SlideShare a Scribd company logo
I.T. Governance v4.1
4 GOVERNANCE DOMAINS
Monitor and
Evaluate
Acquire and
Implement
Plan and
Organize
Deliver and
Support
PO1 Define a Strategic IT Plan and direction
PO2 Define the Information Architecture
PO3 Determine Technological Direction
PO4 Define the IT Processes, Organization and Relationships
PO5 Manage the IT Investment
PO6 Communicate Management Aims and Direction
PO7 Manage IT Human Resources
PO8 Manage Quality
PO9 Assess and Manage IT Risks
PO10 Manage Projects
AI1 Identify Automated Solutions
AI2 Acquire and Maintain Application Software
AI3 Acquire and Maintain Technology Infrastructure
AI4 Enable Operation and Use
AI5 Procure IT Resources
AI6 Manage Changes
AI7 Install and Accredit Solutions and Changes
ME1 Monitor and Evaluate IT Processes
ME2 Monitor and Evaluate Internal Control
ME3 Ensure Regulatory Compliance
ME4 Provide IT Governance
DS1 Define and Manage Service Levels
DS2 Manage Third-party Services
DS3 Manage Performance and Capacity
DS4 Ensure Continuous Service
DS5 Ensure Systems Security
DS6 Identify and Allocate Costs
DS7 Educate and Train Users
DS8 Manage Service Desk and Incidents
DS9 Manage the Configuration
DS10 Manage Problems
DS11 Manage Data
DS12 Manage the Physical Environment
DS13 Manage Operations
Authored by; Jason P. Rusch - CISSP, CISM, CISA | www.infosec-rusch.com | jason@infosec-rusch.com

More Related Content

What's hot

Data quality overview
Data quality overviewData quality overview
Data quality overview
Alex Meadows
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
Delphix
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
datatovalue
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
Doreen Christian
 
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
Perficient, Inc.
 
Data quality management Basic
Data quality management BasicData quality management Basic
Data quality management Basic
Khaled Mosharraf
 
Data management vs. data governance
Data management vs. data governance Data management vs. data governance
Data management vs. data governance
shopiawilson
 
Data Quality
Data QualityData Quality
Data Quality
jerdeb
 
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
Big Data Expo 2015 - Trillium software Big Data and the Data QualityBig Data Expo 2015 - Trillium software Big Data and the Data Quality
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
BigDataExpo
 
Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
Anton Chuvakin
 
Ensuring data quality
Ensuring data qualityEnsuring data quality
Ensuring data quality
IUPUI
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Mergers, acquisitions, and partnerships dramatically reducing it consolidati...
Mergers, acquisitions, and partnerships  dramatically reducing it consolidati...Mergers, acquisitions, and partnerships  dramatically reducing it consolidati...
Mergers, acquisitions, and partnerships dramatically reducing it consolidati...
Health Catalyst
 
Data Science & Analytics – New approaches and capabilities for driving busine...
Data Science & Analytics – New approaches and capabilities for driving busine...Data Science & Analytics – New approaches and capabilities for driving busine...
Data Science & Analytics – New approaches and capabilities for driving busine...
Leigh Hill
 
Data Governance Maturity Model
Data Governance Maturity ModelData Governance Maturity Model
Data Governance Maturity Model
Basuki Rahmad
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Aiec & csr presentation
Aiec & csr presentationAiec & csr presentation
Aiec & csr presentation
Eduworks Network
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...
pero periuc
 
Data Quality - Standards and Application to Open Data
Data Quality - Standards and Application to Open DataData Quality - Standards and Application to Open Data
Data Quality - Standards and Application to Open Data
Marco Torchiano
 

What's hot (20)

Data quality overview
Data quality overviewData quality overview
Data quality overview
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
Combining Patient Records, Genomic Data and Environmental Data to Enable Tran...
 
Data quality management Basic
Data quality management BasicData quality management Basic
Data quality management Basic
 
Data management vs. data governance
Data management vs. data governance Data management vs. data governance
Data management vs. data governance
 
Data Quality
Data QualityData Quality
Data Quality
 
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
Big Data Expo 2015 - Trillium software Big Data and the Data QualityBig Data Expo 2015 - Trillium software Big Data and the Data Quality
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
 
Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
 
Ensuring data quality
Ensuring data qualityEnsuring data quality
Ensuring data quality
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Mergers, acquisitions, and partnerships dramatically reducing it consolidati...
Mergers, acquisitions, and partnerships  dramatically reducing it consolidati...Mergers, acquisitions, and partnerships  dramatically reducing it consolidati...
Mergers, acquisitions, and partnerships dramatically reducing it consolidati...
 
