SlideShare a Scribd company logo
1 of 21
Download to read offline
CONIG®
v1.5
CONVERGED INFORMATION
GOVERNANCE
A reference FRAMEWORK
CONIG® (Converged Information Governance) is a governance framework
developed by TAC A.S. addressing information and related technologies. Its main
focus is INFORMATION. CONIG® is based on models that are widely used for
Information Technologies, Corporate Governance as well as Business Governance.
Introduced in 2009 by TAC A.S., CONIG® is a reference framework that consists of
components of various models, best-practices, framework and standards. All of the
underlying frameworks and best practices are widely accepted in the industry. While
they might bring different perspectives and differ in nuances the common goal of all
these frameworks and best practices is the assurance of provisioning of IT services,
business services, and other enabler services.
CONIG® aims to find the right balance between internal control approach focusing
on control objectives and performance management approach focusing on
achievement of value targets for the organization.
It aims effective and efficient utilization of service and customer focused resources
and capabilities to ensure that the IT organizations’ activities are aligned with
business objectives. It ensures that desired quality, security and compliance
requirements of produced and offered services are met.
In general the purpose of CONIG is providing processes, structures and other related
models to govern and manage the lifecycles of IT resources and capabilities of an
organization to provide IT services to its clients at an acceptable level of cost and
resource utilization.
At the core, CONIG® has PROCESS and IT SERVICE approach.
CONIG® defines INFORMATION as a valuable ASSET for the business. It is based on
IT Services and provides a MANAGEMENT SYSTEM FRAMEWORK that includes
MODELS consisting of PROCESSES for the governance and management of
TECHNOLOGY based IT Services that are used for storing, processing,
communicating and utilization of this INFORMATION.
About CONIG®
v1.5
EPAM - Enhanced Process Architecture Model
ELCA - Enterprise Layered Chambered Architecture
TCM - Transition Change Model
A.T.M.A.C.A. (Agile Timely Mature Adaptive Creative Adroid)
CMAM - Capability Maturity Assessment Model
OAM - IT Organization Assessment Model
CCM - Control Compliance Model
CSIM - Continual Systemic Improvement Model
VAR - Value at Risk Model
CONIG®
v1.5 Components
. is the process architecture model of CONIG Framework , defining and describing in
detail a number of governance and management processes
. has an objective that is to provide a detailed method and a set of supporting tools
for developing an IT process architecture. It may be used freely by any organization
wishing to adopt CONIG for use within that organization
. represents all of the processes normally found in an enterprise relating to IT
activities
. is intentionally composed of a common sense approach to service enabled process
management – do what works and what works is adapting a common framework of
practices that unite all areas of IT service provision toward a single aim – delivering
value to the business
. is expected to provide structure, stability and strength to information management
and governance capabilities with durable principles, methods and tools
. offers a common reference model understandable to operational IT and business
managers
. is a complete and comprehensive reference model: It is not norm model, that's
why, each enterprise shall define its own process set, taking into account its
resources and capabilities
. relies upon enhanced and converged architecture of globally accepted frameworks,
best practices and standards. So the architecture of processes is structured in
aligned with different authoritative requirements
EPAM - Enhanced Process Architecture Model
. is the information architecture model of "enablers" of
CONIG Framework
. has an objective that is to provide a detailed method and a
set of supporting tools - for developing an enterprise
information architecture. It may be used freely by any
organization wishing to adopt CONIG for use within that
organization
. defines "enterprise" as any collection of organizations that
has a common set of goals
. ELCA relies upon "layered" and " chambered" architecture
of CONIG Enablers. So the architecture of enterprise
information is structured in aligned with the lifecycles of
enablers
ELCA - Enterprise Layered Chambered
Architecture
. is the transition change model of CONIG Framework
. has four main lifecycles entities;
- Requirement
- Project / Program
- Fast Transition / Fast Track
- Operational Change
. has objectives that are to;
- Set customer expectations on how the performance and use of the new or changed
IT service(s) can be used to enable business change
- Enable the business change to integrate a release into the business processes and
services
- Ensure that there is a business justification;
• for initiating the project/FT (documented in an outline Business Case)
• all the necessary authorities exist for initiating the project/FT
- Manage requirements of the project/FT’s products and product components and to
ensure alignment between those requirements and the project/FT’s plans and work
products
- Plan the work required for project/FT initiation establish and maintain plans that
define project/FT activities
- Ensure management direction and control which are provided throughout the
project/FT’s life, and that the project/FT remains viable
- Quantitatively manage the project/FT to achieve the project/FT’s established quality
and process performance objectives
- Manage the acquisition of products and services from suppliers
- Provide the information needed for the Boards (tCAb, pCAB) to assess the
continuing viability of the project/FT – including the aggregated risk exposure
- Ensure risks and issues are kept under control
- Ensure that team managers, team members and suppliers are clear as to what is to
