Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

COBIT - Use It Effectively

Collaborate, contribute, consume and create knowledge around how to use COBIT within your enterprise or client base.

You must be a registered user on the ISACA web site to join this topic. Create an Account

This Topic Has:
2425 Members
2 Online
22859 Visits

Community Leader

Graciela Braga


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 169 total

Must be a Topic member to contribute
View All »
please elaborate on what is meant by IT should align with business strategy,how this has to be done, achieved note:- business submits signed requirement and IT implement's it, we are already aligned, what else needs to be aligned from IT dept side, does t...
Feroz349 | 9/19/2016 4:28:54 PM | COMMENTS(1)
Dear colleagues, my name is Graciela and I amso proud for this opportunity! How can we improve this topic? All suggestionsare welcome!Best regards,Graciela
Graciela Braga | 9/17/2016 2:58:31 PM | COMMENTS(5)
what is meant by predictable software development process, ?? what factors can be predicted by following CMM
Feroz349 | 9/17/2016 2:25:13 AM | COMMENTS(0)
I wantto share with you my vision about How a well Governed and Managed ICT canHelp to Adopt a New Urban Agenda.  Of course, I used COBIT5.I am soproud and thankful for the opportunity to be a speaker at the Green Standards Week.  (
Graciela Braga | 9/15/2016 1:58:36 PM | COMMENTS(0)
Join author Ahmet Efe, as he responds to ISACA member questions beginning 12 September 2016. Add your questions by responding to this post!You must be logged in and be a member of this group* to participate *After logging in  click Join this Community" to...
Tammie111 | 9/12/2016 3:58:46 PM | COMMENTS(0)
Do you think this is a critical success factor of a good IT Governance and Management? This is an important issue for Financial, Government, Telecommunication, Services, Manufacturing, Health or other kind of organizations?
Alexander Zapata | 8/23/2016 3:35:34 PM | COMMENTS(3)

Documents & Publications: 150 total

Must be a Topic member to contribute
View All »
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 1313 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 1313 days ago
Posted by ISACA 1421 days ago
Posted by ISACA 1421 days ago
Posted by ISACA 1480 days ago

Events & Online Learning: 5 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
11 Aug 2014
ISACA International Event
Seattle, WA, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 28 total

Volume 3, 2016
by Steven De Haes, Ph.D., Anant Joshi, Tim Huygh, and Salvi Jansen
This article reports on one of the investigations being done, specifically, how nonexecutive boards are reporting on their accountability for IT in their yearly reports.
Volume 2, 2016
by Laurent Renard, CISA, CISM, CGEIT, CRISC, COBIT Foundation, DevOps, GRCP, ITIL Expert, Lean Six Sigma BB, MoP, MSP, P3O, PMIACP, PMI-PBA, PMP, PRINCE2, Resilia, Scrum PSM-PSPO, TOGAF
IT helps organizations achieve their goals and optimize their profitability by balancing risk at an acceptable level.
Volume 1, 2016
by Graciela Braga, CGEIT, COBIT Foundation, CPA
IS and IT auditors, assurance professionals and assessors must comply with different professional standards and maintain and improve their own process work at the appropriate capability level to meet the assignment objective...
Volume 5, 2015
by Fredric Greene, CISSP
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity, breaches and attacks on an organization’s IT environment.
Volume 5, 2015
by Chris Sullivan
Hackers frequently try to get inside networks using co-opted access credentials. Yet most IT departments still review access privileges only quarterly or semiannually.
Volume 4, 2015
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., and Wim Van Grembergen, Ph.D.
This article presents some key results of a recent international study on how organizations are adopting GEIT using COBIT 5 and whether these adoptions deliver enterprise value to these organizations.

Wikis: 3 total

Blog Posts: 10 total

Uma introdução ao COBIT 5, o framework usado para a governança e gestão de TI. Palavras chaves: governança corporativa, governança de TI, gestão de TI, princípios de governança, habilitadores, domínios, COBIT 5, ISACA, BSC, Bala...
Posted By : MarceloFortino | 0 comments
How do you achieve effectiveness or simple integrated approach during implementation of COBIT 5. By selecting required COBIT 5 processes combination to achieve organization requirement and align as per regulations and standards. i.e. to implement Enterpri...
Posted By : Sriram S IT IS | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Community of Sponsoring Organizations, essentially the large audit/consulting firms are big proponents of COSO as an ERM framework of choice. However, ERM programs must work with ITRM programs as majority if not almost all enterprises have their key bus...
Posted By : appolloconsulting | 0 comments
13 Nov 2014
Recientemente, al igual que otros muchos profesionales alrededor del mundo, recibí de ISACA una comunicación para que diera mi opinión sobre CobiT 5.   La compilación de información por parte de diversas personas, es un proceso normal que ISACA lleva a ca...
Posted By : emorro | 1 comments