Modeling Architecture for COBIT
|
|
- Peregrine Richard
- 5 years ago
- Views:
Transcription
1 Volume 3, July 2011 Modeling Architecture for COBIT By Reinhold Thurner, Ph.D. Models and frameworks are used as a means to describe the structure and properties of processes and to provide guidelines on how these processes should be organized, monitored and assessed. These models (descriptions) are voluminous and complex artifacts. So, the question is: How can one describe these artifacts so that the information contained in the models can be properly managed? This article answers this question and demonstrates how to do so in practice. For that purpose, a model of COBIT was designed and stored along with the full content of the COBIT 4.1 framework, IT Assurance Guide: Using COBIT and the COBIT 4.1 Process Assessment Model Exposure Draft in a metasafe repository. The results are meaningful, not only for the existing version of COBIT, but also for the upcoming COBIT 5. Information Models About Models There are many publications about COBIT and how to use it. These publications exist in several languages and in various formats such as hard copies, e-books (PDF files), CDs, Excel files and online digital versions. The publications contain detailed descriptions in a top-down structure and also some cross-references between the components of the COBIT framework. The basis for all these documents and the essence of the system is the information model of COBIT. From a purely structural point of view, such a model consists of entities that are described by their properties and connected by relationships. The publications are merely specific views derived from this information base. Such an information base is a tool to: Write, review the components of the model and its structure, and maintain versions Create different views (e.g., for different stakeholders) and to produce the products for publication Translate the text into other languages while preserving the original structure Compare a model with other models (e.g., COBIT to Software Process Improvement and Capability Determination [SPICE], ITIL, or Capability Maturity Model Integration [CMMI]) Clone and adapt a model to a specific environment and purpose without losing the structure of and reference to the original Teach a model. The audience must understand the structure and purpose, but does not necessarily need to learn about all the details. Use or extend a model for an assessment. The results of an assessment are collected and stored in the information base and combined to create a report or even a plan/control a process for improvement. Figure 1 Simplified Information Model Architecture A (simplified) architecture for an information model (figure 1) consists of: The metamodel Describes the structure of the model ( the information base ) The model Contains all the instances in a fine-grained information base Views Provide individual views of selected entities, attributes and Come join the discussion! Reinhold Thurner will respond to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 15 July 2011.
2 relationships. Views are not an additional level within this structure, but a selection of an arbitrary set of elements of the structure. Views may show only a subset and may overlap. Creation of a Metamodel for COBIT A metamodel is not a theoretical construct but has a very clear purpose: It must explain the terms (such as management guideline, work product, process and resource), the properties of these terms (such as description, title, measured by, issues and level) and the relationships (such as uses, has, has output, is input and is responsible). Therefore, one can start with the extraction of the terminology from the available documents. Then, one can connect these elements to reflect the logical structure of the terms. The result for COBIT (after several refinements) was the metamodel draft in figure 2. The draft model was then stored in the metasafe repository, and the picture of the model was generated by the repository. The model reflects the structure of the COBIT 4.1 framework, IT Assurance Guide: Using COBIT and COBIT 4.1 Process Assessment Model Exposure Draft, with an extension as explained in the figure. The extension of some attributes in the assurance model is included to show how a model can be adapted to specific requirements (e.g., the support of an Figure 2 Metamodel Draft Volume 3, July 2011 Page 2
3 assessment process) and still keep the original model. Figure 3 Entity Relationship Representation in Excel The model shows all the important terms, their properties and their relationships. It can be used to teach, design and structure the information base that will contain the model. This is not the metamodel, but it is what the authors wanted to express or show about the model. It is also only a draft or proof of concept of the architecture; however, it is a good basis from which to start and can be extended or changed easily for use in other intended purposes. Beyond the descriptive function, the model is also intended to structure the information base where the instances of the model with the complete textual information are stored, maintained and documented. Preparation of the Information Base COBIT is available in hard copy and as a PDF download and can be browsed using COBIT Online. COBIT Online provides the facility to download the content of COBIT as Word files or in an Access database. IT Assurance Guide: Using COBIT was also published as an Excel spreadsheet. The COBIT 4.1 Process Assessment Model Exposure Draft is published as a PDF file and consists of plaintext. It had to be taken apart and structured appropriately to be loaded into the information base. For the purposes of this analysis, the available documentation was taken apart and converted into strictly structured Excel maps to provide the input for the information base. A strictly structured Excel map contains sets of entity tables and relationship tables. Entity tables contain all occurrences of a given entity type, with its attributes similar to a table of a relational database. Relationship tables