be produced and what is the expected effort, cost or timescales
- Provide an understanding of the project/FT’s progress so that appropriate corrective
actions can be taken when the project/FT’s performance deviates significantly from the
plan
- Ensure that changes are recorded and evaluated, and that authorized changes are
prioritized, planned, tested, implemented, documented and reviewed in a controled
manner
• defines transition and change pipeline starges&gates, processes and information items
• TCM relies upon "stage&gate" architecture. So the architecture of TCM is structured in
aligned with the lifecycles of enablers
TCM - Transition Change Model
• is the IT Service/Product analyze design development model of CONIG
Framework has six main lifecycles entities;
- Requirement (HLR, ILR, SLR)
- Iteration / Sprint
- Service Aspects (Functional, Capability, Resource)
- Test Cases
- Release Unit / Release Package
- Deployment Order
• has objectives that are ;
- Early delivery of working software
- Qality is built into the IT Services — everyone involved in quality
- Defect prevention (stopping them from getting beyond the requirements)
- CIear acceptance criteria
- EarIy involvement of all key players
- Surprises to the business on delivery
- Growth of (test) team skills
- Regression averse - more testing than ever
- Risk based approach to development — the most important bits are done first
- Good collaboration - knowledge of project
- Status, outcomes and progress is clearly and honestly displayed for all to see
- Less "formal'" defects
- Release unit and identification
- Release design options and considerations
- Release and deployment models
- Release and deployment planning
- Preparation for build, test and deployment
- Service testing and pilots
- Perform transfer, deployment and retirement
- Verify deployment
- Early life support
A.T.M.A.C.A.
Agile Timely Mature Adaptive Creative Adroid
• has advantages;
- Grouping of requirements into small increments with minimal planning
- Stakeholders' voice about the product and the plan
- No direct long-term planning
- Short development cycles of two to four weeks
- Daily communication through short meetings to State what one did since the last
meeting, what one will be working on until the next meeting, and what, if anything, is
impeding the progress
- Through these meetings, it becomes easy to discover any issue early and increase
offline communication
- Development progress measured through bum down chaıl and completed
requirement (HLR, ILR, SLR) backlog items
- Team members afticulate upfront about their responsibilities and roadblocks
- Self-organizing and self-managing teams
• leads to faster delivery of software.
- Agile methods are iterative development methods that aim to reduce
development overhead and so produce software faster
- Extreme programming includes practices such as systematic testing, continuous
improvement and customer involvement
- The approach to testing is a particular strength where executable tests are
developed before the code is written.
- Rapid application development environments include database programming
languages, form generation tools and links to office applications
- A throw-away prototype is used to explore requirements and design options
- When implementing a throw-away prototype, start with the requirements you
least understand; in incremental development, start with the best-understood
requirements.
• defines transition and change pipeline iterations, processes, information items
and work products
• benefits the organization by helping it to
- Increase the quality of the deliverables
- Cope better with change (and expect the changes)
- Provide better estimates while spending less time creating them
- Be more in control of the project schedule and state
As a result, A.T.M.A.C.A. projects achieve higher customer satisfaction rates.
• A.T.M.A.C.A. relies upon agile and lean architecture. So the architecture of
A.T.M.A.C.A. is structured in aligned with the lifecycles of enablers
A.T.M.A.C.A.
Agile Timely Mature Adaptive Creative Adroid
. is the capability maturity assessment model of
"processes" of CONIG Framework
. is intended as a comprehensive reference model for
state-of-the-practice process improvement. The
CMAM defines the fundamental IT processes of
information management and governance and specific
capabilities that constitute a gradated path to
maturity. It allows organizations to evaluate
themselves against documented best practices -like
COBIT, ITIL, ISO27001, ISO20000, ISO 22301, eSCM-
determine gaps, and improve management of process
enablers across functional, line of business, and
geographic boundaries.
. CMAM relies upon "maturities" and " capabilities" of
CONIG Process Enablers. So the improvements of
enterprise IT is structured in aligned with the lifecycles
of processes.
CMAM - Capability Maturity
Assessment Model
OAM is a systematic process for obtaining valid information about the performance of an
organization and the factors that affect its performance. It focuses on the functioning of
organizations as the primary unit of analysis.
Outline of the approach being based on observing the relationships among staffs and
organization units, OAM represents a particular way of looking at organizational structure
and design. It gives attention to issues such as planning, delivering, operating, the delegation
of authority, organizational control, role cascade and definitions, boundaries, responsibilities,
and accountabilities.
OAM aims to help an organization defining and improving its overall performance through
analyzing its service portfolios, process areas, relationship, organizational skills and
information items. The factors embedded in the delivery, relations, competency and
contextual environment all influence the performance of governing an organization. The
overall organizational performance is defined in terms of effectiveness (mission fulfillment),
