SlideShare a Scribd company logo
Introducing ISO/IEC 38500:
Corporate Governance in ICT
          Christophe Feltus
    Member of the ISO JTC1/SC7/WG1A on ICT Governance
            Public Research Centre Henri Tudor,
                  29, Rue John F. Kennedy
                    L-1855 Luxembourg
                christophe.feltus@tudor.lu
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Some definitions
• AS 8015 – Australian National Standards
   Corporate Governance of ICT is the system by which the current and future use
   of ICT is directed and controlled. It involves evaluating and directing the plans for
   the use of ICT to support the organization and monitoring this use to achieve
   plans. It includes the strategy and policies for using ICT within an organization.
   (Corporate Governance of Information and Communication Technology; January
   2005).

• OECD Corporate Governance
   Corporate governance involves a set of relationships between a company’s
   management, its board, its shareholders and other stakeholders. Corporate
   governance also provides the structure through which the objectives of the
   company are set, and the means of attaining those objectives and monitoring
   performance are determined. Good corporate governance should provide proper
   incentives for the board and management to pursue objectives that are in the
   interests of the company and its shareholders and should facilitate effective
   monitoring. (OECD Code on Corporate Governance)

Recommended for you

ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know

Just a few days ago NIST published a complete refresh of the SP800-53, which provides a catalog of security measure to protect an organization against a variety of risks and threats. How might NIST guidance fit in an information security management system like ISO/IEC 27001 and its privacy extension ISO/IEC 27701? In this session, we will make a quick walk-through the standards and best practices, compare them, and find out how they map and differ from one another. The webinar will cover: • A quick recap of the topics covered in ISO27001/ISO27701 • Discovering the NIST guidelines for Information & cyber Security (SP800-SP1800) • Main differences and mappings between NIST guidance and ISO27001 • About the latest publication (sep/2020) on NIST SP800-53 (Security and Privacy Controls for Information Systems and Organizations) • Implementing information & cyber-security best practices Date: October 14, 2020 YouTube presentation: https://youtu.be/zfsxSaaErqg ------------------------------------------------------------------------------- Find out more about ISO training and certification services Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701 Webinars: https://pecb.com/webinars Article: https://pecb.com/article Whitepaper: https://pecb.com/whitepaper ------------------------------------------------------------------------------- For more information about PECB: Website: https://pecb.com/ LinkedIn: https://www.linkedin.com/company/pecb/ Facebook: https://www.facebook.com/PECBInternational/ Slideshare: http://www.slideshare.net/PECBCERTIFICATION

iso 27001nistiso27701
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation

Here are some small steps to achieve ISO 27001 implementation. I believe ISO 27001/2 is a key to establish security in the organizations and help the companies to keep the whole ISMS program running aligned with continues improvement. As ISO 27001 has been identified by ICO and recognized by GCHQ/NCSC in the past as the key standard to support GDPR.

ismsiso27001gdpr
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation

In this session, we will go through ISO/IEC 27701 and ISO/IEC 27001 key practical implementation steps and how they can help you to be compliant with the GDPR. Our presenters, Peter Geelen and Stefan Mathuvis, will guide you through the implementer tasks with practical hints and tips and show you how an auditor will look at your implementation, searching for evidence and compliance. In addition, we will match the ISO/IEC 27(7)01 requirements to complete the GDPR obligations as far as possible. Starting from executive management to privacy policies, handling notifications, setting up awareness programs, controlling user access requests, over vendor management to incident management (data breaches) and continuous updates. The webinar will cover: • Quick recap on general ISO components and approach • Implementing ISO/IEC 27001 with the ISO/IEC 27701 extension for GDPR compliance • Do's and don’ts for implementation and audit • The importance of evidence in the audit • Managing audit expectations and the never ending audit cycle Recorded webinar: https://youtu.be/HL-VUiCj4Ew

isoinformation privacyiso/iec 27701
Some definitions
• ITGI (IT Governance Institute)
   IT Governance is the responsibility of the board of directors and executive
   management. It is an integral part of enterprise governance and consists of the
   leadership and organisational structures and processes that ensure that the
   organisation’s IT sustains and extends the organisation’s strategies and
   objectives. (Board Briefing, 2nd edition; 2003).


• World Bank Definition of Corporate Governance
   Corporate governance refers to the structures and processes for the direction
   and control of companies. Corporate governance concerns the relationships
   among the management, the Board of Directors, the controlling shareholders
   and other stakeholders. Good corporate governance contributes to sustainable
   economic development by enhancing the performance of companies and
   increasing their access to outside capital.
Some definitions
• MIT Sloan Center for Information Systems Research :
   IT Governance is specifying the decision rights and accountability framework to
   encourage desirable behaviour in the use of IT. (MIT CISR Working Paper No. 326;
   April 2002).

• University of Tasmania
   The survey of the literature by academics from the University of Tasmania
   (Webb, Phyl, Pollard, Carol, and Ridley, Gail (2006), Attempting to Define IT
   Governance: Wisdom or Folly?, Proceedings of the 39th Hawaii International
   Conference on Systems Sciences) brings out the ‘elements’ that are common to a
   range of suggested definitions. The elements are: strategic alignment, delivery
   of business values, performance management, risk management, policies and
   procedures, and control and accountability. Their resultant definition is : IT
   Governance is the strategic alignment of IT with the business such that
   maximum business value is achieved through the development and
   maintenance of effective IT control and accountability, performance
   management and risk management.
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvment
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Study Group in ISO
• JTC1 : Information Technology Standards
• JTC1 / SC7 : Software and System Engineering
• JTC1 / SC7 / WG25 : IT Operations (service management)
• Basically : Study Group in WG25
Study Group Chair : Alison Holt (New Zeland)
Co-Chair : Ed Lewis (Australia)
Members :    Alwyn Smit, South Africa             Yoshiyuki Hirano, Japan
             Melanie Cheong, South Africa         K.T. Hwang, Korea
             Jyrki Lahnalahti, Finland            Bill Powell, United States
             Craig Pattison, itSMFI/New Zealand   Dennis Ravenelle, itSMFI
             Darcie Destito, United States        Hella Shrader, United Kingdom
             Gargi Keeni, India                   Mark Toomey, Australia
             Sushil Chatterji, ISACA/ITGI         Mikhail Pototsky, Russian Federation/itSMFI
             Brian Cusack, New Zealand            Max Shanahan, ISACA/ITGI
             Christophe Feltus, Luxembourg        Luis Rosa, Spain
                                                  Jenny Dugmore, UK.

