SlideShare a Scribd company logo
1 of 31
IT GOVERNANCE – THE MISSING COMPASS
IN A TECHNOLOGY CHANGING WORLD
09/02/2016
1
By Oladapo Ogundeji : CTO/CISO, Digital Jewels Ltd.
Nigeria.
www.digitaljewels.net2
Oladapo Ogundeji
CTO/CISO - Digital Jewels
Oladapo Ogundeji is Chief Technical Officer at Digital Jewels. Mr. Ogundeji is PECB partner
and has more than 18 years of experience.
+234099930209
dapoo@digitaljewels.net ng.linkedin.com/in/dapoo
www.digitaljewels.net
Profile : Oladapo Ogundeji.
 Professional career extends over 18 years of experience focused on enhancing the strategic
value of ICT in organisations through process re-engineering, strategic planning and project
management for corporate objective & strategy that address business opportunities and
issues.
 A highly trained ICT Management Specialist & Consultant.
 Masters In Information Technology ( M.I.T )
 B. Sc. Electronics & Electrical Engineering.
Past roles/positions
 Head of User Support & Service Desk
 IT Manager
 Project Manager – Technical Services
 Deputy Head – Network Systems
 Project Leader
 Project / System Engineer
CTO/CISO - Digital Jewels Limited.
A specialised Information Value Chain Consulting
Firm offering specialised IT & PM Consulting &
Capacity Building Services
Contact: +234099930209 ; dapoo@digitaljewels.net
QUALIFICATIONS...
 COBIT 4.1/5.0 Foundation & Certified Trainer
 Business Continuity Management : ISO22301/ BS25999 Certified MASTER & Accredited Trainer
 ISO 27001 Certified Lead Implementer Certified & Trainer
 Certified IT Business Manager (ITBMC)
 PRINCE2 Foundation Certificate (Project Management Methodology).
 ISACA : C I S A // C I S M // C G E I T
 IT Service Management Foundation (I T I L)
 RAD Datacommunication Specialist & Engineer.
 HP (COMPAQ) : Accredited Compaq Technician (A C T) // Accredited Platform Specialist (A P S)
 Microsoft Certified Professional: ( M C P) // Microsoft Certified Professional + Internet: ( M C P + I) //
Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified System Engineer : ( M C S E)
// Microsoft Sales Specialist : ( M S S)
 Cisco Certified Network Associate ( C C N A ) // Cisco Certified Network Professional ( C C N P ) // Cisco
Certified Design Associate ( C C D A ) // Cisco Certified Design Professional ( C C D P ) // Cisco Sales Expert
(CSE )
 BICC Brand-Rex (Structured Cabling) Certified Installer.
 TOGAF 9.1 Certified [+ Foundation]
 MoR (Management of Risk) Certified & Accredited Trainer
Overview of IT Governance
Benefits of IT Governance
IT Governance Implementation :
Approach and Methodology
Critical Success Factors
AGENDA
OVERVIEW OF IT
GOVERNANCE
6
WHAT IS IT GOVERNANCE
7
IT governance is the formal process of defining the strategy of the IT organization
and overseeing its execution to achieve the goals of the enterprise.
Decision rights
framework &
mechanisms
Vision,
goals/priorities, measures; value
prop &
service portfolio;
resource approaches &
commitments;
change management
plans
Aligned/synchronized with
the enterprise strategy,
including other key asset
strategies
Translation into
aligned, tactical, operational
plans; closed-loop
monitoring & control;
accountability;
regulatory compliance
IT: A DOUBLE ENDED SWORD…
• Increased complexity, speed, interconnectivity and
globalisation mean more than ever that IT:
Offers extraordinary
opportunities to enable &
transform business.
Involves huge costs &
enormous risks.
WHY IT GOVERNANCE: …BALANCING AMONG MANY COMPETING PRIORITIES
9
IT Governance
Priorities
Maximize Return:
a. Improve business results
b. Grow revenue and earnings
c. Cash flow
d. Reduced cost-of-operation
Increase agility
a. Enable the business organizations and
operations to adapt to changing
business needs
Improve performance:
a. Improve business operations
performance end-to-end across the
enterprise
b. Increase customer and employee
satisfaction
Mitigate Risk:
a. Ensure security and continuity of
internal business operations while
maximizing exposure to external risk
factors
CORE COMPETENCIES FOR IT GOVERNANCE
10
Enterprise
Architecture
Management
Relationship
Management
IT Strategy
Management
Financial
Management
Supply /
Demand
Management
Portfolio
Management
IT Operating