describe the connection between entities and reflect the structure of the system. This entity-relationship view (figure 3) corresponds directly with the conceptual model of the system. Figure 3 shows the tables that describe the input-output flow of work products, as defined in the COBIT 4.1 Process Assessment Model Exposure Draft. The final result of the preparation was three Excel maps with a total of 87 sheets, 5,400 entity rows and 8,200 relationship rows. The Excel maps were then loaded into the information base of the metasafe repository with the Excel import facility. Viewing the Content of the Information Base The content of the information base can be viewed with a generic viewer, which is controlled by the metamodel. Because the viewer/editor is completely controlled by the metamodel, no additional programming is required to: Browse across the model in an arbitrary direction, e.g., forward and backward, and starting anywhere, e.g., one could start with an organizational function (such as chief information officer [CIO]), see all the responsibilities, select one and find the affected process, select one and see the description, or move on to the corresponding management guideline Select a graphical view and browse using the graphics (graphics are dynamically created from the model) Volume 3, July 2011 Page 3
4 Figure 4 Browse and Document the Results of an Assessment Update the descriptions (updating is protected by user-update rights) Export parts of the information Create and export arbitrary cross-references Figure 4 shows the browse tree with forward and backward branches in the left pane. The right pane contains, on top, the descriptive elements of a process and, below the context, a graph of the input/output of the selected process. With a click on one of the outcomes, the graph moves automatically to the selected element. Once a user of the viewer logs in to the system with a specific view, the user will see only the elements and structures defined in this view. It is important to note that such a model-based viewer can also cope with any extension of the model. This is especially important when a model is in development or when extensions and enhancements are introduced. Such a generic viewer is not a replacement for a dedicated system such as COBIT Online; however, one could create this kind of application on top of the repository using the metasafe application programming interface (Java-API). Extension to Support an Assessment To explain the extensibility of the repository technology, some attributes have been added in the assessment guide model (figure 5). (The additional attributes have been marked to avoid misunderstandings.) This view was defined as the assessment view in the model and provides fields to enter the assessment for specific items. Other extensions could include: Grouping assessments and assignments of assesments to selected assessors Accepting attached documents Creating clones for several branches The consolidated results of all assessments can then be extracted and reported using the business intelligence and reporting tool (BIRT). Conclusion A metamodel and an information base (repository) can ease the development, publication, adaption and practical use of process models. The publications in connection with COBIT 4.1 have been used to demonstrate the concept and its Volume 3, July 2011 Page 4
5 Figure 5 Browse and Document the Results of an Assessment implementation. The concept and tools can be applied to any process model. Based on this architecture, generic model-based tools can been used to create the metamodel; to load the model; and to browse, update or export the model. Author s Note The tools used in this article belong to the metasafe repository that is based on the Eclipse Software Framework and on the metasafe Java-API. This infrastructure can be used to create additional tools as required for specific purposes. The metasafe repository is available as a software product; however, the content of the information base is not available for distribution because it is copyrighted material of ISACA and was only used for the proof of concept. Reinhold Thurner, Ph.D. is founder and chief executive officer (CEO) of Metasafe GmbH in Switzerland (metasafe-repository.com) a software company specialized in modeling techniques and the developer of the general purpose repository metasafe. He has more than 30 years of experience in IT, especially in the area of software engineering, model-based development, software generators, compilers and metadata bases. Volume 3, July 2011 Page 5
6 COBIT Focus is published by ISACA. Opinions expressed in COBIT Focus represent the views of the authors. They may differ from policies and official statements of ISACA and its committees, and from opinions endorsed by authors, employers or the editors of COBIT Focus. COBIT Focus does not attest to the originality of authors content ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Please contact Julia Fullerton at Framework Committee Patrick Stachtchenko, CISA, CGEIT, CA, France, chair Steven A. Babb, CGEIT, CRISC, UK Sushil Chatterji, CGEIT, Singapore Sergio Fleginsky, CISA, Uruguay John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, USA Anthony P. Noble, CISA, USA Derek J. Oliver, Ph.D., DBA, CISA, CISM, CITP, FBCS, FISM, UK Rolf M. von Roessing, CISA, CISM, CGEIT, Germany Editorial Content Comments regarding the editorial content may be directed to Jennifer Hajigeorgiou, senior editorial manager, at 2011 ISACA. All rights reserved. Volume 3, July 2011 Page 6
Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma
Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April
More informationCOBIT Maturity Assessment and Continual e-health Governance Improvement at NHS Fife By Elena Beratarbide, CISA, Pablo Borges and Donald Wilson
Volume 4, October 2012 Come join the discussion! Elena Beratarbide will respond to questions in the discussion area of the COBIT (4.1 and earlier) Use It Effectively topic beginning 22 October 2012. COBIT
More informationCOBIT 5: Enabling Information Progress Report By Steven De Haes, Ph.D.