Recommended for you

Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001

Due to the dramatic increase of threats worldwide, there is a need for the companies to find ways how to increase the information security. Therefore, one solution is to implement the ISO/IEC 27001 in order to protect information both internally and externally. Main points that will be covered are: • The scope of ISO 27001 & associated other standards references • Information Security and ISIM Terminologies • ISIM auditing principles • Managing audit program & audit activities Presenter: Eng. Kefah El-Ghobbas is a specialist in ‘Business Process Excellence' through ‘Business Process Re-engineering' with over 20 years of experience. Link of the recorded session published on YouTube: https://youtu.be/rTxA8PVULUs

isoismsauditing
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...

By embracing the importance of GDPR and leveraging ISO/IEC 27701, you can enhance your data protection practices, achieve compliance, and minimize the risk of penalties. Amongst others, the webinar covers:  Importance of Data Protection  Understanding Data Collection and Challenges  Introduction to GDPR  Key Principles of GDPR  Who does GDPR Apply to and Its Global Implications  Introduction to ISO/IEC 27701  Implementing ISO/IEC 27701  Privacy by Design  Dealing with IT on a Daily Basis  Building Awareness and Training  Audit, Data Discovery, and Risk Assessments Presenters: Mike Boutwell Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects. Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director. Lisa Goldsmith Lisa Goldsmith is the founder of LJ Digital and Data Consultancy. Lisa has over 23 years’ experience of supporting leadership teams in membership, charity, and wider not-for-profit organisations to simplify their IT and digital strategy that allows them to sleep soundly at night, knowing their systems and processes are fit for purpose, GDPR compliant, secure and that they deliver value to staff, members, and stakeholders. Prior to starting her own consultancy, Lisa gained extensive experience working for membership organisations and has knowledge and expertise at all levels of operations from working within careers and qualifications teams, as Membership Manager, as Head of Digital & IT for delivering large-scale digital, IT and GDPR compliance projects and serving on several Senior Leadership Teams. Lisa is also currently a Trustee of the BCLA and Groundwork East. Date: June 27, 2023 ------------------------------------------------------------------------------- Find out more about ISO training and certification services Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701 Webinars: https://pecb.com/webinars Article: https://pecb.com/article Whitepaper: https://pecb.com/whitepaper For more information about PECB: Website: https://pecb.com/ LinkedIn: https://www.linkedin.com/company/pecb/ Facebook: https://www.facebook.com/PECBInternational/ Slideshare: http://www.slideshare.net/PECBCERTIFICATION YouTube video: https://youtu.be/lfJrSLaGDtc Website: https://bit.ly/437GOnG

isoprivacyinformation security
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security

ISO 27001 is an international information security standard that provides specifications for implementing an effective Information Security Management System (ISMS) through risk management and compliance with regulations like GDPR. SOC 2 is an assessment for technology companies developed by AICPA to protect customer data stored in the cloud and apply to any company using cloud storage. Both standards aim to implement security controls, policies, and procedures to protect valuable assets, but ISO 27001 provides a more comprehensive framework while SOC 2 focuses on verifying data protection controls. Implementing one or both can strengthen security posture, simplify compliance, and improve customer confidence.

information securityiso 27001soc 2
Study Group in ISO
• In Seoul (2006) :
  Reduce – if not remove – the confusion in the professional and the
  academic literature about the topic
  Resolutions :
       - New SG
       - 1st report
       - Fast Track


• In Moscow (May 2007) :
    Preparation of 1st report
    Definition of ICT Governance
    What is ICT Governance ?
Study Group in ISO
• Montreal (November 2007)
  Fast Track on Australian Standard on ICT Governance
    – Accepted in July
    – Resolution of comments on Fast Track : 149
             –     Canada : 2
             –     Spain : 1
             –     France : 5
             –     Italy : 10
             –     Japan : 10
             –     Korea : 1
             –     Luxembourg : 46
             –     New Zealand : 6
             –     UK : 4
             –     Sweden : 9
             –     USA : 15
             –     South Africa : 40

    – 1st report
    – NWI
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
ISO – itSMF liaison (by WG)

Recommended for you

ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf

New revision of ISO 27001:2022. The presentation was updated and extended on request by the ISACA Bangalore Chapter.

isacaiso27001isms
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training

ISMS Awareness Taining on ISO 27001 done by Industry Experts,customized for you & connected with relevance to your Industry, products,services & Processes

isms awareness traininginformation security awareness trainingiso 27001 awareness training
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards

Main points covered: • Information Security best practices (ESA, COBIT, ITIL, Resilia) • NIST security publications (NIST 800-53) • ISO standards for information security (ISO 20000 and ISO 27000 series) - Information Security Management in ISO 20000 - ISO 27001, ISO 27002 and ISO 27005 • What is best for me: Information Security Best Practices or ISO standards? Presenter: This webinar was presented by Mohamed Gohar. Mr.Gohar has more than 10 years of experience in ISM/ITSM Training and Consultation. He is one of the expert reviewers of CISA RM 26th edition (2016), ISM Senior Trainer/Consultant at EGYBYTE. Link of the recorded session published on YouTube: https://youtu.be/eKYR2BG_MYU

benefits of iso 27001why use iso 27001information security best practices
ISO – itSMF liaison (by WG)
Advisory Board Paper
The formal description it offers is:

“Governance is the collective set of procedures, policies, roles and
   responsibilities, and organizational structures required to support an
   effective decision-making process”.
Advisory Board Paper
Benefits of Governance : (Key words)

–   Achieving business objectives by ensuring that each element of the mission and strategy are
    assigned and managed with a clearly understood and transparent decisions rights and
    accountability framework.

–   Defining and encouraging desirable behavior in the use of IT and in the execution of IT
    outsourcing arrangements.

–   Implementing and integrating the desired business processes into the organization.

–   Providing stability and overcoming the limitations of organizational structure.

–   Improving customer, business and internal relationships and satisfaction, and reducing internal
    territorial strife by formally integrating the customers, business units, and external IT providers
    into a holistic IT governance framework.

–   Enabling effective and strategically aligned decision making for the IT Principles that define the
    role of IT, IT Architecture, IT Infrastructure, Application Portfolio and Frameworks, Service
    Portfolio, Information and Competency Portfolios and IT Investment & Prioritization.
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions

Recommended for you

NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter

Trusted Integration, Inc. is an Alexandria-based cybersecurity company founded in 2001 that focuses on creating adaptive and cost-effective governance, risk, and compliance solutions. The company received Golden Bridge awards in 2013 for its government compliance and governance, risk, and compliance solutions. The document then provides an overview of the NIST Cybersecurity Framework, including its goals to improve cybersecurity risk management, be flexible and repeatable, and focus on outcomes. It describes the framework's core, profiles, and implementation tiers and maps the framework to other standards like ISO 27001. [END SUMMARY]

trusted integrationcybersecurity frameworkisaca
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know

As a follow-up on the previous session (4th of December), we run through the GDPR part of the ISO/IEC 27701 standard which has been published in August 2019. We'll take it from another angle and use the ISO/IEC 27701 as a guide to complete the checklist for the GDPR implementation. Also, with the help of the (new) PECB ISO/IEC 27701 lead auditor course, we'll have an auditor's look at the ISO certification and compliance. It's important to see how it works, to make sure your GDPR implementation can withstand the increasing demand for maturity from customers, subjects and data protection authorities that start to exercise their rights. The ISO27701 contains important requirements and implementation guidance for implementing a PIMS (Privacy Information Management System), which will set the baseline for the future of privacy and data protection. The webinar covers: - The GDRP view of the ISO/IEC 27701 - Mapping the GDPR to-do and the ISO/IEC 27701 to-do list. - The ISO/IEC 27701 auditor mindset - Compliance AND/OR/XOR solid data protection? - Status of GDPR certification Date: December 04, 2019 Recorded Webinar: https://www.youtube.com/watch?v=P80So3ryvJ8&feature=youtu.be

isocybersecurityiso/iec 27701
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001

Just created a slideshare presentation giving a basic introduction to ISO27001 and its Scope, Implementation & Application. You can see more slideshows on http://www.slideshare.net/ImranahmedIT or visit my website: http://imran-ahmed.co.uk

information securityiso27001imranahmedit
Interim Report
•   A review of national governance activities
•   The identification of a set of guiding principles for the development of an ICT
    Governance standard to meet market requirements
•   The identification of the ICT governance needs to be addressed in the standard
•   An assessment of where ICT governance sits within JTC1
•   A review of elements of ICT governance in existing SC7 standards
•   Analysis to determine the level of standard required to sit above existing
    frameworks and methodologies without replacing or displacing existing material.
    Identification of the sort of “standard” required - TR, code of practice or guidelines
•   Analysis of what would need to be added to AS 8015 to meet these needs
•   Analysis of whether a maturity framework could be included from the outset
•   Liaison Relationships: Contributions requested from existing bodies of knowledge
•   Call to action dependent on AS 8015 fast tack result (which is now known)
Governance
            around the world
Written and oral reports were presented to the ICT Study Group reviewing
the state of different ICT Standards environments within the different
jurisdictions.

A general movement towards compliance frameworks was reported in
terms of legislation, Standards adoption and control framework adoption
(eg. CobiT, ITIL, and so on).

Several reports noted that regulatory requirements were pending and that
there is considerable momentum gathering for comprehensive directives
(both explicit and implicit). The importance of ICT Governance and the
current opportune moment in time for ICT Governance advancement was
reported in each case.
What is ICT Governance ?
•   The Working Group should establish a Glossary of governance terms. The Glossary
    especially should include definitions that help to establish the difference between
    Governance and Management. The definitions must be compatible with those in existing
    ISO Standards

Director
    Member of the most senior governing body of an organization. Includes owners, board
    members, partners, senior executives or similar, and officers authorized by legislation or
    regulation.

Management
   Management is the process of controlling the activities required to achieve the strategic
   objectives set by the organisation's governing body. Management is subject to the policy
   guidance and monitoring set through corporate governance.
What is ICT Governance ?
•   The objective of governance is to determine and cause the desired behavior and
    results to achieve the strategic impact of IT.

     – The system in which directors monitor, evaluate and direct IT management to ensure
       effectiveness, accountability and compliance of IT


•   The active distribution of decision-making rights and accountabilities among
    different stakeholders in an organization and the rules and procedures for
    making and monitoring those decisions to determine and achieve desired
    behaviors and results .

     –   who makes directing, controlling and executing decisions
     –   how the decisions will be made
     –   what information is required to make the decisions
     –   what decision-making mechanisms should be required
     –   how exceptions will be handled
     –   how the governance results should be reviewed and improved

Recommended for you

cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdf

This document discusses Cobit 2019 and typical pain points organizations experience with enterprise governance of IT. It outlines 11 design factors to consider when implementing Cobit 2019, such as understanding the enterprise goals, risk profile, current IT issues, threat landscape, compliance requirements, role of IT, sourcing model for IT, and technology adoption strategy. The document provides comparisons between Cobit 5 and Cobit 2019 and lists various Cobit 2019 focus areas.

Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation

, hosted by Alan Calder CEO and founder of Vigilant Software and acknowledged information security risk assessment and management thought leader, explains and discusses what is information security? What is an information security management system (ISMS)? What is ISO 27001? Why should I and my organisation care about ISO 27001?

information securityiso27001risk assessment
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide

ISO 27001:2013 is the international standard that provides a framework for Information Security Management Systems (ISMS) to provide continued confidentiality, integrity and availability of information as well as legal compliance. ISO 27001 certification is essential for protecting your most vital assets like employee and client information, brand image and other private information. The ISO standard includes a process-based approach to initiating, implementing, operating and maintaining your ISMS. This implementation guide will help you run through the benefits, PDCA Cycle and Annex SL structure in detail for implementing ISO 27001. Find out more or get a quote for certification here – https://www.nqa.com/en-gb/certification/standards/iso-27001

 
by NQA
iso 27001information securityinfosec
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Scope
The objective of this Standard is to provide a framework of principles for Directors
   to use when evaluating, directing and monitoring the use of information
   technology (IT) in their organizations.
Scope
Governance is distinct from management, and for the avoidance of confusion, the two
   concepts are clearly defined in the standard.

…the members of the governing body may also occupy the key roles in management.

It provides guidance to those advising, informing, or assisting directors. They include:
     • Senior managers.
     • Members of groups monitoring the resources within the organization.
     • External business or technical specialists, such as legal or accounting
     specialists, retail associations, or professional bodies.
     • Vendors of hardware, software, communications and other IT products.
     • Internal and external service providers (including consultants).
     • IT auditors.


The standard is applicable for all organizations, from the smallest, to the largest, regardless of purpose,
    design and ownership structure.
Outline

• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
      •   Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions

Recommended for you

What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms

This document provides an overview of ISO 27001, which is an international standard for information security management systems (ISMS). It discusses why information security is important for businesses, as information is a valuable asset. ISO 27001 provides a framework to establish, implement, maintain and improve an ISMS. The standard contains 11 control areas, 39 control objectives and 134 controls to help organizations manage information security risks. Implementing ISO 27001 can provide benefits like increased profits, more reliable systems, cost savings, and compliance with legal requirements.

consultingiso consultantsiso
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective

Defines IT Governance, its need, what can happen if governance is not applied and how COBIT has all the answers

it governance cobit
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key

ISO 38500 provides guidance on IT governance for organizations. Effective IT governance can increase profits by 20% compared to competitors. The standard outlines 6 principles for IT governance: responsibility, strategy, acquisition, performance, conformance, and human behavior. It is intended to help boards of directors ensure proper governance of IT and provide auditors a basis for evaluating an organization's IT governance.

itiso 38500ceo
Application
This standard is applicable to all organizations, including public and private
    companies, government entities, and not-for-profit organizations.

The standard is applicable to organizations of all sizes from the smallest to the
   largest, regardless of the extent of their use of IT.
Outline

• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Objectives
The purpose of this Standard is to promote effective, efficient, and acceptable use of
   IT in all organizations by:

•   assuring stakeholders (including consumers, shareholders, and employees) that,
    if the standard is followed, they can have confidence in the organization’s
    corporate governance of IT;

•   informing and guiding directors in governing the use of IT in their organization;
    and

•   providing a basis for objective evaluation of the corporate governance of IT.
Outline

• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions

Recommended for you

PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500

This document discusses how COBIT 5 and ISO 38500 can be aligned for effective IT governance. It provides an overview of COBIT 5 including its product family, principles, processes, and implementation guidance. It also summarizes ISO 38500 and its six principles for corporate governance of IT. The document emphasizes that both frameworks take a holistic approach to IT governance covering the entire enterprise and can be used together to establish effective IT governance.

pecbwebinarsiso 38500
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready EnterpriseRe-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise

It’s time to re-architect your legacy environment in order to lay the foundation for an adaptive enterprise. In this session, you'll learn how to increase your business and technical agility using a fit-to-purpose .NET or Java architecture, while deploying your apps intelligently in the cloud and integrating with your complex IT environment, customers and partners.

agile software developmentc.net
IT Governance
IT GovernanceIT Governance
IT Governance

The document discusses IT governance and provides an overview of key frameworks for IT governance, including ISO 38500 and COBIT. It begins by defining governance and describing how governance applies to IT. It then discusses why IT governance is important for organizations, noting benefits like ensuring strategic alignment between IT and business goals. The document also provides a detailed overview of the ISO 38500 standard for IT governance, describing its scope, framework and principles. It explains the standard's six principles of IT governance and provides examples. Overall, the document serves to introduce the topic of IT governance and some of the most relevant frameworks.

itit governanceisaca
6 principles
Principle 1: Establish clearly understood responsibilities for IT

Principle 2: Plan IT to best support the organization

Principle 3: Acquire IT validly

Principle 4: Ensure that IT performs well, whenever required

Principle 5: Ensure IT conforms with formal rules


Principle 6: Ensure IT use respects human factors
Outline

• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Model for Corporate Governance
                of ICT




Directors should govern ICT through three main tasks:
    (a) Evaluate the use of ICT.
    (b) Direct preparation and implementation of plans and policies.
    (c) Monitor conformance to policies, and performance against the plans.
Evaluate
•   Directors should examine and make judgement on the current and future use of IT,
    including strategies, proposals and supply arrangements (whether internal,
    external, or both).

•   In evaluating the use of IT, directors should consider the pressures acting upon the
    business, such as technological change, economic and social trends, and political
    influences.

•   Directors should also take account of both current and future business needs —
    the current and future organizational objectives that they must achieve, such as
    maintaining competitive advantage, as well as the specific objectives of the
    strategies and proposals they are evaluating.

Recommended for you

2012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V12012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V1

One of the most challenging assignments within an organization is establishing of a maturity model structure in order to optimize enterprise effectiveness. The contents of this paper concern such an assignment. The objective of this mission entailed the establishment of an application governance model and the corresponding documentation therein.

#governance #it #applications
Bsi iso27001-mapping-guide
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guide

This document provides a mapping between the requirements of ISO/IEC 27001:2005 and ISO/IEC 27001:2013. It includes tables that map the ISMS requirements and Annex A controls between the two versions, noting new, unchanged, deleted and reverse requirements. The purpose is to provide guidance on the changes between the standards.

iso27001:2013security standardisms
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist

An approach to cloud adoption is a secure way. As security is a major concern for many organisations adopting cloud services, this is a way of starting the cloud adoption security strategy in a cost effective way. Basically leveraging existing standards and approaches.

securitycyber securitycloud computing
Direct
•   Directors should assign responsibility for, and direct preparation and
    implementation of plans and policies. Plans should set the direction for
    investments in IT projects and IT operations. Policies should establish sound
    behaviour in the use of IT.

•   Directors should ensure that the transition of projects to operational status is
    properly planned and managed, taking into account impacts on business and
    operational practices and existing IT systems and infrastructure.

•   Directors should encourage a culture of good governance of IT in their organization
    by requiring managers to provide timely information, to comply with direction and
    to conform with the six principles of good governance.
Monitor
•   To complete the cycle, directors should monitor, through appropriate
    measurement systems, the performance of IT use. They should reassure
    themselves that performance is in accordance with plans, particularly with regard
    to business objectives.

•   They should also make sure that the use of IT conforms with external obligations
    (regulatory, legislation, common law, contractual) and internal work practices. If
    necessary, directors should direct the submission of proposals for approval to
    address identified needs.
Outline
• ICT Governance definitions
• SG on ICT Governance
   – itSMF involvement
   – Interim Report
   – Beyond ISO 38500
      •   Scope
      •   Application
      •   Objectives
      •   6 principles
      •   Model for Corporate Governance of ICT
• Conclusions
Conclusions and Future Works
Review the use of the Plan, Do, Check Act (PDCA) lifecycle versus Evaluate, Direct Monitor
(EDM). Show mapping of EDM versus PDCA.
Incorporate human behavioural aspects to the chosen lifecycle.
Produce a diagram demonstrating the inter-relation of principles.
Develop derivative material to cover:
·     Clarification on the risks of poor governance and decision making;
·     Analysis on the benefits of Governance across the IT lifecycle; and
·     The explanation of each principle.


Development of a TR2 for CIOs and executives to assist them in explaining the rationale
and implications (risks and benefits) of the principles.
Development of a TR2 for guidelines for the use of the standard by Public Sector
organizations

Recommended for you

20080416 standard iso38500
20080416 standard iso3850020080416 standard iso38500
20080416 standard iso38500

Este documento presenta una guía sobre la implementación de gobierno corporativo de tecnologías de la información (TI) en una organización. Introduce varios marcos y estándares relacionados como COSO, Balanced Scorecard, ISO 38500 e ISO 27000, y describe su objetivo y alcance. También explica la metodología propuesta, que incluye fases para el desarrollo del proyecto de gobierno corporativo de TI de acuerdo a estos marcos.

Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...

To become a data-driven enterprise, companies must move from inflexible legacy data infrastructure that cannot scale to agile data architectures based on scaled-up, open-source systems that can handle any type or source of data. This involves storing both structured and unstructured high-volume, high-velocity data and then analyzing it through machine learning, predictive analytics, and real-time analytics to develop advanced analytical applications and globally scaled, data-driven applications. Achieving this requires expertise in agile development, DevOps, hybrid cloud, and continuous delivery to innovate with closed-loop applications.

#pivotaldtfbig datapivotal software
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And Exposure

This document discusses aligning an organization's risk appetite and risk exposure through strategic execution. It argues that successful strategy execution in the post-credit crisis world requires balancing risk appetite and exposure within the context of clear strategic objectives. The document provides a roadmap for organizations to determine strategic objectives, define risk appetite, identify key risks, review risk appetite in light of key risks, conduct risk assessments, and map risk exposure to risk appetite using a risk appetite and exposure matrix. Following this process allows organizations to integrate risk management into strategic decision making.

risk managementrisk appetitestrategy
Conclusions and Future Works
Determine market requirements and then determine the coverage of future
standards for example IT Projects, IT Operations, IT Use or some other frameworks :
3 SGs
        Digital Forensics,
        Governance of IT operations,
        Schedule of Products.
         Schedule
3 NWIs
        Guides for the Implementation of 38500
        Standard for the Governance of Business Change involving IT investment
        Standard for the Corporate Governance of business projects involving IT
        investment

More Related Content

What's hot

27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
Dr Madhu Aman Sharma
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
PECB
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
Naresh Rao
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
PECB
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
PECB
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
JohnHPazEMCPMPITIL5G
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
himalya sharma
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
PECB
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Tuan Phan
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
PECB
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed
 
cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdf
mohammed539963
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Vigilant Software
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
Craig Willetts ISO Expert
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
Sayyed Zakir Ali Rizwe
 

What's hot (20)

27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
cobit 2019 presentation.pdf
cobit 2019 presentation.pdfcobit 2019 presentation.pdf
cobit 2019 presentation.pdf
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 

Viewers also liked

Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
Basta Group BV
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB
 
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready EnterpriseRe-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Dell World
 
IT Governance
IT GovernanceIT Governance
IT Governance
Carlos Chalico
 
2012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V12012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V1
Michael Boyle
 
Bsi iso27001-mapping-guide
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guide
floora_jj
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
Securestorm
 
20080416 standard iso38500
20080416 standard iso3850020080416 standard iso38500
20080416 standard iso38500
Guillermo Ramirez
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
VMware Tanzu
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And Exposure
Andrew Smart
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
Andrew Smart
 
IT 2.0 Transformation 101
IT 2.0 Transformation 101IT 2.0 Transformation 101
IT 2.0 Transformation 101
Jonathan S. Miller, BSEE
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
Andrew Smart
 
Roles and Responsibilities | RACI
Roles and Responsibilities | RACIRoles and Responsibilities | RACI
Roles and Responsibilities | RACI
Patricia Hswe
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
PECB
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
Gaffri Johnson
 
