You are on page 1of 11

AIS 5131 - MANAGING INFORMATION TECHNOLOGY

Chapter 1: IT Governance and IT Strategy Components of Enterprise Governance


Framework
IT Governance ➔ Corporate Governance (i.e, conformance)
➔ Not an isolated discipline ➔ Business Governance (i.e, performance)
➔ An integral part of a comprehensive enterprise ➔ Accountability & Assurance
governance program ➔ Value Creation & Resource Utilization
➔ Strategic direction, objectives, management of
risks, and use of resources
➔ The setting of objectives, a measure of Enterprise Governance of Information and
performance, benchmark against objectives, to Technology (EGIT)
move forward or change direction
● EGIT: system in which all stakeholders (BOD,
Senior Management, Internal Customers,
IT Governance and IT Strategy Departments) provide input to IT-decision making
● Corporate governance practices: be process
implemented for ethical issues, decision making, ➔ responsibility of the BOD and executive
and overall practices; management;
- used to direct and control the enterprises ➔ “Stewardship” of IT resources on behalf of
● Who is responsible for governance? BOD internal & external stakeholders
● IT governance: consists of leadership and
● Management: implement systems and IT
organizational structures and processes to
controls (oversighted by the BOD)
achieve strategies and objectives
● EGIT’s Purpose: direct IT endeavors to ensure
Corporate Governance 1. alignment of IT with enterprise objectives,
● Involves relationships between the and
management, BOD, shareholders, and 2. achievement of promised benefits
stakeholders ❖ IT must exploit opportunities and maximize
● Provides structure to objective setting, benefits
objective attainment, and monitoring ❖ IT resources must be used responsibly and
performance IT-related risks must be managed properly
● Purpose: help build trust, transparency, and
accountability for fostering long-term
Processes/Practices in Implementing an EGIT
investment, financial stability, and business
integrity Framework
➢ provides feedback on Value Delivery and Risk
Management
Corporate Governance Framework
A) IT Resource Management: maintaining
● Purpose:
inventory IT resources and addresses risk
1) Reduce inaccurate financial reporting
management process
2) Provide greater transparency and
B) Performance Measurement: ensuring IT
accountability
resources perform as expected to deliver value,
● with the use of formal systems
and identification of risks early on
● Government Regulations: - based on performance indicators that are
A. Require a senior management to sign-off optimized to value delivery and from which
internal controls deviations may lead to risks
B. Include an assessment on the internal C) Compliance Management: implementing
controls over financial reports processes that address legal and regulatory
policies and contractual compliance Good Practices for EGIT
requirements ● Purpose of an IT Governance System: satisfy
stakeholder needs and generate value
Governance vs. Management ● Value: balance of benefits, risk and resources
★ ISACA: Information Systems Audit and Control
Association Factors which made EGIT significant:
- An international professional association focus a) Demand of business managers and BOD for
on IT Governance better return from IT investments
➢ Example: IT to deliver business needs and
★ COSO: Committee of Sponsoring Organizations
stakeholder value
- for manual controls
b) Increasing level of IT expenditure
★ COBIT: Control Objectives for Information and
c) Need to meet regulatory requirements for IT
Related Technology
controls in areas such as in privacy and financial
- COBIT is framework made by ISACA, which
reporting, and in a specific sector
makes a clear distinction between
➢ Examples:
governance and management, as follows:
● GDPR
● Governance: ensures stakeholder needs,
● Basel Accords (Basel I, II, III)
conditions and options/opinions are
- Ensures that financial institutions
evaluated
have enough capital on account to
- prioritization and decision making
absorb unexpected losses
- monitoring of performance and
compliance d) Selection of service providers and management
● Management: plans, builds, runs and of service outsourcing and acquisition
monitors activities to achieve objectives ➢ Example: Use of cloud computing
- in alignment with the direction set by the e) IT Governance initiatives: adoption of control
governance body to achieve the frameworks and good practices to help monitor
enterprise objectives and improve critical IT activities
- to increase business value and reduce risks
Effective Enterprise Governance
f) Need to optimize costs
● Individual and group expertise
- by following standardized rather than
● Before: IT is enabler;
specifically developed approaches
➔ Now: IT is integral part
g) Acceptance of well-regarded frameworks
● Alignment of IT and Enterprise Objectives: a
h) Need to assess performance against generally
critical success factor
accepted standards
- cannot simply be seen as either IT
➢ Example: benchmarking
management or IT specialist operations;
● IT needs guidance and supervision from the ● Integration with governance: Evaluate, direct
senior management and oversight from BOD and monitor processes
● Key element: alignment of business and IT to ● Evaluation, direction, and monitoring of:
achieve business value, which concerns 2 issues: 1. Conformance and performance
1. IT delivers value to the business (strategic 2. The system of internal controls
alignment) 3. Compliance with external requirement (such
2. IT risk is managed (driven by embedding as compliance with regulatory agencies)
accountability)
Audit’s Role in EGIT 3. Achievement of performance objectives (e.g.,
efficiency and effectiveness)
● Establishment of internal controls: ensures ● In accordance with the defined role of the IS
good practices auditor, the following aspects related to EGIT
● Good practices: guide to use resources need to be assessed:
● Measurement and reporting of results: provide 4. Legal, environmental, information quality,
input to the cyclical revision and maintenance of fiduciary, security and privacy requirements
controls 5. Control environment
➔ IT is also governed by good practices which 6. Inherent risk within the IS environment
ensure that IT supports the business 7. IT investment/expenditure
objectives, delivers value, uses resources
responsibly, manages risk appropriately and
measures performance Information Security Governance
● Audit: has very important role
● Strategic Direction: defined by business goals
➔ Audit provides recommendations to senior
and objectives
management to help improve the IT
- long-term & covers whole of the company
governance initiatives
● Information Security: support business activities
➔ Audit helps ensure compliance
to be of value
● Monitoring, analysis and evaluation of - It is a subset of corporate governance
metrics: require an independent and balanced - Provides strategic direction for security
view for qualitative assessment and qualitative activities
improvement - Ensures achievement of objectives;
- Ensures information security risk is
● Auditing at the highest level of the enterprise;
appropriately managed and enterprise
crossing divisional, functional or departmental
information resources are used responsibly
boundaries

● The IS auditor should confirm that the terms According to the US National Institute of Standards
of references state the: and Technology (NIST) Special Publication 800-100,
a) Scope of work - with clear definition of Information Security Handbook: A Guide for
functions and issues to be covered Managers:
b) Reporting line to be used - where EGIT ➢ Information security governance can be
issues are identified & reported to the highest defined as the process of establishing and
level of the organization maintaining a framework and supporting
c) IS auditor’s right to access information – management structure and process to provide
both within the organization and from assurance that information security strategies
third-party service providers are aligned with and support business
● Organizational status and skill set of the IS objectives, are consistent with applicable
auditor: should be considered for laws, and regulations through adherence to
appropriateness; if found insufficient, consider policies and internal controls, and provide
third party to perform audit assignment of responsibility, all in an effort to
manage risks
● Aspects related to EGIT that need to be
assessed:
Information Security Governance Framework
1. Alignment of enterprise governance and EGIT
● Thru establishment and maintenance of a
2. Alignment of IT function with the enterprise’s
framework
mission, vision, values, objectives and
strategies
● Framework: ● Negligence of Information Security: diminish
➔ Guide for development and accomplishment capacity to mitigate risks and take advantage of
of comprehensive information security opportunities
program
● BOD and CEOs: accountable and responsible
➔ Basis for cost-effective information security
● CEO: (in charge of implementation)
program
- Accountable to the BOD for information
● Information Security Program: provides
security governance
assurance that information assets are protection
- Responsible for its discharge through the
commensurate with their value or the risk poses
executive management and the organization
to the organization
and resources under his/her charge
● Senior Management: should come from varied
Elements of an Information Security Governance
operations and staff functions; to ensure fair
Framework
representation
a. Security strategy – intrinsically linked/in line with
● Purpose: minimize leaning toward a specific
business objectives & goals
business priority or technology overhead or
b. Security policies – addresses each aspect of the
security concerns
strategy & controls
c. Set of standards for each policy – the ● The board-level committee approving security
“should-be” policies may include:
d. Security organizational structure - Directors
- Having internal controls, specifically the - CEO
physical control: Segregation of Duties - Chief Operating Officer (COO)
e. Monitoring processes – must be - Chief Financial Officer (CFO)
firm-wide/enterprise-wide - Chief Risk Officer (CRO)
- Chief Information Officer (CIO)
Effective Information Security Governance - Chief Technology Officer (CTO)
- Head of Human Resources (HR)
● Information Security Governance: one of the
- Chief of Audit
highest levels of focused activity; its specific
- Chief Compliance Officer (CCO)
drivers are-
- Legal
➢ Confidentiality, integrity, and availability
★ Policy approval = CONSENSUS
(CIA) of information
➢ Continuity of services ● Information as a key resource
➢ Protection of information assets ● Technology: importance from the time
● Security has become a significant governance information is created until destroyed
issue as a result of: ● IT: pervasive; in enterprises and in social, public,
➔ global networking: communicating worldwide and business environments
➔ rapid technological innovation and change: - Involves GENERAL COMPUTER CONTROLS
heightened automation which affects & covers all systems involved
➔ increased dependence on IT (e.g., controls in developing a system)
➔ increased sophistication of threat agents and ➢ Because IT has become pervasive, enterprises
exploits - the more we get tech savvy, the now strive to:
more threats we receive a) Maintain high-quality information
➔ an extension of the enterprise beyond its b) Generate business value from IT-enabled
traditional boundaries investments
c) Achieve operational excellence (faster and
efficient transactions)
d) Maintain IT-related risks at an acceptable b) Resource Management
level ● Efficient and effective use of information
e) Optimize the cost of IT services and security knowledge and infrastructure
technology ● To be considered:
f) Comply with the relevant laws, regulation, 1. Ensure knowledge is captured and
contractual agreements, and policies available
2. Document security processes and
● Protection efforts: currently focused on the
practices
information system rather than the information
3. Develop security architecture(s)
itself
● Above approach: narrow, to accomplish needed c) Process Integration
security ● Focus: integration of management
assurance processes for security
● Information security: broader view; data, as well
● Security activities: fragmented and
as the information and knowledge based on
segmented in silos with different reporting
them, must be protected
structures
● Applicable situations: data are shared easily
● Process integration: improve overall
over the Internet
security and operational efficiencies
- Data are shared easily over the internet
through blogs, newsfeeds, peer-to-peer or
social networks, or websites
Information Systems Strategy
● Protection efforts: both on the process and
information resulting from the process ● Information Systems: crucial for enterprise
● Before: minimal involvement of governing
● Major trends globally: outsourcing and cloud
boards and senior management executives on IS
computing
strategy; decisions left to functional management
● Information security coverage: extend beyond ➔ Now: above approach no longer acceptable
geographic boundary of the enterprise’s due to dependency on IS for operations and
premises growth
● Basic outcomes of effective information ● Internal and external threats: IS resource
security governance include: abuse, cybercrime, fraud, and errors & omissions
➔ Strategic alignment ● IS Strategic processes: integral components
➔ Risk Management - provide assurance that goals and objectives
➔ Compliance will be attained for competitive advantage
➔ Value delivery

Basic outcomes are enabled through the Strategic Planning


development of:
a) Performance Measurement ● Strategic planning: long-term direction on IT to
● Measurement, monitoring, and reporting; improve business processes
ensure that SMART objectives are achieved ● Factors to consider in strategic planning
● To be accomplished: include:
1. Set of metrics aligned with strategic ➢ Identifying IT solutions to address problems
objectives and opportunities
2. Measurement process to identify ➢ Developing action plans
shortcomings and provide feedback ● Enterprises should ensure plans are aligned and
3. Independent assurance consistent with the goals and objectives
● IT department management, IT steering Additional Notes:
committee, Strategy committee: play a key role
in the development and implementation of the Sarbanes Oxley Acts (SOX)
plans ● Section 302 – The CFO & CEO signs off
● Section 404 – requires businesses to have an
● Effective IS strategic planning involves a annual audit of the internal controls performed
consideration of: by an outside firm
- Enterprise’s requirement for information ● Section 406 – Code of ethics of senior financial
systems officers
- IT’s capacity to deliver new functionality

● Determining requirements for information


systems involves:
- Consideration of the strategic intentions
- How these intentions translate into
objectives and initiatives
- IT capabilities to support objectives and
initiatives
- can the current resources and the IT
support & carry over specific tasks?

● Existing system’s portfolio: be reviewed in


terms of functional fit, cost and risk

● Assessing IT’s capacity to deliver: involves


review of the technical IT infrastructure and key
support process to determine whether expansion
or improvement is necessary

● Strategic planning process:


➔ Encompass the delivery of new systems
and technology
➔ Consider return of investment (ROI) on
existing IT and the decommissioning of
legacy systems (old systems previously
used)
● Strategic IT plan: balance cost of maintaining
existing systems against cost of new systems

IS Auditors
1. Should pay attention to the importance of IS
Strategic planning
2. Must put importance to strategic planning
process or planning frameworks
3. Should consider how the CIO or senior IT
management is involved in the creation of the
overall business strategy
SHORT ASSESSMENT:

1. This starts with setting of objectives, then proceeds to measure performance, benchmark against
objectives and move forward or change direction, as appropriate.
a) Strategic Planning
b) Business Intelligence
c) IT Governance
d) Information Systems Strategy

2. Essential to Information Security Governance, the term CIA refers to:


a) Cohesive, Integrity, Availability
b) Completeness, Integrity, Accountability
c) Comprehensiveness, Identity, Availability
d) Confidentiality, Integrity, Availability

3. It is emphasized that its importance is from the time information is created until destroyed.
a) Technology
b) Policies
c) Regulations
d) Technology

4. Who is mainly responsible for governance?


a) Senior Management
b) Board of Directors
c) External Stakeholders
d) None of the above

5. According to US National Institute of Standards and Technology (NIST) Special Publication


800-100, Information Security Handbook: A Guide for Managers, Information Security Governance
can be defined as:
a) The process of establishing and maintaining a framework and supporting management
structure and processes
b) Provides operational and technical support & support for information and security activities
c) Provide assurance that information security strategies are aligned with and support
business objectives, are non-compliant with applicable laws and regulations
d) Provides guidance that the enterprise information resources are managed responsibly.
6. Security has become a significant governance issue as result of:
a) Global Networking
b) Increased independence on IT
c) Decreased sophistication of threat agents and exploits
d) Slow technological innovation and change

7. Which statement regarding Enterprise Governance of Information and Technology is most correct?
a) IT resources must be used responsibly and IT-related risks must be removed completely
b) IT must exploit opportunities and maximize benefits
c) The implementation of systems and IT controls are oversighted by the Management
d) The purpose of EGIT is to direct IT endeavors to ensure alignment of IT with enterprise
objectives, but not to achieve promised benefits

8. One of the elements of an Information Security Governance Framework is:


a) Security Planning
b) Security Strategy
c) Monitoring Structure
d) Organizational processes

9. A recommended practice in Data Governance is to establish a business/IT advisory team that:


a) Establishes cross organizational benefit measures
b) Allows similar functional perspectives to be represented
c) Recommends non-investment priorities
d) None of the above

10. Which of the following statements regarding Enterprise Governance of Information and Technology
is most correct?
a) It involves an exclusive relationship between the BOD and management only
b) Help build trust, transparency, and accountability for fostering short-term investment,
financial stability, and business integrity
c) Provides structure to objective setting, objective attainment, and monitoring performance
d) It involves an exclusive relationship between the management and stakeholders only
11. Basic outcomes of effective information security governance are enabled through the development
of:
a) Performance Measurement
b) Resource Management
c) Process Integration
d) All of the above

12. They play a key role in the development and implementation of the plans in strategic planning.
a) IT department manager, IT development committee, Technical committee
b) IT department management, IT steering committee, Strategy committee
c) IT database management, IT development committee, Strategy committee
d) IT department management, IT steering committee, Technical committee

13. Which of the following is a factor which made EGIT significant?


a) Need to increase cost
b) Demand of business managers to assess performance against competitors
c) Increasing level of IT expenditure
d) Selection of regulatory requirements for IT controls

14. With regards to strategic planning, IS Auditors should;


a) Should consider how the CEO or IT management is involved in the creation of the overall
business strategy
b) Must put importance to strategic planning process but not planning actual frameworks
c) Should pay attention to the importance of IS Strategic planning
d) Disregard the cost of maintaining existing systems against cost of new systems

15. The IS auditor should confirm that the terms of references state the;
a) Scope of data
b) Reporting line to be used
c) CIO’s right to access information
d) None of the above
16. A process/practice in implementing an EGIT framework which ensures that IT resources perform as
expected to deliver value, and identification of risks early on
a) Performance Measurement
b) IT Resource Management
c) Compliance Management
d) Systems Measurement

17. Which of the following statements regarding the Senior Management is correct?
a) They are most accountable and responsible
b) Responsible for its discharge through the executive management and the organization and
resources under his/her charge
c) Should come from varied operations and staff functions to ensure fair representation
d) Accountable to the BOD for information security governance

18. A very important role as it provides recommendations to senior management to help improve the IT
governance initiatives.
a) Security
b) Audit
c) Privacy
d) Accounting

19. A set of regulations that ensures that financial institutions have enough capital on account to
absorb unexpected losses
a) Sarbanes-Oxley Act (SOX)
b) General Data Protection Regulation (GDPR)
c) Control Objectives for Information and Related Technologies (COBIT)
d) Basel Accords (Basel I, II, III)

20. Which of the following statements pertaining to effective enterprise governance is correct?
a) Only for group expertise
b) Now, IT is an enabler
c) Before, IT is an integral part
d) None of the above
ANSWER KEY:

1. C 6. A 11. D 16. A

2. D 7. B 12. B 17. C

3. D 8. B 13. C 18. B

4. B 9. A 14. C 19. D

5. A 10. C 15. B 20. D

References:
ISACA. (2019). CISA review manual (27th ed.).
Open information security management maturity model (O-ISM3). (2011, February). ComputerWeekly.com.
https://www.computerweekly.com/ehandbook/Open-Information-Security-Management-Maturity-Model-O-ISM3

You might also like