SlideShare a Scribd company logo
1 of 33
IT
GOVERNANCE
FRAMEWORK
TOOLKIT
IT BEST PRACTICES
Why its significant?
• A demand on better return from IT investments and a
concern over the generally increasing amount of IT
expenditures.
• The need to meet regulatory requirements for IT controls in
areas such as financial reporting and healthcare.
• The selection of service providers and the management of
service outsourcing and acquisition.
IT BEST PRACTICES
• Having complex IT-related risks, such as
network security
• IT governance help monitor and improve
critical IT activities to increase business value
and reduce business risk.
• The need for enterprises to assess how they
are performing against accepted standards
and against their peers.
(benchmarking)
THE GUIDELINES FOR GOOD IT
GOVERNANCE
1• Strategic Alignment: Alignment of IT goals align with the
enterprise goals.
2. IT Value: It delivers value to business, increase Org.
profits.
3. Performance Measurement: Its performance is
measured // no guessing here,
4. Resource Management: IT resources properly allocated,
5. Risk Management: How the risks being managed
GUIDELINES-CONT’D
IT governance is a continuous life cycle that can be entered
at any point.
Usually one starts with the strategy and its alignment
throughout the enterprise.
Then implementation occurs, delivering the value the
strategy promised and addressing the risks that need
mitigation.
Its recommended that strategy needs to be monitored
continuously and the results need to be:
a. measured,
b. reported and
c. acted upon.
Strategy must be re-evaluated and realigned
annually, if needed.
This life cycle operates in an environment that is
influenced by:
• Stakeholder values
• The mission, vision and values of the enterprise
• The community and Co. ethics and culture
• laws, regulations and policies
• Industry practices
IT GOVERNANCE
FRAMEWORK
ITIL
CMMI
COBIT
Val IT
COBIT, ITIL, VAL IT
1. COBIT was designed as an IT governance
model,
It tells you whatyou should be doing,
COBit is “Control Objectives for Information and
Related Technology (COBIT) is a framework created
by ISACA for (IT) and IT governance. It is a supporting
toolset that allows: managers to bridge the gap
between control requirements, technical issues and
business risks.”
COBIT, ITIL, VAL IT
2. while ITIL tells you How it should be done
Put them together, and you will have a very
powerful model.
3- Val IT: how to do the right things in the right
way and doing them well and are we getting
the value?
Val IT talks about strategy (how well is it
aligned) & its value.
COBIT
To govern IT effectively, it is important to appreciate the
activities and risks within IT that need to be managed.
These can be summarized as follows.
COBIT Framework subdivides IT into four domains
Plan and Organize, PO
Acquire and Implement, AI
Deliver and Support, DS
Monitor and Evaluate, ME
PLAN AND ORGANISE
(PO)
Provides direction to solution delivery
Ask the questions:
• Is IT and the business strategy aligned and is the
usage of ressources optimized?
• Does everyone in the organisation understand the
IT objectives and the risks?
• Are these properly managed?
CONT’D
(AI) Acquire and Implement:
Provides the solutions and passes them to be turned
into services
Ask the question:
Will the new projects deliver solutions
that meet business needs
in time and within the budget?
DS
Deliver and Support (DS)
Ask the questions:
• Are IT costs optimized and employees using IT
efficiently and safely?
• Are Security measures such as confidentiality,
integrity and availability in place?
ME
Monitor and Evaluate (ME)
Ask the questions:
• Is IT performance being measured to detect
problems before it is too late ?
• Are risks, control, compliance and performance
being measured and reported?
COBIT USES TWO TYPES OF
METRICS
• Outcome measures, key goal indicators
(KGIs)
What is measured here:
• is the information needed available all the
time to support the business needs?
• Are integrity and confidentiality risks Absent?
• Is the information & resources reliable?
PERFORMANCE INDICATORS,
Performance indicators, or
key performance indicators (KPIs), indicate
whether goals are likely to be met.
How? for example: Sales Target
Measure the number of wins over a specific
time period and compare it to a future target
and past performance to motivate your sales
team.
Wins: The number of new customers over a certain time period.
Revenue: Income received through sales activities
INFORMATION TECHNOLOGY
INFRASTRUCTURE LIBRARY(ITIL)
The Information Technology Infrastructure
Library (ITIL) is a set of guidance
developed by the United Kingdom’s Office
Of Government Commerce (OGC)
ITIL does not doc how to do things, But tells
you what can and should be done.
It shares with us what other people found to be
the best way to approach IT as a service
provider.
ITIL CONSISTS OF 5
CORE STRATEGIES:
1. Service Strategy volume:
Provide guidance in developing a strategy for
IT service management.
This involves understanding ur market, ur
customers, ur capabilities & resources &
financial constraints under which services must
be delivered and supported.
PROCESSES WITHIN
SERVICE STRATEGY ARE:
1. Service Strategy
Service portfolio management:
is the process of maximizing the ROI while managing risks.
Financial management:
Evaluates investments in services to assist with strategic
decision-making.
Demand management:
works closely with the business to identify & understand
patterns of business demand.
2. Service Design volume:
Service Design begins with a set of business requirements and
ends with a solution designed to meet these business needs.
3. Service Transition:
Looks at managing change, risk and quality assurance during the
deployment of service into operation.
4. Service Operation volume:
is concerned with daily activities, provide guidance on the
effective & efficient operation of the service.
Its where the value of the service is realized & strategy of the
organization is executed.
ITIL –CONT’D
•5. Continual Service Improvement volume (CSI) :
Provide guidance to improve the overall process and
how its executed.
This should be integrated into all the other lifecycle
stages. This is a continual activity
Based on this report, org strive for improvements.
BENEFITS OF ITIL
• Improve Resource Utilization
• Be More Competitive
• Decrease Rework
• Eliminate Redundant Work
• Improve upon project deliverables and
time
• Improve availability, reliability and
security of critical IT services
• Justify the cost of service quality
BENEFITS OF ITIL –
CONT’D
• Provide services that meet business,
customer and user demands
• Integrate central processes
• Document and communicate roles and
responsibilities in service provision
• Learn from previous experience
• Provide performance indicators
COBIT VS ITIL
• ITIL was designed as a service
management framework to help you
understand how you support processes, &
how you deliver services
• COBIT was designed as an IT governance
model, particularly and initially with audit in
mind to give you control objectives and
control practices on how that process
should behave
COBIT VS ITIL
CONT’D
The difference between the two is,
COBIT tells you what you should be doing,
while ITIL tells you how you should be
doing it
• Put them together, and you have a very
powerful model of what you need to be
doing and how to do it.
None of these frameworks are in
competition with each other, in fact, it is
best if they are used together.
– ISO 17799 outlines security controls, but
does not focus on how to integrate them
into business processes
– ITIL focuses on IT processes/services,
not on security
– COBIT focuses on controls and metrics,
not as much on security So, a combination
of all three is usually the best approach.
HOW CAN THEY BE
USED?
COBIT can be used to determine if the
company's needs (including security) are
being properly supported by IT.
ISO 17799 can be used to determine and
improve upon the company's security
posture.
And ITIL can be used to improve IT
processes & services to meet the
company's goals (including security).
TOOLKIT
Start investigating possible tools for strategic
planning and aligning IT with the organization’s
strategic plan. For toolkit
If you don’t know where to start, do a web search
on SWOT analysis (strengths, weaknesses,
opportunities and threats), metrics, analytics and
the balanced scorecard.
Describe what you find here and share as
appropriate on the D2L discussion topic for IT
Toolkits.
Answer these questions for each tool you want to include:
How is the tool accessed?
How is the tool used?
What is the value of the tool for the IT manager?
General comments on the tool:
END

