Modeling Architecture for COBIT

Size: px
Start display at page:

Download "Modeling Architecture for COBIT"

Transcription

1 Volume 3, July 2011 Modeling Architecture for COBIT By Reinhold Thurner, Ph.D. Models and frameworks are used as a means to describe the structure and properties of processes and to provide guidelines on how these processes should be organized, monitored and assessed. These models (descriptions) are voluminous and complex artifacts. So, the question is: How can one describe these artifacts so that the information contained in the models can be properly managed? This article answers this question and demonstrates how to do so in practice. For that purpose, a model of COBIT was designed and stored along with the full content of the COBIT 4.1 framework, IT Assurance Guide: Using COBIT and the COBIT 4.1 Process Assessment Model Exposure Draft in a metasafe repository. The results are meaningful, not only for the existing version of COBIT, but also for the upcoming COBIT 5. Information Models About Models There are many publications about COBIT and how to use it. These publications exist in several languages and in various formats such as hard copies, e-books (PDF files), CDs, Excel files and online digital versions. The publications contain detailed descriptions in a top-down structure and also some cross-references between the components of the COBIT framework. The basis for all these documents and the essence of the system is the information model of COBIT. From a purely structural point of view, such a model consists of entities that are described by their properties and connected by relationships. The publications are merely specific views derived from this information base. Such an information base is a tool to: Write, review the components of the model and its structure, and maintain versions Create different views (e.g., for different stakeholders) and to produce the products for publication Translate the text into other languages while preserving the original structure Compare a model with other models (e.g., COBIT to Software Process Improvement and Capability Determination [SPICE], ITIL, or Capability Maturity Model Integration [CMMI]) Clone and adapt a model to a specific environment and purpose without losing the structure of and reference to the original Teach a model. The audience must understand the structure and purpose, but does not necessarily need to learn about all the details. Use or extend a model for an assessment. The results of an assessment are collected and stored in the information base and combined to create a report or even a plan/control a process for improvement. Figure 1 Simplified Information Model Architecture A (simplified) architecture for an information model (figure 1) consists of: The metamodel Describes the structure of the model ( the information base ) The model Contains all the instances in a fine-grained information base Views Provide individual views of selected entities, attributes and Come join the discussion! Reinhold Thurner will respond to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 15 July 2011.

2 relationships. Views are not an additional level within this structure, but a selection of an arbitrary set of elements of the structure. Views may show only a subset and may overlap. Creation of a Metamodel for COBIT A metamodel is not a theoretical construct but has a very clear purpose: It must explain the terms (such as management guideline, work product, process and resource), the properties of these terms (such as description, title, measured by, issues and level) and the relationships (such as uses, has, has output, is input and is responsible). Therefore, one can start with the extraction of the terminology from the available documents. Then, one can connect these elements to reflect the logical structure of the terms. The result for COBIT (after several refinements) was the metamodel draft in figure 2. The draft model was then stored in the metasafe repository, and the picture of the model was generated by the repository. The model reflects the structure of the COBIT 4.1 framework, IT Assurance Guide: Using COBIT and COBIT 4.1 Process Assessment Model Exposure Draft, with an extension as explained in the figure. The extension of some attributes in the assurance model is included to show how a model can be adapted to specific requirements (e.g., the support of an Figure 2 Metamodel Draft Volume 3, July 2011 Page 2

