using cobit 5 framework for cybersecurity assessment
play

Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, - PowerPoint PPT Presentation

Conference 2018 Conference 2018 Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay Speakers Trevor Hurst, Chief Information Officer Ministry of Advanced Education, Skills & Training Hugh


  1. Conference 2018 Conference 2018 Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay

  2. Speakers Trevor Hurst, Chief Information Officer Ministry of Advanced Education, Skills & Training Hugh Burley, Manager of Information Security/Information Security Officer Thompson Rivers University/BCNET Ivor MacKay, Manager, Information Technology BCNET Conference 2018

  3. Agenda 1. COBIT 5 Refresher 2. Why COBIT 5 3. Assessments 4. Q & A Conference 2018

  4. COBIT 5 Refresher Conference 2018

  5. COBIT PRINCIPLES Conference 2018

  6. Meeting Stakeholder Needs Conference 2018

  7. COBIT 5 ENABLERS Conference 2018

  8. GOVERNANCE VS MANAGEMENT Conference 2018

  9. Conference 2018

  10. Why COBIT 5? Conference 2018

  11. Alignment “How do I ensure all of our Digital investments contribute to Stakeholder Value and enable the strategy of my Institution? Tell a better Audit preparation story (funding) (Risk Management) “How do I ensure benefits are “How do I better realized and IT risks are communicate the gaps in our mitigated? How can I prepare environment and achieve for upcoming Audit and/or better funding? review activity? Conference 2018

  12. OAGBC General Computing Controls Report http://www.bcauditor.com/sites/default/files/publications/reports/OAGBC %20General%20Computing%20Controls%20Report_FINAL.pdf Conference 2018

  13. COBIT Maturity Conference 2018

  14. COBIT Maturity Conference 2018

  15. Assessments Conference 2018

  16. Assessment vs Audit Or is it really Gap Analysis vs. Internal Audit vs. Pre-Assessment Conference 2018

  17. Differences Between the COBIT 4.1 and the COBIT 5 Conference 2018

  18. APO12 Manage Risk APO13 Manage Security BAI06 Manage Changes DSS02 Manage Service Requests and Incidents

  19. Assessment Methodology Conference 2018

  20. KEY AREA: RISK a) Level of risk acceptance b) Risk review c) Risk approval KEY AREA: MANAGING SECURITY Conference 2018

  21. Risk Assessment Consequence Table Conference 2018

  22. KEY AREA: MANAGING CHANGE a) Methods of assessing change and its risks b) Approval process KEY AREA: MANAGE SERVICE REQUESTS AND INCIDENTS a) Problem tracking b) Evidence of reviewing Incidents and Requests Conference 2018

  23. Self-Assessment Conference 2018

  24. Self-Assessment http://www.isaca.org/COBIT/Pages/Self-Assessment-Guide.aspx Conference 2018

  25. Self-Assessment http://www.isaca.org/COBIT/Pages/COBIT-5-PAM.aspx Conference 2018

  26. Info~Tech Conference 2018

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend