• Home
  • About
  • Contact Me

IT Managers Inbox

Resources for IT Managers

  • All Topics
    • Productivity Tips
    • IT Security
    • IT Operations
    • Help Desk
    • Management
    • Leadership
    • Project Management
    • IT Service Management
    • Career and Training
    • Featured Posts
  • Management
  • Leadership
  • Project Management
  • IT Service Management
  • Career and Training

ISACA Releases the Risk IT Framework Draft

By Sam Grier

The Risk IT Framework ISACA, the Information Systems Audit and Control Association has just released an exposure draft of of their initiative “Enterprise Risk: Identify, Govern and Manage IT Risk, The Risk IT Framework”.

Covering 94 pages the document frames IT risk as a business risk and goes into extensive detail on a framework for dealing with it. Packed full of charts, tables and control framework. Though not a final document it offers a great deal of insight into what the final document will look like.

The intended audience for the Risk IT Framework is vast. Boards and executive management, corporate risk managers, operational risk managers, IT management, IT service managers, business continuity managers, IT security managers, chief financial officers, enterprise governance officers, business managers, IT auditors, regulators, external auditors, insurers and rating agencies.

They categorize IT risk in three ways.

  • IT Service Delivery Risk – associated with the performance and availability of IT services, and which can bring destruction or reduction of value to the enterprise.
  • IT Solution Delivery/Benefit Realization Risk – associated with the contributions of IT to new or improved business solutions, usually in the form of projects and programs.
  • IT Benefit Realization Risk – associated with (missed) opportunities to use technology to improve efficiency of effectiveness of business processes, or to use technology as an enabler for new business initiatives.

The document goes into great detail explaining what risk is. How to raise awareness and open communications. How to manage risk and the impact it can have on the business. Most of the document outlines the Risk IT Framework.

This IT enterprise risk management framework was designed to allow business managers to identify and assess IT-related business risks and manage them effectively. It provides the missing link between enterprise risk management (ERM) and IT risk management and control, fitting in the overall IT governance framework of ITGI, and building upon all existing risk related components within the current frameworks, i.e., COBIT and Val IT.

To download “Enterprise Risk: Identify, Govern and Manage IT Risk, The Risk IT Framework” in PDF format visit the ISACA web site download section and for more material available for download. Some material does require membership to access.

About ISACA

ISACA has over 86,000 members worldwide for information governance, control, security and audit professionals and is affiliated with the IT Governance Institute.

It provides three certifications.

  • The Certified Information Systems Auditor (CISA) is ISACA’s cornerstone certification. The CISA certification has been earned by more than 60,000 professionals since inception and is for the IS audit, control, assurance and/or security professionals who wish to set themselves apart from their peers. Since 1978, the CISA certification has been renowned as the globally recognized achievement for those who control, monitor and assess an organization’s information technology and business systems.
  • The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003. Unlike other security certifications, CISM is for the individual who manages, designs, oversees and assesses an enterprise’s information security program. CISM defines the core competencies and international performance standards that those who have information security management responsibilities must master.
  • The IT Governance certification (CGEIT) is intended to recognize a wide range of professionals for their knowledge and application of IT governance principles and practices. Many CGEIT certificates have been awarded. It is designed for professionals who have management, advisory, or assurance responsibilities as defined by a “job practice” consisting of IT governance related tasks and knowledge. Earning this designation will enable professionals to respond to the growing business demand for a comprehensive IT governance program that defines responsibility and accountability across the entire enterprise.

For more information visit the ISACA web site.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email
  • More
  • Pinterest
  • Tumblr
  • Print
  • Reddit
  • Pocket
  • Instapaper

Related That May Interest You

Filed Under: IT Security Tagged With: Best Practices, IT Security

Popular Articles

  • 13 Sites to Download Free eBooks
  • 10 Certifications to Improve Your IT Career
  • How To Deal With Low Morale in The Workplace
  • 5 Ways to Stay Positive in Negative Situations
  • How Passion For Your Job Can Lead To Success
  • How To Work Under Pressure
  • How To Write IT Technical Documentation
  • How To Convert An Email Into An Outlook Task
  • How to Plan a 5S System Launch
  • A 5S Office System - Part 1 Planning
  • Leadership Skills – The Top 5 Skills Needed For IT Leadership Roles
  • 5S System Step 1 - The Sort Step

Latest Tweets

  • Agile project management: A comprehensive guide | CIO https://t.co/lNOtb5MYKB March 2, 2018 5:05 pm
  • The Skills Companies Need Most in 2018 – And The Courses to Get Them - LinkedIn https://t.co/l8fWcK2BvD January 28, 2018 4:45 pm
  • What You Need to Know About Interviewing in 2018 | Official LinkedIn Blog https://t.co/m1zGkCLgpo January 28, 2018 2:05 pm
  • 50 best small companies to work for of 2017, according to employees - Business Insider https://t.co/DeDU2AAb9t December 4, 2017 5:01 pm
  • 2017’s Best & Worst Places to Start a Career #Career https://t.co/9VLvFI5JIu October 21, 2017 7:15 pm
  • Which Is More Important: Faster RAM or More RAM? https://t.co/hPzgQlw1yd September 9, 2017 1:05 pm
  • Leadership training: 10 online resources for developing leadership skills | CIO https://t.co/NeGCSlTyx8 September 5, 2017 3:55 pm
  • If your Wi-Fi router is on this list it might be vulnerable to hacking tools. https://t.co/DCGjoqTXmD June 17, 2017 3:50 pm
  • OneDrive Files On-Demand now available for Windows Insiders https://t.co/l1wNO24Xsp June 17, 2017 12:45 pm
  • Win7 Monthly Rollup KB 4022719 triggers printing problems in Internet Explorer @ AskWoody https://t.co/DdB74SBCmL June 16, 2017 1:00 pm
  • Follow ITManagersInbox On Twitter
IT Managers Inbox Runs On The Magazine Theme

© Copyright 2008-2018 IT Managers Inbox · All Rights Reserved

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.