3 assessment process) and still keep the original model. Figure 3 Entity Relationship Representation in Excel The model shows all the important terms, their properties and their relationships. It can be used to teach, design and structure the information base that will contain the model. This is not the metamodel, but it is what the authors wanted to express or show about the model. It is also only a draft or proof of concept of the architecture; however, it is a good basis from which to start and can be extended or changed easily for use in other intended purposes. Beyond the descriptive function, the model is also intended to structure the information base where the instances of the model with the complete textual information are stored, maintained and documented. Preparation of the Information Base COBIT is available in hard copy and as a PDF download and can be browsed using COBIT Online. COBIT Online provides the facility to download the content of COBIT as Word files or in an Access database. IT Assurance Guide: Using COBIT was also published as an Excel spreadsheet. The COBIT 4.1 Process Assessment Model Exposure Draft is published as a PDF file and consists of plaintext. It had to be taken apart and structured appropriately to be loaded into the information base. For the purposes of this analysis, the available documentation was taken apart and converted into strictly structured Excel maps to provide the input for the information base. A strictly structured Excel map contains sets of entity tables and relationship tables. Entity tables contain all occurrences of a given entity type, with its attributes similar to a table of a relational database. Relationship tables describe the connection between entities and reflect the structure of the system. This entity-relationship view (figure 3) corresponds directly with the conceptual model of the system. Figure 3 shows the tables that describe the input-output flow of work products, as defined in the COBIT 4.1 Process Assessment Model Exposure Draft. The final result of the preparation was three Excel maps with a total of 87 sheets, 5,400 entity rows and 8,200 relationship rows. The Excel maps were then loaded into the information base of the metasafe repository with the Excel import facility. Viewing the Content of the Information Base The content of the information base can be viewed with a generic viewer, which is controlled by the metamodel. Because the viewer/editor is completely controlled by the metamodel, no additional programming is required to: Browse across the model in an arbitrary direction, e.g., forward and backward, and starting anywhere, e.g., one could start with an organizational function (such as chief information officer [CIO]), see all the responsibilities, select one and find the affected process, select one and see the description, or move on to the corresponding management guideline Select a graphical view and browse using the graphics (graphics are dynamically created from the model) Volume 3, July 2011 Page 3

4 Figure 4 Browse and Document the Results of an Assessment Update the descriptions (updating is protected by user-update rights) Export parts of the information Create and export arbitrary cross-references Figure 4 shows the browse tree with forward and backward branches in the left pane. The right pane contains, on top, the descriptive elements of a process and, below the context, a graph of the input/output of the selected process. With a click on one of the outcomes, the graph moves automatically to the selected element. Once a user of the viewer logs in to the system with a specific view, the user will see only the elements and structures defined in this view. It is important to note that such a model-based viewer can also cope with any extension of the model. This is especially important when a model is in development or when extensions and enhancements are introduced. Such a generic viewer is not a replacement for a dedicated system such as COBIT Online; however, one could create this kind of application on top of the repository using the metasafe application programming interface (Java-API). Extension to Support an Assessment To explain the extensibility of the repository technology, some attributes have been added in the assessment guide model (figure 5). (The additional attributes have been marked to avoid misunderstandings.) This view was defined as the assessment view in the model and provides fields to enter the assessment for specific items. Other extensions could include: Grouping assessments and assignments of assesments to selected assessors Accepting attached documents Creating clones for several branches The consolidated results of all assessments can then be extracted and reported using the business intelligence and reporting tool (BIRT). Conclusion A metamodel and an information base (repository) can ease the development, publication, adaption and practical use of process models. The publications in connection with COBIT 4.1 have been used to demonstrate the concept and its Volume 3, July 2011 Page 4

5 Figure 5 Browse and Document the Results of an Assessment implementation. The concept and tools can be applied to any process model. Based on this architecture, generic model-based tools can been used to create the metamodel; to load the model; and to browse, update or export the model. Author s Note The tools used in this article belong to the metasafe repository that is based on the Eclipse Software Framework and on the metasafe Java-API. This infrastructure can be used to create additional tools as required for specific purposes. The metasafe repository is available as a software product; however, the content of the information base is not available for distribution because it is copyrighted material of ISACA and was only used for the proof of concept. Reinhold Thurner, Ph.D. is founder and chief executive officer (CEO) of Metasafe GmbH in Switzerland (metasafe-repository.com) a software company specialized in modeling techniques and the developer of the general purpose repository metasafe. He has more than 30 years of experience in IT, especially in the area of software engineering, model-based development, software generators, compilers and metadata bases. Volume 3, July 2011 Page 5

