SlideShare a Scribd company logo
http://cahyod.dosen.narotama.ac.id/




Indri Sudanawati Rozas , S.Kom, M.Kom
Cahyo Darujati, ST., MT.


     Kajian Tata Kelola Layanan TI –Ditjen DIKTI | Hotel Majapahit Surabaya | Selasa, 20 Nopember 2012
 Kajian Tata Kelola Layanan TI




    Kajian   Tata Kelola TI
Managing IT Resources to Deliver IT Goals
Pembahasan
 Definisi IT Governance
 Mengapa diperlukan IT Governance
 Komponen IT Governance
 Why IT Governance implementation is so difficult?
 IT Governance Frameworks
 COBIT
  Mengapa COBIT?
  Generasi COBIT
  Gambaran COBIT
  COBIT framework : process oriented
  Implementasi COBIT : comprehensive approach
Definisi   (1)
Definisi (2)
Definisi     (3)

• Specifying the decision rights and accountability
  framework to encourage desirable behavior in using IT
  (Peter Weill & Jeanne W Ross – MIT, 2004).

• The system by which the current and future use of ICT is
  directed and controlled. It involves evaluating and
  directing the plans for the use of ICT to support the
  organization and monitoring this use to achieve plans. It
  includes the strategy and policies for using ICT
  within an organization (Australian Standard on
  Corporate Governance of ICT, 2005).
Mengapa IT Governance diperlukan?
Mengapa IT Governance diperlukan?
Management
of the Governance
Process
Governance and Management Processes
Causes of outsourcing failures
source Outsourcing Center 2004
IT Governance Frameworks
 •   ITIL                 •   BS 15000
 •   COSO                 •   SysTrust
 •   ISO 17799            •   PRINCE2
 •   ISO/IEC 17799:2000   •   SOX
 •   ISO/IEC TR 13335     •   Six Sigma
 •   ISO/IEC 15408        •   CMM/CMMI
 •   TickIT               •   SASs
 •   NIST 800-14          •   COBIT
 •   ASL                  •   TOGAF
 •   SAC                  •   FISMA
 •   SAS70
Mengapa dibutuhkan framework?

  Sisi Konseptual.
  Agar pemahaman menyeluruh.
  Menentukan arah.
  Menjamin keteraturan.
IT Governance Frameworks




             IT Governance: Reviewing 17 IT Governance Tools and Analysing, Michael Holm Larsen,
                 Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
IT Governance Frameworks
IT Governance Frameworks
COBIT
Mengapa COBIT?
Siapa yang menyusun COBIT?
Inter-relationship among COBIT Components
(Business Focused)
Governance Lifecycle
COBIT 4.1 & IT Governance

                                         IT GOVERNANCE

 Planning & Organisation              Acquire & Implement                 Deliver & Support                Monitor & Evaluate


  PO1 Define a Strategic IT Plan    AI1 Identify Automated          DS1 Define and Manage
                                                                                                          ME1 Monitor and Evaluate
  PO2 Define the Information         Solutions                        Service Levels
                                                                                                           IT Performance
   Architecture                      AI2 Acquire and Maintain        DS2 Manage Third-party
                                                                                                          ME2 Monitor and Evaluate
  PO3 Determine Technological        Application Software             Services
                                                                                                           Internal Control
   Direction                         AI3 Acquire and Maintain        DS3 Manage Performance
                                                                                                          ME3 Ensure Compliance
  PO4 Define the IT Processes,       Technology Infrastructure        and Capacity
                                                                                                           With External Requirements
   Organisation and Relationships    AI4 Enable Operation and Use    DS4 Ensure Continuous Service
                                                                                                          ME4 Provide IT Governance
  PO5 Manage the IT Investment      AI5 Procure IT Resources        DS5 Ensure Systems Security
  PO6 Communicate                   AI6 Manage Changes              DS6 Identify and Allocate Costs
   Management Aims and               AI7 Install and Accredit        DS7 Educate and Train Users
   Direction                          Solutions and Changes           DS8 Manage Service Desk and
  PO7 Manage IT Human                                                 Incidents
   Resources                                                          DS9 Manage the Configuration
  PO8 Manage Quality                                                 DS10 Manage Problems
  PO9 Assess and Manage                                              DS11 Manage Data
   IT Risks                                                           DS12 Manage the Physical
  PO10 Manage Projects                                                Environment
                                                                      DS13 Manage Operations
Boundaries of Business, General and
Application Controls
Governance and Management Defined




                                    COBIT 5
Seri COBIT
COBIT 4.1
COBIT 5
Process Capability Models and Assessments

                         COBIT
                         4.1/5




                                   © 2012 ISACA® All rights reserved.
RACI Charts



                 Source: COBIT® 4.1, page 39. © 2007 IT Governance Institute® All rights reserved.




              Source: COBIT® 5: Enabling Processes, page 31. © 2012 ISACA® All rights reserved.
Pendekatan COBIT: Top Down
IT Process diturunkan dari Business Goals
Process Oriented
Process Oriented
Model Waterfall
Process Driven
Comprehensive Approach
Maturity Models

   Non-
  existent         Initial       Repeatable        Defined         Managed        Optimised

    0                 1                  2             3               4                5



   Legend for symbols used                                 Legend for rankings used

     Enterprise current status                0 - Management processes are not applied at all
                                              1 - Processes are ad hoc and disorganised
     International standard guidelines        2 - Processes follow a regular pattern
                                              3 - Processes are documented and communicated
     Industry best practice                   4 - Processes are monitored and measured
                                              5 - Best practices are followed and automated
     Enterprise strategy
Fokus: 5 Area
Fokus: 5 Area
Measuring investment performance
The outsourcing governance lifecycle
Diskusi,
Pertanyaan...?

More Related Content

What's hot

transformasi informasi
transformasi informasitransformasi informasi
transformasi informasi
fitria_hanifah
 
Soal uts technopreneurship
Soal uts technopreneurshipSoal uts technopreneurship
Soal uts technopreneurship
Masriani Situmorang
 
Pengembangan Sistem Informasi Manajemen
Pengembangan Sistem Informasi ManajemenPengembangan Sistem Informasi Manajemen
Pengembangan Sistem Informasi Manajemen
Rahmi Septhianingrum
 
Metode Pengembangan dan Evaluasi SIM
Metode Pengembangan dan Evaluasi SIMMetode Pengembangan dan Evaluasi SIM
Metode Pengembangan dan Evaluasi SIM
Fahmi Hakam
 
BAB 4. Pengguna dan Pengembang Sistem
BAB 4. Pengguna dan Pengembang SistemBAB 4. Pengguna dan Pengembang Sistem
BAB 4. Pengguna dan Pengembang Sistemaudi15Ar
 
Analisis proses-bisnis modul 3
Analisis proses-bisnis modul 3Analisis proses-bisnis modul 3
Analisis proses-bisnis modul 3
stiemberau2
 
Analisis Kebutuhan Sistem Informasi
Analisis Kebutuhan Sistem InformasiAnalisis Kebutuhan Sistem Informasi
Analisis Kebutuhan Sistem Informasi
Universitas Teknokrat Indonesia
 
Sistem informasi enterprise
Sistem informasi enterpriseSistem informasi enterprise
Sistem informasi enterprise
Angga Bachtiar
 
Manajemen Proses Bisnis (Business Process Management, BPM)
Manajemen Proses Bisnis (Business Process Management, BPM)Manajemen Proses Bisnis (Business Process Management, BPM)
Manajemen Proses Bisnis (Business Process Management, BPM)
Ivan Lanin
 
Percepatan Penyiapan SDM Teknologi Digital
Percepatan Penyiapan SDM Teknologi DigitalPercepatan Penyiapan SDM Teknologi Digital
Percepatan Penyiapan SDM Teknologi Digital
Togar Simatupang
 
Etika dalam sistem informasi kel 2 ppt
Etika dalam sistem informasi kel 2 pptEtika dalam sistem informasi kel 2 ppt
Etika dalam sistem informasi kel 2 ppt
Lelys x'Trezz
 
MATERI UML(Unified Modelling Language)
MATERI UML(Unified Modelling Language)MATERI UML(Unified Modelling Language)
MATERI UML(Unified Modelling Language)
Febry Mbah Man
 
Sistem Informasi Manajemen
Sistem Informasi ManajemenSistem Informasi Manajemen
Sistem Informasi Manajemen
Asnita Meydelia C K
 
