Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO10.10 - Project Quality Plan

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO10.10 - Project Quality Plan is contained within Process Popup Manage Projects.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

This Topic Has:
4 Members
0 Online
3605 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

Project Quality Plan

Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally reviewed and agreed to by all parties concerned and then incorporated into the integrated project plan.

View value and Risk Drivers  help

Hide value and Risk Drivers help

Value Drivers

  • Alignment of the project quality plan with the corporate quality framework
  • Increased likelihood of the implemented system or system modification meeting business and user requirements
  • A consistent level of quality assurance activity across the project, including third parties
  Risk Drivers
  • Project deliverables failing to meet business and user requirements
  • Gaps in expected and delivered quality within the projects
  • Inefficient and fragmented approach to quality assurance
  • Implemented system or changes adversely impact existing systems and infrastructure

View Control Practices  help

Hide Control Practices  help

  1. Identify ownership and responsibilities, quality review processes, success criteria and performance metrics, to provide quality assurance for the project deliverables.
  2. Define any requirements for independent validation and verification of the quality of deliverables in the plan.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 105 total

Must be a Topic member to contribute
View All »
Posted by ISACA 553 days ago
Posted by ISACA 185 days ago

Events & Online Learning: 15 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 298 total

Volume 5, 2015
by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE
Cyberinsurance is a way to account for cyberrisk and considers the new possible business responsibilities arising from operating in an international context.
Volume 5, 2015
by Michele Mosca, Ph.D.
In the Information Age, many of one’s most valuable belongings—finances, medical histories and, to a large extent, identities—are kept safe behind digital deadbolts.
Volume 5, 2015
by Steven J. Ross, CISA, CISSP, MBCP
If you think of cyberattacks as war, which it is in both the figurative and literal senses, make yourself ready to win it.
Volume 5, 2015
by Ganapathi Subramaniam
How do I ensure that my organization has controls to protect itself from cyberrisk?
Volume 5, 2015
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
Current cyber-related controls and strategies are not acceptable—cybercriminals are getting rich from the hard work of others and the lack of a united cybersecurity front on everyone’s part.
Volume 4, 2015
by Dipti Patel, CISA, CISM, ISO 27001 LA, ITIL V3
Vendor risk management is the next step to elevate information security from a technical control process to an effective management process.

Wikis: 2 total

Blog Posts: 82 total

It is interesting to note that the Government of India's Department of Engineering and Information Technology has issued National Encryption Policy for public comment.  And today the first addendum for the same has been issued for the people to refer to. ...
Posted By : Mayank | 0 comments
Information Security and IT operations generally do not go hand in hand or I rather make a not so controversial statement that IT Operations Folks generally don't like Information Security Folks for they see the Information security folks to be the Show S...
Posted By : Mayank | 0 comments
One thing I learned early on in dealing with IT security issues at a small financial institution is that some of the client's vendors and service providers actually resort to lying as a way of dodging performing such tasks as patching servers, paying for ...
Posted By : Guy399 | 0 comments
Throughout my career I have experienced various “philosophies” in planning and design of IT projects. Some choose the fire fighter philosophy, while others choose the “agile as an excuse for insufficient design”. On the other end of the scale I have found...
Posted By : John410 | 0 comments
Last weekend over dinner at one of my friend’s place, who isa Mergers & Acquisitions “M&A” Partner with a consulting firm; asked mehow would I assess the cyber security related risk of a target acquisition? Thequestion is very relevant in this day and age...
Posted By : Jitendra054 | 0 comments
There are many ways to conduct an audit of the Business Continuity Program (BCP). However, all of them must revolve around 3 key BCP areas, which are: Business Continuity (BC)Disaster Recovery (DR)Crisis Management (CM)These three categories form the basi...
Posted By : Aleksandr754 | 0 comments