Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

ISACA releases business IT governance framework COBIT 5

Free to download

International IT security managers' organisation ISACA has released a new business framework for the governance and management of enterprise IT.

ISACA said COBIT 5, which is free to download, "promotes seamless continuity between an enterprise's IT department and its overall business goals".

It said COBIT 5 provides "globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximise value from IT assets".

Derek Oliver, co-chair of the COBIT 5 Task Force, said: "Information is the currency of the 21st century and COBIT helps enterprises effectively govern and manage this critical asset."

COBIT 5 can be tailored to meet an enterprise's specific business model, technology environment, industry, location and corporate culture. Its open design means it can be applied to meet needs related to information security, risk management, governance and management of enterprise IT, assurance activities, legislative and regulatory compliance, and financial processing reporting.

The new version of COBIT is also designed to integrate other standards, including TOGAF, PMBOK, Prince2, COSO, ITIL, PCI DSS, the Sarbanes-Oxley Act and Basel III.

ISACA recently announced the six key considerations it feels are necessary when rolling out enterprise cloud computing strategies.

ISACA said the growing shift to cloud computing can deliver "significant value" but that most enterprises have little knowledge of the "perils" of transferring IT decision-making away from technology specialists to business unit leaders.

More about: ACA, CA Technologies, ISACA
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Whitepapers
  • The F5 DDoS Protection Reference Architecture part 2 of 3
    This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
    Learn more »
  • 3 Strategies to Manage Compliance Mandates
    Meeting security-related compliance requirements is an increasingly complex job. Follow these best practices to easily manage compliance.
    Learn more »
  • Swiss Nuclear Power Plant Improves Business Continuity
    Learn how Kernkraftwerk Leibstadt (KKL), a Swiss nuclear power plant, achieved 95% virtualization with 50% fewer servers in just two months by implementing a Vblock System. The solution ensures that KKL can reliably deliver the continuous electricity supply safely and cost effectively.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Recent comments