SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Copyright © 2016 ITpreneurs. All rights reserved.
10 Ways to Fail with
IT Management
And how to prevent it with COBIT!
Copyright © 2014 ITpreneurs. All rights reserved. *
“Governance means providing value to stakeholders”.
Assuming governance of IT
is only related to risk and
compliance
Copyright © 2014 ITpreneurs. All rights reserved. *
“Often technical people are included,
but the business, or senior
management is forgotten.”
Not appointing the right
stakeholders to IT steering
committees
Copyright © 2014 ITpreneurs. All rights reserved. *
…..
Assuming IT is only for the
“IT Function”
Copyright © 2014 ITpreneurs. All rights reserved. *
“Failing to take management responsibility for IT
controls and self assessments.”
Reacting only to audit
findings
Copyright © 2014 ITpreneurs. All rights reserved. *
Failing to appoint a senior
business executive to drive the
management of information
security
“In most cases, decision making is left to technicians,
however, business executives are required.”
Copyright © 2014 ITpreneurs. All rights reserved. *
Defining SLAs in technical
delivery terms
“...rather than defining it in customer outcome terms.”
Copyright © 2014 ITpreneurs. All rights reserved. *
“Leads to building and modifying applications and not
changing business process.”
Defining business changes
as “IT Projects” after the IT
solution
Copyright © 2014 ITpreneurs. All rights reserved. *
“No commitment from business, poor definition
of requirements and limited business
engagement in driving the benefits.”
Not appointing a business
owner / sponsor to be
accountable for IT enabled
business changes
Copyright © 2014 ITpreneurs. All rights reserved. *
Defining requirements as a
solution description
“...rather than a desired business
outcome.”
Copyright © 2014 ITpreneurs. All rights reserved. *
…”and monitoring only project deliverables. Most common
reason for project failure.”
Failing to use a business
case to monitor desired
outcomes and benefits.
Copyright © 2015 ITpreneurs. All rights reserved.
Fill out the survey (takes less than 5 minutes) and receive
the white paper which includes ‘how-to-fix-it’.
12
Let’s go!
How to prevent these mistakes?
Copyright © 2016 ITpreneurs. All rights reserved. *
Top 10 - 1-5
Assuming governance of IT is only related to risk and
compliance
Not appointing the right stakeholders to IT steering
committees
Reacting only to audit findings
Failing to appoint a senior business executive to drive
the management of information security
Defining SLAs in technical delivery terms
Copyright © 2016 ITpreneurs. All rights reserved. *
Top 10 - 6-10
Defining business changes as “IT Projects”
Not appointing a business owner / sponsor to be
accountable for IT enabled business changes”
Defining requirements as a solution description
Naming IT Projects after the IT solution
Failing to use a business case to monitor desired
outcomes and benefits.
Copyright © 2016 ITpreneurs. All rights reserved.
Corjan Bast
Products & Solutions Marketing, ITpreneurs
Gary Hardy
COBIT Author and IT Governance Expert, IT Winners
Stephan Brendel
Regional Manager EMEA, APMG-International
Content by:
Copyright © 2016 ITpreneurs. All rights reserved.
Get Started
Courses Designed by Gary Hardy, a.k.a. “Mr. COBIT”
Copyright © 2016 ITpreneurs. All rights reserved.
• Content PLUS: Training materials cover
the exam content but also covers the
practicality of using COBIT
• Quality: Gary’s the author & architect of
the Governance courses, including
COBIT
• Credible: We worked with the early
developers of COBIT and developed the
first ever COBIT course
Deliver Value With ITpreneurs COBIT Courseware
Copyright © 2014 ITpreneurs. All rights reserved.
Partner with Us for Training Materials
+1 800 214 6371 USA
+31 10 711 02 60 INT’L
email us at info@itpreneurs.com
www.itpreneurs.com
https://www.facebook.com/ITpreneurs
https://twitter.com/ITpreneurs
https://www.youtube.com/user/itpreneurs
Copyright © 2016 ITpreneurs. All rights reserved.
COBIT Stats & Info
Copyright © 2016 ITpreneurs. All rights reserved.
Present on all
continents
Wide portfolio of
qualifications Examination and
Accreditation Body
Certified against
ISO 17021
ISO 17024
ISO 17065
Strategic Partner of
ISACA for accreditation
and examinations
Strategic Partner of
ITPreneurs
Copyright © 2016 ITpreneurs. All rights reserved.
Topics
• What is the market take up?
• What does it mean for training
organisations and end users?
Copyright © 2016 ITpreneurs. All rights reserved.
There are separate views on the benefits of
COBIT5
• One is the follow up from an auditor’s perspective
and this is where most of the initial demand has been
generated from
• But this is too short of a jump
Copyright © 2016 ITpreneurs. All rights reserved.
There are separate views on the benefits of
COBIT5
• The second one is increasingly coming from a wider
management perspective
• Here, the Surface still hasn’t been scratched and
here are the benefits
Copyright © 2016 ITpreneurs. All rights reserved.
Not about controls, but a holistic approach
to manage frameworks
ITIL®
PRINCE2®
IEC/ISO 20000
PMBok
Agile
SixSigma
Copyright © 2016 ITpreneurs. All rights reserved.
Countries where more
than 1000 exams have
been taken since 2012
Copyright © 2016 ITpreneurs. All rights reserved.
A recognised framework
• USA - referenced in the U.S. Cyber
Security Framework and acknowledged
by the DoD for Homeland Security
Governance
Copyright © 2016 ITpreneurs. All rights reserved.
A recognised framework
• Australia - recognized and recommended by the
Australian National Audit Office as a baseline for
controls
• South Africa - adopted by National Directive required
by more than
150 government departments
Copyright © 2016 ITpreneurs. All rights reserved.
A recognised framework
• UAE – used by all government institutions for
financial audits
• India – Reserve Bank and the Securities and
Exchange Board (SEBI)
• Brazil - control framework for
Banco Central
Copyright © 2016 ITpreneurs. All rights reserved.
A recognised framework
• EU – used by European Court of Audit in the
performance of its Audits and IT Governance reviews
• Turkey - mandated by Banking Regulation and
Supervision Agency (BRSA) and for all Banks in the
country
Copyright © 2016 ITpreneurs. All rights reserved.
will be adopted and will sell
• where ITIL is in a mature stage
• where regulation gaps need to be filled
• where government standards match
• where organisational maturity is high
• where too many frameworks are
causing confusion
Copyright © 2016 ITpreneurs. All rights reserved.
Being adopted the right way
is the answer.
• Let’s derive the benefits from one of the most advanced
frameworks that exist
Copyright © 2016 ITpreneurs. All rights reserved.
@apmg_inter
Thank You
Bedankt
Gracias
Grazie
Danke
Merci
Tack
@ITwinners
@ITpreneurs
Copyright © 2016 ITpreneurs. All rights reserved.
Q&A
Copyright © 2016 ITpreneurs. All rights reserved.
Use COBIT.. Become a Winner

