@ISACA Volume 8: 9 April 2014 

@ISACA Relevant, Timely News

Report of the Nominating Committee
By Emil D’Angelo, CISA, CISM, Nominating Committee Chair

The charge of the ISACA Nominating Committee, as described in sections 7.02 and 9.01 of the ISACA bylaws, is to prepare a slate of candidates for the ISACA Board of Directors, consisting of an international president and up to 7 vice presidents, for review by the association membership. The Nominating Committee is chaired by a past international president of ISACA, and its members include 2 additional past international presidents and 4 other members with significant ISACA experience and diverse geographic representation.

The committee takes very seriously its obligation to prepare the best possible slate of individuals who will work together as a team to lead the association. Its evaluation of candidates takes into account their intent to reflect the organization’s diversity in terms of geography, skills, experience and other relevant factors, while also balancing continuity and new viewpoints.

The selection process is managed with attention to detail. Deadlines are strictly adhered to, nominations are treated with unbiased consideration, candidates are interviewed and strict confidentiality is maintained throughout the process. The Governance Advisory Council (GAC) provides oversight to the committee’s processes and the committee reports to the Board of Directors and the membership of ISACA.

The 2013-2014 Nominating Committee is pleased to present the slate for the 2014-2015 ISACA Board of Directors. As chair of the committee, I affirm that the committee’s deliberations were carried out in accordance with the bylaws and good governance principles.

2013-2014 Nominating Committee Members:

  • Emil D’Angelo, CISA, CISM, USA, chair (past international president)
  • Ken Vander Wal, CISA, CPA, USA (past international president)
  • Greg Grocholski, CISA, USA (past international president)
  • John Ho Chi, CISA, CISM, CRISC, CBCP, MBCP, Singapore
  • Alex Zapata, CISA, CGEIT, CRISC, PMP, ITIL, Mexico
  • Urs Fischer, CISA, CRISC, CIA, CPA, Switzerland
  • Glen McMurtrie, CISA, CBM, CFE, Australia


Slate of 2014-2015 Board of Directors

ISACA will hold its Annual Meeting of the Membership on 13 June 2014, at the Swissotel Hotel in Chicago, Illinois, USA, where it will install the 2014-2015 Board of Directors. In accordance with the association’s bylaws, the Nominating Committee submits the following slate as the proposed 2014-2015 Board of Directors:

  • Robert Stroud, CGEIT, CRISC, international president
  • James Ambrosini, CISA, CRISC, CFE, CISSP, CRMA, vice president
  • Steven Babb, CGEIT, CRISC, ITIL, vice president
  • Garry Barnes, CISA, CISM, CGEIT, CRISC, vice president
  • Rob Clyde, CISM, vice president
  • Ramses Gallego, CISM, CGEIT, CISSP, SCPM, Six Sigma Black Belt, vice president
  • Theresa Grafenstine, CISA, CGEIT, CRISC, CPA, CIA, CGAP, CGMA, vice president
  • Vittal Raj, CISA, CISM, CGEIT, CRISC, CIA, CISSP, CFE, FCA, vice president
  • Greg Grocholski, CISA, past international president
  • Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, past international president

The bylaws grant the international president the authority to augment the board by a limited number of appointments, if desired. Stroud has proposed the appointment of the following individuals to serve as directors on the 2014-15 Board of Directors, subject to approval by the board: Frank Yam, CISA, CIA, FHKCS, FHKIoD; Debbie Lew, CISA, CRISC; and Alex Zapata, CISA CGEIT, CRISC, ITIL, PMP.

Included on the agenda of the Annual Meeting of the Membership will be the president’s annual report, the treasurer’s report, ratification of significant board actions from the 2013-2014 administrative year and comments from the international president.

All ISACA members are invited to attend the Annual Meeting of the Membership.


New NIST Cybersecurity Framework Features COBIT 5 in Its Core

COBIT 5 was selected as an informative reference in the core of the US Cybersecurity Framework, which was issued by the US National Institute of Standards and Technology (NIST) in February and is aimed at helping improve the cybersecurity of critical infrastructure operators and other businesses. COBIT was seen as helping align policy, business and technology.

ISACA assisted in the development of the framework by participating in all of the NIST development workshops to really understand the new framework and its potential impact on critical infrastructure organizations and ISACA members around the world. COBIT was considered by NIST workshop attendees to be a solid, globally accepted and applicable source for inclusion in the cybersecurity framework.

To begin the process of awareness and adoption of the US Cybersecurity Framework, NIST will give a presentation on the framework at ISACA’s 2014 North America Computer Audit, Control and Security (CACS) Conference in April. ISACA will also release implementation guidance related to the framework later this year.

The NIST framework and additional cybersecurity information can be found on the Cybersecurity Resources page of the ISACA web site.


Parameters to Consider When Acquiring Software

Organizations acquiring software are grappling with increased complexity in their processes. Many factors serve to complicate software delivery, but competition lies at the heart of this complexity. Organizations expect more from the software components, particularly the ability to accommodate rapidly changing requirements. In the IT space, more businesses rely on their operational software for capturing and providing value to their customers and lines of businesses.

