• Bookmark

Leveraging COBIT to Implement Information
Security (Part 2)

By John Frisken, CISA, CA

COBIT Focus | 27 July 2015

This article is a continuation of the article published 4 May 2015 called “Leveraging COBIT to Implement Information Security (Part1).”

Studies by many organisations have highlighted that companies that are remaining secure are focusing on implementing security controls as an integral part of their IT service management (ITSM) systems, not as stand-alone management systems. Companies that practice configuration management and maintain careful inventories of their hardware and software are staying secure. Read More >>

Are You a COBIT 5 Expert, Champion or Consultant? Be Aware!

By Paras Kesharichand Shah, CISA, CGEIT, CRISC, CA

COBIT Focus | 13 July 2015

The COBIT 5 Implementation guide1 is one of the most valuable jewels in the COBIT 5 crown. Any practitioner who has used any of the COBIT 5 practices and guidance might have come across the implementation guidance at some point in time. Read More >>

State and Impact of GEIT in Organizations: Key Findings of an International Study

By Steven De Haes, Ph.D., Anant Joshi, Ph.D., and Wim Van Grembergen, Ph.D.

COBIT Focus | 6 July 2015

Information and related technology are increasingly important in enabling enterprises to deliver value to their stakeholders. As a result, enterprises are increasingly making investments in their governance of enterprise IT (GEIT) and are often drawing upon the practical relevance of generally accepted good practice frameworks such as COBIT. Read More >>