SlideShare a Scribd company logo
www.infosectrain.com
PART 1 – CISA Domain 2 – Governance and
Management of IT
InfosecTrain
About Us
InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings
and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals,
who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas
of Information Technology and Cyber Security.
4
PA RT 1 – C I SA D o m a i n 2 – G o ve r n a n c e a n d M a n a ge m e nt o f I T
T h i s a r t i c l e c o v e r s –
➢ O v e r a l l u n d e r s t a n d i n g o f t h e d o m a i n
➢ I m p o r t a n t c o n c e p t s t o f o c u s o n f r o m e x a m p o i n t o f v i e w
T h e a r t i c l e i s s p l i t i n t o 5 p a r t s a s b e l o w :
• Part 1 – Corporate Governance, Governance of Enterprise IT (GEIT), Auditor’s role in GEIT
• Part 2 – IT Balanced Score Card (BSC), IT Governing Committee (IT Strategy and Steering committee), Maturity and
process improvement models
• Part 3 – Risk Management, Human Resource Management, Sourcing Practices
• Part 4 – Information Security – Roles and Responsibilities, Business Continuity Planning (BCP), Business Impact Analysis
(BIA)
• Part 5 – Classification of Systems and criticality analysis, Components of Business Continuity Planning (BCP), Plan
Testing.
C C I S O C e r t i f i c a t i o n
5
➢ Overall understanding of the domain
What is Corporate Governance?
What is Governance of Enterprise IT (GEIT)?
What is the role of auditor in GEIT?
➢ K n o w l e d g e o f t h e o r g a n i z a t i o n ’s t e c h n o l o g y d i r e c t i o n a n d I T a r c h i t e c t u r e a n d t h e i r
i m p l i c a t i o n s f o r s e t t i n g l o n g - t e r m s t r a t e g i c d i r e c t i o n s
➢ K n o w l e d g e o f t h e p r o c e s s e s f o r t h e d e v e l o p m e n t , i m p l e m e n t a t i o n a n d m a i n t e n a n c e
o f I T s t r a t e g y, p o l i c i e s , s t a n d a r d s a n d p r o c e d u r e s
➢ K n o w l e d g e o f t h e u s e o f c a p a b i l i t y a n d m a t u r i t y m o d e l s
➢ K n o w l e d g e o f p r o c e s s o p t i m i z a t i o n t e c h n i q u e s
➢ K n o w l e d g e o f I T r e s o u r c e i n v e s t m e n t a n d a l l o c a t i o n p r a c t i c e s , i n c l u d i n g
p r i o r i t i z a t i o n c r i t e r i a ( e . g . , p o r t f o l i o m a n a g e m e n t , v a l u e m a n a g e m e n t , p e r s o n n e l
m a n a g e m e n t
➢ K n o w l e d g e o f I T s u p p l i e r s e l e c t i o n , c o n t r a c t m a n a g e m e n t , r e l a t i o n s h i p
m a n a g e m e n t a n d p e r f o r m a n c e m o n i t o r i n g p r o c e s s e s i n c l u d i n g t h i r d p a r t y
o u t s o u r c i n g r e l a t i o n s h i p s
PA RT 1 – C I S A D o m a i n 2 – G o v e r n a n ce a n d M a n a g e m e nt o f I T
6
➢ K n o w l e d g e o f e n t e r p r i s e r i s k m a n a g e m e n t ( E R M )
➢ K n o w l e d g e o f p r a c t i c e s f o r m o n i t o r i n g a n d r e p o r t i n g o f c o n t r o l s p e r f o r m a n c e ( e . g . ,
c o n t i n u o u s m o n i t o r i n g , q u a l i t y a s s u r a n c e [ Q A ] )
➢ K n o w l e d g e o f q u a l i t y m a n a g e m e n t a n d q u a l i t y a s s u r a n c e ( Q A ) s y s t e m s
➢ K n o w l e d g e o f p r a c t i c e s f o r m o n i t o r i n g a n d r e p o r t i n g o f I T p e r f o r m a n c e ( e . g . , b a l a n c e d
s c o r e c a r d s [ B S C s ] , k e y p e r f o r m a n c e i n d i c a t o r s [ K P I s ] )
➢ K n o w l e d g e o f b u s i n e s s i m p a c t a n a l y s i s ( B I A )
➢ K n o w l e d g e o f t h e s t a n d a r d s a n d p r o c e d u r e s f o r t h e d e v e l o p m e n t , m a i n t e n a n c e a n d
t e s t i n g o f t h e b u s i n e s s c o n t i n u i t y p l a n ( B C P )
➢ K n o w l e d g e o f p r o c e d u r e s u s e d t o i n v o k e a n d e x e c u t e t h e b u s i n e s s c o n t i n u i t y p l a n a n d
r e t u r n t o n o r m a l o p e r a t i o n s
7
I m p o r ta nt c o n c e pt s f ro m exa m p o i nt o f v i e w :