Acquiring application software has become a standard process in the systems development life cycle (SDLC). Most organizations have defined and implemented frameworks for selecting and finalizing application software. Generally, these frameworks use known attributes of the software while considering their various applications. The most common criteria used when making acquisition decisions are:

  • Benefits (value) realization from the application
  • Weighted functional requirement analysis to compare various applications available in the market. All functional requirements may not be available in generic or configurable applications. Decision makers try to minimize the functional gaps.
  • Availability of internal development and testing skills. In the era of outsourcing, many organizations may not have sufficient skilled resources.
  • Technical and operational efforts required to implement solutions. Technical attributes include database management systems, systems architecture (e.g., operating system, middleware), programming languages and security. Operational attributes include the need for data conversion, configuration and customization efforts.
  • Training requirements and learning curves for users
  • Software monitoring and support based on availability and contract cost
  • User acceptance

Of these attributes, benefits realization and functional requirements are considered priorities with higher score points as compared to the other factors, including user acceptance. But the fact remains, if users are not comfortable with the solution, the solution may not realize desired benefits. This problem can be handled using one or more of the following actions:

  1. Compromise some noncritical functional requirements against user comfort.
  2. If possible, conduct proof-of-concept by coordinating with the software vendor, which will help in getting feedback from end users.
  3. Provide sufficient time for managing change in order to achieve end user comfort.

Sunil Bakshi, CISA, CISM, CGEIT, CRISC, AMIIB, ABCI, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP, is a consultant and trainer in IT governance and information security.


Stay Certified—Renew Your Certifications

Do not jeopardize your hard-earned certification. Certification renewals for 2014 are still underway and if you have not yet renewed, please do so immediately. Renewing your certification is a 2-step process:

  1. Pay the annual certification maintenance fee. Visit the Renewal page of the ISACA web site and follow the prompts to make your annual maintenance fee payment.
  2. Report the required continuing professional education (CPE) hours for 2013 on the Report CPE page. CPE can be reported individually by each activity or in a single total for the year. Once logged in, you will be redirected to the myCertifications page. From there, click on the Report Now button or the Manage My CPE button, scroll down and select Add CPE. If reporting CPE as a single total, select Summary CPE—Qualifying Activity Not Specified. Click on the help button (the blue question mark) for information on qualifying activities.

The CPE policy requires you to earn 120 CPE hours over a 3-year period with a minimum of 20 CPE hours each year. Please remember that some qualifying activities have limits as to the amount of CPE that you can claim for that particular qualifying activity:

  • Vendor sales/marketing presentations: Annual limit of 10 CPE hours
  • Mentoring: Annual limit of 10 CPE hours
  • Volunteering on ISACA boards/committees: Annual limit of 20 CPE hours
  • Contributions to the IS audit, security, risk and control and IT governance profession: Annual limit of 20 CPE hours

When reporting hours for activities that have limits, the system will not allow you to enter more hours than the CPE limit. Additional information on reporting CPE hours can be found on the CISA, CISM, CGEIT and CRISC Certification Maintenance pages of the ISACA web site. Questions? Contact certification@isaca.org.


Highlight Your Experience With an Inviting Profile

Participating in ISACA’s Knowledge Center community has many benefits, including the ability to collaborate and network with others. But to make the most of your online experience, a completed public profile is a must. Your public profile represents you and serves as a way you can connect with other ISACA members and constituents around the globe. Other members are more likely to connect with you when they see that you have similar interests. Once connected, you can communicate with members using the private message system on the ISACA web site. By enhancing your engagement, you increase your awareness of emerging trends and are exposed to the different methods and viewpoints of members who share your interests.

If you are not comfortable sharing much about yourself, start simply by adding a picture and displaying your current title. To change your profile information and privacy, go to myProfile in the My ISACA tab. From the myProfile page, the box on the right allows you to edit your profile and change your privacy settings.

Profile Privacy Settings

You can choose what you would like others to see on your profile from Edit My Privacy Settings. Choosing My Colleagues allows only your connections to view that portion of your profile.

Edit My Privacy Settings

Once you hit Submit, you will be taken back to your myProfile page, from which you can view your public profile and see exactly how your profile looks to other members.

myProfile Page

Make the most of your Knowledge Center community involvement by creating a personal profile and connecting with your colleagues.


New COBIT Resources on Vendor Management and COSO

ISACA has issued the following new publications:

  • Vendor Management: Using COBIT 5—This publication, available as a complimentary PDF for members, describes the vendor management process and its activities and then presents the most common threats, risk factors and mitigation actions. A detailed case study is provided to show the potential consequences of faulty vendor management. Practical sample templates and checklists are also provided to help during implementation of the concepts presented. Practical guidance is provided for all stakeholders involved in the vendor management process, from the board and c-level executives (e.g., chief executive officer [CEO], chief financial officer [CFO]), to business professionals, supporting functions (e.g., compliance, legal, risk, procurement) and IT.
  • Relating the COSO Internal Control—Integrated Framework and COBIT—This white paper uses the refreshed and updated COSO Internal Control—Integrated Framework as its base structure and examines how the relevant components and content of COBIT 5 and its supporting guidance deliverables relate to the COSO framework. Through the efforts of many, including ISACA, the refreshed COSO framework places much stronger emphasis on the importance of information technology. The purpose of this white paper is to highlight areas of alignment and differences between the content of the two frameworks. Relating the COSO Internal Control—Integrated Framework and COBIT will also help enterprises that are using the COSO framework by presenting the relationship between the COSO framework guidance and the COBIT 5 framework guidance.

Information on current research projects is posted on the Current Projects page of the ISACA web site.


Read More Articles in Our Archives