestones to demonstrate accomplishment of each implementation phase. 3. Deliver project plan to project sponsor, and ask for approval to move forward with the overall plan. Benefits Realisation Stakeholder Needs Risk Optimisation Enterprise Goals IT-related Goals Influence Resource Optimisation Cascade to Cascade to Cascade to Executing the Plan Follow the implementation plan, delivering on milestones as planned and creating project continuation or departure points. Use appropriate tools (goals cascade and Responsible, Accountable, Consulted, Informed [RACI] chart) in determining how strategic goals and stakeholder objectives will be satisfied (value delivery). Apply the framework as broadly as the enterprise needs. 1. Implement the GEIT plan. 2. Report on milestone accomplishments. Enabler Goals Source: ISACA, COBIT 5, USA, 2012, figure ISACA. All rights reserved.

8 INTEGRATING MULTIPLE FRAMEWORKS, STANDARDS AND GOOD PRACTICES MANAGING CHANGE Consider whether there are multiple frameworks or sets of standards in place in the enterprise. If there are, plan for their integration into the overarching framework. Consider which framework is the most appropriate for GEIT over IT resources. UNDERSTANDING AVAILABLE AND NECESSARY RESOURCES (PROCESSES, ETC.) Enterprise resources need to tie processes into the internal control environment, which likely will have risk and controls detailed against a control matrix of control designs and control objectives. Plan to provide detail on how control objectives can be made from governance and management practices. Be careful to provide only the level of GEIT detail that the enterprise needs. In particular, define domains, processes and practices only to the extent that users in the enterprise need these terms. Be mindful that a common language is an important aspect to a successful framework implementation ISACA. All rights reserved.

Implementation PREVIEW VERSION

Implementation PREVIEW VERSION Implementation These following pages provide a preview of the information contained in COBIT 5 Implementation. The publication provides a good-practice approach for implementation governance of enterprise

More information

27/11/2014 DISCLAIMER RESERVATION OF RIGHTS ACKNOWLEDGEMENTS STUDENT BOOK AGENDA

27/11/2014 DISCLAIMER RESERVATION OF RIGHTS ACKNOWLEDGEMENTS STUDENT BOOK AGENDA DISCLAIMER ISACA has designed and created the Rocky Summit University Caselet (the Work ) primarily as an educational resource for educational professionals. ISACA makes no claim that use of any of the

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 8, 9 April 2014 Report of the Nominating Committee Slate of 2014-15 Board of Directors New NIST Cybersecurity Framework Features COBIT 5 in Its Core Parameters to Consider When Acquiring Software

More information

IS Audit and Assurance Guideline 2001 Audit Charter

IS Audit and Assurance Guideline 2001 Audit Charter IS Audit and Assurance Guideline 2001 Audit Charter The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 In This Issue: Mapping COBIT 5 With IT Governance, Risk and Compliance at Ecopetrol COBIT 5 Helps Find Value in the Cloud 6 Tips for Implementing IT Governance With COBIT 5 Are COSO

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

COBIT Maturity Assessment and Continual e-health Governance Improvement at NHS Fife By Elena Beratarbide, CISA, Pablo Borges and Donald Wilson

COBIT Maturity Assessment and Continual e-health Governance Improvement at NHS Fife By Elena Beratarbide, CISA, Pablo Borges and Donald Wilson Volume 4, October 2012 Come join the discussion! Elena Beratarbide will respond to questions in the discussion area of the COBIT (4.1 and earlier) Use It Effectively topic beginning 22 October 2012. COBIT

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 7, 31 March 2011 In This Issue: Report of the Nominating Committee Slate of 2011-2012 Board of Directors New COBIT Case Study: Grupo Bancolombia New COBIT Process Assessment Model: The Market Need

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved. The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

COBIT 5: Enabling Information Progress Report By Steven De Haes, Ph.D.

COBIT 5: Enabling Information Progress Report By Steven De Haes, Ph.D. Volume 4, October 2012 In This Issue: COBIT 5: Enabling Information Progress Report Integrating COBIT 4.1 Into the Internal Audit Function COBIT 5 for Risk Progress Report COBIT Maturity Assessment and

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success. ROI for Your Enterprise Through ISACA With the growing complexities of global business and

More information

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic

More information

COBIT 5 Implementation Certification Training Course - Brochure

COBIT 5 Implementation Certification Training Course - Brochure COBIT 5 Implementation Certification Training Course - Brochure Unlock your True Potential Course Name : COBIT 5 Implementation Version : INVL_Cobit5_BR_02_080_1.1 Course ID : ITSG-131 www.invensislearning.com

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements.

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements. Contents List of figures List of tables Foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 3 1.2 Context 6 1.3 ITIL in relation to other publications in the Best Management Practice

More information

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC

ISACA Survey Results. 27 April Ms. Nancy M. Morris, Secretary Securities and Exchange Commission 100 F Street NE Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 27 April 2006 Ms. Nancy M. Morris, Secretary

More information

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk COBIT 5 Foundation Vertical Type Sub-Category Technology Certification-led Audit, Security, Governance & Risk Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

Invest in. ISACA-certified professionals, see the. rewards.

