SlideShare uma empresa Scribd logo
1 de 46
Baixar para ler offline
IT Governances Stewardship is extending to IT as Boards question the depth of their enterprise’s reliance on IT
Background ,[object Object],[object Object],[object Object]
What IT problem? ,[object Object],[object Object],[object Object],[object Object]
What does the board do? ,[object Object]
How does management react? ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stakeholders ,[object Object],[object Object],[object Object],[object Object]
What are customers saying? ,[object Object],[object Object],[object Object],[object Object],[object Object]
How about the Regulators? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The President’s Commission on Critical Infrastructure Protection
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],President Obama’s views on IT
How about standards? ,[object Object],[object Object],[object Object]
and what does management think? ,[object Object],[object Object],[object Object],[object Object]
Why Get Into Governance? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Due Diligence ,[object Object],[object Object],[object Object],[object Object]
IT Is Critical  to Most Businesses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Is Strategic to Most Businesses ,[object Object],[object Object],[object Object],[object Object],[object Object]
Expectations ,[object Object],[object Object],[object Object],[object Object]
Reality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why hasn’t IT received the attention it merits? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Involves Huge Investments and Risks ,[object Object],[object Object],[object Object],[object Object]
(Son of) IT Involves Huge Investments and Risks ,[object Object],[object Object],[object Object],[object Object]
What Should Boards Do About It? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Value  Delivery Stakeholder Value Drivers Performance Measurement Risk  Management IT Strategic Alignment
What Should Management Do About It? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT  Governance Defined  (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT  Governance Defined  (2) ,[object Object]
IT Governance Framework Set measurable goals Compare results Measure performance Act if not aligned Deliver against the goals 
IT Governance Framework Provide  Direction Compare Measure Performance IT Activities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Set Objectives
IT Alignment Business Strategy Alignment Activities IT Operations IT  Strategy Business Operations
IT Value Delivery
IT Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management Expands … ,[object Object],[object Object],[object Object],[object Object],[object Object]
IT Balanced Scorecard Information Financial Customer Process Goals Measures Goals Measures Learning Goals Measures Goals Measures
Example of IT measures ,[object Object],[object Object],[object Object],[object Object],Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],F inancial C ustomer ,[object Object],[object Object],[object Object],[object Object],L earning P rocess
Scorecard Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Samples from CobiT ,[object Object]
Information Security Some Questions for the Board Room ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Know what questions to ask
IT Security Requirements Business Drivers Know what's needed Shorter business cycles Need to involve/connect/tie in with more partners Network centric business models Leverage VPN, remote access, collaborative tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technology Drivers ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT Security Awareness Raise the awareness at the top
Cost of IT Security Have a clarity of purpose Cost of security and control vs. IT Budget 5 - 10% 20 - 25% 45 - 50% 55% Cost of noncompliance Benchmarking Leadership “ Cowboy” operation Baseline operation Good Practice Industry reference site = driver for change
IT Security Performance Measure your performance Tools & Technology Process Policy & Procedures Security  Management Human Behaviour & Culture System Access Control Network Segregation Application Security 1 2 3 6 5 4 Policy 0 1996 1997 1998 1999 2000 2001 20 40 60 80 100 92 88 76 64 48 42 96 Policies & procedures  Security mgt Human behav. & culture  Application security  System access control  Network segregation 1. 2. 3. 4. 5. 6. 10 10 20 20 20 20 100 0 Very poor 1 Poor 2 Fair 3 Good 4 Very good 5 Excel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Legend for symbols used Average of best security performers in the financial industry (begin ‘96) Company status — Feb ‘97 Company. objective for 2001
IT Security is a  C ontinuous  E ffort Keep on doing it  Perform Intrusion Testing Ž Perform Active Monitoring Œ  Issue Security Policy  Security Management    Design Security Defenses
IT Governance Summarized ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Governance Summarized ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology GovernanceGoutama Bachtiar
 
IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014ArmeniaFED
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing worldPECB
 
IT Governance Concept
IT Governance ConceptIT Governance Concept
IT Governance Conceptitgproduct
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationS L
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceBill Lisse
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentationjmcarden
 
IT Metrics Presentation
IT Metrics PresentationIT Metrics Presentation
IT Metrics Presentationjmcarden
 
Governance matrix
Governance matrixGovernance matrix
Governance matrixzeusi9iuto
 
IT governance and bal
IT governance and balIT governance and bal
IT governance and balsourov_das
 
Mergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT IssuesMergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT Issuescurtherge
 
IT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersIT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersWalter Adamson
 

Mais procurados (20)

Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology Governance
 
IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
IT Governance Concept
IT Governance ConceptIT Governance Concept
IT Governance Concept
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 
It governance
It governanceIt governance
It governance
 
It governance
It governanceIt governance
It governance
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
IT Governance - OpenThinking Day
IT Governance - OpenThinking DayIT Governance - OpenThinking Day
IT Governance - OpenThinking Day
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 
IT Metrics Presentation
IT Metrics PresentationIT Metrics Presentation
IT Metrics Presentation
 
Governance matrix
Governance matrixGovernance matrix
Governance matrix
 
IT governance and bal
IT governance and balIT governance and bal
IT governance and bal
 
Mergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT IssuesMergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT Issues
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
Stateofthecio2008 1210987739793979 8
Stateofthecio2008 1210987739793979 8Stateofthecio2008 1210987739793979 8
Stateofthecio2008 1210987739793979 8
 
IT projects
IT projectsIT projects
IT projects
 
IT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersIT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business Managers
 

Destaque

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceVishal Sharma
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology GovernanceAlan McSweeney
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...A Case Study - WestJet Airlines: Information Technology Governance and Corpor...
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...Dimas Ramadhani
 
N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6Khathu Mudau
 
Design of an innovative approach based on Service Learning for Information Te...
Design of an innovative approach based on Service Learning for Information Te...Design of an innovative approach based on Service Learning for Information Te...
Design of an innovative approach based on Service Learning for Information Te...Grial - University of Salamanca
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Destaque (18)

What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
The iTTi Manifesto
The iTTi ManifestoThe iTTi Manifesto
The iTTi Manifesto
 
Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governance
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Whitepaper Practical Information Technology Governance
Whitepaper   Practical Information Technology GovernanceWhitepaper   Practical Information Technology Governance
Whitepaper Practical Information Technology Governance
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...A Case Study - WestJet Airlines: Information Technology Governance and Corpor...
A Case Study - WestJet Airlines: Information Technology Governance and Corpor...
 
N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6
 
Design of an innovative approach based on Service Learning for Information Te...
Design of an innovative approach based on Service Learning for Information Te...Design of an innovative approach based on Service Learning for Information Te...
Design of an innovative approach based on Service Learning for Information Te...
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Oracle ERP Introduction
Oracle ERP IntroductionOracle ERP Introduction
Oracle ERP Introduction
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Semelhante a IT Governances

Governance (Corporate And Technology)
Governance (Corporate And Technology)Governance (Corporate And Technology)
Governance (Corporate And Technology)Jerald Burget
 
Ilta 2005 successful technology begins outside the computer room by dave cu...
Ilta 2005 successful technology begins outside the computer room   by dave cu...Ilta 2005 successful technology begins outside the computer room   by dave cu...
Ilta 2005 successful technology begins outside the computer room by dave cu...David Cunningham
 
COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0bluekiu
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxanthonywanjohi5
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangThang Ta Hoang
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
Information Technology, Internal Control, And Financial...
Information Technology, Internal Control, And Financial...Information Technology, Internal Control, And Financial...
Information Technology, Internal Control, And Financial...Katie Fernandez
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training courseIman Baradari
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValueEileen Chan
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
IT Governance.ppt
IT Governance.pptIT Governance.ppt
IT Governance.pptInsta13
 
Business Driven Technology Considerations
Business Driven Technology ConsiderationsBusiness Driven Technology Considerations
Business Driven Technology ConsiderationsDominic Lumsden
 

Semelhante a IT Governances (20)

Governance (Corporate And Technology)
Governance (Corporate And Technology)Governance (Corporate And Technology)
Governance (Corporate And Technology)
 
Ilta 2005 successful technology begins outside the computer room by dave cu...
Ilta 2005 successful technology begins outside the computer room   by dave cu...Ilta 2005 successful technology begins outside the computer room   by dave cu...
Ilta 2005 successful technology begins outside the computer room by dave cu...
 
COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_Thang
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Information Technology, Internal Control, And Financial...
Information Technology, Internal Control, And Financial...Information Technology, Internal Control, And Financial...
Information Technology, Internal Control, And Financial...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
JS Favs - COBIT5
JS Favs - COBIT5JS Favs - COBIT5
JS Favs - COBIT5
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training course
 
Itm day2
Itm day2Itm day2
Itm day2
 
IT_Governance iia uganda_presentation_ruyooka_2011
IT_Governance iia uganda_presentation_ruyooka_2011IT_Governance iia uganda_presentation_ruyooka_2011
IT_Governance iia uganda_presentation_ruyooka_2011
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital Value
 
IT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to BusinessIT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to Business
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
IT Governance.ppt
IT Governance.pptIT Governance.ppt
IT Governance.ppt
 
20100529 johnthorp
20100529 johnthorp20100529 johnthorp
20100529 johnthorp
 
Business Driven Technology Considerations
Business Driven Technology ConsiderationsBusiness Driven Technology Considerations
Business Driven Technology Considerations
 

Mais de Jerald Burget

Jerald burget chronologial
Jerald burget chronologialJerald burget chronologial
Jerald burget chronologialJerald Burget
 
Jerald burget management
Jerald burget managementJerald burget management
Jerald burget managementJerald Burget
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And ChallengesJerald Burget
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become ObsoleteJerald Burget
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementJerald Burget
 
Content Management Case Study
Content Management Case StudyContent Management Case Study
Content Management Case StudyJerald Burget
 
What Is An Architectural Framework
What Is An Architectural FrameworkWhat Is An Architectural Framework
What Is An Architectural FrameworkJerald Burget
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management AgentJerald Burget
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable ArchitectureJerald Burget
 

Mais de Jerald Burget (10)

Jerald burget chronologial
Jerald burget chronologialJerald burget chronologial
Jerald burget chronologial
 
Jerald burget management
Jerald burget managementJerald burget management
Jerald burget management
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And Challenges
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become Obsolete
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Content Management
Content ManagementContent Management
Content Management
 
Content Management Case Study
Content Management Case StudyContent Management Case Study
Content Management Case Study
 
What Is An Architectural Framework
What Is An Architectural FrameworkWhat Is An Architectural Framework
What Is An Architectural Framework
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
 
EA as an Actionable Architecture
EA as an Actionable ArchitectureEA as an Actionable Architecture
EA as an Actionable Architecture
 

Último

Fabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsFabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsWristbands Ireland
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...Khaled Al Awadi
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfAMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfJohnCarloValencia4
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..dlewis191
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsP&CO
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023Steve Rader
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyHanna Klim
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZKanakChauhan5
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Winbusinessin
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfChicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfSourav Sikder
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxWorkforce Group
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.mcshagufta46
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 

Último (20)

Fabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsFabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and Festivals
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdfAMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
AMAZON SELLER VIRTUAL ASSISTANT PRODUCT RESEARCH .pdf
 
Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..Team B Mind Map for Organizational Chg..
Team B Mind Map for Organizational Chg..
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
Entrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizationsEntrepreneurship & organisations: influences and organizations
Entrepreneurship & organisations: influences and organizations
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023NASA CoCEI Scaling Strategy - November 2023
NASA CoCEI Scaling Strategy - November 2023
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agency
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZ
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdfChicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
Chicago Medical Malpractice Lawyer Chicago Medical Malpractice Lawyer.pdf
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 

IT Governances

  • 1. IT Governances Stewardship is extending to IT as Boards question the depth of their enterprise’s reliance on IT
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. IT Value Delivery Stakeholder Value Drivers Performance Measurement Risk Management IT Strategic Alignment
  • 25.
  • 26.
  • 27.
  • 28. IT Governance Framework Set measurable goals Compare results Measure performance Act if not aligned Deliver against the goals 
  • 29.
  • 30. IT Alignment Business Strategy Alignment Activities IT Operations IT Strategy Business Operations
  • 32.
  • 33.
  • 34. IT Balanced Scorecard Information Financial Customer Process Goals Measures Goals Measures Learning Goals Measures Goals Measures
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Cost of IT Security Have a clarity of purpose Cost of security and control vs. IT Budget 5 - 10% 20 - 25% 45 - 50% 55% Cost of noncompliance Benchmarking Leadership “ Cowboy” operation Baseline operation Good Practice Industry reference site = driver for change
  • 43.
  • 44. IT Security is a C ontinuous E ffort Keep on doing it  Perform Intrusion Testing Ž Perform Active Monitoring Œ Issue Security Policy  Security Management  Design Security Defenses
  • 45.
  • 46.