6 COBIT Focus is published by ISACA. Opinions expressed in COBIT Focus represent the views of the authors. They may differ from policies and official statements of ISACA and its committees, and from opinions endorsed by authors, employers or the editors of COBIT Focus. COBIT Focus does not attest to the originality of authors content ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Please contact Julia Fullerton at Framework Committee Patrick Stachtchenko, CISA, CGEIT, CA, France, chair Steven A. Babb, CGEIT, CRISC, UK Sushil Chatterji, CGEIT, Singapore Sergio Fleginsky, CISA, Uruguay John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, USA Anthony P. Noble, CISA, USA Derek J. Oliver, Ph.D., DBA, CISA, CISM, CITP, FBCS, FISM, UK Rolf M. von Roessing, CISA, CISM, CGEIT, Germany Editorial Content Comments regarding the editorial content may be directed to Jennifer Hajigeorgiou, senior editorial manager, at 2011 ISACA. All rights reserved. Volume 3, July 2011 Page 6

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma Volume 2, April 2011 Come join the discussion! Pritam Bankar and Sharad Verma will be responding to questions and comments in the discussion area of the COBIT Use It Effectively topic beginning 21 April

More information

COBIT Maturity Assessment and Continual e-health Governance Improvement at NHS Fife By Elena Beratarbide, CISA, Pablo Borges and Donald Wilson

COBIT Maturity Assessment and Continual e-health Governance Improvement at NHS Fife By Elena Beratarbide, CISA, Pablo Borges and Donald Wilson Volume 4, October 2012 Come join the discussion! Elena Beratarbide will respond to questions in the discussion area of the COBIT (4.1 and earlier) Use It Effectively topic beginning 22 October 2012. COBIT

More information

COBIT 5: Enabling Information Progress Report By Steven De Haes, Ph.D.

COBIT 5: Enabling Information Progress Report By Steven De Haes, Ph.D. Volume 4, October 2012 In This Issue: COBIT 5: Enabling Information Progress Report Integrating COBIT 4.1 Into the Internal Audit Function COBIT 5 for Risk Progress Report COBIT Maturity Assessment and

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 In This Issue: Mapping COBIT 5 With IT Governance, Risk and Compliance at Ecopetrol COBIT 5 Helps Find Value in the Cloud 6 Tips for Implementing IT Governance With COBIT 5 Are COSO

More information

COBIT for IT Risk Management in a Bank A Case Study By Jitendra Barve, CISA, FCA

COBIT for IT Risk Management in a Bank A Case Study By Jitendra Barve, CISA, FCA In This Issue: Volume 3, July 2010 COBIT for IT Risk Management in a Bank A Case Study, by Jitendra Barve, CISA, FCA Laugh & Learn: Using COBIT to Improve the Software Development Life Cycle, by Corjan

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 7, 31 March 2011 In This Issue: Report of the Nominating Committee Slate of 2011-2012 Board of Directors New COBIT Case Study: Grupo Bancolombia New COBIT Process Assessment Model: The Market Need

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

COBIT 5 Foundation Workshop

COBIT 5 Foundation Workshop COBIT 5 Foundation Workshop Dear Members, ISACA Pune chapter is pleased to organize Two / Three Days COBIT-5 Foundation course Dates of Training & Workshop: Date: Friday, 19 th Dec 2014 and Saturday, 20

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

What Auditors Want. John Mitchell. PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE

What Auditors Want. John Mitchell. PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE What Auditors Want 14 th February 2008 John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE LHS Business Control Tel: +44 (0)1707 851454 47 Grangewood Fax: +44 (0)1707 851455 Potters

More information

IS Audit and Assurance Guideline 2001 Audit Charter

IS Audit and Assurance Guideline 2001 Audit Charter IS Audit and Assurance Guideline 2001 Audit Charter The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

Implementation PREVIEW VERSION

Implementation PREVIEW VERSION Implementation These following pages provide a preview of the information contained in COBIT 5 Implementation. The publication provides a good-practice approach for implementation governance of enterprise

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

Information and documentation Library performance indicators

Information and documentation Library performance indicators Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 11620 Third edition 2014-06-01 Information and documentation Library performance indicators Information et documentation Indicateurs de performance

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

Innovation in the IT Audit Process

Innovation in the IT Audit Process IS AUDIT BASICS Innovation in the IT Audit Process Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click on

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk COBIT 5 Foundation Vertical Type Sub-Category Technology Certification-led Audit, Security, Governance & Risk Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your

More information

IT Strategic Planning: Making Your IT Organization Efficient and Effective

IT Strategic Planning: Making Your IT Organization Efficient and Effective IT Strategic Planning: Making Your IT Organization Efficient and Effective Jeffrey Locketz, CPA, CGMA, CITP, CISA, CISM, CGEIT, CRISC, CBCP, CRMA, CCISO ICMA Conference Presenter How can an IT Strategic

More information

Next Generation Policy & Compliance

Next Generation Policy & Compliance Next Generation Policy & Compliance Mason Karrer, CISSP, CISA GRC Strategist - Policy and Compliance, RSA Core Competencies C33 2013 Fall Conference Sail to Success CRISC CGEIT CISM CISA Introductions...

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

COBIT 5 Update October 2010

COBIT 5 Update October 2010 COBIT 5 Update October 2010 ISACA Tel Aviv Chapter Conference October 20th, 2010 Kaya Kazmirci ISACA Istanbul Chapter President COBIT 5 Initiative The initiative charge from the Board of Directors is to

More information

Exam Requirements v4.1

Exam Requirements v4.1 COBIT Foundation Exam Exam Requirements v4.1 The purpose of this document is to provide information to those interested in participating in the COBIT Foundation Exam. The document provides information

More information

The secret of the service catalogue. Panel discussion 9 th April 2014

The secret of the service catalogue. Panel discussion 9 th April 2014 The secret of the service catalogue Panel discussion 9 th April 2014 The panellists Colin Rudd: is a leading author of the ITIL guidance and is one of the most experienced service management professionals

More information

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : COBIT 5 FOR RISK ISACA INFORMATION ASSURANCE PDF EBOOK EPUB MOBI Page 1 Page 2 cobit 5 for risk isaca information assurance cobit 5 for risk pdf cobit 5 for risk isaca information assurance

More information

COBIT 5 Foundation Certification Training Course - Brochure

COBIT 5 Foundation Certification Training Course - Brochure COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com

More information

SAME RISK-BASED APPROACH

SAME RISK-BASED APPROACH Journal Online Using Microsoft Office in Analyzing SAP SoD and Beyond Haiyan Chen, CISA, CIA, is head of IT internal audit in the group internal audit department of Sodexo. He has many years of experience

More information

Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects

Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects 1.0. Project team There should be a clear indication of who is responsible for the publication of the project.

More information

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM): viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information

More information

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship

More information

ISACA International Perspective

ISACA International Perspective ISACA International Perspective 11 th October 2013 Allan Boardman ISACA International Vice President and Board Director Member of ISACA s Strategic Advisory Council Member of the IT Governance Institute

More information

IVOA Document Standards Version 0.1

IVOA Document Standards Version 0.1 International Virtual Observatory Alliance IVOA Document Standards Version 0.1 IVOA Working Draft 09 July 2003 This version: http://www.ivoa.net/documents/wd/docstandard/documentstandards-20030709.html

More information

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

Conceptualising Item Banks

Conceptualising Item Banks Loughborough University Institutional Repository Conceptualising Item Banks This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: SCLATER, N., 2005.

More information

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic

More information

PROTASIS Restoring Trust in the Cyber Space: A Systems Security Proposal

PROTASIS Restoring Trust in the Cyber Space: A Systems Security Proposal Marie Skłodowska-Curie Research and Innovation Staff Exchange Equality and Citizenship PROTASIS Restoring Trust in the Cyber Space: A Systems Security Proposal D2.5: CyberSecurity Repository Abstract:

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

Coming up soon: TMMI

Coming up soon: TMMI Coming up soon: TMMI What to expect Jan Jaap Cannegieter Vice President SYSQA Almere Quality Assurance in ICT / 1 Agenda The history: TMM Why TMMI What we know in advance TMMI compared to other models

More information

HITRUST CSF: One Framework

HITRUST CSF: One Framework HITRUST CSF: One Framework Leveraging the HITRUST CSF to Support ISO, HIPAA, & NIST Implementation and Compliance, and SSAE 16 SOC Reporting Dr. Bryan Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Senior

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment

Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Shigeo Sugimoto Research Center for Knowledge Communities Graduate School of Library, Information

More information

Certified Information Systems Auditor Training and Certification

Certified Information Systems Auditor Training and Certification Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit

More information

TRAINING SEMINAR COURSE OUTLINE October

TRAINING SEMINAR COURSE OUTLINE October TRAINING SEMINAR COURSE OUTLINE October 10-12 2016 FACILITATOR S BIOGRAPHY SHAWNA M FLANDERS CRISC, CISM, CISA, CSSGB, SSBB Shawna is the Founder and CEO of Business Technology Guidance Associates, LLC.,

More information

ISACA Certifications Overview

ISACA Certifications Overview ISACA Certifications Overview CISA, CISM, CRISC, CGEIT Instructor Jay Ranade CISA,, CISSP, CISM, CBCP, ISSAP Risk Management Professionals Intl. jayranade@aol.com jayranade@nyu.edu ranadej@stjohns.edu

More information

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8 Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture

More information

Proposal for the Next Version of the ISO/IEC Standard

Proposal for the Next Version of the ISO/IEC Standard feature Proposal for the Next Version of the ISO/IEC 27001 Standard In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013

More information

Information technology Process assessment Concepts and terminology

Information technology Process assessment Concepts and terminology Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 33001 Second edition 2015-03-01 Information technology Process assessment Concepts and terminology Technologies de l information Évaluation

More information

Extending the Facets concept by applying NLP tools to catalog records of scientific literature

Extending the Facets concept by applying NLP tools to catalog records of scientific literature Extending the Facets concept by applying NLP tools to catalog records of scientific literature *E. Picchi, *M. Sassi, **S. Biagioni, **S. Giannini *Institute of Computational Linguistics **Institute of

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 24744 Second edition 2014-11-15 Software engineering Metamodel for development methodologies Ingénierie du logiciel Métamodèle pour les méthodologies de développement Reference

More information

IRMSA: Endorsement Policy 2013

IRMSA: Endorsement Policy 2013 IRMSA: Endorsement Policy 2013 1 P a g e Quick Overview: Course / Training Provider Fees This sets out fees for endorsement of risk management courses as of July 2013. The total fee comprises of an applicationand

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab 1 Overview QMF for Workstation is an Eclipse-based, rich client desktop Java application, that uses JDBC to connect to data

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Blackboard Portfolio System Owner and Designer Reference

Blackboard Portfolio System Owner and Designer Reference Blackboard Learning System Blackboard Portfolio System Owner and Designer Reference Application Pack 2 for Blackboard Learning System CE Enterprise License (Release 6) Application Pack 2 for Blackboard

More information

CA Test Data Manager 3.x: Foundations 200

CA Test Data Manager 3.x: Foundations 200 CA EDUCATION COURSE DESCRIPTION CA Test Data Manager 3.x: Foundations 200 Course Overview PRODUCT RELEASE CA Test Data Manager 3.2 This course provides students with primary concepts on each function of

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

Creating Reports using Report Designer Part 1. Training Guide

Creating Reports using Report Designer Part 1. Training Guide Creating Reports using Report Designer Part 1 Training Guide 2 Dayforce HCM Creating Reports using Report Designer Part 1 Contributors We would like to thank the following individual who contributed to

More information

WM2015 Conference, March 15 19, 2015, Phoenix, Arizona, USA

WM2015 Conference, March 15 19, 2015, Phoenix, Arizona, USA OECD NEA Radioactive Waste Repository Metadata Management (RepMet) Initiative (2014-2018) 15614 Claudio Pescatore*, Alexander Carter** *OECD Nuclear Energy Agency 1 (claudio.pescatore@oecd.org) ** Radioactive

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab Attendee Choice: IMS Hands-on Lab Thursday, August 13, 2015: 12:30 PM - 01:30 PM, Dolphin, Asia 5 #17765 Insert Custom Session QR if Desired Business Analytics on zenterprise The QMF 11 Product Family

More information

Top Business/Technology Issues Survey 2011

Top Business/Technology Issues Survey 2011 Volume 9, 27 April 2011 In This Issue: Top Business/Technology Issues Survey 2011 Results Released 5 Considerations When Evaluating ISRM Programs and Capabilities Now Available in the Apple App Store:

More information

SharePoint Web Pages and Web Parts. C&IT Services User Guide

SharePoint Web Pages and Web Parts. C&IT Services User Guide SharePoint 2007 Web Pages and Web Parts C&IT Services User Guide SHAREPOINT 2007 WEB PAGES AND WEB PARTS........................................ Copyright 2010 Melbourne by Watsonia Software Pty Ltd (ABN

More information

IBM Best Practices Working With Multiple CCM Applications Draft

IBM Best Practices Working With Multiple CCM Applications Draft Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices

More information

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program itsm003 v.3.0 NICE Training Curriculum & Workforce Planning Program Agenda and Objectives NICE Cybersecurity Curriculum Consortium IT & Cybersecurity Frameworks & Methodologies NICE Curriculum Catalog

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

Cisa Review Manual 2015 Free Download Wordpress READ ONLINE

Cisa Review Manual 2015 Free Download Wordpress READ ONLINE Cisa Review Manual 2015 Free Download Wordpress READ ONLINE cisa review manual 2015 PDF Manual - Oct 19, 2015 Search Results for CISA Review Manual 2015.pdf torrent download and Other related keywords:

More information

Getting Started With Governance of Enterprise IT (GEIT)

Getting Started With Governance of Enterprise IT (GEIT) Getting Started With Governance of Enterprise IT (GEIT) AN ISACA WHITE PAPER Implementing a governance of enterprise IT (GEIT) system successfully will bring myriad benefits, including lower costs, greater

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

C - The C1X Charter. Introduction. Original Principles. Document: WG14 N1250 Author: John Benito, Convener Date: 2007/06/29

C - The C1X Charter. Introduction. Original Principles. Document: WG14 N1250 Author: John Benito, Convener Date: 2007/06/29 C - The C1X Charter Document: WG14 N1250 Author: John Benito, Convener Date: 2007/06/29 Introduction At the WG14/INCITS J11 meeting in London, UK, April 2007 there was general agreement the committee should

More information

How to mark assessments

How to mark assessments How to mark assessments Overview This document describes how assessors can: locate, group and order assessments mark assessments take over marking an assessment override an assessment mark export assessments

More information

FileNet P8 Version 5.2.1

FileNet P8 Version 5.2.1 FileNet P8 Version 5.2.1 Plan and Prepare Your Environment for FileNet P8 for installation on Microsoft Windows with IBM DB2, IBM WebSphere Application Server, and IBM Tivoli Directory Server IBM GC19-3917-04

More information

Preview and Print Reports. Preview and Print Reports (for MAS Users) Participant Profile. Learning Outcomes

Preview and Print Reports. Preview and Print Reports (for MAS Users) Participant Profile. Learning Outcomes Preview and Print Reports Preview and Print Reports (for MAS Users) This document includes a copy of the concepts and procedures that form the basis of this selfpaced online learning module. As you work

More information

Guide for the international tekom certification examinations

Guide for the international tekom certification examinations Guide for the international tekom certification examinations 1 Obtaining the tekom-certificate First Level 1.1 The tekom-certificate First Level at a glance The tekom-certificate First Level is the first

More information

ISACA Book Store Update 10

ISACA Book Store Update 10 Table of Content Editor Absar Khan The President s Message 3 ISACA Karachi Chapter Partnered ITCN Asia 2015 (Flyer) 5 ISACA Karachi Chapter Partnered ITCN Asia 2015 (Report) 6 ISACA Book Store Update 10

More information

Marketplace Simulations Accessibility Conformance Report Based on Voluntary Product Accessibility Template (VPAT ) 1

Marketplace Simulations Accessibility Conformance Report Based on Voluntary Product Accessibility Template (VPAT ) 1 Marketplace Simulations Accessibility Conformance Report Based on Voluntary Product Accessibility Template (VPAT ) 1 Name of Product: Marketplace Simulations Date: September 20, 2017 Contact information:

More information

Report of the Nominating Committee

Report of the Nominating Committee Volume 8, 9 April 2014 Report of the Nominating Committee Slate of 2014-15 Board of Directors New NIST Cybersecurity Framework Features COBIT 5 in Its Core Parameters to Consider When Acquiring Software

More information

Understanding Security Metrics to Drive Business and Security Results

Understanding Security Metrics to Drive Business and Security Results Understanding Security Metrics to Drive Business and Security Results Jennifer Bayuk Professor, Systems Security Engineering Stevens Institute of Technology for NJ CISO Executive Summit May 4, 2009 1 Professor

