Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO10.10 - Project Quality Plan

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO10.10 - Project Quality Plan is contained within Process Popup Manage Projects.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
4 Members
0 Online
3409 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Project Quality Plan

Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally reviewed and agreed to by all parties concerned and then incorporated into the integrated project plan.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Alignment of the project quality plan with the corporate quality framework
  • Increased likelihood of the implemented system or system modification meeting business and user requirements
  • A consistent level of quality assurance activity across the project, including third parties
  Risk Drivers
  • Project deliverables failing to meet business and user requirements
  • Gaps in expected and delivered quality within the projects
  • Inefficient and fragmented approach to quality assurance
  • Implemented system or changes adversely impact existing systems and infrastructure

View Control Practices  help

Hide Control Practices  help

  1. Identify ownership and responsibilities, quality review processes, success criteria and performance metrics, to provide quality assurance for the project deliverables.
  2. Define any requirements for independent validation and verification of the quality of deliverables in the plan.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 105 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 390 days ago
Books
Posted by ISACA 22 days ago
Books
Posted by ISACA 81 days ago

Events & Online Learning: 14 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 288 total

Volume 2, 2015
by Rich Karlgaard | Reviewed by Dino Ippoliti, CISA, CISM
The soft edge is composed of five pillars and each of them is analyzed in a dedicated chapter that guides readers to answer crucial questions.
Volume 2, 2015
by David Vohradsky, CGEIT, CRISC
With increases in the regulatory regime, increasing technology complexity and pressures on cost, organisations are seeking productivity improvements in the evaluation of the performance of internal controls.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 2, 2015
by Fredric Greene, CISSP
Selected processes from the COBIT 5 framework can improve the effectiveness of enterprise security in an organization.
Volume 2, 2015
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
Information security events that affect cloud systems are occurring with no end in sight, so it should be no surprise that the cloud should be treated as a nonsecure environment with numerous threats and concerns.
Volume 2, 2015
by Vasant Raval, DBA, CISA, ACMA
While entrepreneurship has always been a key segment of the economy, there has been a huge surge in this sector since the 1990s.

Wikis: 2 total

Blog Posts: 74 total

Recently, I participated in the First Annual Conference of ICT SECURITY WORLD held on Wednesday, March 4, 2015 at the National Centre for Public Administration and Local Government in Tavros, Athens. The presence of ISACA Athens Chapter was a pleasant sur...
Posted By : Konstantinos741 | 0 comments
29 Mar 2015
As I interview IA professionals I get the feeling that as organizations move toward the adoption of the big-data fueled decision-making paradigm senior decision makers are focusing on the implications of big-data as it pertains to their locust of control....
Posted By : Ben Apple | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
It is Friday morning, the week before Christmas and all through Parliament House, not a creature was stirring, not even a mouse.  Well not quite, but the Parliamentary Triangle has taken a relaxed and ...
Posted By : Rob Hanson | 1 comments
If you are still using excel for your governance, risk and compliance Maclear eGRC SuiteTM have put together a whitepaper to help you understand the benefits of automation and what to look for when selecting your solution. IT GRC Whitepaper includes: 1...
Posted By : SHAMU2015 | 0 comments