efficiency (accuracy, timeliness and value of service and program delivery), ongoing relevance
(the extent to which the organization adapts to changing conditions and its environment),
and financial viability.
OAM is suitable to the nature of how the IT organization operates. It also posits that
organizational performance should be examined in relation to the organization’s producing
outcome capability and external environment.
OAM provides mappings with SFIA (skills framework for the information age) and hence
provides practical implementation guidance for designing IT organization and talent
management in it.
OAM - IT Organization Assessment Model
. is the control compliance model of "enablers" of CONIG Framework
. has an objective that is to provide a detailed method and a set of supporting
tools - for developing an internal control architecture. It may be used freely by
any organization wishing to adopt CONIG for use within that organization in
order to comply authoritative requirements
. has detail objectives;
- Document controls and details
- Test controls
- Review controls
- Identify control deficiencies
- Issue and Remediation Management
- Report on control status
- Maintain controls
- Test control once and rely on results for many regulations
- Incorporate policy and risk management into compliance management
- Identify external compliance requirements (authoritative requirements)
- Optimise response to authoritative requirements
- Confirm authoritative requirements
- Obtain assurance of authoritative requirements
. establish mappings among "internal controls" and "authoritative
requirements"
. defines quatitative scoring model for "internal controls" and "authoritative
requirements" based on tests and audit finding
CCM - Control Compliance Model
. is the continual systemic improvement model of CONIG Framework
. has an objective that is to ensure continual systemic improvement of the IT value
enablers in fulfilling the relevant business objectives of the organization.
. identifies process improvements
. is expected to result in measurable and meaningful improvements in enablers
performance. In addition, the organization should systematically implement processes and
technology that will enable meeting quality and performance objectives of the enablers.
. focuses on continual process and IT service improvements in relation to business goals
. establishes the principles and framework for continual improvement and quality
enhancements across all aspects of the organization's activities
CONIG CSIM is committed to ensuring that the quality of service is constantly monitored
and that planning, procedures and fınancial resources are in place to ensure systematic
improvement, and to enhance efficiency and effectiveness for the benefıt of the enterprise
and its stakeholders. The enterprise's commitment to the provision of quality IT service is
underpinned by a Continual Systemic Improvement Model - CSIM - that applies to every
activity of the organization. The CONIG CSIM will support and enhance policies,
procedures and implemented key IT controls within a continual systemic improvement
cycle to ensure that IT services delivered by the enterprise:
. meet customer needs
. meet stakeholder needs
. are delivered in a quality assured manner
. are equivalent in standard in timely manner
The CONIG CSIM Framework will also meet the requirements of converged ISO standards,
autohoritative requirements of regulatory bodies and, national and international laws
. The enterprise can identify the following key areas of activity which make up the CONIG
CSIM:
. IT services
. assessment validation
. governance
. planning and review
. policy and procedure
. stakeholder feedback
. staff reviews
. course and curriculum reviews
. internal audit and self assessment
. benchmarking of IT service outcomes and the teaching and learning environment
CSIM - Continual Systemic Improvement Model
. is the value at risk model of "enablers" of CONIG Framework
. has an objective that is to provide a detailed method and a set of supporting
tools - for developing an risk model. It may be used freely by any organization
wishing to adopt CONIG for use within that organization in order to create
value from risk management
. has detail objectives;
- Ability to customize or tailor the risk profiles and risk detections
- Ability to schedule, notify, conduct, review and approve risk evaluations
for enablers, business processes, business objectives and other parts of the
organization
- Ability to define and test controls and use results in the risk evaluation
process
- Ability to define and monitor key risk indicators (risk magnitude value, risk
magnitude score) and use results in the risk evaluation process
- Ability to identify issues associated with risk evaluations
- Ability to track and manage remediation/improvement items associated
with issues identified
- Ability to take action to address issues identified
- Ability to monitor the environment for risk and notify appropriate
stakeholders when there has been a change in the risk profile
- Ability to report on the status, schedule or performance of risk
management activities
. establish mappings among "enablers", "risk detections", "risk profiles",
"impacts","internal controls" and "authoritative requirements"
. defines quatitative scoring model for "risk detections" and "risk profiles"
based on risk assessments and other management system information items
VAR – Value at Risk Model
Since our foundation in 1999, we are helping our clients to
identify and implementperformance
improvement opportunities. We work Together
with our clients in a trust-based cooperation to improve,
mature and transform their IT and business
processes. Our methodology based on best-practices
is an innovative and unique approach.
Today TAC is divided into threemajor business
segments :
Consulting | Technology | Education
Each segment is specialized in complementary services that
operate in concert to maximize value for our clients.
About TAC