More Related Content

What's hot

Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and RoadmapAndrew Byers
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy FrameworkVishal Sharma
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1Richard Willis
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing worldPECB
 
Using ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherUsing ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherRob Akershoek
 
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITCOBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITMark Constable
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementChristian F. Nissen
 
ITSM Foundation Course Material
ITSM Foundation Course MaterialITSM Foundation Course Material
ITSM Foundation Course Materialstefanhenry
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...CTE Solutions Inc.
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewMohamed Sami El-Tahawy
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management Alkesh Mishra
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementChristian F. Nissen
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 

What's hot (20)

Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and Roadmap
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
COBIT5 Introduction
COBIT5 IntroductionCOBIT5 Introduction
COBIT5 Introduction
 
Using ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherUsing ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT together
 
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITCOBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
 
ITSM Foundation Course Material
ITSM Foundation Course MaterialITSM Foundation Course Material
ITSM Foundation Course Material
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
 
It governance
It governanceIt governance
It governance
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF Overview
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 

Viewers also liked

IT governance and bal
IT governance and balIT governance and bal
IT governance and balsourov_das
 
Shared service centers - the future of enterprise service management - SEE 2016
Shared service centers - the future of enterprise service management - SEE 2016Shared service centers - the future of enterprise service management - SEE 2016
Shared service centers - the future of enterprise service management - SEE 2016TOPdesk
 
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...CA Technologies
 
The latest in Retain & GWAVA
The latest in Retain & GWAVAThe latest in Retain & GWAVA
The latest in Retain & GWAVAGWAVA
 
Beratungsunternehmen und Agilität - Manage Agile 2016
Beratungsunternehmen und Agilität - Manage Agile 2016Beratungsunternehmen und Agilität - Manage Agile 2016
Beratungsunternehmen und Agilität - Manage Agile 2016Frank Scheffler
 
Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology GovernanceGoutama Bachtiar
 
Shared Services Operating Models
Shared Services Operating ModelsShared Services Operating Models
Shared Services Operating ModelsYash Goyal
 
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...Organimi
 
Shared services centers sector 2016
Shared services centers sector 2016Shared services centers sector 2016
Shared services centers sector 2016ProColombia
 
Monitoring distributed (micro-)services
Monitoring distributed (micro-)servicesMonitoring distributed (micro-)services
Monitoring distributed (micro-)servicesRafael Winterhalter
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsPECB
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementUNITY
 
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...Andreas Wagener
 
Gartner for IT Leadership
Gartner for IT LeadershipGartner for IT Leadership
Gartner for IT LeadershipMegha Khemka
 
Real-World DG Webinar: A Data Governance Framework for Success
Real-World DG Webinar: A Data Governance Framework for Success Real-World DG Webinar: A Data Governance Framework for Success
Real-World DG Webinar: A Data Governance Framework for Success DATAVERSITY
 
Foresight 2020 - Industry trends and scenarios
Foresight 2020 - Industry trends and scenariosForesight 2020 - Industry trends and scenarios
Foresight 2020 - Industry trends and scenariosTieto Corporation
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)Amazon Web Services
 
The digital transformation of society and business: 2020. Futurist keynote sp...
The digital transformation of society and business: 2020. Futurist keynote sp...The digital transformation of society and business: 2020. Futurist keynote sp...
The digital transformation of society and business: 2020. Futurist keynote sp...Gerd Leonhard
 
RDBMS oder NoSQL – warum nicht beides?
RDBMS oder NoSQL – warum nicht beides?RDBMS oder NoSQL – warum nicht beides?
RDBMS oder NoSQL – warum nicht beides?Capgemini
 
Information 4.0 for Industry 4.0 (TCWorld 2016)
Information 4.0 for Industry 4.0 (TCWorld 2016)Information 4.0 for Industry 4.0 (TCWorld 2016)
Information 4.0 for Industry 4.0 (TCWorld 2016)Joe Gollner
 

Viewers also liked (20)

IT governance and bal
IT governance and balIT governance and bal
IT governance and bal
 
Shared service centers - the future of enterprise service management - SEE 2016
Shared service centers - the future of enterprise service management - SEE 2016Shared service centers - the future of enterprise service management - SEE 2016
Shared service centers - the future of enterprise service management - SEE 2016
 
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...
Leading a Digital Business with Greater Agility: How to Plan a Modern Portfol...
 
