Understanding COBIT 2019

Verified

Added on  2023/04/11

|21
|6908
|378
AI Summary
This document provides an overview of COBIT 2019 and its application in the case study of Vermont Teddy Bear. It discusses stakeholder requirements, assessment models, process improvement, IT strategy development, and business alignment. The document also includes a discussion on justifications and the importance of understanding enterprise goals.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Understanding COBIT 2019
(Case study of Vermont Teddy Bear)
Your name
Student #
Course code
Campus
Workshop Day and Time
Lecturer name and title
Your Griffith e-mail
Executive Summary
In the study, the stakeholder requirements are mapped. These are linked to the goals of
the enterprise of VTB or Vermont Teddy Bear. Then the assessment model of the
CVobiT5 is implemented with CobiT 2019. It is helpful to rate the various process in
terms of the capabilities of the process. The VTB is analyzed with justification. Apart
from this, specific procedures are found out through enhancements and the significance
are crucial. After that, the chosen methods are tailored with the help of the CobiT
design tool kit’s companion tools. Next, the targets are demonstrated and are found to
be justified in the study in developing the underlying process. Next, the self-analysis
tool-kit of CobiT5 has been recording and summarizing t6he capability ratings.
Keywords: COBIT 5, COBIT 2019,
1. Introduction
COBIT provides the business process owners and management with the model of
information technology governance. Here, delivering the values from information
technology is useful. It is helpful to manage and understand the risks related to
information technology.
In the following report, the stakeholder’s needs are mapped with stated
enterprise goals. This is in the cascade that has been best meeting the VTB. Next, the
CobiT5 Process Assessment Model is applied along with CobiT 2019. This is to rate the
distinct process as process capabilities. Then the VTB is evaluated along with
justification. Next, a particular method is determined for development and justifying the
importance. Then the means chosen is tailored through the companion tool of CobiT
design tool kit. Later the targets are discussed and justified recommending to develop
the primary process. Then the CobiT5 self-analysis tool-kit to record and summaries the
ratings of capabilities.
2. Introduction of the chosen EGIT
framework:
2.1. Identification of problems and issues:
The COBIT 5 framework needs the inputs and participation from various sectors
of the organization. Further, different levels of commitment have been leading to
diverse resource allocation and priorities. Hence, one can see conflict taking place in
communications, poor quality of deliverables, poor execution and missing of deadlines.
Moreover, the requirements for the framework are highly specific.
CobiT 2019 VTB Report – 3807ICT or 7807ICT (omit one)1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2.2. Introduction of the chosen EGIT framework:
The core task of the COBIT framework has been updating the principles of
COBIT. This layout is considered as the structure of the entire frame. Here, the latest
ideas are introduced and the various terminologies are explained (Huygh et al., 2018).
Apart from this, the COBIT Core Model and its different management and governance
objectives have been providing the platforms to implement the program of governance.
Besides, the performance management system is upgraded and permitting the flexibility
in using the measurements of maturity and measurements of capabilities. Next, its focus
areas and design factors have been offering extra practical guidance over the flexible
adoption of the EGIT framework, irrespective of the particular projects and complete
deployments (Mulyanto, 2018).
2.3. Approach towards process improvement:
The areas of importance and information-technology governance for the enterprise are
listed below.
Various trends in technology.
Getting more upgraded with the updated standards and various methods of
working.
Focussing on the area concepts
To be seen as more authoritative
Better instrument to control performances and adding the latest features of
online collaborations.
Supporting decision making.
2.4. Assessment of risks:
The risks include the following.
The stakeholders with a better understanding of the risk effects and present
states effect across the enterprise.
Guidance regarding how one can control the risks to various levels. This involves
a considerable set of measurements.
Guidance on the way to set up the proper culture of risks for the enterprise.
Guidance on risk analysis enabling the stakeholders to consider the expense of
mitigation and needed resources against the exposure loss.
Scopes of integrating the risk management of IT with the risk of enterprise.
Developed communication and analysing every external and internal
stakeholder.
2.5. Steps towards IT strategy development:
Focusing on the design and areas factors providing more clarity over developing
the system of governance of needs of the business.
Better alignment with various worldwide standards, best practices and
frameworks for supporting the relevance of the structure.
Constant updates are to be released by rolling.
Additional tools for supporting the business while developing the governance
system that is the best fit. This would make the COBIT 2019 more prescriptive.
Better tool for measuring the IT performances and aligned to the CMMI
(Gantman & Fedorowicz, 2016).
2.6. Proposal to gain the business and IT alignment in the Vermont
Teddy Bear:
The Vermont Teddy Bear is devoid of robust information systems. Through
focusing at their production, forecasting and marketing around the product lines, there
are various areas can be analyzed. Having technology platforms like Enterprise
Resource Lanning packages, VTB must consider the usage of the problems of
2 Insert your name and S# here
Document Page
Understanding COBIT 2019
information management systems (Haes & Grembergen, 2016). Decentralizing and
outsourcing of the firm consists of a distinct line of products and channels. This is of
much importance in this place. To a greater extent, the Vermont Teddy Bear has
required to consider the advantages in the long term. This is helpful to get from
utilizing the ERP packages.
3
Document Page
3. Application of CobiT2019 and
CobiT5:
3.1. Mapping of needs of stakeholders and related enterprise goals
for best meeting the VTB:
Updated goal cascades:
The goals of alignment are consolidated, decreased, upgraded and then clarified
as needed. They can be organized through balances scorecard point of view and
involving the instance metrics for measuring the goal achievement.
The specification of the factors of various stakeholders includes the following.
Identifying the efficient effects over the markets
Analysing the possibility that they can continue
Categorizing then as per challenges and strengths.
Ranking as per the terms of how effectively the organization can perform in
every category.
Furthermore, the internal weaknesses and strengths analysis has been helpful to
evaluate the current performances of the Vermont Teddy Bear Co. Inc as per the
development, logistics, operations, finances, marketing, information systems and human
resource management. Here, the reason behind the analysis is to deliver the data
regarding gap analysis. Further, the present performance of Vermont Teddy Bear Co.
Inc and the intended vision performance is needed to raise customer satisfaction and
market share successfully (Pereira, Ferreira & Amaral, 2017).
It is evaluated that various weaknesses and strengths of VTB can be determined
through the analysis of the internal structure. It has been coming from the core of the
organization. The method has been highly vital since VTB Co. Inc has needed to develop
the latest goals. This is helpful to maximize the position as compared to other financial
sectors. Next, regarding the opportunities, there are customer perspectives, service and
productions, greater facility of manufacturing and retail stores. However, the
competitors are the threats in this case. They have been coming in the form of business
of items like greeting cards, flowers and chocolates.
4 Insert your name and S# here

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Understanding COBIT 2019
Figure 1:“Illustrating an effective stakeholder model”
(Source: Pane et al., 2018)
It must be reminded the stakeholders are the primary constituents of Vermont
Teddy Bear. They are the primary constituents having the stake of how VTB can
operate. Vital stakeholders include the employees, owners and investors, groups,
advocacy, regulatory, competitors, suppliers and customer. The future generations and
society at large are essential elements of the stakeholder map. They have been
introducing the concerns of the sustainability and natural environments.
Moreover, top-level decisions are often made with the analysis of the extent to
which the VTB can generate the values. These are helpful to satisfy the necessities of
multiple stakeholders. For instance, the business of VTB has been producing the cost
for the customers. This is through product quality and pricing. Apart from this, the
industry can create several stakeholders for the suppliers. This is done through various
advantages of long-term relationships (Pereira, Ferreira & Amaral, 2017).
It must be reminded that for VTB, its most essential business components is its
primary stakeholders. They have highly demanded at the desires for the lesser prices,
higher quality great services and on-time delivery. Organizational stakeholders are
affected directly through the behaviour of the organization and holding the stake in the
performances. VTB has included the social liabilities in serving various interests of the
stakeholders. They involve the following.
Employees They are contractors and employees working for
VTB.
Customers The clients and consumers have been involved in
purchasing the goods and the use of services of VTB.
Suppliers This involves the economic, material, information and
human resources.
Owners They are the creditors, investors and stockholders
claiming ion the profits and resources of VTB.
Competitors They have been producing similar services and goods.
Regulators This includes the national government agencies, state and
local that have been enforcing the regulations and laws.
Interest groups This includes activists, community groups and
representing the interest of society and citizens.