More Related Content

What's hot

ERP Manager meets SDLC and CMMI
ERP Manager meets SDLC and CMMIERP Manager meets SDLC and CMMI
ERP Manager meets SDLC and CMMIMahesh Vallampati
 
Md050 application extensions_functional_design_080112
Md050 application extensions_functional_design_080112Md050 application extensions_functional_design_080112
Md050 application extensions_functional_design_080112magik570
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture GovernanceRakesh Sharan
 
Sabaruddin de AB_S_Six Step ERP Project Management_FINAL
Sabaruddin de AB_S_Six Step ERP Project Management_FINALSabaruddin de AB_S_Six Step ERP Project Management_FINAL
Sabaruddin de AB_S_Six Step ERP Project Management_FINALsabaruddin de AB
 
Business Process Management - From Market Consolidation to Process Innovation
Business Process Management - From Market Consolidation to Process InnovationBusiness Process Management - From Market Consolidation to Process Innovation
Business Process Management - From Market Consolidation to Process InnovationMichael zur Muehlen
 
Workflow and BPM in the New Enterprise Architecture
Workflow and BPM in the New Enterprise ArchitectureWorkflow and BPM in the New Enterprise Architecture
Workflow and BPM in the New Enterprise ArchitectureNathaniel Palmer
 
ITIL compliant Open Source tools
ITIL compliant Open Source toolsITIL compliant Open Source tools
ITIL compliant Open Source toolsBruno Cornec
 
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)Eric Stephens
 
Creating An EA Governance Organization
Creating An EA Governance OrganizationCreating An EA Governance Organization
Creating An EA Governance OrganizationChip Wilson
 
Evolution of service transition
Evolution of service transitionEvolution of service transition
Evolution of service transitionStuart Rance
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)Sam Mandebvu
 
Architecture Governance in Brief
Architecture Governance in BriefArchitecture Governance in Brief
Architecture Governance in BriefAnthony Dehnashi
 
Architecture Series 5-4 Solution Architecture Draft
Architecture Series 5-4   Solution Architecture   DraftArchitecture Series 5-4   Solution Architecture   Draft
Architecture Series 5-4 Solution Architecture DraftFrankie Hsiang
 
Engineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesEngineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesShobhit Singhal
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
New & Emerging _ David_Burke _ OUM Fusion Apps.pdf
New & Emerging _ David_Burke _ OUM Fusion Apps.pdfNew & Emerging _ David_Burke _ OUM Fusion Apps.pdf
New & Emerging _ David_Burke _ OUM Fusion Apps.pdfInSync2011
 

What's hot (20)

ERP Manager meets SDLC and CMMI
ERP Manager meets SDLC and CMMIERP Manager meets SDLC and CMMI
ERP Manager meets SDLC and CMMI
 
Md050 application extensions_functional_design_080112
Md050 application extensions_functional_design_080112Md050 application extensions_functional_design_080112
Md050 application extensions_functional_design_080112
 
Enterprise Architecture Governance
Enterprise Architecture GovernanceEnterprise Architecture Governance
Enterprise Architecture Governance
 
Sabaruddin de AB_S_Six Step ERP Project Management_FINAL
Sabaruddin de AB_S_Six Step ERP Project Management_FINALSabaruddin de AB_S_Six Step ERP Project Management_FINAL
Sabaruddin de AB_S_Six Step ERP Project Management_FINAL
 
Oracle Method P
Oracle Method POracle Method P
Oracle Method P
 
Business Process Management - From Market Consolidation to Process Innovation
Business Process Management - From Market Consolidation to Process InnovationBusiness Process Management - From Market Consolidation to Process Innovation
Business Process Management - From Market Consolidation to Process Innovation
 
Workflow and BPM in the New Enterprise Architecture
Workflow and BPM in the New Enterprise ArchitectureWorkflow and BPM in the New Enterprise Architecture
Workflow and BPM in the New Enterprise Architecture
 
ITIL compliant Open Source tools
ITIL compliant Open Source toolsITIL compliant Open Source tools
ITIL compliant Open Source tools
 
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)
EA Governance as IT Sustainability (NY IT Leadership Academy Apr 2013)
 
Creating An EA Governance Organization
Creating An EA Governance OrganizationCreating An EA Governance Organization
Creating An EA Governance Organization
 
Evolution of service transition
Evolution of service transitionEvolution of service transition
Evolution of service transition
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
Architecture Governance in Brief
Architecture Governance in BriefArchitecture Governance in Brief
Architecture Governance in Brief
 
Architecture Series 5-4 Solution Architecture Draft
Architecture Series 5-4   Solution Architecture   DraftArchitecture Series 5-4   Solution Architecture   Draft
Architecture Series 5-4 Solution Architecture Draft
 
COBIT®5 - Foundation
COBIT®5 - FoundationCOBIT®5 - Foundation
COBIT®5 - Foundation
 
Engineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best PracticesEngineering Change Management - Overview and Best Practices
Engineering Change Management - Overview and Best Practices
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
Introduction to Oracle BPM Suite
Introduction to Oracle BPM SuiteIntroduction to Oracle BPM Suite
Introduction to Oracle BPM Suite
 
New & Emerging _ David_Burke _ OUM Fusion Apps.pdf
New & Emerging _ David_Burke _ OUM Fusion Apps.pdfNew & Emerging _ David_Burke _ OUM Fusion Apps.pdf
New & Emerging _ David_Burke _ OUM Fusion Apps.pdf
 

Similar to Conig® v1.5 Converged Information Governance

EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) Daljit Banger
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfBrion Carroll (II)
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateCorso
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation William Francis
 
Architecture Series 5-1 EA As Corporate Strategy Introduction
Architecture Series 5-1   EA As Corporate Strategy   IntroductionArchitecture Series 5-1   EA As Corporate Strategy   Introduction
Architecture Series 5-1 EA As Corporate Strategy IntroductionFrankie Hsiang
 
Integrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudIntegrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudPoornima N
 
Mozley,Kathy - Resume 2016
Mozley,Kathy - Resume 2016Mozley,Kathy - Resume 2016
Mozley,Kathy - Resume 2016Kathy Mozley
 
Steve Tuppen - Digital Service Management
Steve Tuppen - Digital Service ManagementSteve Tuppen - Digital Service Management
Steve Tuppen - Digital Service ManagementitSMF UK
 
Kathy Biggerstaff Resume 2018
Kathy Biggerstaff Resume 2018Kathy Biggerstaff Resume 2018
Kathy Biggerstaff Resume 2018Kathy Biggerstaff
 
MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes MuleSoft
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architectureiasaglobal
 
Operational Model Design
Operational Model DesignOperational Model Design
Operational Model DesignFlexera
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Jeff Jakubiak
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
Agile Capacity Management
Agile Capacity ManagementAgile Capacity Management
Agile Capacity ManagementPrecisely
 

Similar to Conig® v1.5 Converged Information Governance (20)

Aim crisp handout
Aim crisp handoutAim crisp handout
Aim crisp handout
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015)
 
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdfSabrion_Consulting_Overview CPG Retail Apparel.pdf
Sabrion_Consulting_Overview CPG Retail Apparel.pdf
 
Agile at scale
Agile at scaleAgile at scale
Agile at scale
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
Removing the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMateRemoving the barriers to business transformation with ArchiMate
Removing the barriers to business transformation with ArchiMate
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
Architecture Series 5-1 EA As Corporate Strategy Introduction
Architecture Series 5-1   EA As Corporate Strategy   IntroductionArchitecture Series 5-1   EA As Corporate Strategy   Introduction
Architecture Series 5-1 EA As Corporate Strategy Introduction
 
Integrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudIntegrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloud
 
Mozley,Kathy - Resume 2016
Mozley,Kathy - Resume 2016Mozley,Kathy - Resume 2016
Mozley,Kathy - Resume 2016
 
Steve Tuppen - Digital Service Management
Steve Tuppen - Digital Service ManagementSteve Tuppen - Digital Service Management
Steve Tuppen - Digital Service Management
 
testing
testingtesting
testing
 
Kathy Biggerstaff Resume 2018
Kathy Biggerstaff Resume 2018Kathy Biggerstaff Resume 2018
Kathy Biggerstaff Resume 2018
 
MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes MuleSoft's Approach to Driving Customer Outcomes
MuleSoft's Approach to Driving Customer Outcomes
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architecture
 
Operational Model Design
Operational Model DesignOperational Model Design
Operational Model Design
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
Agile Capacity Management
Agile Capacity ManagementAgile Capacity Management
Agile Capacity Management
 
RJRothen_Resume_0816
RJRothen_Resume_0816RJRothen_Resume_0816
RJRothen_Resume_0816
 

More from Yalcin Gerek

2020 rezilyant olmamizi hatirlatti. 2021 den itibaren rezilyant olmaliyiz
2020 rezilyant olmamizi hatirlatti.  2021 den itibaren rezilyant olmaliyiz2020 rezilyant olmamizi hatirlatti.  2021 den itibaren rezilyant olmaliyiz
2020 rezilyant olmamizi hatirlatti. 2021 den itibaren rezilyant olmaliyizYalcin Gerek
 
ICT for Covid-19 (Novel Coronavirus) Risk Response
ICT for Covid-19 (Novel Coronavirus) Risk ResponseICT for Covid-19 (Novel Coronavirus) Risk Response
ICT for Covid-19 (Novel Coronavirus) Risk ResponseYalcin Gerek
 
CONIG 1.6 Process Model Canvas
CONIG 1.6 Process Model CanvasCONIG 1.6 Process Model Canvas
CONIG 1.6 Process Model CanvasYalcin Gerek
 
Conig® v1.5 components
Conig® v1.5 componentsConig® v1.5 components
Conig® v1.5 componentsYalcin Gerek
 

More from Yalcin Gerek (6)

2020 rezilyant olmamizi hatirlatti. 2021 den itibaren rezilyant olmaliyiz
2020 rezilyant olmamizi hatirlatti.  2021 den itibaren rezilyant olmaliyiz2020 rezilyant olmamizi hatirlatti.  2021 den itibaren rezilyant olmaliyiz
2020 rezilyant olmamizi hatirlatti. 2021 den itibaren rezilyant olmaliyiz
 