Weitere ähnliche Inhalte

Mehr von ITpreneurs

EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramITpreneurs
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...ITpreneurs
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...ITpreneurs
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).ITpreneurs
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneursITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較ITpreneurs
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessITpreneurs
 
Will They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise ArchitectureWill They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise ArchitectureITpreneurs
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
 
Opportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business AssociateOpportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business AssociateITpreneurs
 
Enabling IT to Make Better Cloud Decisions
Enabling IT to Make Better Cloud DecisionsEnabling IT to Make Better Cloud Decisions
Enabling IT to Make Better Cloud DecisionsITpreneurs
 
Positioning the CCC Professional Cloud Portfolio for Rapid Adoption
Positioning the CCC Professional Cloud Portfolio  for Rapid AdoptionPositioning the CCC Professional Cloud Portfolio  for Rapid Adoption
Positioning the CCC Professional Cloud Portfolio for Rapid AdoptionITpreneurs
 
Training Opportunity: Certified Mobile App Professional (CMAP) Testing
Training Opportunity: Certified Mobile App Professional (CMAP) TestingTraining Opportunity: Certified Mobile App Professional (CMAP) Testing
Training Opportunity: Certified Mobile App Professional (CMAP) TestingITpreneurs
 

Mehr von ITpreneurs (20)

EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 
Will They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise ArchitectureWill They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise Architecture
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Opportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business AssociateOpportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business Associate
 
Enabling IT to Make Better Cloud Decisions
Enabling IT to Make Better Cloud DecisionsEnabling IT to Make Better Cloud Decisions
Enabling IT to Make Better Cloud Decisions
 
Positioning the CCC Professional Cloud Portfolio for Rapid Adoption
Positioning the CCC Professional Cloud Portfolio  for Rapid AdoptionPositioning the CCC Professional Cloud Portfolio  for Rapid Adoption
Positioning the CCC Professional Cloud Portfolio for Rapid Adoption
 
Training Opportunity: Certified Mobile App Professional (CMAP) Testing
Training Opportunity: Certified Mobile App Professional (CMAP) TestingTraining Opportunity: Certified Mobile App Professional (CMAP) Testing
Training Opportunity: Certified Mobile App Professional (CMAP) Testing
 

Kürzlich hochgeladen

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Kürzlich hochgeladen (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

10 Ways to Fail with IT Management (and how prevent it)

  • 1. Copyright © 2016 ITpreneurs. All rights reserved. 10 Ways to Fail with IT Management And how to prevent it with COBIT!
  • 2. Copyright © 2014 ITpreneurs. All rights reserved. * “Governance means providing value to stakeholders”. Assuming governance of IT is only related to risk and compliance
  • 3. Copyright © 2014 ITpreneurs. All rights reserved. * “Often technical people are included, but the business, or senior management is forgotten.” Not appointing the right stakeholders to IT steering committees
  • 4. Copyright © 2014 ITpreneurs. All rights reserved. * ….. Assuming IT is only for the “IT Function”
  • 5. Copyright © 2014 ITpreneurs. All rights reserved. * “Failing to take management responsibility for IT controls and self assessments.” Reacting only to audit findings
  • 6. Copyright © 2014 ITpreneurs. All rights reserved. * Failing to appoint a senior business executive to drive the management of information security “In most cases, decision making is left to technicians, however, business executives are required.”
  • 7. Copyright © 2014 ITpreneurs. All rights reserved. * Defining SLAs in technical delivery terms “...rather than defining it in customer outcome terms.”
  • 8. Copyright © 2014 ITpreneurs. All rights reserved. * “Leads to building and modifying applications and not changing business process.” Defining business changes as “IT Projects” after the IT solution
  • 9. Copyright © 2014 ITpreneurs. All rights reserved. * “No commitment from business, poor definition of requirements and limited business engagement in driving the benefits.” Not appointing a business owner / sponsor to be accountable for IT enabled business changes
  • 10. Copyright © 2014 ITpreneurs. All rights reserved. * Defining requirements as a solution description “...rather than a desired business outcome.”
  • 11. Copyright © 2014 ITpreneurs. All rights reserved. * …”and monitoring only project deliverables. Most common reason for project failure.” Failing to use a business case to monitor desired outcomes and benefits.
  • 12. Copyright © 2015 ITpreneurs. All rights reserved. Fill out the survey (takes less than 5 minutes) and receive the white paper which includes ‘how-to-fix-it’. 12 Let’s go! How to prevent these mistakes?
  • 13. Copyright © 2016 ITpreneurs. All rights reserved. * Top 10 - 1-5 Assuming governance of IT is only related to risk and compliance Not appointing the right stakeholders to IT steering committees Reacting only to audit findings Failing to appoint a senior business executive to drive the management of information security Defining SLAs in technical delivery terms
  • 14. Copyright © 2016 ITpreneurs. All rights reserved. * Top 10 - 6-10 Defining business changes as “IT Projects” Not appointing a business owner / sponsor to be accountable for IT enabled business changes” Defining requirements as a solution description Naming IT Projects after the IT solution Failing to use a business case to monitor desired outcomes and benefits.
  • 15. Copyright © 2016 ITpreneurs. All rights reserved. Corjan Bast Products & Solutions Marketing, ITpreneurs Gary Hardy COBIT Author and IT Governance Expert, IT Winners Stephan Brendel Regional Manager EMEA, APMG-International Content by:
  • 16. Copyright © 2016 ITpreneurs. All rights reserved. Get Started Courses Designed by Gary Hardy, a.k.a. “Mr. COBIT”
  • 17. Copyright © 2016 ITpreneurs. All rights reserved. • Content PLUS: Training materials cover the exam content but also covers the practicality of using COBIT • Quality: Gary’s the author & architect of the Governance courses, including COBIT • Credible: We worked with the early developers of COBIT and developed the first ever COBIT course Deliver Value With ITpreneurs COBIT Courseware
  • 18. Copyright © 2014 ITpreneurs. All rights reserved. Partner with Us for Training Materials +1 800 214 6371 USA +31 10 711 02 60 INT’L email us at info@itpreneurs.com www.itpreneurs.com https://www.facebook.com/ITpreneurs https://twitter.com/ITpreneurs https://www.youtube.com/user/itpreneurs
  • 19. Copyright © 2016 ITpreneurs. All rights reserved. COBIT Stats & Info
  • 20. Copyright © 2016 ITpreneurs. All rights reserved. Present on all continents Wide portfolio of qualifications Examination and Accreditation Body Certified against ISO 17021 ISO 17024 ISO 17065 Strategic Partner of ISACA for accreditation and examinations Strategic Partner of ITPreneurs
  • 21. Copyright © 2016 ITpreneurs. All rights reserved. Topics • What is the market take up? • What does it mean for training organisations and end users?
  • 22. Copyright © 2016 ITpreneurs. All rights reserved. There are separate views on the benefits of COBIT5 • One is the follow up from an auditor’s perspective and this is where most of the initial demand has been generated from • But this is too short of a jump
  • 23. Copyright © 2016 ITpreneurs. All rights reserved. There are separate views on the benefits of COBIT5 • The second one is increasingly coming from a wider management perspective • Here, the Surface still hasn’t been scratched and here are the benefits
  • 24. Copyright © 2016 ITpreneurs. All rights reserved. Not about controls, but a holistic approach to manage frameworks ITIL® PRINCE2® IEC/ISO 20000 PMBok Agile SixSigma
  • 25. Copyright © 2016 ITpreneurs. All rights reserved. Countries where more than 1000 exams have been taken since 2012
  • 26. Copyright © 2016 ITpreneurs. All rights reserved. A recognised framework • USA - referenced in the U.S. Cyber Security Framework and acknowledged by the DoD for Homeland Security Governance
  • 27. Copyright © 2016 ITpreneurs. All rights reserved. A recognised framework • Australia - recognized and recommended by the Australian National Audit Office as a baseline for controls • South Africa - adopted by National Directive required by more than 150 government departments
  • 28. Copyright © 2016 ITpreneurs. All rights reserved. A recognised framework • UAE – used by all government institutions for financial audits • India – Reserve Bank and the Securities and Exchange Board (SEBI) • Brazil - control framework for Banco Central
  • 29. Copyright © 2016 ITpreneurs. All rights reserved. A recognised framework • EU – used by European Court of Audit in the performance of its Audits and IT Governance reviews • Turkey - mandated by Banking Regulation and Supervision Agency (BRSA) and for all Banks in the country
  • 30. Copyright © 2016 ITpreneurs. All rights reserved. will be adopted and will sell • where ITIL is in a mature stage • where regulation gaps need to be filled • where government standards match • where organisational maturity is high • where too many frameworks are causing confusion
  • 31. Copyright © 2016 ITpreneurs. All rights reserved. Being adopted the right way is the answer. • Let’s derive the benefits from one of the most advanced frameworks that exist
  • 32. Copyright © 2016 ITpreneurs. All rights reserved. @apmg_inter Thank You Bedankt Gracias Grazie Danke Merci Tack @ITwinners @ITpreneurs
  • 33. Copyright © 2016 ITpreneurs. All rights reserved. Q&A
  • 34. Copyright © 2016 ITpreneurs. All rights reserved. Use COBIT.. Become a Winner