+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Integrating COBIT with COSO and Other Frameworks - Webinar

  • ID: 3747032
  • Webinar
  • May 2017
  • Region: Global
  • 60 Minutes
  • Online Compliance Panel
1 of 4
This webinar addresses the incorporation of Control Objectives for Information and related Technology (COBIT) with other accepted frameworks to ensure aligned information technology and business processes with the organization's adopted frameworks. This presentation also addresses how manager-leaders can affect enterprise governance of IT practices through concepts addressing accountability, roles, interactions, activities and resource use.

The presenter describes significant directions and core principles of selected frameworks. The presenter links these guidelines and principles to relevant practices. The principles outlined in this session reflect five ISACA defined overarching themes: (1) meeting stakeholder needs (2) covering the enterprise end-to-end (3) applying a single, integrated framework (4) enabling a holistic approach and (5) separating governance from management.

Objectives of the Presentation:

- Establishing processes for sustainable risk management
- Critical IT risk assessment success factors
- Evaluating IT Risk Counter measures
- Identifying risks in controls
- Ensuring governance alignment
- Deploying an integrated governance strategy

Why Should you Attend?

As a framework, enterprise governance of IT enables a 'system of controls' assisting in assuring organizational goals and objectives realization. 'Integrating COBIT with COSO and other frameworks' highlights IT governance alignment considerations for information and related technology. Didactically, this webinar covers five focus areas for merging COBIT with the entity's adopted frameworks to enable effective and efficient design and operation of an organizational system of controls. Regarding managerial design content, this webinar will convey the necessary ingredients for establishing appropriate governance, risk management and compliance. Furthermore, in this webinar, we will discuss operational control system deployments using COBIT and COSO domains as the foundational frameworks for ensuring entity-wide adaptability.

At the end of this session, the speaker will handle your specific questions and address any challenges you have/had in setting Integrating COBIT with other frameworks.

Areas Covered:

- Total governance integration and alignment requirements
- Extracting convergence points when integrating frameworks
- Architectural conceptualization to achieve framework integration
- COBIT program considerations for sustaining congruence with other frameworks
- COBIT system factors for supporting cohesiveness with other frameworks
- COBIT process considerations that enable linkages with other frameworks
- Managerial activities for maintaining consistency with other frameworks

Topic Background

An entity's control environment (CE) can provide discipline and structure to processes that ensure meeting operational, financial and compliance requirements. As an integrated component, technology has and will continue to influence the CE as well as assume activity change agent responsibility. Nevertheless, technological development and deployment inextricably connect to the economic, social, political and informational factors that prevail in the entity's CE.

Managements' interest in, and awareness of, IT capabilities (including those performed for the entity by Third Party Providers (TPPs)) is important in establishing an entity-wide consciousness of control issues. To determine relevant IT control issues, an entity's CE typically requires management define control emphasis through 'assessments of importance' between IT domain criteria and entity objectives.

Derivatively, an entity's CE affects the IT organizational structure. Centralized structures often have a single computer processing strategy and use a unique set of systems and infrastructure software, enabling tighter management control over the IT architecture. Alternatively, in decentralized structures, each profit or cost center has a particular computer processing strategy, application programs, and infrastructure software, which may result in differences in policies and procedures and various levels of compliance at each location. Regardless, IT policies and procedures should demonstrate alignment with the entity's mission.
Note: Product cover images may vary from those shown
2 of 4
By attending, you will learn:

- Requirements for total governance integration and alignment
- Extracting convergence points when integrating frameworks
- Architectural conceptualization to achieve framework integration
- COBIT and COSO program, system, process, and activity considerations that sustain cohesiveness with other frameworks
Note: Product cover images may vary from those shown
3 of 4


4 of 4
  • Robert E. Davis Robert E. Davis,
    Professor ,
    Temple and West Chester University

    Robert E. Davis obtained a Bachelor of Business Administration degree in Accounting and Business Law and a Master of Business Administration degree in Management Information Systems from Temple and West Chester University; respectively. In addition, during his twenty years of involvement in education, Robert acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Robert also obtained the Certified Information Systems Auditor (CISA) certificate - after passing the 1988 Information Systems Audit and Control Association's rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.

    Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations as well as other organizations; in staff through management positions. Prior to engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material.

    Robert has authored articles addressing IT issues for The Institute of Internal Auditors, IT Governance LTD and ISACA as well as peer reviewed Carnegie Mellon University's technical report "Comparing eSCM-SP v2 and COBIT" and five chapters of Bloomsbury's "Effective Auditing for Corporates". Robert is a member of the American Association of University Professors, ISACA, and The Institute for Internal Controls. Robert is a Fox Management Information Systems professor of IT auditing and cyber-security at Temple University. He is also a college computer science and mathematics instructor, having previously taught at Cheyney University and Bryant & Stratton College.

    In regards to training individuals in the information systems audit process; he has provided instruction to the Data Processing Management Association, ISACA-Philadelphia Chapter CISA Review Course participants, 3rd Annual Securasia Congress delegates and an Internet CISA study group. Based on his accomplishments, Robert has been featured in Temple University's Fox School of Business and Management Alumni Newsletter as well as The Institute for Internal Controls e-newsletter. Furthermore, he is listed as: the Temple University (First and Inaugural) CISA-in-Residence, a Temple University Master of Science in IT Auditing and Cyber-Security Advisory Councilmen, an IT Governance LTD expert panel member, a leading expert and specialist by The Compliance Authority as well as an International Association of IT Governance Standards honorary member.

Note: Product cover images may vary from those shown
5 of 4
  • Audit Committee Members
  • Risk Management Executives
  • Chief Audit Executives
  • External Audit Partners
  • Chief Executive Officers
  • Chief Financial Officers
  • Chief Information Officers
  • Compliance Executives
  • Chief Information Security Officers
Note: Product cover images may vary from those shown