Model
• Align operational and strategic
IT investments to business
strategies & objectives.
• Establish
policies,
standards,
models and
processes for
managing IT as
an enterprise
asset • Lifecycle management of
infrastructure, applications and
services
• Understand the
drivers of IT costs
to allocate
appropriate costs
to the consumers
of IT services.
• Establish effective, collaborative
relationships with business
stakeholders and suppliers.
• Balance the demand for IT services with
available resources to meet immediate and
strategic goals.
NEED FOR IT GOVERNANCE - GOVERNANCE OF EMERGING TECHNOLOGIES
11
• Big Data Management & Analytics. How we can
manage Information, that would change the
way we run our business?
• BYOD & Enterprise Mobility. How to manage
mobile strategies enabling the mobile employee
with computing everywhere around them?
• Mobile & Cloud Security. Creating a balance
between the need to protect the organization
and the need to operate the business?
• Decision Supporting Systems. The increased
use of computing machines in decision
making to extend into the realm of financial
decisions such as FX trading, lending, e.t.c.
NEED FOR IT GOVERNANCE - TIE TOGETHER EMERGING TECH PROCESSES
12
• Crowd sourcing. Connecting more and more
employers through remote, distributed channels
with other employees in different places all over the
world.
• Desktop Virtualization and Cloud Client-
Computing. Empowering employees and IT with
secure, reliable desktop virtualization
• Web-Scale IT: The Enterprise Impact. Delivering
seamless user services on a massive scale using Open
technologies (Hardware, Software, Agile Software
Methods)
• Identity & Access Management. Preparing enterprise
infrastructure for a stateless identity; Protect and
monitor enterprise assets and processes anytime,
anywhere.
BENEFITS OF IT
GOVERNANCE
13
IT GOVERNANCE FAILURES
14
• In 2005, Ford Motor spent a whopping $400 million on a purchasing system,
only to abandon it.
• Canadian Blood Services’ Enterprise Resource Planning rollout failed and
abandoned
• By Meta Group, 60 to 80 per cent of project failures can be attributed
directly to poor requirements gathering analysis and management.
• Carnegie Mellon says 25 to 40 per cent of all spending on IT projects is
wasted as a result of re-work
NEEDS, ISSUES AND CHALLENGES
15
Procedure, Audits, Metrics
Control
Strategic
Tactical
Operations
Demand
IT and
Business
Resources
Supply
Capital, Capacity, Priorities
Planning
Alignment Flexibility
EfficiencyQuality
Lack of Business aligned strategy
Reduce costs across businessIneffective project Management
Deployment Complexity through lack
of standard & legacy
No Audit Trails
Management of Service Changes
Must reduce IT costs by 30%
Lack of IT resource transparency
Missed targets due to lack of steering control
Deployment Complexity in number of
project
Cannot aggregate need and distribute
ROI
No means of governing outsourced contracts
No means of capturing demands
No means of prioritization of
business need
No means of reporting SLA
Making new outsourcing decisions
EXPECTED OUTCOMES
Tighter IT-
Business alignment
Reduced
Operational
Criticality/Risk
Improved
Value Delivery and
Benefits Realization
Enhanced IT
Resource
Management
Improved
Performance
Management
Improved IT
Coverage
Integration with
other best practice
standards.
16
TANGIBLE BENEFITS
17
Cost avoidance
• Stop projects unlikely to deliver expected business value
• Save by avoiding investment in non-viable projects
• Reduce IT spend not aligned to IT strategy reduced
• Reduce IT project scope change orders
Cost reduction
• Reduce “At risk” projects
• Reduce IT expenditure s
• IT budget on target
Efficiency gains
• Greater IT-Business Alignment
• Increased Stakeholder value
• Reduced project funding process
• Reduce Schedule tracking and updating lead time
• Increase in Reporting efficiency of IT processes
• Increase in IT productivity, delivery and quality
• Increase Project management efficiency
• Reduce Demand queue
IMPLEMENTATION METHODOLOGY
AND APPROACH
18
IT GOVERNANCE FRAMEWORKS
19
There are quite a few supporting references that can be useful guides to the implementation of
