Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Strategic Planning/Alignment

Welcome to the Strategic Planning/Alignment topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now

 
This Topic Has:
780 Members
0 Online
9492 Visits

Community Leader

SA

SA

Title: Chief Enterprise Architect

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 28 total

Must be a Topic member to contribute
View All »
When we talk about alignment, it usually refers to alignment between business strategy and IT strategy. In today's competitive and media intensive business world, how much there is need for the business strategy (resulting in initiatives and products/serv...
SA | 9/28/2017 9:34:06 AM | COMMENTS(3)
Following is an interesting perspective on strategic alignment:http://www.sergaygroup.com/Smart-Talk/Strategic-Alignment.html What do you think?
SA | 8/20/2017 9:14:48 PM | COMMENTS(16)
Hello All,I'm helping a client develop an incident response plan to bring them in compliance with NIST 800-171. They want assurance that their BCP would satisfy this standard. Can anyone suggest a good (but not overly burdensome) BCP template that can be ...
Joseph953 | 8/20/2017 9:12:41 PM | COMMENTS(3)
hello all Any suggestions on creating  IS strategy
Youssef432 | 8/20/2017 9:05:12 PM | COMMENTS(4)
Hi All, What is the best practice for the Information Security Function in a banking institution to report to?Meaning that what is the best reporting line for this function? Keeping in mind that the information security personnel is reviewing and monitori...
Faisal | 8/20/2017 6:42:05 PM | COMMENTS(5)
I am curious to know what other OCC regulated financial institutions are conducting their GLBA risk assessments. · How are risk assessments conducted? Are they based on processes or assets? · What program/application is being used to ...
Mjean | 6/28/2017 10:45:50 AM | COMMENTS(0)

Documents & Publications: 17 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 741 days ago
This article addresses a common error many who implement data loss prevention technology make - monitoring without a goal to the end state.
Posted by Lisa508 1163 days ago
CIOs should evolve their desktop-first strategy to address the rise of mobile
Posted by nooruddin 1164 days ago
Security at the highest level can be broken down to people, process and technology. The people and process requirements are going to be different depending on company revenue, industry vertical and geographic location. However, security technology, and threat detection,for the most part, has remained... more
Posted by nooruddin 1184 days ago

Events & Online Learning: 3 total

Journal Articles: 14 total

Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP, and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001, ITIL Foundation
A key issue often cited by information systems (IS) executives in the last three decades is aligning IT with business, which assists in realizing value from IT investments.
Volume 5, 2016
by Yuri Bobbert, CISM, SCF and Hans Mulder, Ph.D.
This article addresses the major takeaways of efficient meeting facilitation and decision making based on practical and academic insights.
Volume 4, 2016
by Ed Gelbstein, Ph.D.
This article discusses how the key elements of the audit universe that are included in the audit strategy and its derived audit plans are chosen to reflect business risk.
Volume 4, 2016
by Ed Gelbstein, Ph.D.
This article, which is the first of a two-part series, concentrates on what an audit strategy should deliver and to whom.
Volume 4, 2016
by Phil Zongo
This article provides some practical recommendations to address three key areas of risk associated with cloud adoption.
Volume 2, 2016
by Nancy Lankton, CISA, CPA and Jean Price
Ten years ago, Richard Nolan and F. Warren McFarlan wrote a Harvard Business Review article about the role of the board of directors (BoD) in IT governance.

Wikis: 2 total

Blog Posts: 14 total

28 Sep 2017
Recently, I witnessed an interesting webcast by Scopism, an UK-based consulting and training company. They announced the publication of the SIAM(c) Foundation Body of Knowledge, available for free through their website www.scopism.com. Service Integration...
Posted By : Peter873 | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 1 comments
13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments