SlideShare a Scribd company logo
IT GOVERNANCE – THE MISSING COMPASS
IN A TECHNOLOGY CHANGING WORLD
09/02/2016
1
By Oladapo Ogundeji : CTO/CISO, Digital Jewels Ltd.
Nigeria.
www.digitaljewels.net2
Oladapo Ogundeji
CTO/CISO - Digital Jewels
Oladapo Ogundeji is Chief Technical Officer at Digital Jewels. Mr. Ogundeji is PECB partner
and has more than 18 years of experience.
+234099930209
dapoo@digitaljewels.net ng.linkedin.com/in/dapoo
www.digitaljewels.net
Profile : Oladapo Ogundeji.
 Professional career extends over 18 years of experience focused on enhancing the strategic
value of ICT in organisations through process re-engineering, strategic planning and project
management for corporate objective & strategy that address business opportunities and
issues.
 A highly trained ICT Management Specialist & Consultant.
 Masters In Information Technology ( M.I.T )
 B. Sc. Electronics & Electrical Engineering.
Past roles/positions
 Head of User Support & Service Desk
 IT Manager
 Project Manager – Technical Services
 Deputy Head – Network Systems
 Project Leader
 Project / System Engineer
CTO/CISO - Digital Jewels Limited.
A specialised Information Value Chain Consulting
Firm offering specialised IT & PM Consulting &
Capacity Building Services
Contact: +234099930209 ; dapoo@digitaljewels.net
QUALIFICATIONS...
 COBIT 4.1/5.0 Foundation & Certified Trainer
 Business Continuity Management : ISO22301/ BS25999 Certified MASTER & Accredited Trainer
 ISO 27001 Certified Lead Implementer Certified & Trainer
 Certified IT Business Manager (ITBMC)
 PRINCE2 Foundation Certificate (Project Management Methodology).
 ISACA : C I S A // C I S M // C G E I T
 IT Service Management Foundation (I T I L)
 RAD Datacommunication Specialist & Engineer.
 HP (COMPAQ) : Accredited Compaq Technician (A C T) // Accredited Platform Specialist (A P S)
 Microsoft Certified Professional: ( M C P) // Microsoft Certified Professional + Internet: ( M C P + I) //
Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified System Engineer : ( M C S E)
// Microsoft Sales Specialist : ( M S S)
 Cisco Certified Network Associate ( C C N A ) // Cisco Certified Network Professional ( C C N P ) // Cisco
Certified Design Associate ( C C D A ) // Cisco Certified Design Professional ( C C D P ) // Cisco Sales Expert
(CSE )
 BICC Brand-Rex (Structured Cabling) Certified Installer.
 TOGAF 9.1 Certified [+ Foundation]
 MoR (Management of Risk) Certified & Accredited Trainer
Overview of IT Governance
Benefits of IT Governance
IT Governance Implementation :
Approach and Methodology
Critical Success Factors
AGENDA
OVERVIEW OF IT
GOVERNANCE
6
WHAT IS IT GOVERNANCE
7
IT governance is the formal process of defining the strategy of the IT organization
and overseeing its execution to achieve the goals of the enterprise.
Decision rights
framework &
mechanisms
Vision,
goals/priorities, measures; value
prop &
service portfolio;
resource approaches &
commitments;
change management
plans
Aligned/synchronized with
the enterprise strategy,
including other key asset
strategies
Translation into
aligned, tactical, operational
plans; closed-loop
monitoring & control;
accountability;
regulatory compliance
IT: A DOUBLE ENDED SWORD…
• Increased complexity, speed, interconnectivity and
globalisation mean more than ever that IT:
Offers extraordinary
opportunities to enable &
transform business.
Involves huge costs &
enormous risks.
WHY IT GOVERNANCE: …BALANCING AMONG MANY COMPETING PRIORITIES
9
IT Governance
Priorities
Maximize Return:
a. Improve business results
b. Grow revenue and earnings
c. Cash flow
d. Reduced cost-of-operation
Increase agility
a. Enable the business organizations and
operations to adapt to changing
business needs
Improve performance:
a. Improve business operations
performance end-to-end across the
enterprise
b. Increase customer and employee
satisfaction
Mitigate Risk:
a. Ensure security and continuity of
internal business operations while
maximizing exposure to external risk
factors
CORE COMPETENCIES FOR IT GOVERNANCE
10
Enterprise
Architecture
Management
Relationship
Management
IT Strategy
Management
Financial
Management
Supply /
Demand
Management
Portfolio
Management
IT Operating
Model
• Align operational and strategic
IT investments to business
strategies & objectives.
• Establish
policies,
standards,
models and
processes for
managing IT as
an enterprise
asset • Lifecycle management of
infrastructure, applications and
services
• Understand the
drivers of IT costs
to allocate
appropriate costs
to the consumers
of IT services.
• Establish effective, collaborative
relationships with business
stakeholders and suppliers.
• Balance the demand for IT services with
available resources to meet immediate and
strategic goals.
NEED FOR IT GOVERNANCE - GOVERNANCE OF EMERGING TECHNOLOGIES
11
• Big Data Management & Analytics. How we can
manage Information, that would change the
way we run our business?
• BYOD & Enterprise Mobility. How to manage
mobile strategies enabling the mobile employee
with computing everywhere around them?
• Mobile & Cloud Security. Creating a balance
between the need to protect the organization
and the need to operate the business?
• Decision Supporting Systems. The increased
use of computing machines in decision
making to extend into the realm of financial
decisions such as FX trading, lending, e.t.c.
NEED FOR IT GOVERNANCE - TIE TOGETHER EMERGING TECH PROCESSES
12
• Crowd sourcing. Connecting more and more
employers through remote, distributed channels
with other employees in different places all over the
world.
• Desktop Virtualization and Cloud Client-
Computing. Empowering employees and IT with
secure, reliable desktop virtualization
• Web-Scale IT: The Enterprise Impact. Delivering
seamless user services on a massive scale using Open
technologies (Hardware, Software, Agile Software
Methods)
• Identity & Access Management. Preparing enterprise
infrastructure for a stateless identity; Protect and
monitor enterprise assets and processes anytime,
anywhere.
BENEFITS OF IT
GOVERNANCE
13
IT GOVERNANCE FAILURES
14
• In 2005, Ford Motor spent a whopping $400 million on a purchasing system,
only to abandon it.
• Canadian Blood Services’ Enterprise Resource Planning rollout failed and
abandoned
• By Meta Group, 60 to 80 per cent of project failures can be attributed
directly to poor requirements gathering analysis and management.
• Carnegie Mellon says 25 to 40 per cent of all spending on IT projects is
wasted as a result of re-work
NEEDS, ISSUES AND CHALLENGES
15
Procedure, Audits, Metrics
Control
Strategic
Tactical
Operations
Demand
IT and
Business
Resources
Supply
Capital, Capacity, Priorities
Planning
Alignment Flexibility
EfficiencyQuality
Lack of Business aligned strategy
Reduce costs across businessIneffective project Management
Deployment Complexity through lack
of standard & legacy
No Audit Trails
Management of Service Changes
Must reduce IT costs by 30%
Lack of IT resource transparency
Missed targets due to lack of steering control
Deployment Complexity in number of
project
Cannot aggregate need and distribute
ROI
No means of governing outsourced contracts
No means of capturing demands
No means of prioritization of
business need
No means of reporting SLA
Making new outsourcing decisions
EXPECTED OUTCOMES
Tighter IT-
Business alignment
Reduced
Operational
Criticality/Risk
Improved
Value Delivery and
Benefits Realization
Enhanced IT
Resource
Management
Improved
Performance
Management
Improved IT
Coverage
Integration with
other best practice
standards.
16
TANGIBLE BENEFITS
17
Cost avoidance
• Stop projects unlikely to deliver expected business value
• Save by avoiding investment in non-viable projects
• Reduce IT spend not aligned to IT strategy reduced
• Reduce IT project scope change orders
Cost reduction
• Reduce “At risk” projects
• Reduce IT expenditure s
• IT budget on target
Efficiency gains
• Greater IT-Business Alignment
• Increased Stakeholder value
• Reduced project funding process
• Reduce Schedule tracking and updating lead time
• Increase in Reporting efficiency of IT processes
• Increase in IT productivity, delivery and quality
• Increase Project management efficiency
• Reduce Demand queue
IMPLEMENTATION METHODOLOGY
AND APPROACH
18
IT GOVERNANCE FRAMEWORKS
19
There are quite a few supporting references that can be useful guides to the implementation of
information and technology (IT) governance. Some of them are:
• COBIT 5
• ISO 38500
COBIT 5 PRINCIPLES
20
• COBIT 5 helps enterprises create
optimal value from IT by maintaining
a balance between realising benefits
and optimising risk levels and
resource use.
• COBIT 5 enables information and
related technology to be governed
and managed in a holistic manner for
the entire enterprise, taking in the
full end-to-end business and
functional areas of responsibility,
considering the IT-related interests
of internal and external stakeholders.
• The COBIT 5 principles and enablers
are generic and useful for enterprises
of all sizes, whether commercial, not-
for-profit or in the public sector.
COBIT 5 - GOVERNANCE & MANAGEMENT AREAS
21
• Governance ensures that enterprise
objectives are achieved by evaluating
stakeholder needs, conditions and
options; setting direction through
prioritisation and decision making;
and monitoring performance,
compliance and progress against
agreed-on direction and objectives
(EDM).
• Management plans, builds, runs and
monitors activities in alignment with
the direction set by the governance
body to achieve the enterprise
objectives (P B R M).
COBIT 5 ENTERPRISE ENABLERS
22
1. Principles, policies and
frameworks
2. Processes
3. Organisational structures
4. Culture, ethics and
behaviour
5. Information
6. Services, infrastructure
and applications
7. People, skills and
competencies
COBIT 5 Process Model
23
ISO/IEC 38500:2015
• ISO/IEC 38500:2015, Corporate governance of information technology, is applicable to organizations of
all sizes, including public and private companies, government entities, and not-for-profit organizations.
• The standard provides a framework for effective governance of IT to assist those at the highest level of
organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their
organizations’ use of IT.
• The framework comprises definitions, principles and a model. It sets out six principles for good corporate
governance of IT that express preferred behavior to guide decision making:
www.digitaljewels.net24
Six principles
for good
corporate
governance
of IT
Responsibility
Strategy
Acquisition
Performance
Conformance
Human
Behaviour
MODEL FOR GOVERNANCE OF IT - ISO 38500:2015
25
IT GOVERNANCE IMPLEMENTATION APPROACH & METHODOLOGY
26
Execute
IT Governance
Assessment
Setup
IT Governance
Framework
Design
IT Governance
Processes
Implement
Supporting Tools
•Execute assessment to identify gaps
•Define new role of IT in organization
•Define evolution roadmap to address the gaps
•Define roles and responsibilities
•Setup communication path to support IT-business alignment
•Define management structures for decision making, reporting and escalation
•Define policies
•Define processes
•Define KPIs and reporting requirements
•Implement tool to support the execution of the solution
•Implement tools for data collection and management reporting
Continuous
Improvement Plan
(Control Lifecycle)
•Identify indicators to monitor strategy execution
•Define steering committee to manage relationships within IT and between
business & IT
•Review IT strategy periodically and evolve governance environment
CRITICAL SUCCESS FACTORS
27
Critical Success Factors
• Clarity of Purpose
• Executive or Top Management commitment & buy-in: active &
sustained
• Prompt approval and implementation of recommendations from
the assessment
• Management of Business Change
• Focus, execute and enforce
• Measure achievable targets and
expectations
• Don’t over-engineer IT Governance
• Evolution not revolution
• Competence resource sufficiency &
availability
CONSTRAINTS
29
• Senior management not engaging IT
– Unwillingness to involve IT in decision making
• Poor Risk Management
– Not assessing likely potential threats
• Poor Strategic Alignment
– Little or no business value derived
from major IT investments
• Ineffective Resource &
Resource Mgt
– Ensure timely availability of people,
technology and financial resources.
www.digitaljewels.net30
?
QUESTIONS
THANK YOU
+234099930209
dapoo@digitaljewels.net
www.digitaljewels.net
ng.linkedin.com/in/dapoo
for your time & attention…
A presentation by Oladapo OGUNDEJI.
CTO / CISO, Digital Jewels Ltd
dapoo@digitaljewels.net

More Related Content

What's hot

IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability Assessment
Eryk Budi Pratama
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
Sayyed Zakir Ali Rizwe
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
jmcarden
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
Alan McSweeney
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
jiricejka
 
IT Strategy
IT StrategyIT Strategy
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Alan McSweeney
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
Jerry Bishop
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...
Waqas Tariq
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
Richard Willis
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
Eryk Budi Pratama
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
Vishal Sharma
 
How to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeksHow to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeks
Leo Barella
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
Rob Akershoek
 
COBIT 2019 Overview_v1.1.pdf
COBIT 2019 Overview_v1.1.pdfCOBIT 2019 Overview_v1.1.pdf
COBIT 2019 Overview_v1.1.pdf
MartinPatrici
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
Info-Tech Research Group
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
Eryk Budi Pratama
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
Goutama Bachtiar
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
ITpreneurs
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
Sebastien Juras
 

What's hot (20)

IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability Assessment
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 
IT Strategy
IT StrategyIT Strategy
IT Strategy
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
 
How to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeksHow to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeks
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
 
COBIT 2019 Overview_v1.1.pdf
COBIT 2019 Overview_v1.1.pdfCOBIT 2019 Overview_v1.1.pdf
COBIT 2019 Overview_v1.1.pdf
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
Enterprise Architecture for Dummies
Enterprise Architecture for DummiesEnterprise Architecture for Dummies
Enterprise Architecture for Dummies
 

Similar to IT Governance – The missing compass in a technology changing world

IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance Metric
PECB
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
John Halliday
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee
 
Indus productization-brief
Indus productization-briefIndus productization-brief
Indus productization-brief
indusaviation
 
IT Capabilty Assessment 150713
IT Capabilty Assessment 150713IT Capabilty Assessment 150713
IT Capabilty Assessment 150713Peter Maddigan
 
Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
Nikola Terziev, CISA
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsGoutama Bachtiar
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
Ayelet Baron
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022
Ray Bugg
 
Career sessions IM
Career sessions IMCareer sessions IM
Career sessions IM
SupportGCI
 
Arquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digitalArquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digital
★ Pedro Del Castillo ★
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
bartholomeocoombs
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
keturahhazelhurst
 
Maximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT GovernanceMaximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT Governance
Cognizant
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue ResumePaul Gue
 
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT StrategyICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
Mohammad Abdul Matin Emon
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Paul Woudstra
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Fresche Solutions
 

Similar to IT Governance – The missing compass in a technology changing world (20)

IT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance MetricIT Performance Measurement using IT Governance Metric
IT Performance Measurement using IT Governance Metric
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27
 
Indus productization-brief
Indus productization-briefIndus productization-brief
Indus productization-brief
 
IT Capabilty Assessment 150713
IT Capabilty Assessment 150713IT Capabilty Assessment 150713
IT Capabilty Assessment 150713
 
Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022
 
Career sessions IM
Career sessions IMCareer sessions IM
Career sessions IM
 
Arquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digitalArquitectura Empresarial impulsando la transformación digital
Arquitectura Empresarial impulsando la transformación digital
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
Maximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT GovernanceMaximizing Business Value Through Effective IT Governance
Maximizing Business Value Through Effective IT Governance
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue Resume
 
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT StrategyICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
 
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip ReportGartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
Gartner IT Infrastructure & Operations Management Summit 2014 - Trip Report
 
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris KoppeDeveloping a Modernization Strategy: Evaluating the Options by Chris Koppe
Developing a Modernization Strategy: Evaluating the Options by Chris Koppe
 
resume.smrozMA
resume.smrozMAresume.smrozMA
resume.smrozMA
 
Craig E. Laski,ITIL.PMP,SSGB resume
Craig E. Laski,ITIL.PMP,SSGB resumeCraig E. Laski,ITIL.PMP,SSGB resume
Craig E. Laski,ITIL.PMP,SSGB resume
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

IT Governance – The missing compass in a technology changing world

  • 1. IT GOVERNANCE – THE MISSING COMPASS IN A TECHNOLOGY CHANGING WORLD 09/02/2016 1 By Oladapo Ogundeji : CTO/CISO, Digital Jewels Ltd. Nigeria.
  • 2. www.digitaljewels.net2 Oladapo Ogundeji CTO/CISO - Digital Jewels Oladapo Ogundeji is Chief Technical Officer at Digital Jewels. Mr. Ogundeji is PECB partner and has more than 18 years of experience. +234099930209 dapoo@digitaljewels.net ng.linkedin.com/in/dapoo www.digitaljewels.net
  • 3. Profile : Oladapo Ogundeji.  Professional career extends over 18 years of experience focused on enhancing the strategic value of ICT in organisations through process re-engineering, strategic planning and project management for corporate objective & strategy that address business opportunities and issues.  A highly trained ICT Management Specialist & Consultant.  Masters In Information Technology ( M.I.T )  B. Sc. Electronics & Electrical Engineering. Past roles/positions  Head of User Support & Service Desk  IT Manager  Project Manager – Technical Services  Deputy Head – Network Systems  Project Leader  Project / System Engineer CTO/CISO - Digital Jewels Limited. A specialised Information Value Chain Consulting Firm offering specialised IT & PM Consulting & Capacity Building Services Contact: +234099930209 ; dapoo@digitaljewels.net
  • 4. QUALIFICATIONS...  COBIT 4.1/5.0 Foundation & Certified Trainer  Business Continuity Management : ISO22301/ BS25999 Certified MASTER & Accredited Trainer  ISO 27001 Certified Lead Implementer Certified & Trainer  Certified IT Business Manager (ITBMC)  PRINCE2 Foundation Certificate (Project Management Methodology).  ISACA : C I S A // C I S M // C G E I T  IT Service Management Foundation (I T I L)  RAD Datacommunication Specialist & Engineer.  HP (COMPAQ) : Accredited Compaq Technician (A C T) // Accredited Platform Specialist (A P S)  Microsoft Certified Professional: ( M C P) // Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified Professional + Internet: ( M C P + I) // Microsoft Certified System Engineer : ( M C S E) // Microsoft Sales Specialist : ( M S S)  Cisco Certified Network Associate ( C C N A ) // Cisco Certified Network Professional ( C C N P ) // Cisco Certified Design Associate ( C C D A ) // Cisco Certified Design Professional ( C C D P ) // Cisco Sales Expert (CSE )  BICC Brand-Rex (Structured Cabling) Certified Installer.  TOGAF 9.1 Certified [+ Foundation]  MoR (Management of Risk) Certified & Accredited Trainer
  • 5. Overview of IT Governance Benefits of IT Governance IT Governance Implementation : Approach and Methodology Critical Success Factors AGENDA
  • 7. WHAT IS IT GOVERNANCE 7 IT governance is the formal process of defining the strategy of the IT organization and overseeing its execution to achieve the goals of the enterprise. Decision rights framework & mechanisms Vision, goals/priorities, measures; value prop & service portfolio; resource approaches & commitments; change management plans Aligned/synchronized with the enterprise strategy, including other key asset strategies Translation into aligned, tactical, operational plans; closed-loop monitoring & control; accountability; regulatory compliance
  • 8. IT: A DOUBLE ENDED SWORD… • Increased complexity, speed, interconnectivity and globalisation mean more than ever that IT: Offers extraordinary opportunities to enable & transform business. Involves huge costs & enormous risks.
  • 9. WHY IT GOVERNANCE: …BALANCING AMONG MANY COMPETING PRIORITIES 9 IT Governance Priorities Maximize Return: a. Improve business results b. Grow revenue and earnings c. Cash flow d. Reduced cost-of-operation Increase agility a. Enable the business organizations and operations to adapt to changing business needs Improve performance: a. Improve business operations performance end-to-end across the enterprise b. Increase customer and employee satisfaction Mitigate Risk: a. Ensure security and continuity of internal business operations while maximizing exposure to external risk factors
  • 10. CORE COMPETENCIES FOR IT GOVERNANCE 10 Enterprise Architecture Management Relationship Management IT Strategy Management Financial Management Supply / Demand Management Portfolio Management IT Operating Model • Align operational and strategic IT investments to business strategies & objectives. • Establish policies, standards, models and processes for managing IT as an enterprise asset • Lifecycle management of infrastructure, applications and services • Understand the drivers of IT costs to allocate appropriate costs to the consumers of IT services. • Establish effective, collaborative relationships with business stakeholders and suppliers. • Balance the demand for IT services with available resources to meet immediate and strategic goals.
  • 11. NEED FOR IT GOVERNANCE - GOVERNANCE OF EMERGING TECHNOLOGIES 11 • Big Data Management & Analytics. How we can manage Information, that would change the way we run our business? • BYOD & Enterprise Mobility. How to manage mobile strategies enabling the mobile employee with computing everywhere around them? • Mobile & Cloud Security. Creating a balance between the need to protect the organization and the need to operate the business? • Decision Supporting Systems. The increased use of computing machines in decision making to extend into the realm of financial decisions such as FX trading, lending, e.t.c.
  • 12. NEED FOR IT GOVERNANCE - TIE TOGETHER EMERGING TECH PROCESSES 12 • Crowd sourcing. Connecting more and more employers through remote, distributed channels with other employees in different places all over the world. • Desktop Virtualization and Cloud Client- Computing. Empowering employees and IT with secure, reliable desktop virtualization • Web-Scale IT: The Enterprise Impact. Delivering seamless user services on a massive scale using Open technologies (Hardware, Software, Agile Software Methods) • Identity & Access Management. Preparing enterprise infrastructure for a stateless identity; Protect and monitor enterprise assets and processes anytime, anywhere.
  • 14. IT GOVERNANCE FAILURES 14 • In 2005, Ford Motor spent a whopping $400 million on a purchasing system, only to abandon it. • Canadian Blood Services’ Enterprise Resource Planning rollout failed and abandoned • By Meta Group, 60 to 80 per cent of project failures can be attributed directly to poor requirements gathering analysis and management. • Carnegie Mellon says 25 to 40 per cent of all spending on IT projects is wasted as a result of re-work
  • 15. NEEDS, ISSUES AND CHALLENGES 15 Procedure, Audits, Metrics Control Strategic Tactical Operations Demand IT and Business Resources Supply Capital, Capacity, Priorities Planning Alignment Flexibility EfficiencyQuality Lack of Business aligned strategy Reduce costs across businessIneffective project Management Deployment Complexity through lack of standard & legacy No Audit Trails Management of Service Changes Must reduce IT costs by 30% Lack of IT resource transparency Missed targets due to lack of steering control Deployment Complexity in number of project Cannot aggregate need and distribute ROI No means of governing outsourced contracts No means of capturing demands No means of prioritization of business need No means of reporting SLA Making new outsourcing decisions
  • 16. EXPECTED OUTCOMES Tighter IT- Business alignment Reduced Operational Criticality/Risk Improved Value Delivery and Benefits Realization Enhanced IT Resource Management Improved Performance Management Improved IT Coverage Integration with other best practice standards. 16
  • 17. TANGIBLE BENEFITS 17 Cost avoidance • Stop projects unlikely to deliver expected business value • Save by avoiding investment in non-viable projects • Reduce IT spend not aligned to IT strategy reduced • Reduce IT project scope change orders Cost reduction • Reduce “At risk” projects • Reduce IT expenditure s • IT budget on target Efficiency gains • Greater IT-Business Alignment • Increased Stakeholder value • Reduced project funding process • Reduce Schedule tracking and updating lead time • Increase in Reporting efficiency of IT processes • Increase in IT productivity, delivery and quality • Increase Project management efficiency • Reduce Demand queue
  • 19. IT GOVERNANCE FRAMEWORKS 19 There are quite a few supporting references that can be useful guides to the implementation of information and technology (IT) governance. Some of them are: • COBIT 5 • ISO 38500
  • 20. COBIT 5 PRINCIPLES 20 • COBIT 5 helps enterprises create optimal value from IT by maintaining a balance between realising benefits and optimising risk levels and resource use. • COBIT 5 enables information and related technology to be governed and managed in a holistic manner for the entire enterprise, taking in the full end-to-end business and functional areas of responsibility, considering the IT-related interests of internal and external stakeholders. • The COBIT 5 principles and enablers are generic and useful for enterprises of all sizes, whether commercial, not- for-profit or in the public sector.
  • 21. COBIT 5 - GOVERNANCE & MANAGEMENT AREAS 21 • Governance ensures that enterprise objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritisation and decision making; and monitoring performance, compliance and progress against agreed-on direction and objectives (EDM). • Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives (P B R M).
  • 22. COBIT 5 ENTERPRISE ENABLERS 22 1. Principles, policies and frameworks 2. Processes 3. Organisational structures 4. Culture, ethics and behaviour 5. Information 6. Services, infrastructure and applications 7. People, skills and competencies
  • 23. COBIT 5 Process Model 23
  • 24. ISO/IEC 38500:2015 • ISO/IEC 38500:2015, Corporate governance of information technology, is applicable to organizations of all sizes, including public and private companies, government entities, and not-for-profit organizations. • The standard provides a framework for effective governance of IT to assist those at the highest level of organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their organizations’ use of IT. • The framework comprises definitions, principles and a model. It sets out six principles for good corporate governance of IT that express preferred behavior to guide decision making: www.digitaljewels.net24 Six principles for good corporate governance of IT Responsibility Strategy Acquisition Performance Conformance Human Behaviour
  • 25. MODEL FOR GOVERNANCE OF IT - ISO 38500:2015 25
  • 26. IT GOVERNANCE IMPLEMENTATION APPROACH & METHODOLOGY 26 Execute IT Governance Assessment Setup IT Governance Framework Design IT Governance Processes Implement Supporting Tools •Execute assessment to identify gaps •Define new role of IT in organization •Define evolution roadmap to address the gaps •Define roles and responsibilities •Setup communication path to support IT-business alignment •Define management structures for decision making, reporting and escalation •Define policies •Define processes •Define KPIs and reporting requirements •Implement tool to support the execution of the solution •Implement tools for data collection and management reporting Continuous Improvement Plan (Control Lifecycle) •Identify indicators to monitor strategy execution •Define steering committee to manage relationships within IT and between business & IT •Review IT strategy periodically and evolve governance environment
  • 28. Critical Success Factors • Clarity of Purpose • Executive or Top Management commitment & buy-in: active & sustained • Prompt approval and implementation of recommendations from the assessment • Management of Business Change • Focus, execute and enforce • Measure achievable targets and expectations • Don’t over-engineer IT Governance • Evolution not revolution • Competence resource sufficiency & availability
  • 29. CONSTRAINTS 29 • Senior management not engaging IT – Unwillingness to involve IT in decision making • Poor Risk Management – Not assessing likely potential threats • Poor Strategic Alignment – Little or no business value derived from major IT investments • Ineffective Resource & Resource Mgt – Ensure timely availability of people, technology and financial resources.
  • 31. for your time & attention… A presentation by Oladapo OGUNDEJI. CTO / CISO, Digital Jewels Ltd dapoo@digitaljewels.net