Ppt big data dina nisrina rosandi 6018210043
Ppt big data dina nisrina rosandi 6018210043Ppt big data dina nisrina rosandi 6018210043
Ppt big data dina nisrina rosandi 6018210043
DinaNisrinaRosandi
 
Contoh organisasi suatu perusahaan
Contoh organisasi suatu perusahaanContoh organisasi suatu perusahaan
Contoh organisasi suatu perusahaan
Riezqi Badruzaman
 
Penerapan Teknologi Informasi di Manajemen SDM
Penerapan Teknologi Informasi di Manajemen SDMPenerapan Teknologi Informasi di Manajemen SDM
Penerapan Teknologi Informasi di Manajemen SDM
Noverino Rifai
 
4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem
Judianto Nugroho
 

What's hot (20)

transformasi informasi
transformasi informasitransformasi informasi
transformasi informasi
 
Soal uts technopreneurship
Soal uts technopreneurshipSoal uts technopreneurship
Soal uts technopreneurship
 
COBIT 5
COBIT 5COBIT 5
COBIT 5
 
Pengembangan Sistem Informasi Manajemen
Pengembangan Sistem Informasi ManajemenPengembangan Sistem Informasi Manajemen
Pengembangan Sistem Informasi Manajemen
 
Metode Pengembangan dan Evaluasi SIM
Metode Pengembangan dan Evaluasi SIMMetode Pengembangan dan Evaluasi SIM
Metode Pengembangan dan Evaluasi SIM
 
Sistem Basis Data model data relasional
Sistem Basis Data model data relasionalSistem Basis Data model data relasional
Sistem Basis Data model data relasional
 
BAB 4. Pengguna dan Pengembang Sistem
BAB 4. Pengguna dan Pengembang SistemBAB 4. Pengguna dan Pengembang Sistem
BAB 4. Pengguna dan Pengembang Sistem
 
Analisis proses-bisnis modul 3
Analisis proses-bisnis modul 3Analisis proses-bisnis modul 3
Analisis proses-bisnis modul 3
 
Analisis Kebutuhan Sistem Informasi
Analisis Kebutuhan Sistem InformasiAnalisis Kebutuhan Sistem Informasi
Analisis Kebutuhan Sistem Informasi
 
Sistem informasi enterprise
Sistem informasi enterpriseSistem informasi enterprise
Sistem informasi enterprise
 
Manajemen Proses Bisnis (Business Process Management, BPM)
Manajemen Proses Bisnis (Business Process Management, BPM)Manajemen Proses Bisnis (Business Process Management, BPM)
Manajemen Proses Bisnis (Business Process Management, BPM)
 
Percepatan Penyiapan SDM Teknologi Digital
Percepatan Penyiapan SDM Teknologi DigitalPercepatan Penyiapan SDM Teknologi Digital
Percepatan Penyiapan SDM Teknologi Digital
 
Etika dalam sistem informasi kel 2 ppt
Etika dalam sistem informasi kel 2 pptEtika dalam sistem informasi kel 2 ppt
Etika dalam sistem informasi kel 2 ppt
 
MATERI UML(Unified Modelling Language)
MATERI UML(Unified Modelling Language)MATERI UML(Unified Modelling Language)
MATERI UML(Unified Modelling Language)
 
Sistem Informasi Manajemen
Sistem Informasi ManajemenSistem Informasi Manajemen
Sistem Informasi Manajemen
 
Ppt big data dina nisrina rosandi 6018210043
Ppt big data dina nisrina rosandi 6018210043Ppt big data dina nisrina rosandi 6018210043
Ppt big data dina nisrina rosandi 6018210043
 
Contoh organisasi suatu perusahaan
Contoh organisasi suatu perusahaanContoh organisasi suatu perusahaan
Contoh organisasi suatu perusahaan
 
Metode fact finding & requirement
Metode fact finding & requirementMetode fact finding & requirement
Metode fact finding & requirement
 
Penerapan Teknologi Informasi di Manajemen SDM
Penerapan Teknologi Informasi di Manajemen SDMPenerapan Teknologi Informasi di Manajemen SDM
Penerapan Teknologi Informasi di Manajemen SDM
 
