Home Tags Posts tagged with "IT Governance & Compliance"
Articles Tagged with: IT Governance & Compliance
The General Data Protection Regulation (GDPR) will come into force on the 25th May 2018. Currently many organizations are considering the actions to take to become compliant before the deadline. To help them, the UK’s Information Commissioner’s Office (ICO) has published 12 steps to take on your road to GDPR compliance. Richard Moore presents them here.
The General Data Protection Regulation (or GDPR) comes into effect on the 25th May 2018! Are you ready? Watch our short video to find out!
Are you ready for GDPR? This brand new GDPR course from Good e-Learning will make sure you are prepared when the time comes!
This blog takes a quick look at COBIT 5 Enablers. The 7 COBIT enablers are all described by a common structure, which helps us both understand and use the enabler in practice. This structure consists of 2 major areas – enabler dimensions and enabler performance management.
A quick introductions to the COBIT 5 enabler: The principles, policies and frameworks. Each enabler, including Principles, policies and frameworks, is broken down into four generic enabler dimensions. Each of these dimensions contain enabler specific information.
A video guide detailing how IT Governance using COBIT 5 can create value in your organization. Creating Value is a governance objective and one that COBIT 5 very clearly describes.
COBIT 5 is based on 5 principles that enable the organisation to build an effective governance and management framework that optimises information and technology investment and use for the benefit of a wide range of organisational stakeholders.
COBIT5 asks the following question - how can businesses apply the same mentality that they do to their normal business activities to IT? In this article we cover the 3 components of COBIT5, and the three main benefits it offers to an organization.
Without the governance and management provided by COBIT 5, organizations face increased risk that all your IT and information assets are poorly managed and proper accountability is compromised.
12Page 2 of 2