Data Science & Analytics – New approaches and capabilities for driving busine...
Data Science & Analytics – New approaches and capabilities for driving busine...Data Science & Analytics – New approaches and capabilities for driving busine...
Data Science & Analytics – New approaches and capabilities for driving busine...
 
Data Governance Maturity Model
Data Governance Maturity ModelData Governance Maturity Model
Data Governance Maturity Model
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Aiec & csr presentation
Aiec & csr presentationAiec & csr presentation
Aiec & csr presentation
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...
 
Data Quality - Standards and Application to Open Data
Data Quality - Standards and Application to Open DataData Quality - Standards and Application to Open Data
Data Quality - Standards and Application to Open Data
 

Similar to Cobit v5 High Level Controls Topology

ICT Governance
ICT GovernanceICT Governance
ICT Governance
Richardus Indrajit
 
Feb 26 NETP Slide Deck
Feb 26 NETP Slide DeckFeb 26 NETP Slide Deck
Feb 26 NETP Slide Deck
ddcomeau
 
Palestra Gestão de Incidentes de Segurança
Palestra Gestão de Incidentes de SegurançaPalestra Gestão de Incidentes de Segurança
Palestra Gestão de Incidentes de Segurança
PATH ITTS - DATA GOVERNANCE INNOVATION
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
vyomlabs
 
Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811
faau09
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
tlknecht
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet
 
1neoteric may 2015
1neoteric may 20151neoteric may 2015
1neoteric may 2015
marcombuzz
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
Mirsis Bilgi Teknolojileri
 
Seminar IT Service Management pada Perhotelan 8 november 2013
Seminar IT Service Management pada Perhotelan  8 november 2013Seminar IT Service Management pada Perhotelan  8 november 2013
Seminar IT Service Management pada Perhotelan 8 november 2013
Cookies BigCinnamon
 
Tatakelola Teknologi Informasi
Tatakelola Teknologi InformasiTatakelola Teknologi Informasi
Tatakelola Teknologi Informasi
Cahyo Darujati
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
2008_Pugh-Kirch-Allstate-FINAL
2008_Pugh-Kirch-Allstate-FINAL 2008_Pugh-Kirch-Allstate-FINAL
2008_Pugh-Kirch-Allstate-FINAL
Cathy Kirch
 
Togaf – an overview of enterprise architecture
Togaf – an overview of enterprise architectureTogaf – an overview of enterprise architecture
Togaf – an overview of enterprise architecture
Khawar Naseem
 
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
Support for Improvement in Governance and Management SIGMA
 
Marcos gobernabilidad-sin-mapa-v040811
Marcos gobernabilidad-sin-mapa-v040811Marcos gobernabilidad-sin-mapa-v040811
Marcos gobernabilidad-sin-mapa-v040811
faau09
 
It strategy in the organisation
It strategy in the organisationIt strategy in the organisation
It strategy in the organisation
Veena Iyer
 
Im information systems
Im   information systemsIm   information systems
Im information systems
Alejandro Domínguez Torres
 
COBIT
COBITCOBIT
Bpo overview niit
Bpo overview   niitBpo overview   niit
Bpo overview niit
Karen Rumble Needel
 

Similar to Cobit v5 High Level Controls Topology (20)

ICT Governance
ICT GovernanceICT Governance
ICT Governance
 
Feb 26 NETP Slide Deck
Feb 26 NETP Slide DeckFeb 26 NETP Slide Deck
Feb 26 NETP Slide Deck
 
Palestra Gestão de Incidentes de Segurança
Palestra Gestão de Incidentes de SegurançaPalestra Gestão de Incidentes de Segurança
Palestra Gestão de Incidentes de Segurança
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
 
Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
1neoteric may 2015
1neoteric may 20151neoteric may 2015
1neoteric may 2015
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
 
Seminar IT Service Management pada Perhotelan 8 november 2013
Seminar IT Service Management pada Perhotelan  8 november 2013Seminar IT Service Management pada Perhotelan  8 november 2013
Seminar IT Service Management pada Perhotelan 8 november 2013
 
Tatakelola Teknologi Informasi
Tatakelola Teknologi InformasiTatakelola Teknologi Informasi
Tatakelola Teknologi Informasi
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
2008_Pugh-Kirch-Allstate-FINAL
2008_Pugh-Kirch-Allstate-FINAL 2008_Pugh-Kirch-Allstate-FINAL
2008_Pugh-Kirch-Allstate-FINAL
 
Togaf – an overview of enterprise architecture
Togaf – an overview of enterprise architectureTogaf – an overview of enterprise architecture
Togaf – an overview of enterprise architecture
 
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
Marcos gobernabilidad-sin-mapa-v040811
Marcos gobernabilidad-sin-mapa-v040811Marcos gobernabilidad-sin-mapa-v040811
Marcos gobernabilidad-sin-mapa-v040811
 
It strategy in the organisation
It strategy in the organisationIt strategy in the organisation
It strategy in the organisation
 
Im information systems
Im   information systemsIm   information systems
Im information systems
 
COBIT
COBITCOBIT
COBIT
 
Bpo overview niit
Bpo overview   niitBpo overview   niit
Bpo overview niit
 

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA

NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013ISO.IEC 27001 27002-2013
ISO.IEC 27000 Series Map
ISO.IEC 27000 Series MapISO.IEC 27000 Series Map
Cobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
GLBA Topology
GLBA TopologyGLBA Topology
HIPAA Topology
HIPAA TopologyHIPAA Topology
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
PCI-DSS DESV Topology
PCI-DSS DESV TopologyPCI-DSS DESV Topology
DATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLDDATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLD
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 
SOX Titles Topology
SOX Titles TopologySOX Titles Topology
ITIL v3 Topology
ITIL v3 TopologyITIL v3 Topology
HITRUST CSF Topology
HITRUST CSF TopologyHITRUST CSF Topology
HIPAA Topology
HIPAA TopologyHIPAA Topology
GLBA Topology
GLBA TopologyGLBA Topology
COSO ERM Topology
COSO ERM TopologyCOSO ERM Topology
Octave Topology
Octave TopologyOctave Topology
FFIEC I.T. Booklets Topology
FFIEC I.T. Booklets TopologyFFIEC I.T. Booklets Topology
FFIEC I.T. Booklets Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
 

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA (20)

NIST sp800 53-v4 Topology
NIST sp800 53-v4 TopologyNIST sp800 53-v4 Topology
NIST sp800 53-v4 Topology
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013ISO.IEC 27001 27002-2013
ISO.IEC 27001 27002-2013
 
ISO.IEC 27000 Series Map
ISO.IEC 27000 Series MapISO.IEC 27000 Series Map
ISO.IEC 27000 Series Map
 
Cobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance Topology
 
GLBA Topology
GLBA TopologyGLBA Topology
GLBA Topology
 
HIPAA Topology
HIPAA TopologyHIPAA Topology
HIPAA Topology
 
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
 
PCI-DSS DESV Topology
PCI-DSS DESV TopologyPCI-DSS DESV Topology
PCI-DSS DESV Topology
 
DATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLDDATA PROTECTION LAWS OF THE WORLD
DATA PROTECTION LAWS OF THE WORLD
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
 
Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)Information_Governance_Risk_Compliance_Frameworks (v5)
Information_Governance_Risk_Compliance_Frameworks (v5)
 
SOX Titles Topology
SOX Titles TopologySOX Titles Topology
SOX Titles Topology
 
ITIL v3 Topology
ITIL v3 TopologyITIL v3 Topology
ITIL v3 Topology
 
HITRUST CSF Topology
HITRUST CSF TopologyHITRUST CSF Topology
HITRUST CSF Topology
 
HIPAA Topology
HIPAA TopologyHIPAA Topology
HIPAA Topology
 
GLBA Topology
GLBA TopologyGLBA Topology
GLBA Topology
 
COSO ERM Topology
COSO ERM TopologyCOSO ERM Topology
COSO ERM Topology
 
Octave Topology
Octave TopologyOctave Topology
Octave Topology
 
FFIEC I.T. Booklets Topology
FFIEC I.T. Booklets TopologyFFIEC I.T. Booklets Topology
FFIEC I.T. Booklets Topology
 

Recently uploaded

EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdfEN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
ivanparu86
 