Invest in. ISACA-certified professionals, see the. rewards. Invest in ISACA-certified professionals, see the rewards. Invest in ISACA-certified professionals, see the rewards. As a global IT association that has been around for more than 40 years, ISACA provides

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship

More information

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April

More information

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2

More information

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014 ISACA MADRID DECEMBER 2014 Robert E Stroud CEGIT CRISC International President December 2014 CHANGING DYNAMICS OF BUSINESS Source: http://www.securedgenetworks.com/secure-edge-networks-blog/bid/84023/10-ways-mobile-device-management-can-help-your-school

More information

COBIT 5 Foundation Workshop

COBIT 5 Foundation Workshop COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Getting Started with IT Service Management

Getting Started with IT Service Management Getting Started with IT Service Management SMSG 4 th February 2014 BCS Bedford Branch Ian Connelly Over 15 years experience working in IT, latterly within Service Operations for Telcos, ISPs & the insurance

More information

Revisit the Foundations of ITSM SMSG

Revisit the Foundations of ITSM SMSG Revisit the Foundations of ITSM SMSG 10 th October 2013 Ian Connelly Over 15 years experience working in IT, principally in Service Operations for Telcos, ISPs & the Insurance sector Service Management

More information

Getting Started with IT Service Management

Getting Started with IT Service Management Getting Started with IT Service Management SMSG 3rd March 2014 BCS Bristol Branch BCS Service Management Specialist Group The Service Management Specialist Group provides an avenue for developing and promoting

More information

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 25 April 2008 International Auditing and Assurance

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL.   Index Index 2014 revised COSO framework. See COSO internal control framework Association of Certified Fraud Examiners (ACFE), 666 Administrative files workpaper document organization, 402 AICPA fraud standards

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

ISO/IEC overview

ISO/IEC overview ISO/IEC 20000 overview Overview 1. What is ISO/IEC 20000? 2. ISO/IEC 20000 and ITIL 2 BS 15000 BS15000 started in UK and first launched on July 1, 2003. Which was replaced by ISO/IEC 20000 after formal

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

ON-DEMAND TRAINING FOR PROFESSIONALS

ON-DEMAND TRAINING FOR PROFESSIONALS FACT SHEET ON-DEMAND TRAINING FOR PROFESSIONALS REP ID : 3871 GET PMP CERTIFIED. GROW IN YOUR CAREER GreyCampus offers four day Classroom Training Program on Project Management Professional (PMP ) Certification

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

Training Services TRAINING SERVICES. Translating Knowledge into Results

Training Services TRAINING SERVICES. Translating Knowledge into Results TRAINING SERVICES About Pink Elephant Pink Elephant is an international knowledge leader in the field of business innovation and business change. With advisory and IT services, Pink Elephant draws the

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

ITIL Intermediate Service Design (SD) Certification Training - Brochure

ITIL Intermediate Service Design (SD) Certification Training - Brochure ITIL Intermediate Service Design (SD) Certification Training - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

COBIT 5 Assessor Certification Training Course - Brochure

COBIT 5 Assessor Certification Training Course - Brochure COBIT 5 Assessor Certification Training Course - Brochure Take your IT Governance Career to the Next-level Course Name : COBIT 5 Assessor Version : INVL_Cobit5_BR_02_079_1.1 Course ID : ITSG-132 www.invensislearning.com

More information

European Cybersecurity Implementation: Overview

European Cybersecurity Implementation: Overview European Cybersecurity Implementation: Overview Cybersecurity is emerging within the fields of information security and traditional security to address sharp increases in cybercrime and, in some instances,

More information

MSP Foundation and Practitioner Certification Exam Training - Brochure

MSP Foundation and Practitioner Certification Exam Training - Brochure MSP Foundation and Practitioner Certification Exam Training - Brochure Learn to manage programs effectively with MSP best practices Course Name : MSP Foundation & Practitioner Version : INVL_MSPFP_BR_02_1.3

More information

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta

Integrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

COBIT 5 Foundation Certification Training Course - Brochure

COBIT 5 Foundation Certification Training Course - Brochure COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com

More information

Find out more about APM qualifications and keep up to date with the latest developments at apm.org.uk/apmqualifications

Find out more about APM qualifications and keep up to date with the latest developments at apm.org.uk/apmqualifications APM recognises the importance of keeping qualifications up to date and relevant, so they reflect the knowledge that you have, the work that you do and the skills that you have developed. Our APM Project

More information

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 26 February 2007 Office of the Secretary Public

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

Business Continuity Planning

Business Continuity Planning Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more

More information

State of Cyber Security 2017

State of Cyber Security 2017 State of Cyber Security 2017 Part 1: Current Trends in Workforce Development Abstract State of Cyber Security 2017 reports the results of the annual ISACA global cyber security survey, conducted in October

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

OVERVIEW & UPDATE. Laurel Nelson-Rowe Director of Strategic Communications (CHANGE NAME to ACTUAL PRESENTER)

OVERVIEW & UPDATE. Laurel Nelson-Rowe Director of Strategic Communications (CHANGE NAME to ACTUAL PRESENTER) OVERVIEW & UPDATE Laurel Nelson-Rowe Director of Strategic Communications (CHANGE NAME to ACTUAL PRESENTER) ISACA at a Glance Founded 1969 Global non-profit, professional association Serving more than

More information

Pink Elephant s Critical Success Factors for Successful IT Service Management. Pink Elephant Leading The Way In IT Management Best Practices

Pink Elephant s Critical Success Factors for Successful IT Service Management. Pink Elephant Leading The Way In IT Management Best Practices Pink Elephant s Critical Success Factors for Successful IT Service Management Pink Elephant Leading The Way In IT Management Best Practices Critical Success Factors For Successful ITSM 1. 2. 3. 4. 5. 6.

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL Provläsningsexemplar / Preview TECHNICAL REPORT ISO/IEC TR 20000-11 First edition 2015-12-15 Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

ISACA Certification Your Blueprint for Success

ISACA Certification Your Blueprint for Success TM ISACA Certification Your Blueprint for Success Ensure the success of your enterprise and your career with ISACA s certifications: Certified Information Systems Auditor TM (CISA ) Certified Information

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

COBIT 5 Update October 2010

COBIT 5 Update October 2010 COBIT 5 Update October 2010 ISACA Tel Aviv Chapter Conference October 20th, 2010 Kaya Kazmirci ISACA Istanbul Chapter President COBIT 5 Initiative The initiative charge from the Board of Directors is to

More information

Copies of the model curriculum are freely available to all and may be downloaded from

Copies of the model curriculum are freely available to all and may be downloaded from ISACA Model Curriculum for Information Security Management ISACA With more than 86,000 constituents in more than 160 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance,

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

SkillsManager TM. Business advantage through IT skills management

SkillsManager TM. Business advantage through IT skills management SkillsManager TM Business advantage through IT skills management A powerful new approach to identify and effectively manage the IT skills within your organisation SkillsManager TM Business advantage through

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Follow AICPA on Twitter Feeds, LinkedIn Networks, Facebook Communities and YouTube Channels:

Follow AICPA on Twitter Feeds, LinkedIn Networks, Facebook Communities and YouTube Channels: 2 SOC 2 User Guide Disclaimer ISACA has designed this publication, SOC 2 SM User Guide (the Work ), primarily as an educational resource for user entities. ISACA makes no claim that use of any of the Work

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Annual Meeting Minutes October 15, 2005 Miami, Florida USA

INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Annual Meeting Minutes October 15, 2005 Miami, Florida USA INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Annual Meeting Minutes October 15, 2005 Miami, Florida USA Opening: The annual meeting of the International Information Systems

More information

IT Strategic Planning: Making Your IT Organization Efficient and Effective

IT Strategic Planning: Making Your IT Organization Efficient and Effective IT Strategic Planning: Making Your IT Organization Efficient and Effective Jeffrey Locketz, CPA, CGMA, CITP, CISA, CISM, CGEIT, CRISC, CBCP, CRMA, CCISO ICMA Conference Presenter How can an IT Strategic

More information

EXIN BCS SIAM TM Foundation Certification Training - Brochure

EXIN BCS SIAM TM Foundation Certification Training - Brochure EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Drive Your Career Forward IIA Certifications and Qualifications

Drive Your Career Forward IIA Certifications and Qualifications Drive Your Career Forward IIA Certifications and Qualifications Mapping Your Path for Growth Professional development is a journey. Demonstrating your knowledge, acumen, and leadership ability are key

More information

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI Page 1 Page 2 cobit 5 for risk isaca information assurance cobit 5 for risk pdf cobit 5 for risk isaca information assurance

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27013 First edition 2012-10-15 Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 Technologies de l'information

More information

New International Health and Safety Standard ISO 45001

New International Health and Safety Standard ISO 45001 New International Health and Safety Standard ISO 45001 By Mr. Coleman Tse, Sales & Marketing Director, BSI Hong Kong 4/24/2015 Who is BSI? Royal Charter Status focused on the development of standards,

More information

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform VMEdu VMEdu provides organizations with corporate training and training solutions to manage their learning and development needs efficiently. VMEdu Training VMEdu Inc. is a leading global training service

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework Keith Price Principal Consultant 1 About About me - Specialise in cybersecurity strategy, architecture, and assessment -

More information

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES WHITE PAPER USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES Table of Contents I. Overview II. COSO to CobIT III. CobIT / COSO Objectives met by using QualysGuard 2 3 4 Using QualysGuard

More information

British Columbia International Academy

British Columbia International Academy Largest Professional Academy Professional Courses Corporate s Short-Duration Public Courses Study In UAE Scholarship Available Multiple Options Design Your Course Proven Track Record Placement Assistance

More information