Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO5.2 - Prioritisation Within IT Budget

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO5.2 - Prioritisation Within IT Budget is contained within Process Popup Manage the IT Investment

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
4 Members
0 Online
3820 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Prioritisation Within IT Budget

Implement a decision-making process to prioritise the allocation of IT resources for operations, projects and maintenance to maximise IT’s contribution to optimising the return on the enterprise’s portfolio of IT-enabled investment programmes and other IT services and assets.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Priorities that reflect IT goals and requirements of the business and are transparent to all stakeholders
  • Focused use of resources
  • Appropriate decision making, balancing cost, continuous improvement, quality and readiness for the future
  Risk Drivers
  • Inefficient resource management
  • Inability to optimise goals and objectives
  • Confusion, demotivation and loss of agility due to unclear priorities
  • IT budget not in line with the IT strategy and investment decisions

View Control Practices  help

Hide Control Practices  help

  1. Create a process and establish a decision-making body for the prioritisation of IT initiatives and related resources within the high-level budget envelopes for IT-enabled investment programmes, IT services and IT assets as established by the strategic and tactical plans and maintained by portfolio decisions.
  2. Create and use procedures to rank all IT initiatives within portfolios based on the business cases and strategic and tactical plans, and establish procedures to determine budget allocations and cut-off based on the envelopes received. Establish the procedure to communicate budget decisions and review them with the detailed IT budget holders.
  3. Identify, communicate and resolve significant impacts of budget decisions on business cases, portfolios and strategy plans, e.g., when budgets are not aligned with strategic objectives or when budget allocations significantly impact the business case objectives.
  4. Obtain ratification from the executive committee for the overall IT budget changes that negatively impact the entity’s strategic or tactical plans and suggested actions to resolve these impacts.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 75 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1264 days ago
Downloads
Posted by ISACA 1274 days ago
Downloads
Posted by FarmService 2349 days ago
Books
Posted by ISACA 567 days ago
Books
Posted by ISACA 672 days ago

Events & Online Learning: 21 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 220 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 5, 2017
by Michael Werneburg, CIA, PMP
Service organizations with a bespoke application in a regulated industry have special challenges in addressing application vulnerabilities.
Volume 5, 2017
by Filip Caron, Ph.D.
Blockchain technology, commonly expected to drive the next wave of digital infrastructure and process innovation, is rapidly developing into maturity.
Volume 5, 2017
by Hari Mukundhan, CISA, CISSP
This is an age in which machine-to-machine communication is expanding significantly, creating new types of cyberrisk or exacerbating existing risk, thus impacting not only privacy and wealth, but also human safety.
Volume 4, 2017
by Vimal Mani, CISA, CISM, Six Sigma Black Belt
Blockchain is a distributed database that maintains a continuously growing list of records called blocks that are secured from any kind of tampering and revision efforts.

Wikis: 2 total

Blog Posts: 138 total

With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments
ProposalI will come straight to the point, every country is now connected to the Internet Of The Thing available to public to access to their personal data, order stuffs, book tickets, book hotel, open bank account, view personal account and play around o...
Posted By : SHAMU2015 | 0 comments
24 Aug 2017
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools exist...
Posted By : ramoncod | 0 comments
Few days ago the person behind the Hacking Team hack revealed how he did it in pastebin - (the original in Spanish) https://pastebin.com/raw/GPSHF04A I was very keen to understand how good you need to be to hack back one of the most (in)famous hacki...
Posted By : TiagoRosado | 0 comments
9 Aug 2017
How, where, and when can IT innovate even in anapparent non-innovation culture?Innovationcan be a broad concept whose definition for a specific company, department orpractitioner is based very much upon context. Organization mission, culture,size, revenue...
Posted By : Richard521 | 0 comments
Realizar tareas de educación y concienciación para el usuario final es vital, teniendo en cuenta que al final es este usuario quien decidirá si se protege. pensando en esto, les comparto consejos útiles. 1. No utilices vocabulario técnico, considera que t...
Posted By : Rene372 | 0 comments