The latest in Retain & GWAVA
The latest in Retain & GWAVAThe latest in Retain & GWAVA
The latest in Retain & GWAVA
 
Beratungsunternehmen und Agilität - Manage Agile 2016
Beratungsunternehmen und Agilität - Manage Agile 2016Beratungsunternehmen und Agilität - Manage Agile 2016
Beratungsunternehmen und Agilität - Manage Agile 2016
 
Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology Governance
 
Shared Services Operating Models
Shared Services Operating ModelsShared Services Operating Models
Shared Services Operating Models
 
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...
Redrawing Org Charts; Rethinking Organizational Boundaries: Opportunities for...
 
Shared services centers sector 2016
Shared services centers sector 2016Shared services centers sector 2016
Shared services centers sector 2016
 
Monitoring distributed (micro-)services
Monitoring distributed (micro-)servicesMonitoring distributed (micro-)services
Monitoring distributed (micro-)services
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...
Leben 4.0: Künstliche Intelligenz und der Weg in die Datengesellschaft. Vortr...
 
Gartner for IT Leadership
Gartner for IT LeadershipGartner for IT Leadership
Gartner for IT Leadership
 
Real-World DG Webinar: A Data Governance Framework for Success
Real-World DG Webinar: A Data Governance Framework for Success Real-World DG Webinar: A Data Governance Framework for Success
Real-World DG Webinar: A Data Governance Framework for Success
 
Foresight 2020 - Industry trends and scenarios
Foresight 2020 - Industry trends and scenariosForesight 2020 - Industry trends and scenarios
Foresight 2020 - Industry trends and scenarios
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
 
The digital transformation of society and business: 2020. Futurist keynote sp...
The digital transformation of society and business: 2020. Futurist keynote sp...The digital transformation of society and business: 2020. Futurist keynote sp...
The digital transformation of society and business: 2020. Futurist keynote sp...
 
RDBMS oder NoSQL – warum nicht beides?
RDBMS oder NoSQL – warum nicht beides?RDBMS oder NoSQL – warum nicht beides?
RDBMS oder NoSQL – warum nicht beides?
 
Information 4.0 for Industry 4.0 (TCWorld 2016)
Information 4.0 for Industry 4.0 (TCWorld 2016)Information 4.0 for Industry 4.0 (TCWorld 2016)
Information 4.0 for Industry 4.0 (TCWorld 2016)
 

Similar to IT Governance Frameworks Toolkit Guide

Similar to IT Governance Frameworks Toolkit Guide (20)

CobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast SeminarCobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast Seminar
 
Dit yvol4iss28
Dit yvol4iss28Dit yvol4iss28
Dit yvol4iss28
 
01 intro-cobit
01 intro-cobit01 intro-cobit
01 intro-cobit
 
Itil the basics
Itil the basicsItil the basics
Itil the basics
 
20180530123152_PPT8-TOPIK8-R0-IT Governance Instruments.pptx
20180530123152_PPT8-TOPIK8-R0-IT Governance Instruments.pptx20180530123152_PPT8-TOPIK8-R0-IT Governance Instruments.pptx
20180530123152_PPT8-TOPIK8-R0-IT Governance Instruments.pptx
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Cobi t vs itil
Cobi t vs itilCobi t vs itil
Cobi t vs itil
 
ITIL With Information Security
ITIL With Information SecurityITIL With Information Security
ITIL With Information Security
 
Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
Cobi t 4.1-brochure
Cobi t 4.1-brochureCobi t 4.1-brochure
Cobi t 4.1-brochure
 
Co5bit
Co5bitCo5bit
Co5bit
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Dit yvol2iss40
Dit yvol2iss40Dit yvol2iss40
Dit yvol2iss40
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
Dit yvol4iss22
Dit yvol4iss22Dit yvol4iss22
Dit yvol4iss22
 
Executive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and GovernanceExecutive's Handbook on IT Strategy and Governance
Executive's Handbook on IT Strategy and Governance
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

IT Governance Frameworks Toolkit Guide

  • 2. IT BEST PRACTICES Why its significant? • A demand on better return from IT investments and a concern over the generally increasing amount of IT expenditures. • The need to meet regulatory requirements for IT controls in areas such as financial reporting and healthcare. • The selection of service providers and the management of service outsourcing and acquisition.
  • 3. IT BEST PRACTICES • Having complex IT-related risks, such as network security • IT governance help monitor and improve critical IT activities to increase business value and reduce business risk. • The need for enterprises to assess how they are performing against accepted standards and against their peers. (benchmarking)
  • 4. THE GUIDELINES FOR GOOD IT GOVERNANCE 1• Strategic Alignment: Alignment of IT goals align with the enterprise goals. 2. IT Value: It delivers value to business, increase Org. profits. 3. Performance Measurement: Its performance is measured // no guessing here, 4. Resource Management: IT resources properly allocated, 5. Risk Management: How the risks being managed
  • 5. GUIDELINES-CONT’D IT governance is a continuous life cycle that can be entered at any point. Usually one starts with the strategy and its alignment throughout the enterprise. Then implementation occurs, delivering the value the strategy promised and addressing the risks that need mitigation. Its recommended that strategy needs to be monitored continuously and the results need to be: a. measured, b. reported and c. acted upon.
  • 6. Strategy must be re-evaluated and realigned annually, if needed. This life cycle operates in an environment that is influenced by: • Stakeholder values • The mission, vision and values of the enterprise • The community and Co. ethics and culture • laws, regulations and policies • Industry practices
  • 7.
  • 9. COBIT, ITIL, VAL IT 1. COBIT was designed as an IT governance model, It tells you whatyou should be doing, COBit is “Control Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for (IT) and IT governance. It is a supporting toolset that allows: managers to bridge the gap between control requirements, technical issues and business risks.”
  • 10. COBIT, ITIL, VAL IT 2. while ITIL tells you How it should be done Put them together, and you will have a very powerful model. 3- Val IT: how to do the right things in the right way and doing them well and are we getting the value? Val IT talks about strategy (how well is it aligned) & its value.
  • 11. COBIT To govern IT effectively, it is important to appreciate the activities and risks within IT that need to be managed. These can be summarized as follows. COBIT Framework subdivides IT into four domains Plan and Organize, PO Acquire and Implement, AI Deliver and Support, DS Monitor and Evaluate, ME
  • 12. PLAN AND ORGANISE (PO) Provides direction to solution delivery Ask the questions: • Is IT and the business strategy aligned and is the usage of ressources optimized? • Does everyone in the organisation understand the IT objectives and the risks? • Are these properly managed?
  • 13. CONT’D (AI) Acquire and Implement: Provides the solutions and passes them to be turned into services Ask the question: Will the new projects deliver solutions that meet business needs in time and within the budget?
  • 14. DS Deliver and Support (DS) Ask the questions: • Are IT costs optimized and employees using IT efficiently and safely? • Are Security measures such as confidentiality, integrity and availability in place?
  • 15. ME Monitor and Evaluate (ME) Ask the questions: • Is IT performance being measured to detect problems before it is too late ? • Are risks, control, compliance and performance being measured and reported?
  • 16. COBIT USES TWO TYPES OF METRICS • Outcome measures, key goal indicators (KGIs) What is measured here: • is the information needed available all the time to support the business needs? • Are integrity and confidentiality risks Absent? • Is the information & resources reliable?
  • 17. PERFORMANCE INDICATORS, Performance indicators, or key performance indicators (KPIs), indicate whether goals are likely to be met. How? for example: Sales Target Measure the number of wins over a specific time period and compare it to a future target and past performance to motivate your sales team.
  • 18. Wins: The number of new customers over a certain time period. Revenue: Income received through sales activities
  • 19.
  • 20. INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY(ITIL) The Information Technology Infrastructure Library (ITIL) is a set of guidance developed by the United Kingdom’s Office Of Government Commerce (OGC) ITIL does not doc how to do things, But tells you what can and should be done. It shares with us what other people found to be the best way to approach IT as a service provider.
  • 21. ITIL CONSISTS OF 5 CORE STRATEGIES: 1. Service Strategy volume: Provide guidance in developing a strategy for IT service management. This involves understanding ur market, ur customers, ur capabilities & resources & financial constraints under which services must be delivered and supported.
  • 22. PROCESSES WITHIN SERVICE STRATEGY ARE: 1. Service Strategy Service portfolio management: is the process of maximizing the ROI while managing risks. Financial management: Evaluates investments in services to assist with strategic decision-making. Demand management: works closely with the business to identify & understand patterns of business demand.
  • 23. 2. Service Design volume: Service Design begins with a set of business requirements and ends with a solution designed to meet these business needs. 3. Service Transition: Looks at managing change, risk and quality assurance during the deployment of service into operation. 4. Service Operation volume: is concerned with daily activities, provide guidance on the effective & efficient operation of the service. Its where the value of the service is realized & strategy of the organization is executed.
  • 24. ITIL –CONT’D •5. Continual Service Improvement volume (CSI) : Provide guidance to improve the overall process and how its executed. This should be integrated into all the other lifecycle stages. This is a continual activity Based on this report, org strive for improvements.
  • 25. BENEFITS OF ITIL • Improve Resource Utilization • Be More Competitive • Decrease Rework • Eliminate Redundant Work • Improve upon project deliverables and time • Improve availability, reliability and security of critical IT services • Justify the cost of service quality
  • 26. BENEFITS OF ITIL – CONT’D • Provide services that meet business, customer and user demands • Integrate central processes • Document and communicate roles and responsibilities in service provision • Learn from previous experience • Provide performance indicators
  • 27. COBIT VS ITIL • ITIL was designed as a service management framework to help you understand how you support processes, & how you deliver services • COBIT was designed as an IT governance model, particularly and initially with audit in mind to give you control objectives and control practices on how that process should behave
  • 28. COBIT VS ITIL CONT’D The difference between the two is, COBIT tells you what you should be doing, while ITIL tells you how you should be doing it • Put them together, and you have a very powerful model of what you need to be doing and how to do it.
  • 29. None of these frameworks are in competition with each other, in fact, it is best if they are used together. – ISO 17799 outlines security controls, but does not focus on how to integrate them into business processes – ITIL focuses on IT processes/services, not on security – COBIT focuses on controls and metrics, not as much on security So, a combination of all three is usually the best approach.
  • 30. HOW CAN THEY BE USED? COBIT can be used to determine if the company's needs (including security) are being properly supported by IT. ISO 17799 can be used to determine and improve upon the company's security posture. And ITIL can be used to improve IT processes & services to meet the company's goals (including security).
  • 31. TOOLKIT Start investigating possible tools for strategic planning and aligning IT with the organization’s strategic plan. For toolkit If you don’t know where to start, do a web search on SWOT analysis (strengths, weaknesses, opportunities and threats), metrics, analytics and the balanced scorecard. Describe what you find here and share as appropriate on the D2L discussion topic for IT Toolkits.
  • 32. Answer these questions for each tool you want to include: How is the tool accessed? How is the tool used? What is the value of the tool for the IT manager? General comments on the tool:
  • 33. END