Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Governance of Enterprise IT

Welcome to the Governance of Enterprise IT topic!

Collaborate, contribute, consume and create knowledge around IT governance in topics such as implementations, acquisitions, IT transformation and portfolio management.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1186 Members
0 Online
12318 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 102 total

Must be a Topic member to contribute
View All »
I'm in the process of helping an organization select an IT governance framework. What would you say the one thing that makes COBIT better than other governance frameworks?
david ho | 2/22/2017 9:43:31 AM | COMMENTS(5)
How communication between IT AND Business will minimize failed initiatives and control raising of IT COST
Feroz349 | 2/18/2017 5:30:59 AM | COMMENTS(0)
What are the components GEIT framework
Feroz349 | 2/17/2017 3:39:36 AM | COMMENTS(0)
Before IT GOVERNANCE is implemented, is it must to have enterprise governance
Feroz349 | 2/16/2017 2:29:29 AM | COMMENTS(2)
How to identify the requirements and objectives for the governance of enterprise IT , PLEASE elaborate with examples
Feroz349 | 2/15/2017 2:45:07 PM | COMMENTS(1)
Why enterprise governance issues canot be solved without considering IT
Feroz349 | 2/15/2017 2:18:31 PM | COMMENTS(0)

Documents & Publications: 155 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1080 days ago
Posted by ISACA 2165 days ago
Posted by ISACA 383 days ago
Posted by ISACA 435 days ago
Posted by ISACA 498 days ago

Events & Online Learning: 8 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA
31 Jul 2017
ISACA International Event
Chicago, IL, USA

Journal Articles: 88 total

Volume 1, 2017
by Graciela Braga, CGEIT, COBIT Foundation, CPA
When discussing the impact of IT on cities, some questions arise: How have cities been transformed by IT? Can this transformation be measured? What are the benefits and risk factors of the transformation?
Volume 1, 2017
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application
Volume 1, 2017
by Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold and Stefan Hartung
The average total cost of a data breach is about US $4 million, whereas the average cost for a stolen record increased slightly from US $154 in 2015 to US $158 in 2016.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.
Volume 6, 2016
by Ed Gelbstein, Ph.D., 1940-2015
In my early days as a practitioner, the use of computers was referred to as data processing and electronic data processing (EDP), and this covered primarily batch processing of inventory, banking transactions and billing for utility services.
Volume 6, 2016
by Gary Roboff
Thought leaders have long recognized that strong leadership and ethical culture are foundational building blocks of enterprises with top-performing risk management programs.

Wikis: 3 total

Blog Posts: 100 total

Manejo de TI interno. El tener toda la estructura de TI internamente, sin subcontrataciones, puede dar una acumulación de problemas difíciles de manejar para una sola organización.Asociaciones con contrapartes. Al trabajar en un proyecto conjunto con una...
Posted By : Gladys789 | 0 comments
La razón de que varias páginas y servicios soportados por la nube de Amazon Web Services –entre ellos Netflix y Spotify- presentarán fallas el martes pasado se debió a un error humano, aseguró la compañía. El reporte de Amazon apuntaba que servidores S3 e...
Posted By : Rene372 | 0 comments
The DoT (Department of Telecommunications) in India has enforced the telecom operators holding license(s) to ensure that they comply to security amendment dated 31st May 2011, likewise Ofcom in UK and other nations has got regulatory compliance for teleco...
Posted By : rasoolirfan | 0 comments
Dear All I am working on Information security risk assessment framework which helps to reduce the subjectivity in the risk assessment process. (Subjective risk assessment is the one which is based on the risk parameters having values 1 to 5 or 1 to 3. and...
Posted By : Muhammad Irfan Bashir | 0 comments
Cyber Security Program the way I have often observed in various organization over the years, is lead with piecemeal approach. There is no holistic view or review of the same and the Cyber Security team, often to be counted on fingers, is left to fend the...
Posted By : Mayank | 0 comments
This is a suggestion for Central,State Governments & Local Government Bodies such as Municipalities to issueShare Capital and the shares to be traded on Stock Exchanges.The purpose is to have an online,independent measure of performance of the Government ...
Posted By : Vivek Mathker | 0 comments