• Bookmark

Leveraging COBIT to Implement Information
Security (Part 4)

By John Frisken, CISA, CA

COBIT Focus | 5 October 2015

This article is the final article of a 4-part “Leveraging COBIT to Implement Information Security” series. Part 1 covered how COBIT 5 can be used to establish the overall framework for the collaboration of technical standards such as the IT Infrastructure Library (ITIL), ISO/IEC 27001 and SANS Critical Security Controls (SANS Top 20). Part 2 focused on using COBIT to implement information security process controls within an ITIL system to provide protection envisaged by SANS Top 20. Read More >>

Implementation of Service Integration in a Multiprovider Environment Using COBIT 5

By Martin Andenmatten

COBIT Focus | 28 September 2015
French | German | Portuguese | Spanish

We are living in a constantly changing world. While technology is getting smarter and easier to handle for users, governance and management of enterprise IT (GEIT) is becoming overly complex. Read More >>

ISACA’s COBIT Conference Europe Provides Actionable Insights and Training for All

By Okanlawon Zachy Olorunojowon, CISA, CGEIT, PMP

COBIT Focus | 21 September 2015

Getting the foundation right is critical. COBIT is an important foundation for good governance and management of enterprise IT (GEIT). Read More >>