Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Governance of Enterprise IT

Welcome to the Governance of Enterprise IT topic!

Collaborate, contribute, consume and create knowledge around IT governance in topics such as implementations, acquisitions, IT transformation and portfolio management.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1224 Members
0 Online
12655 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 104 total

Must be a Topic member to contribute
View All »
With so much interest in Cyber Security, organizations are focused on perimeter security such as strong firewalls and educating staff about phishing emails. But I continue to read and hear about internal threats. There is also a lot of interest in Big Dat...
david ho | 5/30/2017 9:37:06 AM | COMMENTS(1)
Hi all, Our organization has recently taken on formalizing a 3rd party risk program. This includes in scope Vendor Management/Supplier Governance. Currently, the organization makes purchases for technology, partnerships, etc. and our concern are around...
Chris860 | 4/6/2017 12:42:14 PM | COMMENTS(3)
I'm in the process of helping an organization select an IT governance framework. What would you say the one thing that makes COBIT better than other governance frameworks?
david ho | 2/22/2017 9:43:31 AM | COMMENTS(5)
How communication between IT AND Business will minimize failed initiatives and control raising of IT COST
Feroz349 | 2/18/2017 5:30:59 AM | COMMENTS(0)
What are the components GEIT framework
Feroz349 | 2/17/2017 3:39:36 AM | COMMENTS(0)
Before IT GOVERNANCE is implemented, is it must to have enterprise governance
Feroz349 | 2/16/2017 2:29:29 AM | COMMENTS(2)

Documents & Publications: 151 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1226 days ago
Downloads
Posted by FarmService 2311 days ago
Books
Posted by ISACA 529 days ago
Books
Posted by ISACA 581 days ago
Books
Posted by ISACA 644 days ago

Events & Online Learning: 11 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 94 total

Volume 4, 2017
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001
The Emirates National Oil Company embarked on an initiative to realize value out of IT assets through Information Technology Infrastructure Library (ITIL) process implementation.
Volume 4, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 2, 2017
by Trevor J. Dildy, CCNA
Today’s enterprises have solutions in place to help with the detection and management of their information systems vulnerabilities, especially as it relates to system software and firmware.
Volume 2, 2017
by Ed Gelbstein, Ph.D., 1940-2015
This column presents the questions that would provide enough information to get started and the subsequent steps to come up with a realistic audit plan that adds value to the organization.

Wikis: 3 total

Blog Posts: 103 total

Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments
Seguro que todos hemos oído en los últimos meses noticiassobre ataques cibernéticos y el impacto que los mismos han tenido en diferentesindustrias y empresas. El último de ellos denominado “WannaCry” ha sidoconsiderado como uno de los mayores ataques info...
Posted By : Rene372 | 0 comments
Lately I have received a number of questions and concerns around NIST 800-171 so I wanted to write a quick brief on what you need to know.What is NIST 800-171?This is a special publication released by the National Institute of Standards and Technology (NI...
Posted By : Justin238 | 1 comments
Ransomware is a form of malware and is engineered to infect your personal computer and restrict access in some way, while demanding payment or ransom  to remove the restriction. First identified in 1989  under the name of PC Cyborg, today there are over 2...
Posted By : Robert658 | 1 comments
30 Mar 2017
When you think about your company information security, a greatest image come into your mind: * if my storage device crashed;* if my flashcopy in other storage device crashed too;* if my backup tape was in flame;* if my archive data was missed;* if my sec...
Posted By : MGPlay | 0 comments
Manejo de TI interno. El tener toda la estructura de TI internamente, sin subcontrataciones, puede dar una acumulación de problemas difíciles de manejar para una sola organización.Asociaciones con contrapartes. Al trabajar en un proyecto conjunto con una...
Posted By : Gladys789 | 0 comments