More information

New Features Summary PowerDesigner 15.2

New Features Summary PowerDesigner 15.2 New Features Summary PowerDesigner 15.2 Windows DOCUMENT ID: DC10077-01-1520-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software

More information

CA Productivity Accelerator 12.1 and Later

CA Productivity Accelerator 12.1 and Later CA Productivity Accelerator 12.1 and Later Localize Content Localize Content Once you have created content in one language, you might want to translate it into one or more different languages. The Developer

More information

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance

More information

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Government of Ontario IT Standard (GO ITS)

Government of Ontario IT Standard (GO ITS) Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

EXPLORING COURSE TOOLS

EXPLORING COURSE TOOLS EXPLORING COURSE TOOLS Now that we have covered the My Blackboard screen, let s explore the different tools that you might find within your course. NOTE: Your instructor controls which tools are available.

More information

ISO/IEC TR TECHNICAL REPORT. Software and systems engineering Life cycle management Guidelines for process description

ISO/IEC TR TECHNICAL REPORT. Software and systems engineering Life cycle management Guidelines for process description TECHNICAL REPORT ISO/IEC TR 24774 First edition 2007-09-01 Software and systems engineering Life cycle management Guidelines for process description Ingénierie du logiciel et des systèmes Gestion du cycle

More information

R1 Test Case that tests this Requirement Comments Manage Users User Role Management

R1 Test Case that tests this Requirement Comments Manage Users User Role Management 2/19/2014 CDISC SHARE Requirements Page 1 of 23 Number Name Req ID Requirement Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage Users 2.1.1 User Role Manage

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

EXIN BCS SIAM TM Foundation Certification Training - Brochure

EXIN BCS SIAM TM Foundation Certification Training - Brochure EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version

More information

Object-Oriented Programming for Managers

Object-Oriented Programming for Managers 95-807 Object-Oriented Programming for Managers 12 units Prerequisites: 95-815 Programming Basics is required for students with little or no prior programming coursework or experience. (http://www.andrew.cmu.edu/course/95-815/)

More information

Management Update: Information Security Risk Best Practices

Management Update: Information Security Risk Best Practices IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine

More information

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

OPERATIONS SEAFARER CERTIFICATION STANDARD OF TRAINING & ASSESSMENT. Security Awareness STCW A-VI/6-1

OPERATIONS SEAFARER CERTIFICATION STANDARD OF TRAINING & ASSESSMENT. Security Awareness STCW A-VI/6-1 Document No. STA-06-601 Version No, Date 1.0 01/06/2018 Effective Date 01/07/2018 Compiled by Consultant, Senior Examiner Deck, QSS - Developer Approved by Chief Examiner Approval date 31/05/2018 OPERATIONS

More information

Cisa Certified Information Systems Auditor Study Guide 4th Edition

Cisa Certified Information Systems Auditor Study Guide 4th Edition Cisa Certified Information Systems Auditor Study Guide 4th Edition We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your

More information

Monitoring and Evaluation Tool

Monitoring and Evaluation Tool Monitoring and Evaluation Tool USER MANUAL March, 2014 www.menarid.icarda.org THIS PAGE LEFT EMPTY INTENTIONALLY USER MANUAL Definitions and abbreviations Chart... Graphical representation of M&E project

More information

Spring Education Conference. Securing the Organization (Ensuring Trustworthy Systems)

Spring Education Conference. Securing the Organization (Ensuring Trustworthy Systems) Spring Education Conference Securing the Organization (Ensuring Trustworthy Systems) Ken Vander Wal, CISA, CPA Past President, ISACA vandeke@gmail.com 1 2012-2013 Board of Directors International President

More information

Global Software, Inc.'s Distribution Manager User Manual. Release V12 R5 M1

Global Software, Inc.'s Distribution Manager User Manual. Release V12 R5 M1 Global Software, Inc.'s Distribution Manager User Manual Release V12 R5 M1 Worldwide Headquarters 3201 Beechleaf Court Raleigh, NC 27604 USA +1.919.872.7800 www.glbsoft.com EMEA Headquarters 500 Chiswick

More information