Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Governance of Enterprise IT

Welcome to the Governance of Enterprise IT topic!

Collaborate, contribute, consume and create knowledge around IT governance in topics such as implementations, acquisitions, IT transformation and portfolio management.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1233 Members
0 Online
12718 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 104 total

Must be a Topic member to contribute
View All »
I'm in the process of helping an organization select an IT governance framework. What would you say the one thing that makes COBIT better than other governance frameworks?
david ho | 8/21/2017 12:43:55 PM | COMMENTS(6)
With so much interest in Cyber Security, organizations are focused on perimeter security such as strong firewalls and educating staff about phishing emails. But I continue to read and hear about internal threats. There is also a lot of interest in Big Dat...
david ho | 5/30/2017 9:37:06 AM | COMMENTS(1)
Hi all, Our organization has recently taken on formalizing a 3rd party risk program. This includes in scope Vendor Management/Supplier Governance. Currently, the organization makes purchases for technology, partnerships, etc. and our concern are around...
Chris860 | 4/6/2017 12:42:14 PM | COMMENTS(3)
How communication between IT AND Business will minimize failed initiatives and control raising of IT COST
Feroz349 | 2/18/2017 5:30:59 AM | COMMENTS(0)
What are the components GEIT framework
Feroz349 | 2/17/2017 3:39:36 AM | COMMENTS(0)
Before IT GOVERNANCE is implemented, is it must to have enterprise governance
Feroz349 | 2/16/2017 2:29:29 AM | COMMENTS(2)

Documents & Publications: 151 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1261 days ago
Downloads
Posted by FarmService 2346 days ago
Books
Posted by ISACA 564 days ago
Books
Posted by ISACA 616 days ago
Books
Posted by ISACA 679 days ago

Events & Online Learning: 10 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 97 total

Volume 5, 2017
by T. Sean Kelly
Certain steps can be taken to build a strong respect for and practice of security into the cultural fabric of any organization, across all departments and areas of the business.
Volume 5, 2017
by Noman Sultan, Ph.D., CISM, CGEIT, CITP
It is extremely important that organizations invest in their leadership capabilities because leaders play an integral role in motivating, inspiring and influencing talent management.
Volume 4, 2017
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001
The Emirates National Oil Company embarked on an initiative to realize value out of IT assets through Information Technology Infrastructure Library (ITIL) process implementation.
Volume 4, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.
Volume 4, 2017
by Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL Expert
The trustworthiness of various risk assessment methods in pursuit of risk-based decisions is largely questioned in the marketplace.

Wikis: 3 total

Blog Posts: 105 total

With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments
ProposalI will come straight to the point, every country is now connected to the Internet Of The Thing available to public to access to their personal data, order stuffs, book tickets, book hotel, open bank account, view personal account and play around o...
Posted By : SHAMU2015 | 0 comments
24 Aug 2017
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools exist...
Posted By : ramoncod | 0 comments
Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments
Seguro que todos hemos oído en los últimos meses noticiassobre ataques cibernéticos y el impacto que los mismos han tenido en diferentesindustrias y empresas. El último de ellos denominado “WannaCry” ha sidoconsiderado como uno de los mayores ataques info...
Posted By : Rene372 | 0 comments
Lately I have received a number of questions and concerns around NIST 800-171 so I wanted to write a quick brief on what you need to know.What is NIST 800-171?This is a special publication released by the National Institute of Standards and Technology (NI...
Posted By : Justin238 | 1 comments