-
Introduction to IT Governance
- IT and business alignment
- Security and privacy
- Measure of IT investments and gains
-
New applications
- Customer portals
- Employee portals
- E business strategies
- Web services
- ...
- Focus on information technology systems
-
IT governance needs to be aligned with corporate governance
- Implement IT governance with Business stake holders included
-
Performance metrics
- Developement metrics
- service metrics
-
Why IT governance is not successful
- Senior management is not engaging IT
- Poor strategic alignment
- Lack of project ownership
- Poor risk management
- Ineffective resource managment
-
Conclusion
- IT is an integral part of organization programme delivery
- IT governance is an integral part of corporate governance
- IT governance ensures that IT goals are met and IT risks are mitigated
- IT governance strategies are aligned with business strategies
-
Information security standards
-
ISO - 27000
-
27001 (ISMS)
-
Plan, Do, Check, Act
- Plan- Establish the ISMS
- Do - Implement and Operate controls & measure
- Check - Monitor, Audit, Review
- Act - Maintain & improve ISMS
- ISMS - Information Security Management System
-
27002(Controles)
- Deterrent
- Preventive
- Detective
- Corrective
- Recovery
- Compensating
-
27003 (implementation guidance)
- Management approval
- Defining scope
- Objective
- Scope
- Processes
- Assets
- Risk assessment
-
27004 (measurements and metrics)
- Key performance indicators
- Chosing what to measure
- Collecting data
-
27005 (risk management)
- Risk analysis
- Risk identification
- Risk estimation
- Risk evaluation
- Risk reduction
- Risk retention
- Risk avoidance
- Risk transfer
- Risk acceptance
- Risk communication
-
CIA
- Confidentiality
- Integrity
- Availability
-
FACTS
- Information security is not IT security
-
Information assets
- Electronic information
- Non-electronic information
- Infrastructure
- Hadrware
- Software
- People
- Services
-
Information technology service management
-
ISO 20000-1
- Specification for Service management
- Requirements for service provider to deliver managed services
-
ISO 20000-2
- Code of practice for Service management
- Industry consensus on quality standards for IT service management process
- Plan, Do, Check, Act
-
Conclusion
- ISO 20000 effective and efficient implementation of an integrated service management program
-
ITIL (Information Technology Infrastructure library)
-
ITIL service strategy
-
Financial management
- show value. Responsible for accounting for the costs and returns on IT Service Investments (IT Portfolio management), and for any aspects of recovering costs from the customer (charging)
-
ITIL service design
-
Service Level management
- negotiate and review SLA’s and ensure internal and external support contracts are adequate with the customer
-
Availability management
- Determine availability requirements from business. Monitor availability and reliability
-
Capacity management
- Ensuring that there is adequate IT Capacity to meet required levels of Service
-
IT Service continuity management
- recovery options must be understood, choose appropriate solution, Identify roles and responsibilities, get endorsement from upper mgt, align plans with BCM and review regularly
-
ITIL service transition
-
Change management
- Ensures changes are assessed, developed, tested, implemented and reviewed
-
Configuration management
- provide a logical model of the infrastructure or a service by identifying, controlling, maintaining and verifying the versions of Configuration Items (CI) in existence
-
Release management
- Plan and Oversee rollout of Hardware and Software
-
ITIL service operation
-
Incident management
- to make sure every incident logged, resolve as soon as possible
-
Problem management
- Identify Problems, investigate problems, Develop/maintain problem control process, monitor progress, review efficiency/effectiveness of process, identify trends, prevent replication of problems to multiple systems
- ITIL continual service improvement
-
Business Continuity Management (BCM)
- BS 25999-1 - Code of practice
- BS 25999-2 - Specification
-
BCM process model
-
Project initiation
- Problem definition
- Policy statement
- Project sponsor
-
Functional requirements
- Understanding business needs
- Business impact analysis
- Risk assessment
-
Design & develop
- Definition
- Consideration
- Plan elements
- Plan framework structure
-
implementation
- emergency responses
- Delegation/designation of authority
- Command, control & management operations center
- Vendor contracts
- escalation, notification plan activities
- Training & awareness program
- Scenario to execute plan
-
Testing & executing
- Definition
- Why testing is important
- Types of tests
- Establishing testing plan
-
maintain & update
- BCM process requires interaction with wide range of managers and operations people
- Identify & include changes to organization's processes
- Date of last & next review date
- BCM life cycle
- ISO 270001 chapter 14 is BCM
-
Risk management
- Scope
- Assumptions
-
Risk types
- Business risk
- Organizational risk
- IT risk
-
Risk assessment approach
- Identify risk
- Analyze risk
- Manage risk
-
Disaster recovery
-
Post-disaster phases
- Immediate response
- Near-term resumption
- Recovery toward normalization
- Restoration to pre-disaster state
-
Disaster recovery plan (DRP)
-
Define the process
- Actions before, during and after disaster
- Identify what supports process and its tolerance to interruptions
- Determine and implement strategies that would reduce the likelihood and co-sequences of interruptions
- Disaster recovery team
- Priorities to restore critical applications
- Host site and Cold site
-
COBIT
- Focus on information integrity, security and availability
- Control model
-
Internal control process
- Criteria
- Test & Evaluate process and controls
- Recommend changes if needed
- Observe the process and controls
- Document the process and controls
-
Control responsibilities
- Management
- Users
- Audit
-
Project implementation
-
ISO 10006
- Quality management systems - Guidelines for quality management in projects
-
ISO 27003
- Information technology - Security techniques - Information security management system implementation guidance
-
Project workflow
- Getting approval for initiating an ISMS
- Defining ISMS scope
- Conducting business analyse
- Conducting risk assessment
- Designing the ISMS
- Implementing ISMS