➢ I t i s a s y s t e m b y w h i c h e n t i t y i s c o n t r o l l e d a n d d i r e c t e d
➢ S e t o f r e s p o n s i b i l i t i e s a n d p r a c t i c e s w h o p r o v i d e s t r a t e g i c d i r e c t i o n s , t h e r e b y
e n s u r i n g t h a t
• Goals are achievable,
• Risk are properly addressed and
• Organizational resources are properly utilized
➢ I n v o l v e s a s e t o f r e l a t i o n s h i p s b e t w e e n a c o m p a n y ’s m a n a g e m e n t , i t s b o a r d , i t s
s h a r e h o l d e r s a n d o t h e r s t a k e h o l d e r s
8
➢ G E I T i s o n e o f t h e d o m a i n s o f C o r p o r a t e g o v e r n a n c e
➢ G E I T i s a s y s t e m i n w h i c h a l l s t a k e h o l d e r s , i n c l u d i n g t h e b o a r d , s e n i o r m a n a g e m e n t ,
i n t e r n a l c u s t o m e r s a n d d e p a r t m e n t s s u c h a s f i n a n c e , p r o v i d e i n p u t i n t o t h e d e c i s i o n -
m a k i n g p r o c e s s .
➢ G E I T i s t h e r e s p o n s i b i l i t y o f t h e b o a r d o f d i r e c t o r s a n d e x e c u t i v e m a n a g e m e n t .
9
➢ P u r p o s e s o f G E I T a r e :
• to direct IT endeavors to ensure that IT performance meets the objectives of aligning IT with the enterprise’s objectives
and the realization of promised benefits
• enable the enterprise by exploiting opportunities and maximizing benefits
• IT resources should be used responsibly, and IT-related risk should be managed Appropriately
➢ K e y e l e m e n t o f G E I T i s t h e a l i g n m e n t o f b u s i n e s s a n d I T, l e a d i n g t o t h e a c h i e v e m e n t
o f b u s i n e s s v a l u e .
➢ E xa m p l e s o f G E I T i n c l u d e s t h e fo l l o w i n g :
• COBIT 5 is developed by ISACA, which includes five principles, five domains, 37 processes and 210 practices
• The International Organization for Standardization (ISO)/International Electro-technical Commission (IEC) 27001 (ISO
27001) – provides guidance to organizations implementing and maintaining information security programs.
• The Information Technology Infrastructure Library (ITIL) was developed by the UK Office of Government Commerce
(OGC)
• ISO/IEC 38500:2008 Corporate governance of information technology
• ISO/IEC 20000 is a specification for service management that is aligned with ITIL’s service management framework
10
11
➢ To p r o v i d e l e a d i n g p r a c t i c e r e c o m m e n d a t i o n s t o s e n i o r m a n a g e m e n t t o h e l p
i m p r o v e t h e q u a l i t y a n d e f f e c t i v e n e s s o f t h e I T g o v e r n a n c e i n i t i a t i v e s
i m p l e m e n t e d .
➢ H e l p s e n s u r e c o m p l i a n c e w i t h G E I T i n i t i a t i v e s i m p l e m e n t e d w i t h i n a n o r g a n i z a t i o n
➢ c o n t i n u o u s m o n i t o r i n g , a n a l y s i s a n d e v a l u a t i o n o f m e t r i c s a s s o c i a t e d w i t h G E I T
i n i t i a t i v e s r e q u i r e a n i n d e p e n d e n t a n d b a l a n c e d v i e w t o e n s u r e a q u a l i t a t i v e
a s s e s s m e n t t h a t s u b s e q u e n t l y f a c i l i t a t e s t h e q u a l i t a t i v e i m p r o v e m e n t o f I T
p r o c e s s e s a n d a s s o c i a t e d G E I T i n i t i a t i v e s
➢ To c h e c k o n a l i g n m e n t o f t h e I T f u n c t i o n w i t h t h e o r g a n i z a t i o n ’s m i s s i o n , v i s i o n ,
v a l u e s , o b j e c t i v e s a n d s t r a t e g i e s
➢ To e n s u r e c o m p l i a n c e w i t h l e g a l , e n v i r o n m e n t a l , i n f o r m a t i o n q u a l i t y, f i d u c i a r y,
s e c u r i t y a n d p r i v a c y r e q u i r e m e n t s
12
OUR CONTACT
A B O U T O U R C O M PA N Y
InfosecTrain welcomes overseas customers to come and attend
training sessions in destination cities across the globe and enjoy their
learning experience at the same time.
1800-843-7890
sales@infosectrain.co
m
www.infosectrain.com
https://www.facebook.com/Infosectrain/
https://www.linkedin.com/company/infosec-train/
https://www.youtube.com/c/InfosecTrain

More Related Content

What's hot

Company Profile 2014 (Before Rebranding)
Company Profile 2014 (Before Rebranding)Company Profile 2014 (Before Rebranding)
Company Profile 2014 (Before Rebranding)
Tonny Tok
 
Accounting Class Project - Creating a Private Placement Memorandum
Accounting Class Project - Creating a Private Placement MemorandumAccounting Class Project - Creating a Private Placement Memorandum
Accounting Class Project - Creating a Private Placement Memorandum
Quin T
 
WTIA Marketing Series: What Can You Learn from a Gaming Company
WTIA Marketing Series: What Can You Learn from a Gaming CompanyWTIA Marketing Series: What Can You Learn from a Gaming Company
WTIA Marketing Series: What Can You Learn from a Gaming Company
npyron
 
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
GoLeanSixSigma.com
 
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
DNX
 
Josh Griffin - Examples of Work
Josh Griffin - Examples of WorkJosh Griffin - Examples of Work
Josh Griffin - Examples of WorkJoshua Griffin
 
Know How: Graduates & Research Placement Application Form
Know How: Graduates & Research Placement Application FormKnow How: Graduates & Research Placement Application Form
Know How: Graduates & Research Placement Application Form
nearnow
 
Presentation For Minnor Project MCET
Presentation For Minnor Project MCETPresentation For Minnor Project MCET
Presentation For Minnor Project MCET
ShhuvradipChakrabort
 
AIE Ireland Task
AIE Ireland TaskAIE Ireland Task
AIE Ireland Task
Elio Laureano
 
GIS in Natural and Built Environments - Lecture 1
GIS in Natural and Built Environments - Lecture 1GIS in Natural and Built Environments - Lecture 1
GIS in Natural and Built Environments - Lecture 1Nicole Leslie
 
Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...
Національна комісія з цінних паперів та фондового ринку
 
Neigbourhood Planning, RCE Curitiba Parana
Neigbourhood Planning, RCE Curitiba ParanaNeigbourhood Planning, RCE Curitiba Parana
Neigbourhood Planning, RCE Curitiba Parana
Hanna Stahlberg
 
Audience theory
Audience theoryAudience theory
Audience theory
MatthewNothing
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summaryfsikipa
 
Gameful classroom description_math_land
Gameful classroom description_math_landGameful classroom description_math_land
Gameful classroom description_math_landKatefanelli
 
Business Intelligence - Measuring Success
Business Intelligence - Measuring SuccessBusiness Intelligence - Measuring Success
Business Intelligence - Measuring Success
Mirum India - A WPP Group Company
 
From Data to Knowledge
From Data to KnowledgeFrom Data to Knowledge
From Data to Knowledge
Fabien Richard
 
Product Management Lessons from Rose Yao
Product Management Lessons from Rose Yao Product Management Lessons from Rose Yao
Product Management Lessons from Rose Yao
AxiomZen
 
Engineer Internship
Engineer InternshipEngineer Internship
Engineer Internship
AIEIRELANDINTERNSHIP
 
Cv putri dwi jayanti
Cv putri dwi jayantiCv putri dwi jayanti
Cv putri dwi jayanti
Putri Dwi Jayanti
 

What's hot (20)

Company Profile 2014 (Before Rebranding)
Company Profile 2014 (Before Rebranding)Company Profile 2014 (Before Rebranding)
Company Profile 2014 (Before Rebranding)
 
Accounting Class Project - Creating a Private Placement Memorandum
Accounting Class Project - Creating a Private Placement MemorandumAccounting Class Project - Creating a Private Placement Memorandum
Accounting Class Project - Creating a Private Placement Memorandum
 
WTIA Marketing Series: What Can You Learn from a Gaming Company
WTIA Marketing Series: What Can You Learn from a Gaming CompanyWTIA Marketing Series: What Can You Learn from a Gaming Company
WTIA Marketing Series: What Can You Learn from a Gaming Company
 
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
PROJECT STORYBOARD: Increasing First Run Parts From 60% to 90%
 
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
 
Josh Griffin - Examples of Work
Josh Griffin - Examples of WorkJosh Griffin - Examples of Work
Josh Griffin - Examples of Work
 
Know How: Graduates & Research Placement Application Form
Know How: Graduates & Research Placement Application FormKnow How: Graduates & Research Placement Application Form
Know How: Graduates & Research Placement Application Form
 
Presentation For Minnor Project MCET
Presentation For Minnor Project MCETPresentation For Minnor Project MCET
Presentation For Minnor Project MCET
 
AIE Ireland Task
AIE Ireland TaskAIE Ireland Task
AIE Ireland Task
 
GIS in Natural and Built Environments - Lecture 1
GIS in Natural and Built Environments - Lecture 1GIS in Natural and Built Environments - Lecture 1
GIS in Natural and Built Environments - Lecture 1
 
Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...
 
Neigbourhood Planning, RCE Curitiba Parana
Neigbourhood Planning, RCE Curitiba ParanaNeigbourhood Planning, RCE Curitiba Parana
Neigbourhood Planning, RCE Curitiba Parana
 
Audience theory
Audience theoryAudience theory
Audience theory
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summary
 
Gameful classroom description_math_land
Gameful classroom description_math_landGameful classroom description_math_land
Gameful classroom description_math_land
 
Business Intelligence - Measuring Success
Business Intelligence - Measuring SuccessBusiness Intelligence - Measuring Success
Business Intelligence - Measuring Success
 
From Data to Knowledge
From Data to KnowledgeFrom Data to Knowledge
From Data to Knowledge
 
Product Management Lessons from Rose Yao
Product Management Lessons from Rose Yao Product Management Lessons from Rose Yao
Product Management Lessons from Rose Yao
 
Engineer Internship
Engineer InternshipEngineer Internship
Engineer Internship
 
Cv putri dwi jayanti
Cv putri dwi jayantiCv putri dwi jayanti
Cv putri dwi jayanti
 

Similar to Cisa domain 2 part 1 governance and management of it

Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
JohnLagman3
 
Spring cleaning workbook 2018
Spring cleaning workbook 2018Spring cleaning workbook 2018
Spring cleaning workbook 2018
Ted Creighton, P.Eng, MBA
 
SCMS Journal of Indian Management , J a n u a r y - M a r c.docx
SCMS Journal of Indian Management ,  J a n u a r y  -  M a r c.docxSCMS Journal of Indian Management ,  J a n u a r y  -  M a r c.docx
SCMS Journal of Indian Management , J a n u a r y - M a r c.docx
kenjordan97598
 
BIA
BIABIA
BIA
CIMS
 
SIP Report Presentation.pptx
SIP Report Presentation.pptxSIP Report Presentation.pptx
SIP Report Presentation.pptx
SachinMalani
 
New technologies about Drugs Administration - Pharmacology
New technologies about Drugs Administration - PharmacologyNew technologies about Drugs Administration - Pharmacology
New technologies about Drugs Administration - Pharmacology
Yvann Saculo
 
Presentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptxPresentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptx
Ebba Ossiannilsson
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
University of Hertfordshire
 
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury Smartphones
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury SmartphonesATC UK 2015: Enhancing Drop Testing Simulation for Luxury Smartphones
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury SmartphonesAltair
 
Presentation Tariff Guide for Telecom Consumers
Presentation Tariff Guide for Telecom ConsumersPresentation Tariff Guide for Telecom Consumers
Presentation Tariff Guide for Telecom Consumersmrkhanlodhi
 
Marketing: Closing The Sale | Fluid Advertising
Marketing: Closing The Sale | Fluid AdvertisingMarketing: Closing The Sale | Fluid Advertising
Marketing: Closing The Sale | Fluid Advertising
Fluid
 