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk ManagementStrategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Andrew Smart
 
Standardization of IT Processes
Standardization of IT ProcessesStandardization of IT Processes
Standardization of IT Processes
Natarajan V
 
Integrating Enterprise Risk Management (ERM) with Organizational Strategy
Integrating Enterprise Risk Management (ERM) with Organizational StrategyIntegrating Enterprise Risk Management (ERM) with Organizational Strategy
Integrating Enterprise Risk Management (ERM) with Organizational Strategy
henrytk2
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
Elkanouni Mohamed
 

Viewers also liked (20)

Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready EnterpriseRe-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
2012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V12012 04 16 Iso38500 Governance V1
2012 04 16 Iso38500 Governance V1
 
Bsi iso27001-mapping-guide
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guide
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
 
20080416 standard iso38500
20080416 standard iso3850020080416 standard iso38500
20080416 standard iso38500
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And Exposure
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 
IT 2.0 Transformation 101
IT 2.0 Transformation 101IT 2.0 Transformation 101
IT 2.0 Transformation 101
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
 
Roles and Responsibilities | RACI
Roles and Responsibilities | RACIRoles and Responsibilities | RACI
Roles and Responsibilities | RACI
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk ManagementStrategic Planning Society Webinar- Integrating Strategy and Risk Management
Strategic Planning Society Webinar- Integrating Strategy and Risk Management
 
Standardization of IT Processes
Standardization of IT ProcessesStandardization of IT Processes
Standardization of IT Processes
 
Integrating Enterprise Risk Management (ERM) with Organizational Strategy
Integrating Enterprise Risk Management (ERM) with Organizational StrategyIntegrating Enterprise Risk Management (ERM) with Organizational Strategy
Integrating Enterprise Risk Management (ERM) with Organizational Strategy
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 

Similar to Christophe feltus introduction to iso 38500 v1 0

Iso iec 29382 the new standard for ict governance christophe feltus
Iso iec 29382   the new standard for ict governance christophe feltusIso iec 29382   the new standard for ict governance christophe feltus
Iso iec 29382 the new standard for ict governance christophe feltus
Luxembourg Institute of Science and Technology
 
Eurosec'2008 christophe feltus
Eurosec'2008 christophe feltusEurosec'2008 christophe feltus
Eurosec'2008 christophe feltus
Luxembourg Institute of Science and Technology
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
Navneet Singh
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylan
ozewai
 
As
As As
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
ssusera19f45
 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
jojo82637
 
01 integrated management system telkom 2016 opening
01 integrated management system   telkom 2016 opening01 integrated management system   telkom 2016 opening
01 integrated management system telkom 2016 opening
wisnu wardhana, i nyoman
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
Richard Willis
 
Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018 Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018
Association for Project Management
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
Ajay Gangakhedkar
 
InfoTech - IT Governance.pptx
InfoTech - IT Governance.pptxInfoTech - IT Governance.pptx
InfoTech - IT Governance.pptx
Ajay Gangakhedkar
 
standards1.pdf
standards1.pdfstandards1.pdf
standards1.pdf
Karthick Panneerselvam
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
Christian F. Nissen
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
anthonywanjohi5
 
Syzygal cobit5-brc
Syzygal cobit5-brcSyzygal cobit5-brc
Syzygal cobit5-brc
Syzygal
 
COBIT
COBITCOBIT
COBIT
Ai Lun Wu
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
Ramiro Cid
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
Sam Mandebvu
 
Sharpening the Lens
Sharpening the LensSharpening the Lens

Similar to Christophe feltus introduction to iso 38500 v1 0 (20)

Iso iec 29382 the new standard for ict governance christophe feltus
Iso iec 29382   the new standard for ict governance christophe feltusIso iec 29382   the new standard for ict governance christophe feltus
Iso iec 29382 the new standard for ict governance christophe feltus
 
Eurosec'2008 christophe feltus
Eurosec'2008 christophe feltusEurosec'2008 christophe feltus
Eurosec'2008 christophe feltus
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylan
 
As
As As
As
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
 
01 integrated management system telkom 2016 opening
01 integrated management system   telkom 2016 opening01 integrated management system   telkom 2016 opening
01 integrated management system telkom 2016 opening
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018 Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
 
InfoTech - IT Governance.pptx
InfoTech - IT Governance.pptxInfoTech - IT Governance.pptx
InfoTech - IT Governance.pptx
 
standards1.pdf
standards1.pdfstandards1.pdf
standards1.pdf
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
Syzygal cobit5-brc
Syzygal cobit5-brcSyzygal cobit5-brc
Syzygal cobit5-brc
 
COBIT
COBITCOBIT
COBIT
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 

More from Luxembourg Institute of Science and Technology

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Luxembourg Institute of Science and Technology
 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
Luxembourg Institute of Science and Technology
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Luxembourg Institute of Science and Technology
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
Luxembourg Institute of Science and Technology
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
Luxembourg Institute of Science and Technology
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
Luxembourg Institute of Science and Technology
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
Luxembourg Institute of Science and Technology
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
Luxembourg Institute of Science and Technology
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
Luxembourg Institute of Science and Technology
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Luxembourg Institute of Science and Technology
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
Luxembourg Institute of Science and Technology
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
Luxembourg Institute of Science and Technology
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
Luxembourg Institute of Science and Technology
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
Luxembourg Institute of Science and Technology
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
Luxembourg Institute of Science and Technology
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
Luxembourg Institute of Science and Technology
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
Luxembourg Institute of Science and Technology
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
Luxembourg Institute of Science and Technology
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
Luxembourg Institute of Science and Technology
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
Luxembourg Institute of Science and Technology
 

More from Luxembourg Institute of Science and Technology (20)

