SBN

Guide to COBIT 2019

Introduction

The Information Systems Audit and Control Association (ISACA) has recently introduced the first update for its COBIT 5 framework. The updated version, COBIT 2019, will allow organizations to develop, implement and organize governance strategies that are more collaborative, flexible and address new and evolving technology.

Many companies, however, aren’t familiar with COBIT or the advantages it can provide to their business. Why should organizations care what this framework can do for them? The answer is that it offers an end-to-end view of the governance of corporate IT, reflecting the central role of technology and information for businesses of all sizes.

In this article, we’ll talk about COBIT 2019 in detail. By the time you finish reading this article, you’ll be able to give comprehensive answers to questions such as:

  • What is COBIT?
  • What is COBIT 2019?
  • What are the key components of COBIT 2019?
  • What are some differences between COBIT 2019 and COBIT 5?

Let’s get started.

What is COBIT?

COBIT is the acronym for Control Objectives for Information and Related Technology. ISACA developed this framework for IT management and governance. It was built to be a supportive tool for stakeholders and helps in bridging the vital gap between business risks, technical problems and control requirements. Today, COBIT is used by IT process managers in a variety of industries to ensure control, reliability and quality of information systems in their enterprise.

Part of its success comes from the fact that it has been frequently updated to meet the ever-evolving needs of enterprise IT governance. For example, after the initial introduction of COBIT in 1996, ISACA introduced a second version to expand the framework outside the initial auditing community. In the 2000s, COBIT 3 brought in the IT information governance and management strategies you see in the framework today.

A (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dan Virgillito. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/KJGqKnC4Y2s/