Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Value Delivery

Welcome to the Value Delivery topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
211 Members
1 Online
5511 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 21 total

Must be a Topic member to contribute
View All »
I share with our group a publication in the blog of Joanne De Palma: "How to create a GEIT That system delivers value". I will be expectant about your comments. Thanks, http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=505&cid=sm_1107286...
Romulo Lomparte | 1/3/2016 4:25:40 AM | COMMENTS(2)
Here is a great article discussing the five types of value to services: http://www.3cs.ch/is_service_value_really_delivered/
Phil Green | 12/30/2015 7:48:33 AM | COMMENTS(0)
Hello every body  I hope that you are all fine, happy and strong I have a question regarding the business case as a document I had ask in the intreview questions for a study: Weather any changes happened to the cost, time, risk, benefits, etc of the IT p...
Hanan292 | 12/30/2015 4:05:53 AM | COMMENTS(1)
Looking to collaborate and share experiences applying Val IT Framework (and other standards/best practices) in medium/large hospital networks whose portfolio included enterprise level initiatives such as DSRIP, EMR, ERP and other large scale programs aime...
Joe Gallo | 10/20/2015 9:23:47 PM | COMMENTS(0)
Can any one help in finding relation among value delivery,Value Creation, Value Realization, Value Management practices, Val IT I had read some but still didnt get good understanding: first Value creation it is mentioned in COBIT: "realizing benifit at an...
Hanan292 | 7/26/2015 1:20:29 AM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:33:43 AM | COMMENTS(0)

Documents & Publications: 42 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 669 days ago
Downloads
Posted by ISACA 1754 days ago
Books
Posted by ISACA 87 days ago
Books
Posted by ISACA 370 days ago

Events & Online Learning: 2 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 18 total

Volume 4, 2015
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., and Wim Van Grembergen, Ph.D.
This article presents some key results of a recent international study on how organizations are adopting GEIT using COBIT 5 and whether these adoptions deliver enterprise value to these organizations.
Volume 2, 2015
by Manas Tripathi and Arunabha Mukhopadhyay, Ph.D.
Enterprise resource planning (ERP) aims to enhance business productivity, quality and efficiency by integrating operations and processes.
Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 6, 2013
by Frank Bezzina, Ph.D., Pascal Lélé, Ph.D., Ronald Zhao, Ph.D., Simon Grima, Ph.D., Robert W. Klein, Ph.D. and Martin Hellmich, Ph.D.
IT-directed IRM adds value to risk management by strengthening internal controls and audit processes.
Volume 5, 2013
by Andrej Volchkov
Establishing a method for measuring or monitoring security is a necessity in order to meet the demands for justifying an organization’s security investments.
Volume 2, 2013
by Rajesh Bhatia, CISA, CGEIT, PMP, MDP
This article discusses the benefits of using the framework of the five IT governance focus areas.

Wikis: 2 total

Blog Posts: 29 total

Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 1 comments
Yes! Here I like to share my story about how I start my journey to become CISA, that I heard firstly from my CEO Mr. Amien Sunaryadi CISA, He suggest that all the Internal Audit Staff and Manager in our company (SKK Migas) to get this certification. The...
Posted By : Fitra238 | 0 comments
Information Security Managers (ISMs) are task with providing security oversight in defending organisations data, systems and building Infrastructures it depends on for making profit, against threats, risks and vulnerabilities such as cyber attacks from th...
Posted By : Prince143 | 0 comments
I am currently recruiting for a Senior IT Auditor - Financial Services , to join the team in Paddington. If you’re a CISA qualified Auditor and keen to travel internationally, please click on the link below. NO AGENCIES https://vodafone.taleo.net/caree...
Posted By : Stephen913 | 0 comments
ENISA's CCSL - the Cloud Certification Schemes List should gain transparency and clarity under the European Cloud Strategy Key Action Nr. 1 "Cutting through the jungle of standards". Is it helpful for the Cloud Users/Customers as well as for the Cloud Pro...
Posted By : Kresimir_Kristic | 1 comments
Many a times we encounter situations where we find that certain Information Security Policy requirements and considerations are not in line with the Global Security Best Practices and they actually are not in-line with the Global Standards to that effect....
Posted By : Mayank | 0 comments