ICT for Covid-19 (Novel Coronavirus) Risk Response
ICT for Covid-19 (Novel Coronavirus) Risk ResponseICT for Covid-19 (Novel Coronavirus) Risk Response
ICT for Covid-19 (Novel Coronavirus) Risk Response
 
GLDNHRN ONEIT SDM
GLDNHRN ONEIT SDMGLDNHRN ONEIT SDM
GLDNHRN ONEIT SDM
 
GLDNHRN
GLDNHRNGLDNHRN
GLDNHRN
 
CONIG 1.6 Process Model Canvas
CONIG 1.6 Process Model CanvasCONIG 1.6 Process Model Canvas
CONIG 1.6 Process Model Canvas
 
Conig® v1.5 components
Conig® v1.5 componentsConig® v1.5 components
Conig® v1.5 components
 

Recently uploaded

Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 

Recently uploaded (20)

Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 

Conig® v1.5 Converged Information Governance

  • 2. CONIG® (Converged Information Governance) is a governance framework developed by TAC A.S. addressing information and related technologies. Its main focus is INFORMATION. CONIG® is based on models that are widely used for Information Technologies, Corporate Governance as well as Business Governance. Introduced in 2009 by TAC A.S., CONIG® is a reference framework that consists of components of various models, best-practices, framework and standards. All of the underlying frameworks and best practices are widely accepted in the industry. While they might bring different perspectives and differ in nuances the common goal of all these frameworks and best practices is the assurance of provisioning of IT services, business services, and other enabler services. CONIG® aims to find the right balance between internal control approach focusing on control objectives and performance management approach focusing on achievement of value targets for the organization. It aims effective and efficient utilization of service and customer focused resources and capabilities to ensure that the IT organizations’ activities are aligned with business objectives. It ensures that desired quality, security and compliance requirements of produced and offered services are met. In general the purpose of CONIG is providing processes, structures and other related models to govern and manage the lifecycles of IT resources and capabilities of an organization to provide IT services to its clients at an acceptable level of cost and resource utilization. At the core, CONIG® has PROCESS and IT SERVICE approach. CONIG® defines INFORMATION as a valuable ASSET for the business. It is based on IT Services and provides a MANAGEMENT SYSTEM FRAMEWORK that includes MODELS consisting of PROCESSES for the governance and management of TECHNOLOGY based IT Services that are used for storing, processing, communicating and utilization of this INFORMATION. About CONIG® v1.5
  • 3.
  • 4.
  • 5. EPAM - Enhanced Process Architecture Model ELCA - Enterprise Layered Chambered Architecture TCM - Transition Change Model A.T.M.A.C.A. (Agile Timely Mature Adaptive Creative Adroid) CMAM - Capability Maturity Assessment Model OAM - IT Organization Assessment Model CCM - Control Compliance Model CSIM - Continual Systemic Improvement Model VAR - Value at Risk Model CONIG® v1.5 Components
  • 6. . is the process architecture model of CONIG Framework , defining and describing in detail a number of governance and management processes . has an objective that is to provide a detailed method and a set of supporting tools for developing an IT process architecture. It may be used freely by any organization wishing to adopt CONIG for use within that organization . represents all of the processes normally found in an enterprise relating to IT activities . is intentionally composed of a common sense approach to service enabled process management – do what works and what works is adapting a common framework of practices that unite all areas of IT service provision toward a single aim – delivering value to the business . is expected to provide structure, stability and strength to information management and governance capabilities with durable principles, methods and tools . offers a common reference model understandable to operational IT and business managers . is a complete and comprehensive reference model: It is not norm model, that's why, each enterprise shall define its own process set, taking into account its resources and capabilities . relies upon enhanced and converged architecture of globally accepted frameworks, best practices and standards. So the architecture of processes is structured in aligned with different authoritative requirements EPAM - Enhanced Process Architecture Model
  • 7.
  • 8. . is the information architecture model of "enablers" of CONIG Framework . has an objective that is to provide a detailed method and a set of supporting tools - for developing an enterprise information architecture. It may be used freely by any organization wishing to adopt CONIG for use within that organization . defines "enterprise" as any collection of organizations that has a common set of goals . ELCA relies upon "layered" and " chambered" architecture of CONIG Enablers. So the architecture of enterprise information is structured in aligned with the lifecycles of enablers ELCA - Enterprise Layered Chambered Architecture
  • 9.
  • 10.
  • 11. . is the transition change model of CONIG Framework . has four main lifecycles entities; - Requirement - Project / Program - Fast Transition / Fast Track - Operational Change . has objectives that are to; - Set customer expectations on how the performance and use of the new or changed IT service(s) can be used to enable business change - Enable the business change to integrate a release into the business processes and services - Ensure that there is a business justification; • for initiating the project/FT (documented in an outline Business Case) • all the necessary authorities exist for initiating the project/FT - Manage requirements of the project/FT’s products and product components and to ensure alignment between those requirements and the project/FT’s plans and work products - Plan the work required for project/FT initiation establish and maintain plans that define project/FT activities - Ensure management direction and control which are provided throughout the project/FT’s life, and that the project/FT remains viable - Quantitatively manage the project/FT