DPI Playbook for MOSIP MIS framework India
DPI Playbook for MOSIP MIS framework IndiaDPI Playbook for MOSIP MIS framework India
DPI Playbook for MOSIP MIS framework India
Zaheer Parvez
 
Movers near me in Dubai , Best Packers and Movers In Dubai
Movers near me in Dubai , Best Packers and Movers In DubaiMovers near me in Dubai , Best Packers and Movers In Dubai
Movers near me in Dubai , Best Packers and Movers In Dubai
imranmalik114455
 
Gym business MODEL .pdf .
Gym business MODEL .pdf                 .Gym business MODEL .pdf                 .
Gym business MODEL .pdf .
Divyanshu56740
 
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
حبوب الاجهاض سايتوتك للبيع في الامارات cytotec واتس 00966583759617
 
What's your strategy? Getting tactical about being strategic.
What's your strategy? Getting tactical about being strategic.What's your strategy? Getting tactical about being strategic.
What's your strategy? Getting tactical about being strategic.
Doug Hall
 
Look at our July library display on Mining
Look at our July library display on MiningLook at our July library display on Mining
Look at our July library display on Mining
NZSG
 
Cracking the Corporate Social Responsibilty Code.pptx
Cracking the Corporate Social Responsibilty Code.pptxCracking the Corporate Social Responsibilty Code.pptx
Cracking the Corporate Social Responsibilty Code.pptx
Workforce Group
 
Mid America Trucking Show Exhibitor List 2024 - Exhibitors Data
Mid America Trucking Show Exhibitor List 2024 - Exhibitors DataMid America Trucking Show Exhibitor List 2024 - Exhibitors Data
Mid America Trucking Show Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
 
20240716_ TJ Communications Credentials.pdf
20240716_ TJ Communications Credentials.pdf20240716_ TJ Communications Credentials.pdf
20240716_ TJ Communications Credentials.pdf
tjcomstrang
 
WAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdfWAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdf
Western Alaska Minerals Corp.
 
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptxThe-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
Jindal Global University, Sonipat Haryana 131001
 
California Carpet Stewardship Program Q1 2024
California Carpet Stewardship Program Q1 2024California Carpet Stewardship Program Q1 2024
California Carpet Stewardship Program Q1 2024
Carpet America Recovery Effort
 
Chief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 ReportChief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 Report
Compliance Vision
 
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINIFURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
FURI88 ONLINE
 
A Playbook for Solo & Siloed Data Science Practitioners
A Playbook for Solo & Siloed Data Science PractitionersA Playbook for Solo & Siloed Data Science Practitioners
A Playbook for Solo & Siloed Data Science Practitioners
Tim Wilson
 
CH.3.pptx DIGITAL MARKETING STRATEGY, IMPLEMENTATION AND PRACTICE Seventh Edi...
CH.3.pptx DIGITAL MARKETINGSTRATEGY, IMPLEMENTATION AND PRACTICESeventh Edi...CH.3.pptx DIGITAL MARKETINGSTRATEGY, IMPLEMENTATION AND PRACTICESeventh Edi...
CH.3.pptx DIGITAL MARKETING STRATEGY, IMPLEMENTATION AND PRACTICE Seventh Edi...
motasem221
 
How to use lace front wig importance and
How to use lace front wig importance andHow to use lace front wig importance and
How to use lace front wig importance and
kaporej505
 
AI and Best Use Cases for Your Personal Life.pptx
AI and Best Use Cases for Your Personal Life.pptxAI and Best Use Cases for Your Personal Life.pptx
AI and Best Use Cases for Your Personal Life.pptx
Brian Frerichs
 

Recently uploaded (20)

EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdfEN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
 
DEMO_Aboveground Storage Tank Inspection.pdf
DEMO_Aboveground Storage Tank Inspection.pdfDEMO_Aboveground Storage Tank Inspection.pdf
DEMO_Aboveground Storage Tank Inspection.pdf
 
DPI Playbook for MOSIP MIS framework India
DPI Playbook for MOSIP MIS framework IndiaDPI Playbook for MOSIP MIS framework India
DPI Playbook for MOSIP MIS framework India
 
Movers near me in Dubai , Best Packers and Movers In Dubai
Movers near me in Dubai , Best Packers and Movers In DubaiMovers near me in Dubai , Best Packers and Movers In Dubai
Movers near me in Dubai , Best Packers and Movers In Dubai
 
Gym business MODEL .pdf .
Gym business MODEL .pdf                 .Gym business MODEL .pdf                 .
Gym business MODEL .pdf .
 