4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem
 

Viewers also liked

Mengatur referensi penelitian
Mengatur referensi penelitianMengatur referensi penelitian
Mengatur referensi penelitian
Cahyo Darujati
 
01.welcome.ppt.sosialisasi.skkni.surabaya
01.welcome.ppt.sosialisasi.skkni.surabaya01.welcome.ppt.sosialisasi.skkni.surabaya
01.welcome.ppt.sosialisasi.skkni.surabayaCahyo Darujati
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
Cahyo Darujati
 
Tata kelola teknologi informasi
Tata kelola teknologi informasiTata kelola teknologi informasi
Tata kelola teknologi informasi
Faith Posumah
 
IT Governance Dan Audit Sistem Informasi
IT Governance Dan Audit Sistem Informasi IT Governance Dan Audit Sistem Informasi
IT Governance Dan Audit Sistem Informasi
Herison Surbakti
 
Tata Kelola TI (IT Governance)
Tata Kelola TI (IT Governance)Tata Kelola TI (IT Governance)
Tata Kelola TI (IT Governance)
Julio Mamesah
 
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013rahmatmoelyana
 
Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Ir. Zakaria, M.M
 
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...rahmatmoelyana
 
SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra YulistiaSNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra Yulistiarahmatmoelyana
 
Perbedaan cobit 4.1 dan cobit 5
Perbedaan cobit 4.1 dan cobit 5Perbedaan cobit 4.1 dan cobit 5
Perbedaan cobit 4.1 dan cobit 5Furqan Buncit
 
Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01
Cahyo Darujati
 
pengenalan ipv6
pengenalan ipv6pengenalan ipv6
pengenalan ipv6
Cahyo Darujati
 
Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02Cahyo Darujati
 
Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)
Elisa Lumintang
 
Mapa de Processos do Cobit v 4.1
Mapa de Processos do Cobit v 4.1Mapa de Processos do Cobit v 4.1
Mapa de Processos do Cobit v 4.1
Rildo (@rildosan) Santos
 
Mata Kuliah Pengelolaan installasi komputer - Tata Kelola IT (COBIT ) - 2
Mata Kuliah Pengelolaan installasi komputer  -  Tata Kelola IT (COBIT  ) - 2Mata Kuliah Pengelolaan installasi komputer  -  Tata Kelola IT (COBIT  ) - 2
Mata Kuliah Pengelolaan installasi komputer - Tata Kelola IT (COBIT ) - 2
Bambang
 
Internal Quality Assurance of Indonesian Higher Education
Internal Quality Assurance of Indonesian Higher EducationInternal Quality Assurance of Indonesian Higher Education
Internal Quality Assurance of Indonesian Higher Education
jjnjndn
 
Pembukaan
PembukaanPembukaan
Pembukaan
Khairia Ulfah
 

Viewers also liked (20)

Mengatur referensi penelitian
Mengatur referensi penelitianMengatur referensi penelitian
Mengatur referensi penelitian
 
01.welcome.ppt.sosialisasi.skkni.surabaya
01.welcome.ppt.sosialisasi.skkni.surabaya01.welcome.ppt.sosialisasi.skkni.surabaya
01.welcome.ppt.sosialisasi.skkni.surabaya
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Tata kelola teknologi informasi
Tata kelola teknologi informasiTata kelola teknologi informasi
Tata kelola teknologi informasi
 
IT Governance Dan Audit Sistem Informasi
IT Governance Dan Audit Sistem Informasi IT Governance Dan Audit Sistem Informasi
IT Governance Dan Audit Sistem Informasi
 
Tata Kelola TI (IT Governance)
Tata Kelola TI (IT Governance)Tata Kelola TI (IT Governance)
Tata Kelola TI (IT Governance)
 
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013Rahmat mulyana   isaca tech session - mapping cobit 5 & per-02-mbu-2013
Rahmat mulyana isaca tech session - mapping cobit 5 & per-02-mbu-2013
 
Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012Modul 8 enterprise architecture-2012
Modul 8 enterprise architecture-2012
 
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
ISACA Indonesia Technical Session - feat Erik Guldentops - panelist Rahmat Mu...
 
SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra YulistiaSNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
 
Perbedaan cobit 4.1 dan cobit 5
Perbedaan cobit 4.1 dan cobit 5Perbedaan cobit 4.1 dan cobit 5
Perbedaan cobit 4.1 dan cobit 5
 
Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01
 
pengenalan ipv6
pengenalan ipv6pengenalan ipv6
pengenalan ipv6
 
Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02
 
Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)
 
Mapa de Processos do Cobit v 4.1
Mapa de Processos do Cobit v 4.1Mapa de Processos do Cobit v 4.1
Mapa de Processos do Cobit v 4.1
 
Mata Kuliah Pengelolaan installasi komputer - Tata Kelola IT (COBIT ) - 2
Mata Kuliah Pengelolaan installasi komputer  -  Tata Kelola IT (COBIT  ) - 2Mata Kuliah Pengelolaan installasi komputer  -  Tata Kelola IT (COBIT  ) - 2
Mata Kuliah Pengelolaan installasi komputer - Tata Kelola IT (COBIT ) - 2
 
Internal Quality Assurance of Indonesian Higher Education
Internal Quality Assurance of Indonesian Higher EducationInternal Quality Assurance of Indonesian Higher Education
Internal Quality Assurance of Indonesian Higher Education
 
Pembukaan
PembukaanPembukaan
Pembukaan
 
Stateofthecio2008 1210987739793979 8
Stateofthecio2008 1210987739793979 8Stateofthecio2008 1210987739793979 8
Stateofthecio2008 1210987739793979 8
 

Similar to Tatakelola Teknologi Informasi

Cobit 4.1 Highlights
Cobit 4.1 HighlightsCobit 4.1 Highlights
Cobit 4.1 Highlights
geoffharmer
 
Community IT Innovators - IT Governance 083012
Community IT Innovators - IT Governance 083012Community IT Innovators - IT Governance 083012
Community IT Innovators - IT Governance 083012
Community IT Innovators
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
tlknecht
 
Valuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handoutValuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handout
Marc Vael
 
ICT Governance
ICT GovernanceICT Governance
ICT Governance
Richardus Indrajit
 
Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811faau09
 
Feb 26 NETP Slide Deck
Feb 26 NETP Slide DeckFeb 26 NETP Slide Deck
Feb 26 NETP Slide Deckddcomeau
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
Marc Vael
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldChris Byrne
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
vyomlabs
 
IT frameworks
IT frameworksIT frameworks
IT frameworks
cyouss
 
Improving Quality and Adoption: EIM SQL Server 2012
Improving Quality and Adoption: EIM SQL Server 2012Improving Quality and Adoption: EIM SQL Server 2012
Improving Quality and Adoption: EIM SQL Server 2012
Perficient, Inc.
 
COBIT 5 & 4.1 Comparison
COBIT 5 & 4.1 ComparisonCOBIT 5 & 4.1 Comparison
COBIT 5 & 4.1 Comparison
Anthony Dehnashi
 
ISO 20K is Not Scary
ISO 20K is Not ScaryISO 20K is Not Scary
ISO 20K is Not Scary
ITSM Academy, Inc.
 
ICIL Technology Ltd
ICIL Technology LtdICIL Technology Ltd
ICIL Technology Ltd
Adil Mufti
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
Christian F. Nissen
 
What Is It Governance 24812
What Is It Governance 24812What Is It Governance 24812
What Is It Governance 24812Amr Mustafa
 
What is-it-governance-24812
What is-it-governance-24812What is-it-governance-24812
What is-it-governance-24812
Jorge Luis Callalle Torres
 
Stij5014 distributed systems
Stij5014 distributed systemsStij5014 distributed systems
Stij5014 distributed systemslara_ays
 

Similar to Tatakelola Teknologi Informasi (20)

Cobit 4.1 Highlights
Cobit 4.1 HighlightsCobit 4.1 Highlights
Cobit 4.1 Highlights
 
Community IT Innovators - IT Governance 083012
Community IT Innovators - IT Governance 083012Community IT Innovators - IT Governance 083012
Community IT Innovators - IT Governance 083012
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
Valuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handoutValuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handout
 
ICT Governance
ICT GovernanceICT Governance
ICT Governance
 
Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811Marcos cobi t -e-itil-v040811
Marcos cobi t -e-itil-v040811
 
Feb 26 NETP Slide Deck
Feb 26 NETP Slide DeckFeb 26 NETP Slide Deck
Feb 26 NETP Slide Deck
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
 
IT frameworks
IT frameworksIT frameworks
IT frameworks
 
Improving Quality and Adoption: EIM SQL Server 2012
Improving Quality and Adoption: EIM SQL Server 2012Improving Quality and Adoption: EIM SQL Server 2012
Improving Quality and Adoption: EIM SQL Server 2012
 
iso 20000
iso 20000iso 20000
iso 20000
 
COBIT 5 & 4.1 Comparison
COBIT 5 & 4.1 ComparisonCOBIT 5 & 4.1 Comparison
COBIT 5 & 4.1 Comparison
 
ISO 20K is Not Scary
ISO 20K is Not ScaryISO 20K is Not Scary
ISO 20K is Not Scary
 
ICIL Technology Ltd
ICIL Technology LtdICIL Technology Ltd
ICIL Technology Ltd
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
 
What Is It Governance 24812
What Is It Governance 24812What Is It Governance 24812
What Is It Governance 24812
 
What is-it-governance-24812
What is-it-governance-24812What is-it-governance-24812
What is-it-governance-24812
 
Stij5014 distributed systems
Stij5014 distributed systemsStij5014 distributed systems
Stij5014 distributed systems
 

More from Cahyo Darujati

Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
Cahyo Darujati
 
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
Cahyo Darujati
 
Melawan penyebaran hoax di media sosial dengan teknologi
Melawan penyebaran hoax di media sosial dengan teknologiMelawan penyebaran hoax di media sosial dengan teknologi
Melawan penyebaran hoax di media sosial dengan teknologi
Cahyo Darujati
 
Security is a process not a magic
Security is a process not a magicSecurity is a process not a magic
Security is a process not a magic
Cahyo Darujati
 
Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture06
Kcd226 Sistem Operasi Lecture06Kcd226 Sistem Operasi Lecture06
Kcd226 Sistem Operasi Lecture06Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture03
Kcd226 Sistem Operasi Lecture03Kcd226 Sistem Operasi Lecture03
Kcd226 Sistem Operasi Lecture03Cahyo Darujati
 
Kcd226 Sistem Operasi Lecture02
Kcd226 Sistem Operasi Lecture02Kcd226 Sistem Operasi Lecture02
Kcd226 Sistem Operasi Lecture02Cahyo Darujati
 
Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01
Cahyo Darujati
 

More from Cahyo Darujati (12)

Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
Presentasi jaring pengaman sandi untuk mendukung spbe 29042019 rev2
 
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
Melindungi, Mengamankan, Menanggulangi, dan Memulihkan Keamanan Informasi Pen...
 
Melawan penyebaran hoax di media sosial dengan teknologi
Melawan penyebaran hoax di media sosial dengan teknologiMelawan penyebaran hoax di media sosial dengan teknologi
Melawan penyebaran hoax di media sosial dengan teknologi
 
Security is a process not a magic
Security is a process not a magicSecurity is a process not a magic
Security is a process not a magic
 
Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01
 
Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01Kcd226 Sistem Operasi Lecture01
Kcd226 Sistem Operasi Lecture01
 
Kcd226 Sistem Operasi Lecture06
Kcd226 Sistem Operasi Lecture06Kcd226 Sistem Operasi Lecture06
Kcd226 Sistem Operasi Lecture06
 
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05
 
Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04
 
Kcd226 Sistem Operasi Lecture03
Kcd226 Sistem Operasi Lecture03Kcd226 Sistem Operasi Lecture03
Kcd226 Sistem Operasi Lecture03
 
Kcd226 Sistem Operasi Lecture02
Kcd226 Sistem Operasi Lecture02Kcd226 Sistem Operasi Lecture02
Kcd226 Sistem Operasi Lecture02
 
Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01Kbk436 Sistem Operasi Lanjut Lecture01
Kbk436 Sistem Operasi Lanjut Lecture01
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Tatakelola Teknologi Informasi

  • 1. http://cahyod.dosen.narotama.ac.id/ Indri Sudanawati Rozas , S.Kom, M.Kom Cahyo Darujati, ST., MT. Kajian Tata Kelola Layanan TI –Ditjen DIKTI | Hotel Majapahit Surabaya | Selasa, 20 Nopember 2012
  • 2.  Kajian Tata Kelola Layanan TI  Kajian Tata Kelola TI
  • 3. Managing IT Resources to Deliver IT Goals
  • 4. Pembahasan  Definisi IT Governance  Mengapa diperlukan IT Governance  Komponen IT Governance  Why IT Governance implementation is so difficult?  IT Governance Frameworks  COBIT  Mengapa COBIT?  Generasi COBIT  Gambaran COBIT  COBIT framework : process oriented  Implementasi COBIT : comprehensive approach
  • 5. Definisi (1)
  • 7. Definisi (3) • Specifying the decision rights and accountability framework to encourage desirable behavior in using IT (Peter Weill & Jeanne W Ross – MIT, 2004). • The system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organization and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organization (Australian Standard on Corporate Governance of ICT, 2005).
  • 8. Mengapa IT Governance diperlukan?
  • 9. Mengapa IT Governance diperlukan?
  • 11.
  • 13.
  • 14. Causes of outsourcing failures source Outsourcing Center 2004
  • 15. IT Governance Frameworks • ITIL • BS 15000 • COSO • SysTrust • ISO 17799 • PRINCE2 • ISO/IEC 17799:2000 • SOX • ISO/IEC TR 13335 • Six Sigma • ISO/IEC 15408 • CMM/CMMI • TickIT • SASs • NIST 800-14 • COBIT • ASL • TOGAF • SAC • FISMA • SAS70
  • 16. Mengapa dibutuhkan framework?  Sisi Konseptual.  Agar pemahaman menyeluruh.  Menentukan arah.  Menjamin keteraturan.
  • 17. IT Governance Frameworks IT Governance: Reviewing 17 IT Governance Tools and Analysing, Michael Holm Larsen, Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
  • 20. COBIT
  • 23.
  • 24. Inter-relationship among COBIT Components (Business Focused)
  • 26. COBIT 4.1 & IT Governance IT GOVERNANCE Planning & Organisation Acquire & Implement Deliver & Support Monitor & Evaluate  PO1 Define a Strategic IT Plan  AI1 Identify Automated  DS1 Define and Manage  ME1 Monitor and Evaluate  PO2 Define the Information Solutions Service Levels IT Performance Architecture  AI2 Acquire and Maintain  DS2 Manage Third-party  ME2 Monitor and Evaluate  PO3 Determine Technological Application Software Services Internal Control Direction  AI3 Acquire and Maintain  DS3 Manage Performance  ME3 Ensure Compliance  PO4 Define the IT Processes, Technology Infrastructure and Capacity With External Requirements Organisation and Relationships  AI4 Enable Operation and Use  DS4 Ensure Continuous Service  ME4 Provide IT Governance  PO5 Manage the IT Investment  AI5 Procure IT Resources  DS5 Ensure Systems Security  PO6 Communicate  AI6 Manage Changes  DS6 Identify and Allocate Costs Management Aims and  AI7 Install and Accredit  DS7 Educate and Train Users Direction Solutions and Changes  DS8 Manage Service Desk and  PO7 Manage IT Human Incidents Resources  DS9 Manage the Configuration  PO8 Manage Quality  DS10 Manage Problems  PO9 Assess and Manage  DS11 Manage Data IT Risks  DS12 Manage the Physical  PO10 Manage Projects Environment  DS13 Manage Operations
  • 27. Boundaries of Business, General and Application Controls
  • 28. Governance and Management Defined COBIT 5
  • 32. Process Capability Models and Assessments COBIT 4.1/5 © 2012 ISACA® All rights reserved.
  • 33. RACI Charts Source: COBIT® 4.1, page 39. © 2007 IT Governance Institute® All rights reserved. Source: COBIT® 5: Enabling Processes, page 31. © 2012 ISACA® All rights reserved.
  • 35. IT Process diturunkan dari Business Goals
  • 41. Maturity Models Non- existent Initial Repeatable Defined Managed Optimised 0 1 2 3 4 5 Legend for symbols used Legend for rankings used Enterprise current status 0 - Management processes are not applied at all 1 - Processes are ad hoc and disorganised International standard guidelines 2 - Processes follow a regular pattern 3 - Processes are documented and communicated Industry best practice 4 - Processes are monitored and measured 5 - Best practices are followed and automated Enterprise strategy