SlideShare a Scribd company logo
1 of 13
COBIT(Control Objectives
for Information and Related
Technologies)
Presenter: Hamza Jamil
Agenda
• Introduction
• What is COBIT?
• COBIT Framework Components
• COBIT Domains
• Benefits of COBIT
• COBIT Implementation Process
• COBIT Maturity Models
• Case Study
• Conclusion
Introduction to COBIT: Control Objectives
for Information and Related Technologies
• What COBIT is and its importance in managing and governing IT
processes and systems.
What is COBIT?
• COBIT as a framework for managing and governing IT processes and
systems.
• Ensure IT aligns with business objectives and controlling IT-related
risks.
• Evolution over time
COBIT Framework Components
Four main components of the COBIT framework:
• Governance and Management Objectives
• Control Objectives
• Management Guidelines
• Maturity Models
COBIT Domains
• Present the COBIT domains (also known as governance and management
areas):
• Evaluate, Direct, and Monitor (EDM)
• Align, Plan, and Organize (APO)
• Build, Acquire, and Implement (BAI)
• Deliver, Service, and Support (DSS)
• Monitor, Evaluate, and Assess (MEA)
Benefits of COBIT
• Improved IT governance and decision-making processes
• Enhanced risk management and compliance
• Effective resource utilization
• Increased business-IT alignment
• Standardized IT practices and processes
COBIT Implementation Process
• Initiate the project and gain management support
• Assess the current state of IT governance and identify gaps
• Define and prioritize improvement areas
• Develop a roadmap for COBIT implementation
• Implement and monitor the changes
• Continuously evaluate and improve the IT governance processes
COBIT Maturity Models
• Explanation for the COBIT maturity models.
• Role in assessing the organization's maturity level in each COBIT
domain.
• Benefits and role in providing a roadmap for progression.
Case study
• Company XYZ
• Positive Outcomes:
• 1. Enhanced Alignment:
• 2. Strengthened Risk Management
• 3. Improved Decision-making
• 4. Regulatory Compliance
Conclusion
• COBIT is a framework for managing and governing IT processes and systems
within organizations.
• It is crucial for organizations to have effective IT governance and risk
management practices to ensure alignment with business objectives and
control IT-related risks.
• COBIT provides a comprehensive set of guidelines, best practices, and control
objectives to help organizations achieve these goals.
• The four main components of COBIT include Governance and Management
Objectives, Control Objectives, Management Guidelines, and Maturity Models.
• Organizations are encouraged to explore COBIT further and consider its
implementation to improve their IT governance, manage risks, and drive
business value through effective IT practices.
COBIT.pptx

More Related Content

Similar to COBIT.pptx

Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Meghna Verma
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance FrameworkSherri Booher
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008ssusera19f45
 
Cobit 4.1 ivooktavianti
Cobit 4.1 ivooktaviantiCobit 4.1 ivooktavianti
Cobit 4.1 ivooktaviantiIvo Oktavianti
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5Eryk Budi Pratama
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfMarkMandeoya
 
L 3 - Management goals and objectives.ppt
L 3 - Management goals and objectives.pptL 3 - Management goals and objectives.ppt
L 3 - Management goals and objectives.pptJeremiahLukwesa
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsCTE Solutions Inc.
 

Similar to COBIT.pptx (20)

Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 
Darmin ritonga 11353205418
Darmin ritonga 11353205418Darmin ritonga 11353205418
Darmin ritonga 11353205418
 
IT Govenence.pptx
IT Govenence.pptxIT Govenence.pptx
IT Govenence.pptx
 
It goverence
It goverenceIt goverence
It goverence
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
ITIL vs. COBIT
ITIL vs. COBITITIL vs. COBIT
ITIL vs. COBIT
 
Cobit 4.1 ivo oktavianti
Cobit 4.1 ivo oktaviantiCobit 4.1 ivo oktavianti
Cobit 4.1 ivo oktavianti
 
Cobit 4.1 ivooktavianti
Cobit 4.1 ivooktaviantiCobit 4.1 ivooktavianti
Cobit 4.1 ivooktavianti
 
Cobit 4.1 ivo oktavianti
Cobit 4.1 ivo oktaviantiCobit 4.1 ivo oktavianti
Cobit 4.1 ivo oktavianti
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdf
 
L 3 - Management goals and objectives.ppt
L 3 - Management goals and objectives.pptL 3 - Management goals and objectives.ppt
L 3 - Management goals and objectives.ppt
 
COBIT 5.0 vs COBIT 2019
COBIT 5.0 vs COBIT 2019COBIT 5.0 vs COBIT 2019
COBIT 5.0 vs COBIT 2019
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE Solutions
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

COBIT.pptx

  • 1.
  • 2. COBIT(Control Objectives for Information and Related Technologies) Presenter: Hamza Jamil
  • 3. Agenda • Introduction • What is COBIT? • COBIT Framework Components • COBIT Domains • Benefits of COBIT • COBIT Implementation Process • COBIT Maturity Models • Case Study • Conclusion
  • 4. Introduction to COBIT: Control Objectives for Information and Related Technologies • What COBIT is and its importance in managing and governing IT processes and systems.
  • 5. What is COBIT? • COBIT as a framework for managing and governing IT processes and systems. • Ensure IT aligns with business objectives and controlling IT-related risks. • Evolution over time
  • 6. COBIT Framework Components Four main components of the COBIT framework: • Governance and Management Objectives • Control Objectives • Management Guidelines • Maturity Models
  • 7. COBIT Domains • Present the COBIT domains (also known as governance and management areas): • Evaluate, Direct, and Monitor (EDM) • Align, Plan, and Organize (APO) • Build, Acquire, and Implement (BAI) • Deliver, Service, and Support (DSS) • Monitor, Evaluate, and Assess (MEA)
  • 8. Benefits of COBIT • Improved IT governance and decision-making processes • Enhanced risk management and compliance • Effective resource utilization • Increased business-IT alignment • Standardized IT practices and processes
  • 9. COBIT Implementation Process • Initiate the project and gain management support • Assess the current state of IT governance and identify gaps • Define and prioritize improvement areas • Develop a roadmap for COBIT implementation • Implement and monitor the changes • Continuously evaluate and improve the IT governance processes
  • 10. COBIT Maturity Models • Explanation for the COBIT maturity models. • Role in assessing the organization's maturity level in each COBIT domain. • Benefits and role in providing a roadmap for progression.
  • 11. Case study • Company XYZ • Positive Outcomes: • 1. Enhanced Alignment: • 2. Strengthened Risk Management • 3. Improved Decision-making • 4. Regulatory Compliance
  • 12. Conclusion • COBIT is a framework for managing and governing IT processes and systems within organizations. • It is crucial for organizations to have effective IT governance and risk management practices to ensure alignment with business objectives and control IT-related risks. • COBIT provides a comprehensive set of guidelines, best practices, and control objectives to help organizations achieve these goals. • The four main components of COBIT include Governance and Management Objectives, Control Objectives, Management Guidelines, and Maturity Models. • Organizations are encouraged to explore COBIT further and consider its implementation to improve their IT governance, manage risks, and drive business value through effective IT practices.