SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
IT Governance: Ensuring Transparency,
Accountability & Risk Mitigation
Patricia Watson | President | ISACA Boise Chapter
What We Will Discuss
 What is IT Governance?
 Why is IT Governance
Important?
 Transparent accountability
 Resource optimization
 Continuous mitigation of risks
 Q&A
http://www.isacaboise.org/
IT Governance
 ISACA defines IT Governance
as:
…the responsibility of executives
and the board of directors, and
consists of the leadership,
organizational structures and
processes that ensure that the
enterprise’s IT sustains and
extends the organization’s
strategies and objectives.
www.isaca.org
Why is IT Governance Important?
 Effectively harnessing IT
Governance validates
transparent accountability of
resource optimization,
alignment between strategic
business objectives and
continuous mitigation of risks.
http://www.isacaboise.org/
IT Governance
www.isaca.org
IT Governance
www.isaca.org
Transparent Accountability
 Performance & strategic alignment
 Eliminate reactive decision making
 Demonstrate that an integrated,
economical IT infrastructure exists
 Value delivery
 Harness standardization &
automation
 Ensure competence of key IT
personnel
http://www.isacaboise.org/
Transparent Accountability
www.isaca.org
Resource Optimization
 Clearly define control objectives
 Ensure cross-functional
collaboration
 Eliminate silos and redundancy
 Driven services & solutions
 Sustained innovation
 Foster a culture of trust, empower
employees and partners to contribute
new ideas
http://www.isacaboise.org/
Continuous Mitigation of Risks
 Align security regulations,
compliance and best practices mapping
 Constant changes in regulatory
landscape
 Increased demand for compliance with
relevant laws, regulations and
policies
 Risk emerging from the ever-changing
complex technologies
 Proactively address cyber security
threats
http://www.isacaboise.org/
In Summary – IT Governance:
 Enables organizations to cultivate a
culture of business and IT synergies
 Promotes establishment of control
benchmarks & metrics
 Prepares companies for the new age of
involuntary transparency
 Addresses structure, technology and
education
 Ensures continuous mitigation of
risks
http://www.isacaboise.org/
Questions?
president@isacaboise.org
About ISACA
 Professional association incorporated in 1969
with over 110,000 constituents worldwide.
 Through its comprehensive guidance and services,
ISACA defines the roles of information systems
governance, security, audit and assurance
professionals worldwide.
 The COBIT, Val IT and Risk IT governance
frameworks and the CISA, CISM, CGEIT and
CRISC certifications are ISACA brands respected
and used by these professionals for the benefit
of their enterprises.
 To learn about membership benefits, please visit
www.isaca.org
 ISACA Boise Chapter 42 www.isacaboise.org
president@isacaboise.org
A Few Sources:
 COBIT
 IT Governance Institute:
http://www.itgi.org/
 Implementing & Continually Improving IT
Governance:
http://www.isaca.org/Knowledge-
Center/cobit/Documents/Implement-cont-
improve-it-gov-17aNov09.pdf
A Few More…
 Forrester Whitepaper: CIOs Are Not Ready
To Support Business Innovation:
http://info.apptio.com/rs/apptio/images/AR
%20-
%20CIOs%20Are%20Not%20Ready%20to%20Support
%20Business%20Innovation.pdf?mkt_tok=3RkMM
JWWfF9wsRokua3PZKXonjHpfsX57%2B4sXq%2B3lMI
%2F0ER3fOvrPUfGjI4FSMRqI%2BSLDwEYGJlv6SgFT
7DMMaFwybgPWBE%3D
 ISACA Now Blog – The Internet of
everything and the built environment: How
smart buildings impact security!
http://www.isaca.org/Knowledge-
Center/Blog/Lists/Posts/Post.aspx?ID=329

Más contenido relacionado

La actualidad más candente

Asse a safe-investment_(2)
Asse a safe-investment_(2)Asse a safe-investment_(2)
Asse a safe-investment_(2)Lori Frederic
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsPECB
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Coso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageCoso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageLuisMiguelPaz4
 
Standardization of IT Processes
Standardization of IT ProcessesStandardization of IT Processes
Standardization of IT ProcessesNatarajan V
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Segregation of Duties
Segregation of DutiesSegregation of Duties
Segregation of DutiesPECB
 
GIACC Italy - ISO 37001
GIACC Italy - ISO 37001GIACC Italy - ISO 37001
GIACC Italy - ISO 37001Ciro Strazzeri
 
Iso 27001 foundation sample slides
Iso 27001 foundation sample slidesIso 27001 foundation sample slides
Iso 27001 foundation sample slidesStratos Lazaridis
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldKevin Duffey
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...Nur Shiqim Chok
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...PECB
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...Nur Shiqim Chok
 
Alexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr
 

La actualidad más candente (18)

Asse a safe-investment_(2)
Asse a safe-investment_(2)Asse a safe-investment_(2)
Asse a safe-investment_(2)
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSs
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Coso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageCoso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-age
 
Standardization of IT Processes
Standardization of IT ProcessesStandardization of IT Processes
Standardization of IT Processes
 
What is RIMS Doing?
What is RIMS Doing?What is RIMS Doing?
What is RIMS Doing?
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Segregation of Duties
Segregation of DutiesSegregation of Duties
Segregation of Duties
 
GIACC Italy - ISO 37001
GIACC Italy - ISO 37001GIACC Italy - ISO 37001
GIACC Italy - ISO 37001
 
Iso 27001 foundation sample slides
Iso 27001 foundation sample slidesIso 27001 foundation sample slides
Iso 27001 foundation sample slides
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Alexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr Transcript
Alexander Knorr Transcript
 

Destacado

Evaluación y Diagnóstico de Inversiones de TI
Evaluación y Diagnóstico de Inversiones de TIEvaluación y Diagnóstico de Inversiones de TI
Evaluación y Diagnóstico de Inversiones de TICarlos Francavilla
 
Comparacion cobit 4.1 y 5.0
Comparacion cobit 4.1 y 5.0Comparacion cobit 4.1 y 5.0
Comparacion cobit 4.1 y 5.0Jesus Alvarez
 
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónI
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónIDiagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónI
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónICarlos Francavilla
 
Seminario "La empresa digital" - Introducción a la economía digital
Seminario "La empresa digital" - Introducción a la economía digitalSeminario "La empresa digital" - Introducción a la economía digital
Seminario "La empresa digital" - Introducción a la economía digitalCarlos Francavilla
 
Seminario "La Empresa Digital" - Economia Digital
Seminario "La Empresa Digital" - Economia DigitalSeminario "La Empresa Digital" - Economia Digital
Seminario "La Empresa Digital" - Economia DigitalCarlos Francavilla
 
Seminario "La Empresa Digital" - Cómo Empezar
Seminario "La Empresa Digital" - Cómo EmpezarSeminario "La Empresa Digital" - Cómo Empezar
Seminario "La Empresa Digital" - Cómo EmpezarCarlos Francavilla
 
Seminario "La Empresa Digital" - Nuevos Paradigmas
Seminario "La Empresa Digital" - Nuevos ParadigmasSeminario "La Empresa Digital" - Nuevos Paradigmas
Seminario "La Empresa Digital" - Nuevos ParadigmasCarlos Francavilla
 
Seminario "La Empresa Digital" - Modelo de Negocios
Seminario "La Empresa Digital" - Modelo de NegociosSeminario "La Empresa Digital" - Modelo de Negocios
Seminario "La Empresa Digital" - Modelo de NegociosCarlos Francavilla
 
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en IT
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en ITVal IT V2.0 Valor Empresario - Gestión de las Inversiones en IT
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en ITCarlos Francavilla
 
From Value Governance To Benefits Realization In A Controlled Environment
From Value Governance To Benefits Realization In A Controlled EnvironmentFrom Value Governance To Benefits Realization In A Controlled Environment
From Value Governance To Benefits Realization In A Controlled EnvironmentGeorge Papoulias
 
Servicio Estrategia de Transformación Digital
Servicio Estrategia de Transformación Digital Servicio Estrategia de Transformación Digital
Servicio Estrategia de Transformación Digital Carlos Francavilla
 
El CIO ante los nuevos requerimientos del CEO
El CIO ante los nuevos requerimientos del CEO El CIO ante los nuevos requerimientos del CEO
El CIO ante los nuevos requerimientos del CEO Carlos Francavilla
 
Revolución de las Plataformas - Capitulo 2 - Efectos de Red
Revolución de las Plataformas - Capitulo 2 - Efectos de RedRevolución de las Plataformas - Capitulo 2 - Efectos de Red
Revolución de las Plataformas - Capitulo 2 - Efectos de RedCarlos Francavilla
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Marcos de gobierno de ti
Marcos de gobierno de tiMarcos de gobierno de ti
Marcos de gobierno de tiRosmery Banr
 