Volume 4, October 2012 In This Issue: COBIT 5: Enabling Information Progress Report Integrating COBIT 4.1 Into the Internal Audit Function COBIT 5 for Risk Progress Report COBIT Maturity Assessment and
More informationMapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 In This Issue: Mapping COBIT 5 With IT Governance, Risk and Compliance at Ecopetrol COBIT 5 Helps Find Value in the Cloud 6 Tips for Implementing IT Governance With COBIT 5 Are COSO
More informationCOBIT for IT Risk Management in a Bank A Case Study By Jitendra Barve, CISA, FCA
In This Issue: Volume 3, July 2010 COBIT for IT Risk Management in a Bank A Case Study, by Jitendra Barve, CISA, FCA Laugh & Learn: Using COBIT to Improve the Software Development Life Cycle, by Corjan
More informationReport of the Nominating Committee
Volume 7, 31 March 2011 In This Issue: Report of the Nominating Committee Slate of 2011-2012 Board of Directors New COBIT Case Study: Grupo Bancolombia New COBIT Process Assessment Model: The Market Need
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationCOBIT 5 Foundation Workshop
COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20
More informationThe Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA
The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,
More informationIS Audit and Assurance Guideline 2002 Organisational Independence
IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
More informationWhat Auditors Want. John Mitchell. PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE
What Auditors Want 14 th February 2008 John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE LHS Business Control Tel: +44 (0)1707 851454 47 Grangewood Fax: +44 (0)1707 851455 Potters
More informationIS Audit and Assurance Guideline 2001 Audit Charter
IS Audit and Assurance Guideline 2001 Audit Charter The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply
More informationImplementation PREVIEW VERSION
Implementation These following pages provide a preview of the information contained in COBIT 5 Implementation. The publication provides a good-practice approach for implementation governance of enterprise
More informationCOURSE BROCHURE CISA TRAINING
COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within
More informationInformation and documentation Library performance indicators
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 11620 Third edition 2014-06-01 Information and documentation Library performance indicators Information et documentation Indicateurs de performance
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationInnovation in the IT Audit Process
IS AUDIT BASICS Innovation in the IT Audit Process Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click on
More informationMY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.
MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED
More informationCOBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk
COBIT 5 Foundation Vertical Type Sub-Category Technology Certification-led Audit, Security, Governance & Risk Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your
More informationIT Strategic Planning: Making Your IT Organization Efficient and Effective
IT Strategic Planning: Making Your IT Organization Efficient and Effective Jeffrey Locketz, CPA, CGMA, CITP, CISA, CISM, CGEIT, CRISC, CBCP, CRMA, CCISO ICMA Conference Presenter How can an IT Strategic
More informationNext Generation Policy & Compliance
Next Generation Policy & Compliance Mason Karrer, CISSP, CISA GRC Strategist - Policy and Compliance, RSA Core Competencies C33 2013 Fall Conference Sail to Success CRISC CGEIT CISM CISA Introductions...
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationCOURSE BROCHURE. COBIT5 FOUNDATION Training & Certification
COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements
More informationCOBIT 5 Update October 2010
COBIT 5 Update October 2010 ISACA Tel Aviv Chapter Conference October 20th, 2010 Kaya Kazmirci ISACA Istanbul Chapter President COBIT 5 Initiative The initiative charge from the Board of Directors is to
More informationExam Requirements v4.1
COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information
More informationThe secret of the service catalogue. Panel discussion 9 th April 2014
The secret of the service catalogue Panel discussion 9 th April 2014 The panellists Colin Rudd: is a leading author of the ITIL guidance and is one of the most experienced service management professionals
More informationDOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI Page 1 Page 2 cobit 5 for risk isaca information assurance cobit 5 for risk pdf cobit 5 for risk isaca information assurance
More informationCOBIT 5 Foundation Certification Training Course - Brochure
COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com
More informationSAME RISK-BASED APPROACH
Journal Online Using Microsoft Office in Analyzing SAP SoD and Beyond Haiyan Chen, CISA, CIA, is head of IT internal audit in the group internal audit department of Sodexo. He has many years of experience
More informationBest Practice Guidelines for the Development and Evaluation of Digital Humanities Projects
Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects 1.0. Project team There should be a clear indication of who is responsible for the publication of the project.
More informationComputation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):
viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information
More information*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship
More informationISACA International Perspective
ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute
More informationIVOA Document Standards Version 0.1
International Virtual Observatory Alliance IVOA Document Standards Version 0.1 IVOA Working Draft 09 July 2003 This version: http://www.ivoa.net/documents/wd/docstandard/documentstandards-20030709.html
More informationGovernment of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationConceptualising Item Banks
Loughborough University Institutional Repository Conceptualising Item Banks This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: SCLATER, N., 2005.
More informationRisk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities
Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic
More informationPROTASIS Restoring Trust in the Cyber Space: A Systems Security Proposal
Marie Skłodowska-Curie Research and Innovation Staff Exchange Equality and Citizenship PROTASIS Restoring Trust in the Cyber Space: A Systems Security Proposal D2.5: CyberSecurity Repository Abstract:
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationComing up soon: TMMI
Coming up soon: TMMI What to expect Jan Jaap Cannegieter Vice President SYSQA Almere Quality Assurance in ICT / 1 Agenda The history: TMM Why TMMI What we know in advance TMMI compared to other models
More informationHITRUST CSF: One Framework
HITRUST CSF: One Framework Leveraging the HITRUST CSF to Support ISO, HIPAA, & NIST Implementation and Compliance, and SSAE 16 SOC Reporting Dr. Bryan Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Senior
More informationTHE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :
THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationArchives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment
Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Shigeo Sugimoto Research Center for Knowledge Communities Graduate School of Library, Information
More informationCertified Information Systems Auditor Training and Certification
Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit
More informationTRAINING SEMINAR COURSE OUTLINE October
TRAINING SEMINAR COURSE OUTLINE October 10-12 2016 FACILITATOR S BIOGRAPHY SHAWNA M FLANDERS CRISC, CISM, CISA, CSSGB, SSBB Shawna is the Founder and CEO of Business Technology Guidance Associates, LLC.,
More informationISACA Certifications Overview
ISACA Certifications Overview CISA, CISM, CRISC, CGEIT Instructor Jay Ranade CISA,, CISSP, CISM, CBCP, ISSAP Risk Management Professionals Intl. jayranade@aol.com jayranade@nyu.edu ranadej@stjohns.edu
More informationModule B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8
Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture
More informationProposal for the Next Version of the ISO/IEC Standard
feature Proposal for the Next Version of the ISO/IEC 27001 Standard In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013
More informationInformation technology Process assessment Concepts and terminology
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 33001 Second edition 2015-03-01 Information technology Process assessment Concepts and terminology Technologies de l information Évaluation
More informationExtending the Facets concept by applying NLP tools to catalog records of scientific literature
Extending the Facets concept by applying NLP tools to catalog records of scientific literature *E. Picchi, *M. Sassi, **S. Biagioni, **S. Giannini *Institute of Computational Linguistics **Institute of
