ISACA releases business IT governance framework COBIT 5
- 16 April, 2012 04:51
International IT security managers' organisation ISACA has released a new business framework for the governance and management of enterprise IT.
ISACA said COBIT 5, which is free to download, "promotes seamless continuity between an enterprise's IT department and its overall business goals".
It said COBIT 5 provides "globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximise value from IT assets".
Derek Oliver, co-chair of the COBIT 5 Task Force, said: "Information is the currency of the 21st century and COBIT helps enterprises effectively govern and manage this critical asset."
COBIT 5 can be tailored to meet an enterprise's specific business model, technology environment, industry, location and corporate culture. Its open design means it can be applied to meet needs related to information security, risk management, governance and management of enterprise IT, assurance activities, legislative and regulatory compliance, and financial processing reporting.
The new version of COBIT is also designed to integrate other standards, including TOGAF, PMBOK, Prince2, COSO, ITIL, PCI DSS, the Sarbanes-Oxley Act and Basel III.
ISACA recently announced the six key considerations it feels are necessary when rolling out enterprise cloud computing strategies.
ISACA said the growing shift to cloud computing can deliver "significant value" but that most enterprises have little knowledge of the "perils" of transferring IT decision-making away from technology specialists to business unit leaders.
Telecom changes name to Spark
Telecom changes name to Spark
Aerohive hopes to ride enterprise Wi-Fi to a $75M IPO
Intel wants to be the 'operating system' for big data
IT professionals switching jobs for less money
Unlocking the Power of Flash
Continuous data growth coupled with a new generation of multi-core CPUs has placed new demands on storage systems. This whitepaper details why firms should consider moving from HDDs to higher-performance Flash media, with the adoption of new technology with a higher I/O intensity.
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
How to Successfully Select an ERP System
An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.