CGEIT Domain 3: Benefits Realization - Security Boulevard

CGEIT Domain 3: Benefits Realization


Benefits realization falls under the third domain of ISACA’s Certified in the Governance of Enterprise IT (CGEIT) exam and covers 16% of the overall objectives of the exam. This domain helps ensure that IT-enabled investments are managed to provide optimized business benefits. It also ensures that the outcome and performance measures of benefits realization are set up and evaluated, and that progress is reported to the key stakeholders.

What Topics are Covered in This Domain?

There are eight (8) tasks in this domain and CGEIT students must understand how to perform them. Below, we see the detailed description of these eight tasks:

Task Statements:

  1. Ensure that IT-enabled investments are managed as a portfolio of investments
  2. Ensure that IT-enabled investments are managed through their economic life cycle to achieve business benefit
  3. Ensure that business ownership and accountability for IT-enabled investments are established
  4. Ensure that IT investment management practices align with enterprise investment management practices
  5. Ensure that IT-enabled investment portfolios, IT processes, and IT services are evaluated and benchmarked to achieve business benefit
  6. Ensure that outcome and performance measures are established and evaluated to assess progress towards the achievement of enterprise and IT objectives
  7. Ensure that outcome and performance measures are monitored and reported to key stakeholders in a timely manner
  8. Ensure that improvement initiatives are identified, prioritized, initiated and managed based on outcome and performance measures

In addition to these eight task statements, CGEIT candidates must know each of the twelve (12) areas delineated by the knowledge statements below:

Knowledge Statements:

  1. Knowledge of IT investment management processes, including the economic life cycle of investments
  2. Knowledge of basic principles of portfolio management
  3. Knowledge of benefit calculation techniques (for example, earned value, the total cost of ownership, return on investment)
  4. Knowledge of process and service measurement techniques (for example, maturity (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: