SlideShare uma empresa Scribd logo
1 de 78
2007 CISA   Review Course Chapter 2 IT Governance
Chapter Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Objective ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object]
2.1  Corporate Governance ,[object Object],[object Object],[object Object]
Corporate Governance ,[object Object]
Corporate Governance ,[object Object],[object Object]
2.2  Monitoring and Assurance Practices for   Board  a nd Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 – Question 8
Monitoring and Assurance Practices for Board  and E xecutive Management ,[object Object],IT Value Delivery Stakeholders Value Drivers   Performance Measurement Risk Management Strategic Alignment
Monitoring and Assurance Practices for   Board  a nd Executive Management ,[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board  and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board  and Executive Management ,[object Object],[object Object]
Monitoring and Assurance Practices for Board  and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board  and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object]
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],Detailed Representation Technology Model Systems Model Enterprise Model Scope Strategy Process People Network Functional Data
Monitoring and Assurance Practices for Board and Executive Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2.3  Information Systems Strategy ,[object Object],[object Object],[object Object]
Information Systems Strategy ,[object Object],[object Object]
Information Systems Strategy ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question 9
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question 10
2.4  Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object]
2.5  Risk Management ,[object Object],[object Object],[object Object]
Risk Management ,[object Object],[object Object],[object Object]
Risk Management ,[object Object],[object Object],[object Object],[object Object]
Risk Management ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risk Management
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risk Management
[object Object],[object Object],[object Object],[object Object],[object Object],2.6 IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],IS  Management Practices
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS  Management Practices
2.7  IS Organizational Structure and  r esponsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
IS Organizational Structure and Responsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question 2
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question 3
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question 4
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question   5
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question   6
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 Question   7
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IS Organizational Structure  and Responsibilities
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.8  Auditing IT Governance Structure  and Implementation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Auditing IT Governance Structure  and Implementation
[object Object],[object Object],Auditing IT Governance Structure  and Implementation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Auditing IT Governance Structure  and Implementation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Auditing IT Governance Structure  and Implementation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.9 Case Study
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 : Case study  Question  1
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 2 : Case study  Question  2

Mais conteúdo relacionado

Mais procurados

Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementChristian F. Nissen
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdfmohammed539963
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 
IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentEryk Budi Pratama
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Managementjiricejka
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITCOBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITMark Constable
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 

Mais procurados (20)

CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdf
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability Assessment
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise ITCOBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
COBIT 2019 webinar Use Cases: Tailoring Governance of Your Enterprise IT
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 

Destaque

Destaque (14)

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review Course
 
des
desdes
des
 
Chap5 2007 Cisa Review Course
Chap5 2007 Cisa Review CourseChap5 2007 Cisa Review Course
Chap5 2007 Cisa Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
The iTTi Manifesto
The iTTi ManifestoThe iTTi Manifesto
The iTTi Manifesto
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3
 
IT Governances
IT GovernancesIT Governances
IT Governances
 

Semelhante a Chap2 2007 Cisa Review Course

IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptxFaith Shimba
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfDanteHayashi
 
COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0bluekiu
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training courseIman Baradari
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungnorsaidatul_akmar
 
Pm And It Governance
Pm And It GovernancePm And It Governance
Pm And It Governancesundong
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"guest1c7740
 
Research Paper on Project Management and IT Governance
Research Paper on Project Management and IT GovernanceResearch Paper on Project Management and IT Governance
Research Paper on Project Management and IT Governanceguest7db01d
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chaukeMayk Campelo
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1Richard Willis
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)guestf73e68
 

Semelhante a Chap2 2007 Cisa Review Course (20)

IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
 
It governance
It governanceIt governance
It governance
 
COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
It governance
It governanceIt governance
It governance
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training course
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
 
Pm And It Governance
Pm And It GovernancePm And It Governance
Pm And It Governance
 
Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007
 
Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"Research Paper on "Project Management and IT Governance"
Research Paper on "Project Management and IT Governance"
 
Research Paper on Project Management and IT Governance
Research Paper on Project Management and IT GovernanceResearch Paper on Project Management and IT Governance
Research Paper on Project Management and IT Governance
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 

Mais de Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000165
File000165File000165
File000165
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 

Chap2 2007 Cisa Review Course

  • 1. 2007 CISA  Review Course Chapter 2 IT Governance
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57. 2.7 IS Organizational Structure and r esponsibilities
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. IS Organizational Structure and Responsibilities
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.