Destacado (17)

Evaluación y Diagnóstico de Inversiones de TI
Evaluación y Diagnóstico de Inversiones de TIEvaluación y Diagnóstico de Inversiones de TI
Evaluación y Diagnóstico de Inversiones de TI
 
Interim manager
Interim manager Interim manager
Interim manager
 
Comparacion cobit 4.1 y 5.0
Comparacion cobit 4.1 y 5.0Comparacion cobit 4.1 y 5.0
Comparacion cobit 4.1 y 5.0
 
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónI
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónIDiagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónI
Diagnóstico y Evaluacion Gobierno y Gestión de Tecnología de la InformaciónI
 
Seminario "La empresa digital" - Introducción a la economía digital
Seminario "La empresa digital" - Introducción a la economía digitalSeminario "La empresa digital" - Introducción a la economía digital
Seminario "La empresa digital" - Introducción a la economía digital
 
Seminario "La Empresa Digital" - Economia Digital
Seminario "La Empresa Digital" - Economia DigitalSeminario "La Empresa Digital" - Economia Digital
Seminario "La Empresa Digital" - Economia Digital
 
Seminario "La Empresa Digital" - Cómo Empezar
Seminario "La Empresa Digital" - Cómo EmpezarSeminario "La Empresa Digital" - Cómo Empezar
Seminario "La Empresa Digital" - Cómo Empezar
 
Seminario "La Empresa Digital" - Nuevos Paradigmas
Seminario "La Empresa Digital" - Nuevos ParadigmasSeminario "La Empresa Digital" - Nuevos Paradigmas
Seminario "La Empresa Digital" - Nuevos Paradigmas
 
Seminario "La Empresa Digital" - Modelo de Negocios
Seminario "La Empresa Digital" - Modelo de NegociosSeminario "La Empresa Digital" - Modelo de Negocios
Seminario "La Empresa Digital" - Modelo de Negocios
 
Val IT 2.0 Overview
Val IT 2.0 Overview Val IT 2.0 Overview
Val IT 2.0 Overview
 
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en IT
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en ITVal IT V2.0 Valor Empresario - Gestión de las Inversiones en IT
Val IT V2.0 Valor Empresario - Gestión de las Inversiones en IT
 
From Value Governance To Benefits Realization In A Controlled Environment
From Value Governance To Benefits Realization In A Controlled EnvironmentFrom Value Governance To Benefits Realization In A Controlled Environment
From Value Governance To Benefits Realization In A Controlled Environment
 
Servicio Estrategia de Transformación Digital
Servicio Estrategia de Transformación Digital Servicio Estrategia de Transformación Digital
Servicio Estrategia de Transformación Digital
 
El CIO ante los nuevos requerimientos del CEO
El CIO ante los nuevos requerimientos del CEO El CIO ante los nuevos requerimientos del CEO
El CIO ante los nuevos requerimientos del CEO
 
Revolución de las Plataformas - Capitulo 2 - Efectos de Red
Revolución de las Plataformas - Capitulo 2 - Efectos de RedRevolución de las Plataformas - Capitulo 2 - Efectos de Red
Revolución de las Plataformas - Capitulo 2 - Efectos de Red
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Marcos de gobierno de ti
Marcos de gobierno de tiMarcos de gobierno de ti
Marcos de gobierno de ti
 

Similar a IT Governance | 2013 Interface Conf | Watson

ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010pgpmikey
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certificationJasonRoy50
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure GeneralCaroline Bombart
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governancejkllee
 
I&O Organizational Vision, Strategy and Implementation
I&O Organizational Vision, Strategy and ImplementationI&O Organizational Vision, Strategy and Implementation
I&O Organizational Vision, Strategy and ImplementationSilvestri Consulting
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshoppgpmikey
 
110.decision makers.cio.ciso
110.decision makers.cio.ciso110.decision makers.cio.ciso
110.decision makers.cio.cisoLarry Smith
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxinfosec train
 
ISACA ROI Brochure directed at Financial Firms
ISACA ROI Brochure directed at Financial FirmsISACA ROI Brochure directed at Financial Firms
ISACA ROI Brochure directed at Financial FirmsCaroline Bombart
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungnorsaidatul_akmar
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective: njain_seanet
 

Similar a IT Governance | 2013 Interface Conf | Watson (20)

ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
ISACA certification programme 2010
ISACA certification programme 2010ISACA certification programme 2010
ISACA certification programme 2010
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certification
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
I&O Organizational Vision, Strategy and Implementation
I&O Organizational Vision, Strategy and ImplementationI&O Organizational Vision, Strategy and Implementation
I&O Organizational Vision, Strategy and Implementation
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
ISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and WorkshopISACA March Education Session - Special Executive Breakfast and Workshop
ISACA March Education Session - Special Executive Breakfast and Workshop
 
110.decision makers.cio.ciso
110.decision makers.cio.ciso110.decision makers.cio.ciso
110.decision makers.cio.ciso
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
 
ISACA ROI Brochure directed at Financial Firms
ISACA ROI Brochure directed at Financial FirmsISACA ROI Brochure directed at Financial Firms
ISACA ROI Brochure directed at Financial Firms
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective:
 

Más de Patricia M Watson

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013Patricia M Watson
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Patricia M Watson
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonPatricia M Watson
 

Más de Patricia M Watson (9)

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IT Governance | 2013 Interface Conf | Watson

  • 1. IT Governance: Ensuring Transparency, Accountability & Risk Mitigation Patricia Watson | President | ISACA Boise Chapter
  • 2. What We Will Discuss  What is IT Governance?  Why is IT Governance Important?  Transparent accountability  Resource optimization  Continuous mitigation of risks  Q&A http://www.isacaboise.org/
  • 3. IT Governance  ISACA defines IT Governance as: …the responsibility of executives and the board of directors, and consists of the leadership, organizational structures and processes that ensure that the enterprise’s IT sustains and extends the organization’s strategies and objectives. www.isaca.org
  • 4. Why is IT Governance Important?  Effectively harnessing IT Governance validates transparent accountability of resource optimization, alignment between strategic business objectives and continuous mitigation of risks. http://www.isacaboise.org/
  • 7. Transparent Accountability  Performance & strategic alignment  Eliminate reactive decision making  Demonstrate that an integrated, economical IT infrastructure exists  Value delivery  Harness standardization & automation  Ensure competence of key IT personnel http://www.isacaboise.org/
  • 9. Resource Optimization  Clearly define control objectives  Ensure cross-functional collaboration  Eliminate silos and redundancy  Driven services & solutions  Sustained innovation  Foster a culture of trust, empower employees and partners to contribute new ideas http://www.isacaboise.org/
  • 10. Continuous Mitigation of Risks  Align security regulations, compliance and best practices mapping  Constant changes in regulatory landscape  Increased demand for compliance with relevant laws, regulations and policies  Risk emerging from the ever-changing complex technologies  Proactively address cyber security threats http://www.isacaboise.org/
  • 11. In Summary – IT Governance:  Enables organizations to cultivate a culture of business and IT synergies  Promotes establishment of control benchmarks & metrics  Prepares companies for the new age of involuntary transparency  Addresses structure, technology and education  Ensures continuous mitigation of risks http://www.isacaboise.org/
  • 13. About ISACA  Professional association incorporated in 1969 with over 110,000 constituents worldwide.  Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.  The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises.  To learn about membership benefits, please visit www.isaca.org  ISACA Boise Chapter 42 www.isacaboise.org president@isacaboise.org
  • 14. A Few Sources:  COBIT  IT Governance Institute: http://www.itgi.org/  Implementing & Continually Improving IT Governance: http://www.isaca.org/Knowledge- Center/cobit/Documents/Implement-cont- improve-it-gov-17aNov09.pdf
  • 15. A Few More…  Forrester Whitepaper: CIOs Are Not Ready To Support Business Innovation: http://info.apptio.com/rs/apptio/images/AR %20- %20CIOs%20Are%20Not%20Ready%20to%20Support %20Business%20Innovation.pdf?mkt_tok=3RkMM JWWfF9wsRokua3PZKXonjHpfsX57%2B4sXq%2B3lMI %2F0ER3fOvrPUfGjI4FSMRqI%2BSLDwEYGJlv6SgFT 7DMMaFwybgPWBE%3D  ISACA Now Blog – The Internet of everything and the built environment: How smart buildings impact security! http://www.isaca.org/Knowledge- Center/Blog/Lists/Posts/Post.aspx?ID=329