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
ابي شي %10 مضمون ينزل الجنين واتس 00966583759617
 
What's your strategy? Getting tactical about being strategic.
What's your strategy? Getting tactical about being strategic.What's your strategy? Getting tactical about being strategic.
What's your strategy? Getting tactical about being strategic.
 
Look at our July library display on Mining
Look at our July library display on MiningLook at our July library display on Mining
Look at our July library display on Mining
 
Cracking the Corporate Social Responsibilty Code.pptx
Cracking the Corporate Social Responsibilty Code.pptxCracking the Corporate Social Responsibilty Code.pptx
Cracking the Corporate Social Responsibilty Code.pptx
 
Mid America Trucking Show Exhibitor List 2024 - Exhibitors Data
Mid America Trucking Show Exhibitor List 2024 - Exhibitors DataMid America Trucking Show Exhibitor List 2024 - Exhibitors Data
Mid America Trucking Show Exhibitor List 2024 - Exhibitors Data
 
20240716_ TJ Communications Credentials.pdf
20240716_ TJ Communications Credentials.pdf20240716_ TJ Communications Credentials.pdf
20240716_ TJ Communications Credentials.pdf
 
WAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdfWAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdf
 
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptxThe-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
The-Three-Pillars-of-Doctoral-Research-What-Why-and-How (1).pptx
 
California Carpet Stewardship Program Q1 2024
California Carpet Stewardship Program Q1 2024California Carpet Stewardship Program Q1 2024
California Carpet Stewardship Program Q1 2024
 
Chief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 ReportChief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 Report
 
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINIFURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
FURI88 : GAME SLOT PGSOFT PALING GACOR MUDAH MENANG HANYA DISINI
 
A Playbook for Solo & Siloed Data Science Practitioners
A Playbook for Solo & Siloed Data Science PractitionersA Playbook for Solo & Siloed Data Science Practitioners
A Playbook for Solo & Siloed Data Science Practitioners
 
CH.3.pptx DIGITAL MARKETING STRATEGY, IMPLEMENTATION AND PRACTICE Seventh Edi...
CH.3.pptx DIGITAL MARKETINGSTRATEGY, IMPLEMENTATION AND PRACTICESeventh Edi...CH.3.pptx DIGITAL MARKETINGSTRATEGY, IMPLEMENTATION AND PRACTICESeventh Edi...
CH.3.pptx DIGITAL MARKETING STRATEGY, IMPLEMENTATION AND PRACTICE Seventh Edi...
 
How to use lace front wig importance and
How to use lace front wig importance andHow to use lace front wig importance and
How to use lace front wig importance and
 
AI and Best Use Cases for Your Personal Life.pptx
AI and Best Use Cases for Your Personal Life.pptxAI and Best Use Cases for Your Personal Life.pptx
AI and Best Use Cases for Your Personal Life.pptx
 

Cobit v5 High Level Controls Topology

  • 1. I.T. Governance v4.1 4 GOVERNANCE DOMAINS Monitor and Evaluate Acquire and Implement Plan and Organize Deliver and Support PO1 Define a Strategic IT Plan and direction PO2 Define the Information Architecture PO3 Determine Technological Direction PO4 Define the IT Processes, Organization and Relationships PO5 Manage the IT Investment PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources PO8 Manage Quality PO9 Assess and Manage IT Risks PO10 Manage Projects AI1 Identify Automated Solutions AI2 Acquire and Maintain Application Software AI3 Acquire and Maintain Technology Infrastructure AI4 Enable Operation and Use AI5 Procure IT Resources AI6 Manage Changes AI7 Install and Accredit Solutions and Changes ME1 Monitor and Evaluate IT Processes ME2 Monitor and Evaluate Internal Control ME3 Ensure Regulatory Compliance ME4 Provide IT Governance DS1 Define and Manage Service Levels DS2 Manage Third-party Services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS6 Identify and Allocate Costs DS7 Educate and Train Users DS8 Manage Service Desk and Incidents DS9 Manage the Configuration DS10 Manage Problems DS11 Manage Data DS12 Manage the Physical Environment DS13 Manage Operations Authored by; Jason P. Rusch - CISSP, CISM, CISA | www.infosec-rusch.com | jason@infosec-rusch.com