Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

COBIT - Use It Effectively

Collaborate, contribute, consume and create knowledge around how to use COBIT within your enterprise or client base.

You must be a registered user on the ISACA web site to join this topic. Create an Account

 
This Topic Has:
2653 Members
0 Online
0 Visits

Community Leader

Graciela Braga

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 196 total

Must be a Topic member to contribute
View All »
When most organizations undertake animportant process improvement effort (e.g., compliance, cyber security,governance), they typically refer to different standards and prepare a complexprocess to implement the improvement.From this author’s point of view,...
Carly555 | 6/28/2017 6:00:00 AM | COMMENTS(5)
I am working with the NIST document "Framework for Improving Critical Infrastructure Cybersecurity" http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf. Cobit 5 mappings are included in the document and Cobit APO13.12 is included ...
Brad810 | 6/20/2017 5:22:35 PM | COMMENTS(4)
A leading Big 4 professional services firm in the Middle East was selected by a large retail bank in the region to assist in enabling IT risk management practices to deliver value to the enterprise in a cost-effective manner. The bank was facing and conti...
Carly555 | 6/15/2017 1:28:40 PM | COMMENTS(15)
With just a year left until theEuropean Union’s (EU’s) General Data Protection Regulation (GDPR)[i] takes effect, it istime for any organization with European customers to get started with theimplementation of its requirements. Most supervisory authoritie...
Carly555 | 6/13/2017 10:43:42 AM | COMMENTS(6)
buen dia.Soy nuevo en this comunidad. Me Encuentro en la búsqueda e Interés de Transformar el área de TI,: Por ello desde el alineamiento con El Negocio Hasta Estrategias Donde TI permita brindar v El Valor a mi Institución, Una Institución del Gobierno, ...
Marco083 | 4/25/2017 3:58:07 PM | COMMENTS(1)
2017 is here with cyberbreaches increasing, with their impacts rippling ever further into business and personal life.Are these threats too big to manage? Is cyberthreat management the ‘elephant in the room’?Cyberresilience needs to be on the board agenda,...
Alexandra295 | 4/21/2017 4:05:15 PM | COMMENTS(4)

Documents & Publications: 157 total

Must be a Topic member to contribute
View All »
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 1588 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 1588 days ago
Posted by ISACA 1696 days ago
Posted by ISACA 1696 days ago
Posted by ISACA 1755 days ago
Cobit Related
Posted by ISACA 2 days ago

Events & Online Learning: 8 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 32 total

Volume 3, 2017
by ISACA | Reviewed by Diana Hamono
The book is a useful resource for managers in all parts of an organization that is considering transitioning some, or all, of its current IT services onto cloud-based services and who want to understand the security implications of doing so.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 1, 2017
by Reviewed by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application
Volume 6, 2016
by Gordon Stoor, CISA, CISSP, ISO 20000 AC, ISO 20000 LA
Challenges set before auditors today are imposing. With seemingly endless changes in technology and the resulting effect on organizations, there is a tendency to feel overwhelmed.
Volume 3, 2016
by Steven De Haes, Ph.D., Anant Joshi, Tim Huygh, and Salvi Jansen
This article reports on one of the investigations being done, specifically, how nonexecutive boards are reporting on their accountability for IT in their yearly reports.
Volume 2, 2016
by Laurent Renard, CISA, CISM, CGEIT, CRISC, COBIT Foundation, DevOps, GRCP, ITIL Expert, Lean Six Sigma BB, MoP, MSP, P3O, PMIACP, PMI-PBA, PMP, PRINCE2, Resilia, Scrum PSM-PSPO, TOGAF
IT helps organizations achieve their goals and optimize their profitability by balancing risk at an acceptable level.

Wikis: 3 total

Blog Posts: 11 total

Places where the relevant principles of COBIT map to COSO 2013 principles* are marked as Yes. .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 table {;} .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 .font51287 {color:black;font-size:9.0pt;font-weig...
Posted By : Sugandh | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Uma introdução ao COBIT 5, o framework usado para a governança e gestão de TI. http://fortinux.info Palavras chaves: governança corporativa, governança de TI, gestão de TI, princípios de governança, habilitadores, domínios, COBIT 5, ISACA, BSC, Bala...
Posted By : MarceloFortino | 0 comments
How do you achieve effectiveness or simple integrated approach during implementation of COBIT 5. By selecting required COBIT 5 processes combination to achieve organization requirement and align as per regulations and standards. i.e. to implement Enterpri...
Posted By : Sriram S IT IS | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Community of Sponsoring Organizations, essentially the large audit/consulting firms are big proponents of COSO as an ERM framework of choice. However, ERM programs must work with ITRM programs as majority if not almost all enterprises have their key bus...
Posted By : appolloconsulting | 0 comments