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 24744 Second edition 2014-11-15 Software engineering Metamodel for development methodologies Ingénierie du logiciel Métamodèle pour les méthodologies de développement Reference
More informationIRMSA: Endorsement Policy 2013
IRMSA: Endorsement Policy 2013 1 P a g e Quick Overview: Course / Training Provider Fees This sets out fees for endorsement of risk management courses as of July 2013. The total fee comprises of an applicationand
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More informationUsing the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab
Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab 1 Overview QMF for Workstation is an Eclipse-based, rich client desktop Java application, that uses JDBC to connect to data
More informationISACA Enterprise. Solutions and Resources
ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the
More informationBlackboard Portfolio System Owner and Designer Reference
Blackboard Learning System Blackboard Portfolio System Owner and Designer Reference Application Pack 2 for Blackboard Learning System CE Enterprise License (Release 6) Application Pack 2 for Blackboard
More informationCA Test Data Manager 3.x: Foundations 200
CA EDUCATION COURSE DESCRIPTION CA Test Data Manager 3.x: Foundations 200 Course Overview PRODUCT RELEASE CA Test Data Manager 3.2 This course provides students with primary concepts on each function of
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationCreating Reports using Report Designer Part 1. Training Guide
Creating Reports using Report Designer Part 1 Training Guide 2 Dayforce HCM Creating Reports using Report Designer Part 1 Contributors We would like to thank the following individual who contributed to
More informationWM2015 Conference, March 15 19, 2015, Phoenix, Arizona, USA
OECD NEA Radioactive Waste Repository Metadata Management (RepMet) Initiative (2014-2018) 15614 Claudio Pescatore*, Alexander Carter** *OECD Nuclear Energy Agency 1 (claudio.pescatore@oecd.org) ** Radioactive
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationUsing the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab
Attendee Choice: IMS Hands-on Lab Thursday, August 13, 2015: 12:30 PM - 01:30 PM, Dolphin, Asia 5 #17765 Insert Custom Session QR if Desired Business Analytics on zenterprise The QMF 11 Product Family
More informationTop Business/Technology Issues Survey 2011
Volume 9, 27 April 2011 In This Issue: Top Business/Technology Issues Survey 2011 Results Released 5 Considerations When Evaluating ISRM Programs and Capabilities Now Available in the Apple App Store:
More informationSharePoint Web Pages and Web Parts. C&IT Services User Guide
SharePoint 2007 Web Pages and Web Parts C&IT Services User Guide SHAREPOINT 2007 WEB PAGES AND WEB PARTS........................................ Copyright 2010 Melbourne by Watsonia Software Pty Ltd (ABN
More informationIBM Best Practices Working With Multiple CCM Applications Draft
Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices
More informationitsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program
itsm003 v.3.0 NICE Training Curriculum & Workforce Planning Program Agenda and Objectives NICE Cybersecurity Curriculum Consortium IT & Cybersecurity Frameworks & Methodologies NICE Curriculum Catalog
More informationitsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum
itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum
More informationCisa Review Manual 2015 Free Download Wordpress READ ONLINE
Cisa Review Manual 2015 Free Download Wordpress READ ONLINE cisa review manual 2015 PDF Manual - Oct 19, 2015 Search Results for CISA Review Manual 2015.pdf torrent download and Other related keywords:
More informationGetting Started With Governance of Enterprise IT (GEIT)
Getting Started With Governance of Enterprise IT (GEIT) AN ISACA WHITE PAPER Implementing a governance of enterprise IT (GEIT) system successfully will bring myriad benefits, including lower costs, greater
More informationWorkshop description
Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance
More informationC - The C1X Charter. Introduction. Original Principles. Document: WG14 N1250 Author: John Benito, Convener Date: 2007/06/29
C - The C1X Charter Document: WG14 N1250 Author: John Benito, Convener Date: 2007/06/29 Introduction At the WG14/INCITS J11 meeting in London, UK, April 2007 there was general agreement the committee should
More informationHow to mark assessments
How to mark assessments Overview This document describes how assessors can: locate, group and order assessments mark assessments take over marking an assessment override an assessment mark export assessments
More informationFileNet P8 Version 5.2.1
FileNet P8 Version 5.2.1 Plan and Prepare Your Environment for FileNet P8 for installation on Microsoft Windows with IBM DB2, IBM WebSphere Application Server, and IBM Tivoli Directory Server IBM GC19-3917-04
More informationPreview and Print Reports. Preview and Print Reports (for MAS Users) Participant Profile. Learning Outcomes
Preview and Print Reports Preview and Print Reports (for MAS Users) This document includes a copy of the concepts and procedures that form the basis of this selfpaced online learning module. As you work
More informationGuide for the international tekom certification examinations
Guide for the international tekom certification examinations 1 Obtaining the tekom-certificate First Level 1.1 The tekom-certificate First Level at a glance The tekom-certificate First Level is the first
More informationISACA Book Store Update 10
Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter Partnered ITCN Asia 2015 (Flyer) 5 ISACA Karachi Chapter Partnered ITCN Asia 2015 (Report) 6 ISACA Book Store Update 10
More informationMarketplace Simulations Accessibility Conformance Report Based on Voluntary Product Accessibility Template (VPAT ) 1
Marketplace Simulations Accessibility Conformance Report Based on Voluntary Product Accessibility Template (VPAT ) 1 Name of Product: Marketplace Simulations Date: September 20, 2017 Contact information:
More informationReport of the Nominating Committee
Volume 8, 9 April 2014 Report of the Nominating Committee Slate of 2014-15 Board of Directors New NIST Cybersecurity Framework Features COBIT 5 in Its Core Parameters to Consider When Acquiring Software
More informationUnderstanding Security Metrics to Drive Business and Security Results
Understanding Security Metrics to Drive Business and Security Results Jennifer Bayuk Professor, Systems Security Engineering Stevens Institute of Technology for NJ CISO Executive Summit May 4, 2009 1 Professor
More informationNew Features Summary PowerDesigner 15.2
New Features Summary PowerDesigner 15.2 Windows DOCUMENT ID: DC10077-01-1520-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationCA Productivity Accelerator 12.1 and Later
CA Productivity Accelerator 12.1 and Later Localize Content Localize Content Once you have created content in one language, you might want to translate it into one or more different languages. The Developer
More informationCloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA
Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance
More informationITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure
ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2
More informationITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure
ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2
More informationGovernment of Ontario IT Standard (GO ITS)
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationEXPLORING COURSE TOOLS
EXPLORING COURSE TOOLS Now that we have covered the My Blackboard screen, let s explore the different tools that you might find within your course. NOTE: Your instructor controls which tools are available.
More informationISO/IEC TR TECHNICAL REPORT. Software and systems engineering Life cycle management Guidelines for process description
TECHNICAL REPORT ISO/IEC TR 24774 First edition 2007-09-01 Software and systems engineering Life cycle management Guidelines for process description Ingénierie du logiciel et des systèmes Gestion du cycle
More informationR1 Test Case that tests this Requirement Comments Manage Users User Role Management
2/19/2014 CDISC SHARE Requirements Page 1 of 23 Number Name Req ID Requirement Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage
More information"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary
Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL
More informationEXIN BCS SIAM TM Foundation Certification Training - Brochure
EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version
More informationObject-Oriented Programming for Managers
95-807 Object-Oriented Programming for Managers 12 units Prerequisites: 95-815 Programming Basics is required for students with little or no prior programming coursework or experience. (http://www.andrew.cmu.edu/course/95-815/)
More informationManagement Update: Information Security Risk Best Practices
IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine
More informationTaxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company
Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationOPERATIONS SEAFARER CERTIFICATION STANDARD OF TRAINING & ASSESSMENT. Security Awareness STCW A-VI/6-1
Document No. STA-06-601 Version No, Date 1.0 01/06/2018 Effective Date 01/07/2018 Compiled by Consultant, Senior Examiner Deck, QSS - Developer Approved by Chief Examiner Approval date 31/05/2018 OPERATIONS
More informationCisa Certified Information Systems Auditor Study Guide 4th Edition
Cisa Certified Information Systems Auditor Study Guide 4th Edition We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your
More informationMonitoring and Evaluation Tool
Monitoring and Evaluation Tool USER MANUAL March, 2014 www.menarid.icarda.org THIS PAGE LEFT EMPTY INTENTIONALLY USER MANUAL Definitions and abbreviations Chart... Graphical representation of M&E project
More informationSpring Education Conference. Securing the Organization (Ensuring Trustworthy Systems)
Spring Education Conference Securing the Organization (Ensuring Trustworthy Systems) Ken Vander Wal, CISA, CPA Past President, ISACA vandeke@gmail.com 1 2012-2013 Board of Directors International President
More informationGlobal Software, Inc.'s Distribution Manager User Manual. Release V12 R5 M1
Global Software, Inc.'s Distribution Manager User Manual Release V12 R5 M1 Worldwide Headquarters 3201 Beechleaf Court Raleigh, NC 27604 USA +1.919.872.7800 www.glbsoft.com EMEA Headquarters 500 Chiswick
More information