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
 

Christophe feltus introduction to iso 38500 v1 0

  • 1. Introducing ISO/IEC 38500: Corporate Governance in ICT Christophe Feltus Member of the ISO JTC1/SC7/WG1A on ICT Governance Public Research Centre Henri Tudor, 29, Rue John F. Kennedy L-1855 Luxembourg christophe.feltus@tudor.lu
  • 2. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 3. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 4. Some definitions • AS 8015 – Australian National Standards Corporate Governance of ICT is the system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organization and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organization. (Corporate Governance of Information and Communication Technology; January 2005). • OECD Corporate Governance Corporate governance involves a set of relationships between a company’s management, its board, its shareholders and other stakeholders. Corporate governance also provides the structure through which the objectives of the company are set, and the means of attaining those objectives and monitoring performance are determined. Good corporate governance should provide proper incentives for the board and management to pursue objectives that are in the interests of the company and its shareholders and should facilitate effective monitoring. (OECD Code on Corporate Governance)
  • 5. Some definitions • ITGI (IT Governance Institute) IT Governance is the responsibility of the board of directors and executive management. It is an integral part of enterprise governance and consists of the leadership and organisational structures and processes that ensure that the organisation’s IT sustains and extends the organisation’s strategies and objectives. (Board Briefing, 2nd edition; 2003). • World Bank Definition of Corporate Governance Corporate governance refers to the structures and processes for the direction and control of companies. Corporate governance concerns the relationships among the management, the Board of Directors, the controlling shareholders and other stakeholders. Good corporate governance contributes to sustainable economic development by enhancing the performance of companies and increasing their access to outside capital.
  • 6. Some definitions • MIT Sloan Center for Information Systems Research : IT Governance is specifying the decision rights and accountability framework to encourage desirable behaviour in the use of IT. (MIT CISR Working Paper No. 326; April 2002). • University of Tasmania The survey of the literature by academics from the University of Tasmania (Webb, Phyl, Pollard, Carol, and Ridley, Gail (2006), Attempting to Define IT Governance: Wisdom or Folly?, Proceedings of the 39th Hawaii International Conference on Systems Sciences) brings out the ‘elements’ that are common to a range of suggested definitions. The elements are: strategic alignment, delivery of business values, performance management, risk management, policies and procedures, and control and accountability. Their resultant definition is : IT Governance is the strategic alignment of IT with the business such that maximum business value is achieved through the development and maintenance of effective IT control and accountability, performance management and risk management.
  • 7. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvment – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 8. Study Group in ISO • JTC1 : Information Technology Standards • JTC1 / SC7 : Software and System Engineering • JTC1 / SC7 / WG25 : IT Operations (service management) • Basically : Study Group in WG25 Study Group Chair : Alison Holt (New Zeland) Co-Chair : Ed Lewis (Australia) Members : Alwyn Smit, South Africa Yoshiyuki Hirano, Japan Melanie Cheong, South Africa K.T. Hwang, Korea Jyrki Lahnalahti, Finland Bill Powell, United States Craig Pattison, itSMFI/New Zealand Dennis Ravenelle, itSMFI Darcie Destito, United States Hella Shrader, United Kingdom Gargi Keeni, India Mark Toomey, Australia Sushil Chatterji, ISACA/ITGI Mikhail Pototsky, Russian Federation/itSMFI Brian Cusack, New Zealand Max Shanahan, ISACA/ITGI Christophe Feltus, Luxembourg Luis Rosa, Spain Jenny Dugmore, UK.
  • 9. Study Group in ISO • In Seoul (2006) : Reduce – if not remove – the confusion in the professional and the academic literature about the topic Resolutions : - New SG - 1st report - Fast Track • In Moscow (May 2007) :  Preparation of 1st report  Definition of ICT Governance  What is ICT Governance ?
  • 10. Study Group in ISO • Montreal (November 2007) Fast Track on Australian Standard on ICT Governance – Accepted in July – Resolution of comments on Fast Track : 149 – Canada : 2 – Spain : 1 – France : 5 – Italy : 10 – Japan : 10 – Korea : 1 – Luxembourg : 46 – New Zealand : 6 – UK : 4 – Sweden : 9 – USA : 15 – South Africa : 40 – 1st report – NWI
  • 11. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 12. ISO – itSMF liaison (by WG)
  • 13. ISO – itSMF liaison (by WG)
  • 14. Advisory Board Paper The formal description it offers is: “Governance is the collective set of procedures, policies, roles and responsibilities, and organizational structures required to support an effective decision-making process”.
  • 15. Advisory Board Paper Benefits of Governance : (Key words) – Achieving business objectives by ensuring that each element of the mission and strategy are assigned and managed with a clearly understood and transparent decisions rights and accountability framework. – Defining and encouraging desirable behavior in the use of IT and in the execution of IT outsourcing arrangements. – Implementing and integrating the desired business processes into the organization. – Providing stability and overcoming the limitations of organizational structure. – Improving customer, business and internal relationships and satisfaction, and reducing internal territorial strife by formally integrating the customers, business units, and external IT providers into a holistic IT governance framework. – Enabling effective and strategically aligned decision making for the IT Principles that define the role of IT, IT Architecture, IT Infrastructure, Application Portfolio and Frameworks, Service Portfolio, Information and Competency Portfolios and IT Investment & Prioritization.
  • 16. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 17. Interim Report • A review of national governance activities • The identification of a set of guiding principles for the development of an ICT Governance standard to meet market requirements • The identification of the ICT governance needs to be addressed in the standard • An assessment of where ICT governance sits within JTC1 • A review of elements of ICT governance in existing SC7 standards • Analysis to determine the level of standard required to sit above existing frameworks and methodologies without replacing or displacing existing material. Identification of the sort of “standard” required - TR, code of practice or guidelines • Analysis of what would need to be added to AS 8015 to meet these needs • Analysis of whether a maturity framework could be included from the outset • Liaison Relationships: Contributions requested from existing bodies of knowledge • Call to action dependent on AS 8015 fast tack result (which is now known)
  • 18. Governance around the world Written and oral reports were presented to the ICT Study Group reviewing the state of different ICT Standards environments within the different jurisdictions. A general movement towards compliance frameworks was reported in terms of legislation, Standards adoption and control framework adoption (eg. CobiT, ITIL, and so on). Several reports noted that regulatory requirements were pending and that there is considerable momentum gathering for comprehensive directives (both explicit and implicit). The importance of ICT Governance and the current opportune moment in time for ICT Governance advancement was reported in each case.
