Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

COBIT - Implementation

Collaborate, contribute, consume and create knowledge around how to implement COBIT into your organization.

Click “Join this community” to be able to actively participate in discussions and contribute content to this topic. You must be a member of ISACA to join this topic. Join ISACA now!

 
This Topic Has:
1662 Members
1 Online
18618 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 71 total

Must be a Topic member to contribute
View All »
My organization would like to implement COBIT 5. As the IT Governance Analyst, I need guidance from folks on this forum who have gone through this process before. What to I need to do? How do I map Policies, Procedures, Standards or Guidelines to COBIT 5 ...
Abdulai539 | 11/12/2017 12:58:30 PM | COMMENTS(3)
Hello all, Is there any specfic document which provides best practices as to network zone classifications with a clear distinction between the Enterprise and Intranet zone, i.e. what makes these two zones different and why is it worthwhile to create a ...
Robert271 | 10/8/2017 4:54:55 AM | COMMENTS(4)
what is meant by IT department has to act as a enabler to business, how can IT department can enable business, please elaborate, business gives the requirement and IT department implements it, then what is meant by IT dept should enable business
Feroz349 | 9/28/2017 9:18:44 AM | COMMENTS(1)
IT department implements the systems, as per the business requirements submitted by business departments, and vendor selection process is followed by involving business during vendor selection, when these activities are already done what is meant by IT in...
Feroz349 | 8/9/2017 11:06:04 AM | COMMENTS(2)
Hi All, I am currently doing a project with COBIT 5 PAM. I have so far written the qualifying statements for assessing Level 1 (Performed Process). I need to scale this up to write qualifying statements for Level 2 (Managed Process). The publication, "...
Narasimham Nittala | 6/28/2017 4:29:57 AM | COMMENTS(3)
Hi all, Recently I am carrying out a research on ISMS standards and frameworks. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks. I would like to ...
KAI720 | 6/14/2017 10:29:06 AM | COMMENTS(0)

Documents & Publications: 162 total

Must be a Topic member to contribute
View All »
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 1731 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 1731 days ago
Posted by ISACA 1839 days ago
Posted by ISACA 1839 days ago
Posted by ISACA 1898 days ago
Cobit Related
Posted by ISACA 19 days ago

Events & Online Learning: 4 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
4 Dec 2017
ISACA International Event
Scottsdale, AZ, USA

Journal Articles: 34 total

Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP, and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001, ITIL Foundation
A key issue often cited by information systems (IS) executives in the last three decades is aligning IT with business, which assists in realizing value from IT investments.
Volume 4, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.
Volume 3, 2017
by ISACA | Reviewed by Diana Hamono
The book is a useful resource for managers in all parts of an organization that is considering transitioning some, or all, of its current IT services onto cloud-based services and who want to understand the security implications of doing so.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 1, 2017
by Reviewed by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application
Volume 6, 2016
by Gordon Stoor, CISA, CISSP, ISO 20000 AC, ISO 20000 LA
Challenges set before auditors today are imposing. With seemingly endless changes in technology and the resulting effect on organizations, there is a tendency to feel overwhelmed.

Wikis: 2 total

Blog Posts: 12 total

28 Sep 2017
Recently, I witnessed an interesting webcast by Scopism, an UK-based consulting and training company. They announced the publication of the SIAM(c) Foundation Body of Knowledge, available for free through their website www.scopism.com. Service Integration...
Posted By : Peter873 | 0 comments
Places where the relevant principles of COBIT map to COSO 2013 principles* are marked as Yes. .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 table {;} .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 .font51287 {color:black;font-size:9.0pt;font-weig...
Posted By : Sugandh | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Uma introdução ao COBIT 5, o framework usado para a governança e gestão de TI. http://fortinux.info Palavras chaves: governança corporativa, governança de TI, gestão de TI, princípios de governança, habilitadores, domínios, COBIT 5, ISACA, BSC, Bala...
Posted By : MarceloFortino | 0 comments
How do you achieve effectiveness or simple integrated approach during implementation of COBIT 5. By selecting required COBIT 5 processes combination to achieve organization requirement and align as per regulations and standards. i.e. to implement Enterpri...
Posted By : Sriram Srinivasan GRC | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments