Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Value Delivery

Welcome to the Value Delivery topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
245 Members
1 Online
6278 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 24 total

Must be a Topic member to contribute
View All »
In recent years, working with Technology Readiness Levels (TRLs) has become daily business in project/programme management. So far, I could not find any resources related to the use of TRLs as defined i.e. by ISO standard 16290, DoD, NASA, EC, ESA, etc. w...
Christoph N. | 7/18/2017 10:45:29 AM | COMMENTS(0)
Is there an update of The Business Case Guide? http://www.isaca.org/Knowledge-Center/Val-IT-IT-Value-Delivery-/Documents/VAL-IT-business-case.pdf COBIT 5 Implementation refers to that guide, but it is based on COBIT 4.1 and Val IT 2.0. Thank you. ...
rmarin | 10/13/2016 5:16:39 PM | COMMENTS(0)
Hi, I have a question, What is the correct way to fill the fact sheet format? Well, in the document "the-business-case-guide-using-val-it-2-0_res_eng_0410.pdf" don't show fact sheet using. I hope good news. Thanks
JuniorCachay | 5/27/2016 4:06:41 PM | COMMENTS(3)
I share with our group a publication in the blog of Joanne De Palma: "How to create a GEIT That system delivers value". I will be expectant about your comments. Thanks, http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=505&cid=sm_1107286...
Romulo Lomparte | 1/3/2016 4:25:40 AM | COMMENTS(2)
Here is a great article discussing the five types of value to services: http://www.3cs.ch/is_service_value_really_delivered/
Phil Green | 12/30/2015 7:48:33 AM | COMMENTS(0)
Hello every body  I hope that you are all fine, happy and strong I have a question regarding the business case as a document I had ask in the intreview questions for a study: Weather any changes happened to the cost, time, risk, benefits, etc of the IT p...
Hanan292 | 12/30/2015 4:05:53 AM | COMMENTS(1)

Documents & Publications: 38 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1383 days ago
Downloads
Posted by FarmService 2468 days ago
Books
Posted by ISACA 801 days ago
Books
Posted by ISACA 1084 days ago
Research
Posted by ISACA 1312 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 30 total

Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP, and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001, ITIL Foundation
A key issue often cited by information systems (IS) executives in the last three decades is aligning IT with business, which assists in realizing value from IT investments.
Volume 4, 2017
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001
The Emirates National Oil Company embarked on an initiative to realize value out of IT assets through Information Technology Infrastructure Library (ITIL) process implementation.
Volume 1, 2017
by Cheryl Ritts, MSIS
Many enterprises are quick to leap into cloud relationships. Very often, they do so without any analysis—formal or informal—of the value they expect to get in return.
Volume 1, 2017
by Graciela Braga, CGEIT, COBIT Foundation, CPA
When discussing the impact of IT on cities, some questions arise: How have cities been transformed by IT? Can this transformation be measured? What are the benefits and risk factors of the transformation?
Volume 5, 2016
by Syed K. Ishaq, CISA, CRISC, CCISO
Although the short-term impact from a cyberattack can be overwhelming, the long-term implications can be quite burdensome

Wikis: 2 total

Blog Posts: 65 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 0 comments
Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 2 comments
Mi primer acercamiento real al Framework (o Marco de Referencia) de ISACA COBIT 5, fue a mediados del año pasado (2016) cuando decidí tomar un curso de examinación para la certificación de COBIT® 5 Foundation (Fundamentos de COBIT 5). La jerga técnica me ...
Posted By : MNUNEZA | 0 comments
There is need to for ISACA through our local; chapter to allow fees to be paid in installments or split invoices given the fact that in our country - one has to find currency first and then deposit into a VISA card account. Thus i can raise my exam and ma...
Posted By : Hamadzashe | 0 comments
Hello fellow members COBIT 5 is an excellent guide to developing ICT Governance Frameworks. Many organisations have well documented Frameworks but find it challenging when it comes to implementation. The objective of this post is to start a debate o...
Posted By : Thansen Singh | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments