Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO10.10 - Project Quality Plan

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO10.10 - Project Quality Plan is contained within Process Popup Manage Projects.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
4 Members
0 Online
3124 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!


Project Quality Plan

Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally reviewed and agreed to by all parties concerned and then incorporated into the integrated project plan.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Alignment of the project quality plan with the corporate quality framework
  • Increased likelihood of the implemented system or system modification meeting business and user requirements
  • A consistent level of quality assurance activity across the project, including third parties
  Risk Drivers
  • Project deliverables failing to meet business and user requirements
  • Gaps in expected and delivered quality within the projects
  • Inefficient and fragmented approach to quality assurance
  • Implemented system or changes adversely impact existing systems and infrastructure

View Control Practices  help

Hide Control Practices  help

  1. Identify ownership and responsibilities, quality review processes, success criteria and performance metrics, to provide quality assurance for the project deliverables.
  2. Define any requirements for independent validation and verification of the quality of deliverables in the plan.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 111 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 104 days ago
Downloads
Posted by ISACA 23 days ago
Downloads
Posted by ISACA 23 days ago
Research
Posted by ISACA 23 days ago
Books
Posted by ISACA 24 days ago

Events & Online Learning: 13 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.

Journal Articles: 264 total

Volume 4, 2014
by Robert E Stroud, CGEIT, CRISC
Get to know your network.
Volume 4, 2014
by Viktor Polic, Ph.D., CISA, CRISC, CISSP
Information security vendors have recognized the need to optimize the process of managing ethical hacking projects with the goal to reduce their costs.
Volume 3, 2014
by Benjamin Power, CISA, CPA
It is critical that IS audit and control professionals know how to write a good risk statement that is impactful and aligned to better practice.
Volume 3, 2014
by Rosemary M. Amato, CISA, CMA, CPA, CSSGB
Get to know your network.
Volume 3, 2014
by Tommie Singleton, CISA, CGEIT, CPA
The need for consideration of IT in internal and external audits seems intuitively obvious.
Volume 3, 2014
by Fatih Altinel, CISA and Yeliz Kilinc
Before 1999, the regulation and supervision of the banking system in Turkey had a fragmented structure in which the Undersecretariat of Treasury and the Central Bank of the Republic of Turkey were the main actors.

Wikis: 2 total

Blog Posts: 97 total

19 Jun 2014
Posted By : masarker | 2 comments
There is an organizational mandate to log some risks in the project plan. When that status review is called for, you are asked about that pesky risk tracker. You have an excel sheet which lists some risks because you are supposed to do so. Most of the tim...
Posted By : Balamukund Sripathi | 0 comments
As an IT-security specialist i read a lot of standards, guides, frameworks and drafts on all matters of information security. When the EU Data Protection Regulation draft was first published in January 2012, i was eager to see what visions the EU h...
Posted By : Gaffri | 0 comments
In business the information security is the most important factor of operations stability. Prevents data loss , ensures companies data classified or not , to remain intact. Security Officers should establish company policies , procedures etc.. in orde...
Posted By : Constantinos297 | 0 comments
22 Mar 2014
SGSI Risk Management in LATAM-Argentina
Posted By : GMB_Gustavo Blanco | 0 comments
19 Mar 2014
At a recent IT event a show of hands was used to provide theback drop for how change is a consistently evolving event. How many of youbelieve that the number one enterprise Network security Threat is external Hacking?Fifty percent of the room. Ok, how man...
Posted By : Jamie L Yancy | 0 comments