Marketing Closing The Sale
Marketing Closing The Sale Marketing Closing The Sale
Marketing Closing The Sale
Fluid
 
Cloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdfCloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdf
Brij Consulting, LLC
 
Cloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdfCloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdf
Brij Consulting, LLC
 
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Kancil San
 
Cloud-Star.pdf
Cloud-Star.pdfCloud-Star.pdf
Cloud-Star.pdf
Brij Consulting, LLC
 

Similar to Cisa domain 2 part 1 governance and management of it (20)

Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
1-SYSTEM-ANALYSIS-AND-DESIGN-INTRODUCTION.pptx
 
Spring cleaning workbook 2018
Spring cleaning workbook 2018Spring cleaning workbook 2018
Spring cleaning workbook 2018
 
SCMS Journal of Indian Management , J a n u a r y - M a r c.docx
SCMS Journal of Indian Management ,  J a n u a r y  -  M a r c.docxSCMS Journal of Indian Management ,  J a n u a r y  -  M a r c.docx
SCMS Journal of Indian Management , J a n u a r y - M a r c.docx
 
BIA
BIABIA
BIA
 
SIP Report Presentation.pptx
SIP Report Presentation.pptxSIP Report Presentation.pptx
SIP Report Presentation.pptx
 
New technologies about Drugs Administration - Pharmacology
New technologies about Drugs Administration - PharmacologyNew technologies about Drugs Administration - Pharmacology
New technologies about Drugs Administration - Pharmacology
 
Presentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptxPresentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptx
 
CWS One-Sheet Reduced
CWS One-Sheet ReducedCWS One-Sheet Reduced
CWS One-Sheet Reduced
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury Smartphones
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury SmartphonesATC UK 2015: Enhancing Drop Testing Simulation for Luxury Smartphones
ATC UK 2015: Enhancing Drop Testing Simulation for Luxury Smartphones
 
Presentation Tariff Guide for Telecom Consumers
Presentation Tariff Guide for Telecom ConsumersPresentation Tariff Guide for Telecom Consumers
Presentation Tariff Guide for Telecom Consumers
 
Marketing: Closing The Sale | Fluid Advertising
Marketing: Closing The Sale | Fluid AdvertisingMarketing: Closing The Sale | Fluid Advertising
Marketing: Closing The Sale | Fluid Advertising
 
Marketing Closing The Sale
Marketing Closing The Sale Marketing Closing The Sale
Marketing Closing The Sale
 
2015-2016 profile content 5
2015-2016 profile content 52015-2016 profile content 5
2015-2016 profile content 5
 
Cloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdfCloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdf
 
Cloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdfCloud-Star V1, V2, V3.pdf
Cloud-Star V1, V2, V3.pdf
 
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
 
Cloud-Star.pdf
Cloud-Star.pdfCloud-Star.pdf
Cloud-Star.pdf
 
TSwinson Resume2
TSwinson Resume2TSwinson Resume2
TSwinson Resume2
 

More from ShivamSharma909

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
ShivamSharma909
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
ShivamSharma909
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
ShivamSharma909
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
ShivamSharma909
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
ShivamSharma909
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
ShivamSharma909
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ShivamSharma909
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
ShivamSharma909
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
ShivamSharma909
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
ShivamSharma909
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
ShivamSharma909
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
ShivamSharma909
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
ShivamSharma909
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
ShivamSharma909
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
ShivamSharma909
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
ShivamSharma909
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
ShivamSharma909
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
ShivamSharma909
 

More from ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Cisa domain 2 part 1 governance and management of it

  • 1. www.infosectrain.com PART 1 – CISA Domain 2 – Governance and Management of IT
  • 2. InfosecTrain About Us InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas of Information Technology and Cyber Security.
  • 3.
  • 4. 4 PA RT 1 – C I SA D o m a i n 2 – G o ve r n a n c e a n d M a n a ge m e nt o f I T T h i s a r t i c l e c o v e r s – ➢ O v e r a l l u n d e r s t a n d i n g o f t h e d o m a i n ➢ I m p o r t a n t c o n c e p t s t o f o c u s o n f r o m e x a m p o i n t o f v i e w T h e a r t i c l e i s s p l i t i n t o 5 p a r t s a s b e l o w : • Part 1 – Corporate Governance, Governance of Enterprise IT (GEIT), Auditor’s role in GEIT • Part 2 – IT Balanced Score Card (BSC), IT Governing Committee (IT Strategy and Steering committee), Maturity and process improvement models • Part 3 – Risk Management, Human Resource Management, Sourcing Practices • Part 4 – Information Security – Roles and Responsibilities, Business Continuity Planning (BCP), Business Impact Analysis (BIA) • Part 5 – Classification of Systems and criticality analysis, Components of Business Continuity Planning (BCP), Plan Testing. C C I S O C e r t i f i c a t i o n
  • 5. 5 ➢ Overall understanding of the domain What is Corporate Governance? What is Governance of Enterprise IT (GEIT)? What is the role of auditor in GEIT? ➢ K n o w l e d g e o f t h e o r g a n i z a t i o n ’s t e c h n o l o g y d i r e c t i o n a n d I T a r c h i t e c t u r e a n d t h e i r i m p l i c a t i o n s f o r s e t t i n g l o n g - t e r m s t r a t e g i c d i r e c t i o n s ➢ K n o w l e d g e o f t h e p r o c e s s e s f o r t h e d e v e l o p m e n t , i m p l e m e n t a t i o n a n d m a i n t e n a n c e o f I T s t r a t e g y, p o l i c i e s , s t a n d a r d s a n d p r o c e d u r e s ➢ K n o w l e d g e o f t h e u s e o f c a p a b i l i t y a n d m a t u r i t y m o d e l s ➢ K n o w l e d g e o f p r o c e s s o p t i m i z a t i o n t e c h n i q u e s ➢ K n o w l e d g e o f I T r e s o u r c e i n v e s t m e n t a n d a l l o c a t i o n p r a c t i c e s , i n c l u d i n g p r i o r i t i z a t i o n c r i t e r i a ( e . g . , p o r t f o l i o m a n a g e m e n t , v a l u e m a n a g e m e n t , p e r s o n n e l m a n a g e m e n t ➢ K n o w l e d g e o f I T s u p p l i e r s e l e c t i o n , c o n t r a c t m a n a g e m e n t , r e l a t i o n s h i p m a n a g e m e n t a n d p e r f o r m a n c e m o n i t o r i n g p r o c e s s e s i n c l u d i n g t h i r d p a r t y o u t s o u r c i n g r e l a t i o n s h i p s PA RT 1 – C I S A D o m a i n 2 – G o v e r n a n ce a n d M a n a g e m e nt o f I T
  • 6. 6 ➢ K n o w l e d g e o f e n t e r p r i s e r i s k m a n a g e m e n t ( E R M ) ➢ K n o w l e d g e o f p r a c t i c e s f o r m o n i t o r i n g a n d r e p o r t i n g o f c o n t r o l s p e r f o r m a n c e ( e . g . , c o n t i n u o u s m o n i t o r i n g , q u a l i t y a s s u r a n c e [ Q A ] ) ➢ K n o w l e d g e o f q u a l i t y m a n a g e m e n t a n d q u a l i t y a s s u r a n c e ( Q A ) s y s t e m s ➢ K n o w l e d g e o f p r a c t i c e s f o r m o n i t o r i n g a n d r e p o r t i n g o f I T p e r f o r m a n c e ( e . g . , b a l a n c e d s c o r e c a r d s [ B S C s ] , k e y p e r f o r m a n c e i n d i c a t o r s [ K P I s ] ) ➢ K n o w l e d g e o f b u s i n e s s i m p a c t a n a l y s i s ( B I A ) ➢ K n o w l e d g e o f t h e s t a n d a r d s a n d p r o c e d u r e s f o r t h e d e v e l o p m e n t , m a i n t e n a n c e a n d t e s t i n g o f t h e b u s i n e s s c o n t i n u i t y p l a n ( B C P ) ➢ K n o w l e d g e o f p r o c e d u r e s u s e d t o i n v o k e a n d e x e c u t e t h e b u s i n e s s c o n t i n u i t y p l a n a n d r e t u r n t o n o r m a l o p e r a t i o n s