to achieve the project/FT’s established quality and process performance objectives - Manage the acquisition of products and services from suppliers - Provide the information needed for the Boards (tCAb, pCAB) to assess the continuing viability of the project/FT – including the aggregated risk exposure - Ensure risks and issues are kept under control - Ensure that team managers, team members and suppliers are clear as to what is to be produced and what is the expected effort, cost or timescales - Provide an understanding of the project/FT’s progress so that appropriate corrective actions can be taken when the project/FT’s performance deviates significantly from the plan - Ensure that changes are recorded and evaluated, and that authorized changes are prioritized, planned, tested, implemented, documented and reviewed in a controled manner • defines transition and change pipeline starges&gates, processes and information items • TCM relies upon "stage&gate" architecture. So the architecture of TCM is structured in aligned with the lifecycles of enablers TCM - Transition Change Model
  • 12.
  • 13. • is the IT Service/Product analyze design development model of CONIG Framework has six main lifecycles entities; - Requirement (HLR, ILR, SLR) - Iteration / Sprint - Service Aspects (Functional, Capability, Resource) - Test Cases - Release Unit / Release Package - Deployment Order • has objectives that are ; - Early delivery of working software - Qality is built into the IT Services — everyone involved in quality - Defect prevention (stopping them from getting beyond the requirements) - CIear acceptance criteria - EarIy involvement of all key players - Surprises to the business on delivery - Growth of (test) team skills - Regression averse - more testing than ever - Risk based approach to development — the most important bits are done first - Good collaboration - knowledge of project - Status, outcomes and progress is clearly and honestly displayed for all to see - Less "formal'" defects - Release unit and identification - Release design options and considerations - Release and deployment models - Release and deployment planning - Preparation for build, test and deployment - Service testing and pilots - Perform transfer, deployment and retirement - Verify deployment - Early life support A.T.M.A.C.A. Agile Timely Mature Adaptive Creative Adroid
  • 14. • has advantages; - Grouping of requirements into small increments with minimal planning - Stakeholders' voice about the product and the plan - No direct long-term planning - Short development cycles of two to four weeks - Daily communication through short meetings to State what one did since the last meeting, what one will be working on until the next meeting, and what, if anything, is impeding the progress - Through these meetings, it becomes easy to discover any issue early and increase offline communication - Development progress measured through bum down chaıl and completed requirement (HLR, ILR, SLR) backlog items - Team members afticulate upfront about their responsibilities and roadblocks - Self-organizing and self-managing teams • leads to faster delivery of software. - Agile methods are iterative development methods that aim to reduce development overhead and so produce software faster - Extreme programming includes practices such as systematic testing, continuous improvement and customer involvement - The approach to testing is a particular strength where executable tests are developed before the code is written. - Rapid application development environments include database programming languages, form generation tools and links to office applications - A throw-away prototype is used to explore requirements and design options - When implementing a throw-away prototype, start with the requirements you least understand; in incremental development, start with the best-understood requirements. • defines transition and change pipeline iterations, processes, information items and work products • benefits the organization by helping it to - Increase the quality of the deliverables - Cope better with change (and expect the changes) - Provide better estimates while spending less time creating them - Be more in control of the project schedule and state As a result, A.T.M.A.C.A. projects achieve higher customer satisfaction rates. • A.T.M.A.C.A. relies upon agile and lean architecture. So the architecture of A.T.M.A.C.A. is structured in aligned with the lifecycles of enablers A.T.M.A.C.A. Agile Timely Mature Adaptive Creative Adroid
  • 15.
  • 16. . is the capability maturity assessment model of "processes" of CONIG Framework . is intended as a comprehensive reference model for state-of-the-practice process improvement. The CMAM defines the fundamental IT processes of information management and governance and specific capabilities that constitute a gradated path to maturity. It allows organizations to evaluate themselves against documented best practices -like COBIT, ITIL, ISO27001, ISO20000, ISO 22301, eSCM- determine gaps, and improve management of process enablers across functional, line of business, and geographic boundaries. . CMAM relies upon "maturities" and " capabilities" of CONIG Process Enablers. So the improvements of enterprise IT is structured in aligned with the lifecycles of processes. CMAM - Capability Maturity Assessment Model
  • 17. OAM is a systematic process for obtaining valid information about the performance of an organization and the factors that affect its performance. It focuses on the functioning of organizations as the primary unit of analysis. Outline of the approach being based on observing the relationships among staffs and organization units, OAM represents a particular way of looking at organizational structure and design. It gives attention to issues such as planning, delivering, operating, the delegation of authority, organizational control, role cascade and definitions, boundaries, responsibilities, and accountabilities. OAM aims to help an organization defining and improving its overall performance through analyzing its service portfolios, process areas, relationship, organizational skills and information items. The factors embedded in the delivery, relations, competency and contextual environment all influence the performance of governing an organization. The overall organizational performance is defined in terms of effectiveness (mission fulfillment), efficiency (accuracy, timeliness and value of service and program delivery), ongoing relevance (the extent to which the organization adapts to changing conditions and its environment), and financial viability. OAM is suitable to the nature of how the IT organization operates. It also posits that organizational performance should be examined in relation to the organization’s producing outcome capability and external environment. OAM provides mappings with SFIA (skills framework for the information age) and hence provides practical implementation guidance for designing IT organization and talent management in it. OAM - IT Organization Assessment Model
  • 18. . is the control compliance model of "enablers" of CONIG Framework . has an objective that is to provide a detailed method and a set of supporting tools - for developing an internal control architecture. It may be used freely by any organization wishing to adopt CONIG for use within that organization in order to comply authoritative requirements . has detail objectives; - Document controls and details - Test controls - Review controls - Identify control deficiencies - Issue and Remediation Management - Report on control status - Maintain controls - Test control once and rely on results for many regulations - Incorporate policy and risk management into compliance management - Identify external compliance requirements (authoritative requirements) - Optimise response to authoritative requirements - Confirm authoritative requirements - Obtain assurance of authoritative requirements . establish mappings among "internal controls" and "authoritative requirements" . defines quatitative scoring model for "internal controls" and "authoritative requirements" based on tests and audit finding CCM - Control Compliance Model
  • 19. . is the continual systemic improvement model of CONIG Framework . has an objective that is to ensure continual systemic improvement of the IT value enablers in fulfilling the relevant business objectives of the organization. . identifies process improvements . is expected to result in measurable and meaningful improvements in enablers performance. In addition, the organization should systematically implement processes and technology that will enable meeting quality and performance objectives of the enablers. . focuses on continual process and IT service improvements in relation to business goals . establishes the principles and framework for continual improvement and quality enhancements across all aspects of the organization's activities CONIG CSIM is committed to ensuring that the quality of service is constantly monitored and that planning, procedures and fınancial resources are in place to ensure systematic improvement, and to enhance efficiency and effectiveness for the benefıt of the enterprise and its stakeholders. The enterprise's commitment to the provision of quality IT service is underpinned by a Continual Systemic Improvement Model - CSIM - that applies to every activity of the organization. The CONIG CSIM will support and enhance policies, procedures and implemented key IT controls within a continual systemic improvement cycle to ensure that IT services delivered by the enterprise: . meet customer needs . meet stakeholder needs . are delivered in a quality assured manner . are equivalent in standard in timely manner The CONIG CSIM Framework will also meet the requirements of converged ISO standards, autohoritative requirements of regulatory bodies and, national and international laws . The enterprise can identify the following key areas of activity which make up the CONIG CSIM: . IT services . assessment validation . governance . planning and review . policy and procedure . stakeholder feedback . staff reviews . course and curriculum reviews . internal audit and self assessment . benchmarking of IT service outcomes and the teaching and learning environment CSIM - Continual Systemic Improvement Model
  • 20. . is the value at risk model of "enablers" of CONIG Framework . has an objective that is to provide a detailed method and a set of supporting tools - for developing an risk model. It may be used freely by any organization wishing to adopt CONIG for use within that organization in order to create value from risk management . has detail objectives; - Ability to customize or tailor the risk profiles and risk detections - Ability to schedule, notify, conduct, review and approve risk evaluations for enablers, business processes, business objectives and other parts of the organization - Ability to define and test controls and use results in the risk evaluation process - Ability to define and monitor key risk indicators (risk magnitude value, risk magnitude score) and use results in the risk evaluation process - Ability to identify issues associated with risk evaluations - Ability to track and manage remediation/improvement items associated with issues identified - Ability to take action to address issues identified - Ability to monitor the environment for risk and notify appropriate stakeholders when there has been a change in the risk profile - Ability to report on the status, schedule or performance of risk management activities . establish mappings among "enablers", "risk detections", "risk profiles", "impacts","internal controls" and "authoritative requirements" . defines quatitative scoring model for "risk detections" and "risk profiles" based on risk assessments and other management system information items VAR – Value at Risk Model
  • 21. Since our foundation in 1999, we are helping our clients to identify and implementperformance improvement opportunities. We work Together with our clients in a trust-based cooperation to improve, mature and transform their IT and business processes. Our methodology based on best-practices is an innovative and unique approach. Today TAC is divided into threemajor business segments : Consulting | Technology | Education Each segment is specialized in complementary services that operate in concert to maximize value for our clients. About TAC