information and technology (IT) governance. Some of them are:
• COBIT 5
• ISO 38500
COBIT 5 PRINCIPLES
20
• COBIT 5 helps enterprises create
optimal value from IT by maintaining
a balance between realising benefits
and optimising risk levels and
resource use.
• COBIT 5 enables information and
related technology to be governed
and managed in a holistic manner for
the entire enterprise, taking in the
full end-to-end business and
functional areas of responsibility,
considering the IT-related interests
of internal and external stakeholders.
• The COBIT 5 principles and enablers
are generic and useful for enterprises
of all sizes, whether commercial, not-
for-profit or in the public sector.
COBIT 5 - GOVERNANCE & MANAGEMENT AREAS
21
• Governance ensures that enterprise
objectives are achieved by evaluating
stakeholder needs, conditions and
options; setting direction through
prioritisation and decision making;
and monitoring performance,
compliance and progress against
agreed-on direction and objectives
(EDM).
• Management plans, builds, runs and
monitors activities in alignment with
the direction set by the governance
body to achieve the enterprise
objectives (P B R M).
COBIT 5 ENTERPRISE ENABLERS
22
1. Principles, policies and
frameworks
2. Processes
3. Organisational structures
4. Culture, ethics and
behaviour
5. Information
6. Services, infrastructure
and applications
7. People, skills and
competencies
COBIT 5 Process Model
23
ISO/IEC 38500:2015
• ISO/IEC 38500:2015, Corporate governance of information technology, is applicable to organizations of
all sizes, including public and private companies, government entities, and not-for-profit organizations.
• The standard provides a framework for effective governance of IT to assist those at the highest level of
organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their
organizations’ use of IT.
• The framework comprises definitions, principles and a model. It sets out six principles for good corporate
governance of IT that express preferred behavior to guide decision making:
www.digitaljewels.net24
Six principles
for good
corporate
governance
of IT
Responsibility
Strategy
Acquisition
Performance
Conformance
Human
Behaviour
MODEL FOR GOVERNANCE OF IT - ISO 38500:2015
25
IT GOVERNANCE IMPLEMENTATION APPROACH & METHODOLOGY
26
Execute
IT Governance
Assessment
Setup
IT Governance
Framework
Design
IT Governance
Processes
Implement
Supporting Tools
•Execute assessment to identify gaps
•Define new role of IT in organization
•Define evolution roadmap to address the gaps
•Define roles and responsibilities
•Setup communication path to support IT-business alignment
•Define management structures for decision making, reporting and escalation
•Define policies
•Define processes
•Define KPIs and reporting requirements
•Implement tool to support the execution of the solution
•Implement tools for data collection and management reporting
Continuous
Improvement Plan
(Control Lifecycle)
•Identify indicators to monitor strategy execution
•Define steering committee to manage relationships within IT and between
business & IT
•Review IT strategy periodically and evolve governance environment
CRITICAL SUCCESS FACTORS
27
Critical Success Factors
• Clarity of Purpose
• Executive or Top Management commitment & buy-in: active &
sustained
• Prompt approval and implementation of recommendations from
the assessment
• Management of Business Change
• Focus, execute and enforce
• Measure achievable targets and
expectations
• Don’t over-engineer IT Governance
• Evolution not revolution
• Competence resource sufficiency &
availability
CONSTRAINTS
29
• Senior management not engaging IT
– Unwillingness to involve IT in decision making
• Poor Risk Management
– Not assessing likely potential threats
• Poor Strategic Alignment
– Little or no business value derived
from major IT investments
• Ineffective Resource &
Resource Mgt
– Ensure timely availability of people,
technology and financial resources.
www.digitaljewels.net30
?
QUESTIONS
THANK YOU
+234099930209
dapoo@digitaljewels.net
www.digitaljewels.net
ng.linkedin.com/in/dapoo
for your time & attention…
A presentation by Oladapo OGUNDEJI.
CTO / CISO, Digital Jewels Ltd
dapoo@digitaljewels.net

More Related Content

What's hot

cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdfmohammed539963
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1Richard Willis
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFxavblai
 
An Introduction to IT Management with COBIT 2019
An Introduction to IT Management with COBIT 2019An Introduction to IT Management with COBIT 2019
An Introduction to IT Management with COBIT 2019Gregor Polančič
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Alan McSweeney
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentationjmcarden
 
Presentation: Enterprise Architecture design In 3 Minutes or so
Presentation: Enterprise Architecture design In 3 Minutes or soPresentation: Enterprise Architecture design In 3 Minutes or so
Presentation: Enterprise Architecture design In 3 Minutes or soAdrian Grigoriu
 
Enterprise Architecture basics
Enterprise Architecture basicsEnterprise Architecture basics
Enterprise Architecture basicsMahdi Ameri
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
IT Service Management Overview
IT Service Management OverviewIT Service Management Overview
IT Service Management OverviewAhmed Al-Hadidi
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introductionaqel aqel
 
Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy Mohan K.
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 

What's hot (20)

cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdf
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...Introduction to Enterprise architecture and the steps to perform an Enterpris...
Introduction to Enterprise architecture and the steps to perform an Enterpris...
 
What is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAFWhat is the Value of Mature Enterprise Architecture TOGAF
What is the Value of Mature Enterprise Architecture TOGAF
 
An Introduction to IT Management with COBIT 2019
An Introduction to IT Management with COBIT 2019An Introduction to IT Management with COBIT 2019
An Introduction to IT Management with COBIT 2019
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
IT Strategy
IT StrategyIT Strategy
IT Strategy
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 
Presentation: Enterprise Architecture design In 3 Minutes or so
Presentation: Enterprise Architecture design In 3 Minutes or soPresentation: Enterprise Architecture design In 3 Minutes or so
Presentation: Enterprise Architecture design In 3 Minutes or so
 
Enterprise Architecture basics
Enterprise Architecture basicsEnterprise Architecture basics
Enterprise Architecture basics
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
IT Service Management Overview
IT Service Management OverviewIT Service Management Overview
IT Service Management Overview
 
Cobit 5 - An Overview
Cobit 5 - An OverviewCobit 5 - An Overview
Cobit 5 - An Overview
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT Architecture
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy Design Architecture Review Board (ARB) to Enable Digital Strategy
Design Architecture Review Board (ARB) to Enable Digital Strategy
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 

Similar to IT Governance – The missing compass in a technology changing world

IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricPECB
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyJohn Halliday
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee
 
Indus productization-brief
Indus productization-briefIndus productization-brief
Indus productization-briefindusaviation
 
IT Capabilty Assessment 150713
IT Capabilty Assessment 150713IT Capabilty Assessment 150713
IT Capabilty Assessment 150713Peter Maddigan
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsGoutama Bachtiar
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of ITAyelet Baron
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022Ray Bugg
 
Career sessions IM
Career sessions IMCareer sessions IM
Career sessions IMSupportGCI
 
Arquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digitalArquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digital★ Pedro Del Castillo ★
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxbartholomeocoombs
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxketurahhazelhurst
 
Maximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT GovernanceMaximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT GovernanceCognizant
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue ResumePaul Gue
 
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT StrategyICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT StrategyMohammad Abdul Matin Emon
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportPaul Woudstra
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeFresche Solutions
 

Similar to IT Governance – The missing compass in a technology changing world (20)

IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance Metric
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27
 
Indus productization-brief
Indus productization-briefIndus productization-brief
Indus productization-brief
 
IT Capabilty Assessment 150713
IT Capabilty Assessment 150713IT Capabilty Assessment 150713
IT Capabilty Assessment 150713
 
Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022
 
Career sessions IM
Career sessions IMCareer sessions IM
Career sessions IM
 
Arquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digitalArquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digital
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
Maximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT GovernanceMaximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT Governance
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue Resume
 
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT StrategyICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
 
resume.smrozMA
resume.smrozMAresume.smrozMA
resume.smrozMA
 
Craig E. Laski,ITIL.PMP,SSGB resume
Craig E. Laski,ITIL.PMP,SSGB resumeCraig E. Laski,ITIL.PMP,SSGB resume
Craig E. Laski,ITIL.PMP,SSGB resume
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

IT Governance – The missing compass in a technology changing world

  • 1. IT GOVERNANCE – THE MISSING COMPASS IN A TECHNOLOGY CHANGING WORLD 09/02/2016 1 By Oladapo Ogundeji : CTO/CISO, Digital Jewels Ltd. Nigeria.
  • 2. www.digitaljewels.net2 Oladapo Ogundeji CTO/CISO - Digital Jewels Oladapo Ogundeji is Chief Technical Officer at Digital Jewels. Mr. Ogundeji is PECB partner and has more than 18 years of experience. +234099930209 dapoo@digitaljewels.net ng.linkedin.com/in/dapoo www.digitaljewels.net
  • 3. Profile : Oladapo Ogundeji.  Professional career extends over 18 years of experience focused on enhancing the strategic value of ICT in organisations through process re-engineering, strategic planning and project management for corporate objective & strategy that address business opportunities and issues.  A highly trained ICT Management Specialist & Consultant.  Masters In Information Technology ( M.I.T )  B. Sc. Electronics & Electrical Engineering. Past roles/positions  Head of User Support & Service Desk  IT Manager  Project Manager – Technical Services  Deputy Head – Network Systems  Project Leader  Project / System Engineer CTO/CISO - Digital Jewels Limited. A specialised Information Value Chain Consulting Firm offering specialised IT & PM Consulting & Capacity Building Services Contact: +234099930209 ; dapoo@digitaljewels.net
  • 4. QUALIFICATIONS...  COBIT 4.1/5.0 Foundation & Certified Trainer  Business Continuity Management : ISO22301/ BS25999 Certified MASTER & Accredited Trainer  ISO 27001 Certified Lead Implementer Certified & Trainer  Certified IT Business Manager (ITBMC)  PRINCE2 Foundation Certificate (Project Management Methodology).  ISACA : C I S A // C I S M // C G E I T  IT Service Management Foundation (I T I L)  RAD Datacommunication Specialist & Engineer.  HP (COMPAQ) : Accredited Compaq Technician (A C T) // Accredited Platform Specialist (A P S)  Microsoft Certified Professional: ( M C P) // Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified System Engineer : ( M C S E) // Microsoft Sales Specialist : ( M S S)  Cisco Certified Network Associate ( C C N A ) // Cisco Certified Network Professional ( C C N P ) // Cisco Certified Design Associate ( C C D A ) // Cisco Certified Design Professional ( C C D P ) // Cisco Sales Expert (CSE )  BICC Brand-Rex (Structured Cabling) Certified Installer.  TOGAF 9.1 Certified [+ Foundation]  MoR (Management of Risk) Certified & Accredited Trainer
  • 5. Overview of IT Governance Benefits of IT Governance IT Governance Implementation : Approach and Methodology Critical Success Factors AGENDA
  • 7. WHAT IS IT GOVERNANCE 7 IT governance is the formal process of defining the strategy of the IT organization and overseeing its execution to achieve the goals of the enterprise. Decision rights framework & mechanisms Vision, goals/priorities, measures; value prop & service portfolio; resource approaches & commitments; change management plans Aligned/synchronized with the enterprise strategy, including other key asset strategies Translation into aligned, tactical, operational plans; closed-loop monitoring & control; accountability; regulatory compliance
  • 8. IT: A DOUBLE ENDED SWORD… • Increased complexity, speed, interconnectivity and globalisation mean more than ever that IT: Offers extraordinary opportunities to enable & transform business. Involves huge costs & enormous risks.
  • 9. WHY IT GOVERNANCE: …BALANCING AMONG MANY COMPETING PRIORITIES 9 IT Governance Priorities Maximize Return: a. Improve business results b. Grow revenue and earnings c. Cash flow d. Reduced cost-of-operation Increase agility a. Enable the business organizations and operations to adapt to changing business needs Improve performance: a. Improve business operations performance end-to-end across the enterprise b. Increase customer and employee satisfaction Mitigate Risk: a. Ensure security and continuity of internal business operations while maximizing exposure to external risk factors
  • 10. CORE COMPETENCIES FOR IT GOVERNANCE 10 Enterprise Architecture Management Relationship Management IT Strategy Management Financial Management Supply / Demand Management Portfolio Management IT Operating Model • Align operational and strategic IT investments to business strategies & objectives. • Establish policies, standards, models and processes for managing IT as an enterprise asset • Lifecycle management of infrastructure, applications and services • Understand the drivers of IT costs to allocate appropriate costs to the consumers of IT services. • Establish effective, collaborative relationships with business stakeholders and suppliers. • Balance the demand for IT services with available resources to meet immediate and strategic goals.
  • 11. NEED FOR IT GOVERNANCE - GOVERNANCE OF EMERGING TECHNOLOGIES 11 • Big Data Management & Analytics. How we can manage Information, that would change the way we run our business? • BYOD & Enterprise Mobility. How to manage mobile strategies enabling the mobile employee with computing everywhere around them? • Mobile & Cloud Security. Creating a balance between the need to protect the organization and the need to operate the business? • Decision Supporting Systems. The increased use of computing machines in decision making to extend into the realm of financial decisions such as FX trading, lending, e.t.c.
  • 12. NEED FOR IT GOVERNANCE - TIE TOGETHER EMERGING TECH PROCESSES 12 • Crowd sourcing. Connecting more and more employers through remote, distributed channels with other employees in different places all over the world. • Desktop Virtualization and Cloud Client- Computing. Empowering employees and IT with secure, reliable desktop virtualization • Web-Scale IT: The Enterprise Impact. Delivering seamless user services on a massive scale using Open technologies (Hardware, Software, Agile Software Methods) • Identity & Access Management. Preparing enterprise infrastructure for a stateless identity; Protect and monitor enterprise assets and processes anytime, anywhere.
  • 14. IT GOVERNANCE FAILURES 14 • In 2005, Ford Motor spent a whopping $400 million on a purchasing system, only to abandon it. • Canadian Blood Services’ Enterprise Resource Planning rollout failed and abandoned • By Meta Group, 60 to 80 per cent of project failures can be attributed directly to poor requirements gathering analysis and management. • Carnegie Mellon says 25 to 40 per cent of all spending on IT projects is wasted as a result of re-work
  • 15. NEEDS, ISSUES AND CHALLENGES 15 Procedure, Audits, Metrics Control Strategic Tactical Operations Demand IT and Business Resources Supply Capital, Capacity, Priorities Planning Alignment Flexibility EfficiencyQuality Lack of Business aligned strategy Reduce costs across businessIneffective project Management Deployment Complexity through lack of standard & legacy No Audit Trails Management of Service Changes Must reduce IT costs by 30% Lack of IT resource transparency Missed targets due to lack of steering control Deployment Complexity in number of project Cannot aggregate need and distribute ROI No means of governing outsourced contracts No means of capturing demands No means of prioritization of business need No means of reporting SLA Making new outsourcing decisions
  • 16. EXPECTED OUTCOMES Tighter IT- Business alignment Reduced Operational Criticality/Risk Improved Value Delivery and Benefits Realization Enhanced IT Resource Management Improved Performance Management Improved IT Coverage Integration with other best practice standards. 16
  • 17. TANGIBLE BENEFITS 17 Cost avoidance • Stop projects unlikely to deliver expected business value • Save by avoiding investment in non-viable projects • Reduce IT spend not aligned to IT strategy reduced • Reduce IT project scope change orders Cost reduction • Reduce “At risk” projects • Reduce IT expenditure s • IT budget on target Efficiency gains • Greater IT-Business Alignment • Increased Stakeholder value • Reduced project funding process • Reduce Schedule tracking and updating lead time • Increase in Reporting efficiency of IT processes • Increase in IT productivity, delivery and quality • Increase Project management efficiency • Reduce Demand queue
  • 19. IT GOVERNANCE FRAMEWORKS 19 There are quite a few supporting references that can be useful guides to the implementation of information and technology (IT) governance. Some of them are: • COBIT 5 • ISO 38500
  • 20. COBIT 5 PRINCIPLES 20 • COBIT 5 helps enterprises create optimal value from IT by maintaining a balance between realising benefits and optimising risk levels and resource use. • COBIT 5 enables information and related technology to be governed and managed in a holistic manner for the entire enterprise, taking in the full end-to-end business and functional areas of responsibility, considering the IT-related interests of internal and external stakeholders. • The COBIT 5 principles and enablers are generic and useful for enterprises of all sizes, whether commercial, not- for-profit or in the public sector.
  • 21. COBIT 5 - GOVERNANCE & MANAGEMENT AREAS 21 • Governance ensures that enterprise objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritisation and decision making; and monitoring performance, compliance and progress against agreed-on direction and objectives (EDM). • Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives (P B R M).
  • 22. COBIT 5 ENTERPRISE ENABLERS 22 1. Principles, policies and frameworks 2. Processes 3. Organisational structures 4. Culture, ethics and behaviour 5. Information 6. Services, infrastructure and applications 7. People, skills and competencies
  • 23. COBIT 5 Process Model 23
  • 24. ISO/IEC 38500:2015 • ISO/IEC 38500:2015, Corporate governance of information technology, is applicable to organizations of all sizes, including public and private companies, government entities, and not-for-profit organizations. • The standard provides a framework for effective governance of IT to assist those at the highest level of organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their organizations’ use of IT. • The framework comprises definitions, principles and a model. It sets out six principles for good corporate governance of IT that express preferred behavior to guide decision making: www.digitaljewels.net24 Six principles for good corporate governance of IT Responsibility Strategy Acquisition Performance Conformance Human Behaviour
  • 25. MODEL FOR GOVERNANCE OF IT - ISO 38500:2015 25
  • 26. IT GOVERNANCE IMPLEMENTATION APPROACH & METHODOLOGY 26 Execute IT Governance Assessment Setup IT Governance Framework Design IT Governance Processes Implement Supporting Tools •Execute assessment to identify gaps •Define new role of IT in organization •Define evolution roadmap to address the gaps •Define roles and responsibilities •Setup communication path to support IT-business alignment •Define management structures for decision making, reporting and escalation •Define policies •Define processes •Define KPIs and reporting requirements •Implement tool to support the execution of the solution •Implement tools for data collection and management reporting Continuous Improvement Plan (Control Lifecycle) •Identify indicators to monitor strategy execution •Define steering committee to manage relationships within IT and between business & IT •Review IT strategy periodically and evolve governance environment
  • 28. Critical Success Factors • Clarity of Purpose • Executive or Top Management commitment & buy-in: active & sustained • Prompt approval and implementation of recommendations from the assessment • Management of Business Change • Focus, execute and enforce • Measure achievable targets and expectations • Don’t over-engineer IT Governance • Evolution not revolution • Competence resource sufficiency & availability
  • 29. CONSTRAINTS 29 • Senior management not engaging IT – Unwillingness to involve IT in decision making • Poor Risk Management – Not assessing likely potential threats • Poor Strategic Alignment – Little or no business value derived from major IT investments • Ineffective Resource & Resource Mgt – Ensure timely availability of people, technology and financial resources.
  • 31. for your time & attention… A presentation by Oladapo OGUNDEJI. CTO / CISO, Digital Jewels Ltd dapoo@digitaljewels.net