  • 7. 7 I m p o r ta nt c o n c e pt s f ro m exa m p o i nt o f v i e w : ➢ I t i s a s y s t e m b y w h i c h e n t i t y i s c o n t r o l l e d a n d d i r e c t e d ➢ S e t o f r e s p o n s i b i l i t i e s a n d p r a c t i c e s w h o p r o v i d e s t r a t e g i c d i r e c t i o n s , t h e r e b y e n s u r i n g t h a t • Goals are achievable, • Risk are properly addressed and • Organizational resources are properly utilized ➢ I n v o l v e s a s e t o f r e l a t i o n s h i p s b e t w e e n a c o m p a n y ’s m a n a g e m e n t , i t s b o a r d , i t s s h a r e h o l d e r s a n d o t h e r s t a k e h o l d e r s
  • 8. 8 ➢ G E I T i s o n e o f t h e d o m a i n s o f C o r p o r a t e g o v e r n a n c e ➢ G E I T i s a s y s t e m i n w h i c h a l l s t a k e h o l d e r s , i n c l u d i n g t h e b o a r d , s e n i o r m a n a g e m e n t , i n t e r n a l c u s t o m e r s a n d d e p a r t m e n t s s u c h a s f i n a n c e , p r o v i d e i n p u t i n t o t h e d e c i s i o n - m a k i n g p r o c e s s . ➢ G E I T i s t h e r e s p o n s i b i l i t y o f t h e b o a r d o f d i r e c t o r s a n d e x e c u t i v e m a n a g e m e n t .
  • 9. 9 ➢ P u r p o s e s o f G E I T a r e : • to direct IT endeavors to ensure that IT performance meets the objectives of aligning IT with the enterprise’s objectives and the realization of promised benefits • enable the enterprise by exploiting opportunities and maximizing benefits • IT resources should be used responsibly, and IT-related risk should be managed Appropriately ➢ K e y e l e m e n t o f G E I T i s t h e a l i g n m e n t o f b u s i n e s s a n d I T, l e a d i n g t o t h e a c h i e v e m e n t o f b u s i n e s s v a l u e . ➢ E xa m p l e s o f G E I T i n c l u d e s t h e fo l l o w i n g : • COBIT 5 is developed by ISACA, which includes five principles, five domains, 37 processes and 210 practices • The International Organization for Standardization (ISO)/International Electro-technical Commission (IEC) 27001 (ISO 27001) – provides guidance to organizations implementing and maintaining information security programs. • The Information Technology Infrastructure Library (ITIL) was developed by the UK Office of Government Commerce (OGC) • ISO/IEC 38500:2008 Corporate governance of information technology • ISO/IEC 20000 is a specification for service management that is aligned with ITIL’s service management framework
  • 10. 10
  • 11. 11 ➢ To p r o v i d e l e a d i n g p r a c t i c e r e c o m m e n d a t i o n s t o s e n i o r m a n a g e m e n t t o h e l p i m p r o v e t h e q u a l i t y a n d e f f e c t i v e n e s s o f t h e I T g o v e r n a n c e i n i t i a t i v e s i m p l e m e n t e d . ➢ H e l p s e n s u r e c o m p l i a n c e w i t h G E I T i n i t i a t i v e s i m p l e m e n t e d w i t h i n a n o r g a n i z a t i o n ➢ c o n t i n u o u s m o n i t o r i n g , a n a l y s i s a n d e v a l u a t i o n o f m e t r i c s a s s o c i a t e d w i t h G E I T i n i t i a t i v e s r e q u i r e a n i n d e p e n d e n t a n d b a l a n c e d v i e w t o e n s u r e a q u a l i t a t i v e a s s e s s m e n t t h a t s u b s e q u e n t l y f a c i l i t a t e s t h e q u a l i t a t i v e i m p r o v e m e n t o f I T p r o c e s s e s a n d a s s o c i a t e d G E I T i n i t i a t i v e s ➢ To c h e c k o n a l i g n m e n t o f t h e I T f u n c t i o n w i t h t h e o r g a n i z a t i o n ’s m i s s i o n , v i s i o n , v a l u e s , o b j e c t i v e s a n d s t r a t e g i e s ➢ To e n s u r e c o m p l i a n c e w i t h l e g a l , e n v i r o n m e n t a l , i n f o r m a t i o n q u a l i t y, f i d u c i a r y, s e c u r i t y a n d p r i v a c y r e q u i r e m e n t s
  • 12. 12
  • 13. OUR CONTACT A B O U T O U R C O M PA N Y InfosecTrain welcomes overseas customers to come and attend training sessions in destination cities across the globe and enjoy their learning experience at the same time. 1800-843-7890 sales@infosectrain.co m www.infosectrain.com https://www.facebook.com/Infosectrain/ https://www.linkedin.com/company/infosec-train/ https://www.youtube.com/c/InfosecTrain