  • 19. What is ICT Governance ? • The Working Group should establish a Glossary of governance terms. The Glossary especially should include definitions that help to establish the difference between Governance and Management. The definitions must be compatible with those in existing ISO Standards Director Member of the most senior governing body of an organization. Includes owners, board members, partners, senior executives or similar, and officers authorized by legislation or regulation. Management Management is the process of controlling the activities required to achieve the strategic objectives set by the organisation's governing body. Management is subject to the policy guidance and monitoring set through corporate governance.
  • 20. What is ICT Governance ? • The objective of governance is to determine and cause the desired behavior and results to achieve the strategic impact of IT. – The system in which directors monitor, evaluate and direct IT management to ensure effectiveness, accountability and compliance of IT • The active distribution of decision-making rights and accountabilities among different stakeholders in an organization and the rules and procedures for making and monitoring those decisions to determine and achieve desired behaviors and results . – who makes directing, controlling and executing decisions – how the decisions will be made – what information is required to make the decisions – what decision-making mechanisms should be required – how exceptions will be handled – how the governance results should be reviewed and improved
  • 21. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 22. Scope The objective of this Standard is to provide a framework of principles for Directors to use when evaluating, directing and monitoring the use of information technology (IT) in their organizations.
  • 23. Scope Governance is distinct from management, and for the avoidance of confusion, the two concepts are clearly defined in the standard. …the members of the governing body may also occupy the key roles in management. It provides guidance to those advising, informing, or assisting directors. They include: • Senior managers. • Members of groups monitoring the resources within the organization. • External business or technical specialists, such as legal or accounting specialists, retail associations, or professional bodies. • Vendors of hardware, software, communications and other IT products. • Internal and external service providers (including consultants). • IT auditors. The standard is applicable for all organizations, from the smallest, to the largest, regardless of purpose, design and ownership structure.
  • 24. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report • Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 25. Application This standard is applicable to all organizations, including public and private companies, government entities, and not-for-profit organizations. The standard is applicable to organizations of all sizes from the smallest to the largest, regardless of the extent of their use of IT.
  • 26. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 27. Objectives The purpose of this Standard is to promote effective, efficient, and acceptable use of IT in all organizations by: • assuring stakeholders (including consumers, shareholders, and employees) that, if the standard is followed, they can have confidence in the organization’s corporate governance of IT; • informing and guiding directors in governing the use of IT in their organization; and • providing a basis for objective evaluation of the corporate governance of IT.
  • 28. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 29. 6 principles Principle 1: Establish clearly understood responsibilities for IT Principle 2: Plan IT to best support the organization Principle 3: Acquire IT validly Principle 4: Ensure that IT performs well, whenever required Principle 5: Ensure IT conforms with formal rules Principle 6: Ensure IT use respects human factors
  • 30. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 31. Model for Corporate Governance of ICT Directors should govern ICT through three main tasks: (a) Evaluate the use of ICT. (b) Direct preparation and implementation of plans and policies. (c) Monitor conformance to policies, and performance against the plans.
  • 32. Evaluate • Directors should examine and make judgement on the current and future use of IT, including strategies, proposals and supply arrangements (whether internal, external, or both). • In evaluating the use of IT, directors should consider the pressures acting upon the business, such as technological change, economic and social trends, and political influences. • Directors should also take account of both current and future business needs — the current and future organizational objectives that they must achieve, such as maintaining competitive advantage, as well as the specific objectives of the strategies and proposals they are evaluating.
  • 33. Direct • Directors should assign responsibility for, and direct preparation and implementation of plans and policies. Plans should set the direction for investments in IT projects and IT operations. Policies should establish sound behaviour in the use of IT. • Directors should ensure that the transition of projects to operational status is properly planned and managed, taking into account impacts on business and operational practices and existing IT systems and infrastructure. • Directors should encourage a culture of good governance of IT in their organization by requiring managers to provide timely information, to comply with direction and to conform with the six principles of good governance.
  • 34. Monitor • To complete the cycle, directors should monitor, through appropriate measurement systems, the performance of IT use. They should reassure themselves that performance is in accordance with plans, particularly with regard to business objectives. • They should also make sure that the use of IT conforms with external obligations (regulatory, legislation, common law, contractual) and internal work practices. If necessary, directors should direct the submission of proposals for approval to address identified needs.
  • 35. Outline • ICT Governance definitions • SG on ICT Governance – itSMF involvement – Interim Report – Beyond ISO 38500 • Scope • Application • Objectives • 6 principles • Model for Corporate Governance of ICT • Conclusions
  • 36. Conclusions and Future Works Review the use of the Plan, Do, Check Act (PDCA) lifecycle versus Evaluate, Direct Monitor (EDM). Show mapping of EDM versus PDCA. Incorporate human behavioural aspects to the chosen lifecycle. Produce a diagram demonstrating the inter-relation of principles. Develop derivative material to cover: · Clarification on the risks of poor governance and decision making; · Analysis on the benefits of Governance across the IT lifecycle; and · The explanation of each principle. Development of a TR2 for CIOs and executives to assist them in explaining the rationale and implications (risks and benefits) of the principles. Development of a TR2 for guidelines for the use of the standard by Public Sector organizations
  • 37. Conclusions and Future Works Determine market requirements and then determine the coverage of future standards for example IT Projects, IT Operations, IT Use or some other frameworks : 3 SGs Digital Forensics, Governance of IT operations, Schedule of Products. Schedule 3 NWIs Guides for the Implementation of 38500 Standard for the Governance of Business Change involving IT investment Standard for the Corporate Governance of business projects involving IT investment