Various attributes to be checked for the stakeholders and the questions to ask are listed
below.
Firstly, the ways of determination of stakeholders is to be analysed. It must be
analyzed that who are involved in paying for the project and receiving the profits and
deliverables from the projects. From VTB and its client organizations, it is to be found
out who has been implementing the plan. Further, the expert from the domain of the
projects at VTB is to be identified (Bartens et al., 2015).
Next, the interest is to be determined. The direct benefits of the stakeholders are
expected to be received from the projects. The anticipated results due to the project
changes are needed by stakeholders. Then, the conflicts of interest taking place among
the stakeholders are to be determined. Further, the influences are to be identified. The
legitimate authority for the stakeholders on the organization, controlling of resources
and project assets are to be found out (Nugroho, 2017). Next, the degree of influences
5
Document Page
and the power of negotiation for the stakeholders identified has been carried in the
organization. Lastly, the impacts are to be analysed. Here, impact the stakeholders
could be made on the project and the effects on the project success are to be
determined.
Understanding enterprise goals:
Through using the CDN services and Internap’s colocation, the VTB can easily
and quickly roll various storefronts and different sub-brands having minimal technology
and time investment. The traffic to VTB sites from multiple mobile devices has included
tablets and phones. This has raised from 50% every year. This consists of the capability
of optimizing the experience of contents for every complicated user device. The CDN
features of the Internap’s that are created over TCP acceleration is delivered to four
time quicker loads of page. It comprises of a higher quality of customer experiences and
less buffering over the mobile devices and PCs. The reliable IP service of Internap’s
backed through the SLA. It has assured that the websites of VTB have always been
present.
Moreover, it is seen that the retailers are present under high pressure to meet
the goals of the sales within contracted frames of time. It must be reminded for the
organizations depending on the sales of the Internet for matching the numbers, no room
is present for errors while selecting the CDN and various services of IT infrastructures.
Apart from this, the Internap has provided an overall package for the VTB. This is a
flexible platform that can support the demands of variable traffics. This is done through
delivering the performance and reliability needed to assure the satisfactory experiences
for the end users.
Discussion on justifications:
Moreover, these forward-looking statements have been including various
accounts that are related to the performance of IT Infrastructure services. This also
consists of the expected benefits to be gained from that. These type of comments has
not been guaranteeing the further performances and including uncertainties and risks
for VTB. Moreover, there is a vital factor that results differ in a material way from those
who have forward-looking statements. Here, the elements involve the real performances
of the services of IT infrastructures. This includes the capability to finish the expansion
of the data centres that are controlled under the intended timeframe. Furthermore, it
involves the ability to sell the space of the data centre. This includes the retaining and
attracting of the first talents. This also consists of the capacity to react successfully to
various technological alterations. It consists of the availability of services from the
providers of Internet network services delivering loops of network access and different
loops over favourable terms for VTB. Here, the failure of the third party suppliers has
been providing the services and products on favourable conditions. It includes the
failures of centres of network operations, network access points, computer systems and
data centres. It also includes the capability to deliver or enhance the services of IT
infrastructures to the customers. This also involves the ability to secure intellectual
property. It is also seen that provided with the uncertainties and risks, the investors
have been able to put the undue dependence on various statements that are forward-
looking as the prediction of real results.
6 Insert your name and S# here
Document Page
Understanding COBIT 2019
Figure 2: “Design Factors Are New to COBIT 2019”
(Source: Tello, Ruiz & Yoo, 2018, pp. 304-310)
4. Application of CobiT5 Process
Assessment Model and CobiT 2019:
4.1. Implementing the CobiT5 Process Assessment Model:
The Cobit 5 analysis process measures the overall extent to which the particular
method has been gaining specific attributes that are relative to that process. The
process attributes include the following.
Constant optimization
Process innovation
Process control
Process measurement
Process deployment
Process definition
Work Product management
Performance management
Process performance
4.2 Implementing the Cobit 2019 model:
The COBIT 2019 comprises of the most updated form of the COBIT system. It
consists of the revised and latest data and developed guidance for implementing and
designing the properly sized program of governance. This is to be done by
concentrating on the advantages. This is done by checking the boxes of the schedule of
the project steps. This includes the sign of successful deployments for VTB. Apart from
this, the starting point is to be considered. It is seen that most of the enterprises consist
of governance structures in the proper place. It is created over successful efforts apart
from trying to discover the latest approach. Apart from this, the prior developments
generated through implementing the COBIT 5 and practices and standards have
required to get reworked. The COBIT 2019, can be created to undertake events due to
the efforts of an enterprise’s constant expansion.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
To rate VTB, the individual processes can be rated as per processability. This is
done from generating productivity and efficiency under process to control IT. Moreover,
it is useful to create trust and value from an information system with the help of
governance. Besides, it is helpful to set that apart from the residue of the folks that
residual un-certified. Further, it raises the ability and providing credibility. It has been
setting the benchmark to analyze the best practices of the industry.
Through deploying the COBIT 9, the capability analysis for the measuring of data
from a normal distribution for VTB can be done. Through this VTB can be rated 8 out of
10. It performs the analysis capability for the information to be assumed at a random
sample from the normal distribution. This calculates the indices like Cpk, estimating the
DPM or defects per million and help to determine the SQL or Sigma Quality level where
the process has been operating. This is able to control the two-sided limits of the
asymmetric specification, and the borders of two-sided asymmetric along with one-sided
limits. Here, the confidence limits for the standard indices of the capability is also
requested. The input of the process also consists of a minimum of one and more
measurable property used for specifying the outputs. It is analyzed in a statistical
manner and the data of the output displays the normal distribution where the process is
demonstrated through the average or mean and standard deviation. This process also
5requires to be deployed with proper process controls at the place. The control chart
analysis is helpful to find out whether the process is present under statistical control.
However, as the process is under statistical power, the ability becomes meaningless.
Thus, the process capability includes the common reason variation and not any
particular cause variation. Hence, the output of the process is intended to meet the
requirements of the customers, engineering tolerances and specifications. In this way,
the process capability study of VTB can be done to find out the extent where the process
can witness the expectations. Hence, the capability of the process in meeting the
specifications is expressed as one number through an index of process capability. This
can also be analyzed through controlling charts. At both cases, there is the necessity of
running the process to retrieve sufficient measurable output. This makes the process
stable and the process variability and mean estimated reliably.
8 Insert your name and S# here
Document Page
Understanding COBIT 2019
Figure 3: “The COBIT History”
(Source: Pane et al. 2018, p. 012051)
5. Discussion on particular methods
determined to improve and justify the
importance:
This can be done in the following ways.
Sharper clarity:
The Cobit2019 consists of transitioned to refer to the elements of the system of
governance. This is a much more precise characterization. Across this publication, the
term has been lesser academic and more applicable helpful for the users in streamlining
the timeline of adoption.
New focus of areas:
The sectors involve the DevOps, cloud computing, digital transformation,
cybersecurity, small and medium sized businesses and so on.
New design factors:
Various new factors have been influenced through the designing of the
governance system of the enterprise and positioning the success of VTB is utilizing the
technology and information. This involves the technology adoption strategy, methods of
IT implementation, sourcing model regarding IT. This also consists of the role of IT,
requirements of compliance, the landscape of threats, size of danger, risk profile,
enterprise goals and strategy of the enterprise.
Figure 4: “COBIT Design Factors”
(Source: Merhout & O’Toole, 2015, pp. 5-13)
Findings from VTB:
It is seen that VTB has needed to venture into the latest market segments
They should be assuring the reliability and stability for the e-commerce
platforms particularly during the peak times.
9
Document Page
They should be coordinating marketing, production, forecasting around
the product lines.
They must develop the customer relationship aiding the strategies of
marketing of VTB.
Besides, the supply chain management must also be utilized for
enhancing the various operational capabilities.
Processes for implementing the findings:
To perform this the best breed approach much be performed. Apart from buying
any one ERP package, distinct packages are to be bought. This should be provided
nearer to the optimal functionality. It must be reminded that the reason is that VTB’S
cash reserves are limited. They are unable to afford the single ERP package.
The strategies to be adopted for the findings:
This can be done by analyzing the functionalities of the current IT system
with the help of suitable documentation.
The unwanted complex middleware must be eradicated.
Lastly, the incompatible applications are to be removed.
10 Insert your name and S# here

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Understanding COBIT 2019
6. Tailoring of the process through the
CobiT design companion tool:
It is seen that for more than a couple of decades, the governance framework of
COBIT for the useful enterprise information and technology. It has been helpful for VTB
to derive much value from various information technology resources. The current
iteration of the framework of the world-renowned is developed in that legacy. It has
been updating and including multiple information. Further, it has been offering more
kind of practical guidance to tailor and deploy the proper-sized program of governance
to the distinct requirements of the enterprise (Quezada-Sarmiento et al., 2017).
Integration between the maturity model of CMMI and the present model of capability:
The performance management of COBIT 2019 has been leveraging the present
model of VTB and the maturity model of CMMI through various principles. This is easy
to use utilize and analyze. It is consistent with and supporting the conceptual model of
COBIT. It has been providing relevant repeatable and reliable outcomes. Moreover, it is
flexible and supporting various kinds of analysis (Wolden, Valverde & Talla, 2015).
The COBIT 2019 toolkit design guide:
The designing for the solution of information and technology governance is
considered significant for COBIT Framework. As there has been no such aspect as the
only-size-fitting every system of governance for the information technology of VTB, they
should be tailoring the system of governance. This is to maximize the value out of the
information technology. The guide of COBIT 2019 supplies the blueprint for the
enterprises with the use of various factors of design. In this way, the publication can
explore the implications of different coefficients of design and effects von the designing
of the solution of the governance. Next, it has been presenting a four-step flow of work
to design the solution of enterprise governance for VTB. This considers all the factors of
potential design. It is helpful to generate a system of customized governance. This fits
the distinct necessities. In this way, it has been providing guidance to use the COBIT
2019 guide of implementation under tandem, with the design guide (Nguyen Huynh Anh
et al., 2018).
Additionally, the Design Guide of COBIT 2019 has been offering the toolkit of a
companion. This is the Excel spreadsheet that has been based on the tool helping to
prioritize the particular aspects of design. This is considered for the customize program
of governance. Thus the users are able to plug in different values from their enterprises
under the tool. This tool is helpful for VTB to find out the relative significance of the
management and governance objectives for the enterprise. The guidelines of Design
consist of various instructions in step-by-step. This is to utilize the toolkit to help the
enterprise in creating a governance system that is tailored (Noor & Ghazanfar, 2016).
7. Using the self-assessment tool-kit of
Cobit5 to record and summarize the
ratings and capability:
The COBIT 5 is the stand-alone publication. This can be used by VTB in
performing the lesser rigorous analysis of the abilities of the IT processes. It is the
precursor to undertake a more evidence-based and thorough review. It is based on the
PAM or the COBIT Process Assessment Model. Through the COBIT 5 under the
assessment program of COBIT, there is no necessity of evidentiary requirements. This
never needs the usage of COBIT PAM (Percheiro et al., 2017). Here, sufficient data from
the COBIT PAM and the total self-analysis template is supplied for simplifying the
process and eradicate the necessity of reference of the additional publications. This
11
Document Page
takes place under the COBIT analysis program. However, the users can be encouraging
for referring the COBIT Assessor guide and COBIT PAM.
Summarizing the ratings of VTB and the capabilities of COBIT 5:
The skills include the detailing of how to perform the primary self-analysis of the
VTB’s present IT process capability levels against the COBIT 5.
Through the COBIT 5, there has been standalone guidance to support the
primary approach of self-assessment or rating for VTB.
Defining the responsibilities and role to perform the analysis.
Providing the options to scope the analysis or rate VTB.
Defining the kinds of pieces of evidence that must be collected.
Providing guides to find out the level of capability of the IT process.
8. Risk assessment:
Analysing the case as per the determined categories of risks and the scenarios:
Risk categories Scenarios
E-commerce
business model
The chances are present in terms of various aspects. They
include the following. It provides customer dissatisfaction,
customer deceit, service and product failure, legal liability and
theft of intellectual property. This also involves the privacy and
security breaches, website issue and Internet problems. Thus, the
scope of the model of e-commerce model of VTB is made in a
careful way. Here, every model has a clear implication as per
strategy and business planning.
Intellectual
property
This is vital to be protected since the businesses have not
realized the total benefits of the interventions. This is inclined to
focus less on development and research. Moreover, instead of
intellectual property security for VTB, the exporters have been
witnessing unfair competitions abroad. The non-exporters has
also been facing imports ate the home and the business has been
facing the safety, health and legal risks. This from the threat of
the counterfeit resources entering the chains of supply (Andry,
2016).
Privacy and
security
The security of the website of VTB includes the employee from
criminal activities, customers, suppliers, protection of the
company. This is the complicated consideration of the small
business engaged in business e-commerce. Further, the Internet
is a worldwide playground for hackers. This is less risky in
stealing the Internet (Iqbal, Widyawan & Mustika, 2016). This is
because of the anonymity over the Internet looking various
criminals under legitimate-looking identities. This has been
permitting to put the fraudulent orders along with online
merchants and then steam data through intercepting the e-mail.
9. Providing recommendations to
manage the risks on the basis of the
analysis of risk levels, risk tolerances
and risk appetite:
The premise of risk appetite:
12 Insert your name and S# here
Document Page
Understanding COBIT 2019
This must be theoretically sound. Further, it must be pragmatic and practical.
Here, VTB must not generate bureaucracy. Apart from this, they must fetch solutions
that can work for them.
13

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The basis of risk tolerances:
In a successful implementation of the risk appetite, VTB should be determining
and defining the risk tolerances. This must be at the level of the front-level process.
Apart from this, the tools of robust monitoring are helpful for VTB to analyse the
understandings for the causes of the risk at any level. It is useful for VTB in connecting
the decisions of the front-line having the overall risk appetite and find the processes
that are out of range with reports, navigable dashboards and intuitive (Prado et al.
2016).
The basis of risk levels:
The risk has been taking place at the spectrum of governance of VTB, individual
systems and systems-of-systems. It is seen that at the system level, the chance has been
focussing commonly centering on the development. The uncertainty has been existing in
operations, designing, integration and requirements, testing, fielding and training and
so on. For the systems-of-systems, the risk dependency has been rising to the top. In
constantly working around various system-of-system, the fielding and development of
synchronizing ability are considered to integrate, interoperate and interface. This
involves the risks related to the ways coming at the forefront of the environment of the
system-of-systems (Almeida Souza Neto & Mira da Silva, 2018). The complexity and
governance of threats at the enterprise levels have turning to be more prominent. The
risk governance of various guidance around the enterprise for the advantages of the
enterprise has been trickling down to different individuals systems and systems-of-
systems. This has been resulting in the demands that are potentially unanticipated. This
is the suboptimal solution at the lower level and is advantageous at the level of the
enterprise. It has resulted in the unexpected demand and is probably the suboptimal
resolution at a lesser degree that has been advantageous at the enterprise level
(Merhout & O’Toole, 2015).
10. Implementation Issues:
This is demonstrated by making recommendations to the CEO of VTB. This is
regarding the advice on the way to conduct various aspects.
10.1. Change management:
This must be done through opting for the proper change agents. Here, strong
problem solving expertise, collaborations and communications are required. The
capacity has been working effectively in various situations. This also involves the
capability to set multiple priorities and keep the team members engaged and move
forward.
Making desirable changes:
The big picture of VTB must be presented and the benefits are to be broken
down. This must be applied directly to the employees.
Totally integrating the changes:
Helping the current employees of VTB to adapt the changes quicker and assure
that the employees analyse that in the proper manner (Darmawan, 2017).
10.2. Process improvement framework:
This includes the reduction of the steps that are non-value added. Further, the
measurement system must be developed, and the common cause variation must be
reduced. Apart from the individual cause variation must be decreased. Then, the mean
must be shifted to create the capability of the process.
14 Insert your name and S# here
Document Page
Understanding COBIT 2019
10.3. Implementation road map:
Here, the pain or trigger points are to be identified. This must also include the
communicating of the strategy.
15
Document Page
The Road Map:
Communication plan:
Communication is a complicated element to deploy the changes of VTB.
However, this never indicates the necessity for successful change (Listiani & Aziz,
2018).
Sponsorship roadmap:
This has been including the visibility and active participation of the change. It
must also involve the creation of a coalition for supporting the senior leaders and band
managers of VTB. Apart from this, they must communicate directly to the staffs
regarding the nature and reasons for the changes.
Coaching Plan:
The messages must be communicated regarding the changes and the ways it has
been affecting the employees. It should involve the attitudes in the change filtering
directly and immediately how the employees have been reacting to the changes.
Apart from these, the resistance management plan and training plan must also
be involved for VTB (Harwikarya et al. 2015).
11. Suggested timeline:
Figure 5: “Estimated Gantt Chart for the present time schedule”
(Source: Created by Author)
16 Insert your name and S# here

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Understanding COBIT 2019
12. Preparation of IT strategic plan:
This must be done by considering the following steps:
Starting with a new business strategy:
The planning of the IT strategy has been rooted firmly in the strategic planning
time of VTB’s business. As the business strategy has been investing in digital
transformation, the IT should be extrapolated. This indicates the current architecture,
skills, culture, governance, sourcing and operating systems.
Planning the process:
The IT leaders at the outset should be deploying the plan to create the program.
They must collect for developing the achievable and clear steps to strengthen the
strategic plan. This must be done through the current and prior used plans as the
starting points (Almeida et al. 2018).
Strategizing swiftly:
As the IT strategic plan is vital, here the spending of much time for developing is
also harmful.
Focusing on the mid-term horizon:
Here, the long-term roadmaps comprise of the place. However, they have been
profoundly falling out of favour. This is taking place due to the current age of business
shifts and fast technology (Almeida, Pinto & Mira da Silva, 2016).
Nailing the primary components:
This is the efficient IT plan including the data to the governance, organizational
changes staffing and people. They are needed to gain business results. This has been
involving the roadmap of the investment portfolio, goals and discussion of risks,
timeframes and additional problems.
Creating the metric for success:
Here, the smartest IT strategic planning involves the measures of success. This
has nee serving as the mile-marker for the overall progress in due time. In the current
marketplace that is technology-driven, the metrics must be concentrating lesser on the
outputs and inputs that the IT has utilized as the guideposts previously and more on
real outcomes of the business (Amorim et al., 2018).
13. Conclusion:
The above study helps in understanding how the introducing of the latest idea
like focus areas and the design factors has been permitting the extra guidance. This to
tailor the governance system for the needs of VTB. Apart from this, the study is useful to
analyze the upgraded alignment of global frameworks, best practices and global
standards developing the relevancy of COBIT. The models demonstrated above is
helpful to permit VTB with the capability to inform the further up gradations. This can
be done through feedbacks, proposing developments and sharing applications. This
must be done to the derivative products and frameworks in real-time. This must also
involve further COBIT enhancements that are released on a rolling basis. The tools and
guidance evaluated supported the improvement of the best-fit governance system. This
has made the COBIT 2019 more meaningful. Then, there is COBIT 2019 design guide.
This involves the designing of IT governance solutions. This explores the factors of
design influencing the governances and including the workflow plan the simple system
of governance for VTB. The implementation guide of COBIT 2019L, the optimizing and
implementation of the governance solutions has developed the road map. This is for
constant improvements of governances.
17
Document Page
14. References
Huygh, T., De Haes, S., Joshi, A., & Van Grembergen, W. (2018, January). Answering
key global IT management concerns through IT governance and management
processes: A COBIT 5 View. In Proceedings of the 51st Hawaii International
Conference on System Sciences.
Gantman, S., & Fedorowicz, J. (2016). Communication and control in outsourced IS
development projects: Mapping to COBIT domains. International Journal of
Accounting Information Systems, 21, 63-83.
Haes, S. D., & Grembergen, W. V. (2016). Enterprise governance of information
technology: achieving alignment and value, featuring COBIT 5.
Pane, S. F., Awangga, R. M., Nuraini, R., & Fathonah, S. (2018, April). Analysis of
Investment IT Planning on Logistic Company Using COBIT 5. In Journal of
Physics: Conference Series (Vol. 1007, No. 1, p. 012051). IOP Publishing.
Bartens, Y., De Haes, S., Lamoen, Y., Schulte, F., & Voss, S. (2015, January). On the
way to a minimum baseline in IT governance: using expert views for selective
implementation of COBIT 5. In 2015 48th Hawaii International Conference on
System Sciences (pp. 4554-4563). IEEE.
Nugroho, H. (2017). Proposed IT Governance at Hospital Based on COBIT 5
Framework. IJAIT (International Journal of Applied Information Technology),
1(02), 52-58.
Quezada-Sarmiento, P. A., Chango-Cañaveral, P. M., Benavides-Cordova, V. M.,
Jumbo-Flores, L. A., Barba-Guamán, L., & Calderon-Cordova, C. A. (2017, June).
Referent framework to government of IT using standards: COBIT 5 and ISO
38500. In 2017 12th Iberian Conference on Information Systems and
Technologies (CISTI) (pp. 1-6). IEEE.
Wolden, M., Valverde, R., & Talla, M. (2015). The effectiveness of COBIT 5
information security framework for reducing cyber attacks on supply chain
management system. IFAC-PapersOnLine, 48(3), 1846-1852.
Nguyen Huynh Anh, V., Kolp, M., Wautelet, Y., & Heng, S. (2018). Mapping IT
Governance to Software Development Process: From COBIT 5 to GI-Tropos. In
20th International Conference on Enterprise Information Systems (ICEIS 2018).
Percheiro, I., Almeida, R., Pinto, P. L., & da Silva, M. M. (2017, September). Towards
conceptual meta-modeling of ITIL and COBIT 5. In European, Mediterranean,
and Middle Eastern Conference on Information Systems (pp. 478-491). Springer,
Cham.
Andry, J. F. (2016). Audit of IT Governance Based on COBIT 5 assessments: A case
study. Jurnal Nasional Teknologi dan Sistem Informasi, 2(2), 27-34.
Almeida, R., Souza Neto, J., & Mira da Silva, M. (2018). Using Analytic Hierarchy
Process for COBIT 5 Process Prioritization.
Almeida, R., Lourinho, R., da Silva, M. M., & Pereira, R. (2018, July). A Model for
Assessing COBIT 5 and ISO 27001 Simultaneously. In 2018 IEEE 20th
Conference on Business Informatics (CBI) (Vol. 1, pp. 60-69). IEEE.
Amorim, A. C., da Silva, M. M., Pereira, R., & Gonçalves, M. (2018, October). Using
Scrum for Implementing IT Governance with COBIT 5. In 2018 IEEE 22nd
International Enterprise Distributed Object Computing Conference (EDOC) (pp.
198-207). IEEE.
Almeida, R., Pinto, P., & Mira da Silva, M. (2016). Using ArchiMate to assess COBIT
5 and ITIL implementations.
Harwikarya, M. S., Fitrianah, D., Sarinanto, M. M., Nurhaida, I., & Arif, R. (2015). IS
Strategic Plan for Higher Education Based on COBIT Assessment: A Case Study.
International Journal of Information and Education Technology, 5(8).
Merhout, J. W., & O’Toole, J. (2015). Sustainable IT Governance (SITG): Is COBIT 5
An Adequate Model. AIS Electronic Library: Newark, NJ, USA.
18 Insert your name and S# here
Document Page
Understanding COBIT 2019
Bunnell, L., & Weistroffer, H. R. (2017). Integration of the COBIT 5 Framework into
the SDLC for Development of a User Access Attestation System. Integration, 3,
25-2017.
Steuperaert, D. (2019). COBIT 2019: A SIGNIFICANT UPDATE. EDPACS, 1-5.
Rubino, M. (2018). A Comparison of the Main ERM Frameworks: How Limitations
and Weaknesses can be Overcome Implementing IT Governance. International
Journal of Business and Management, 13(12).
Pane, S. F., Awangga, R. M., Nuraini, R., & Fathonah, S. (2018, April). Analysis of
Investment IT Planning on Logistic Company Using COBIT 5. In Journal of
Physics: Conference Series (Vol. 1007, No. 1, p. 012051). IOP Publishing.
Pane, S. F., Awangga, R. M., Nuraini, R., & Fathonah, S. (2018, April). Analysis of
Investment IT Planning on Logistic Company Using COBIT 5. In Journal of
Physics: Conference Series (Vol. 1007, No. 1, p. 012051). IOP Publishing.
Steuperaert, D. (2016). Improving the quality of the COBIT 5 goals cascade as an IT
process prioritisation mechanism. International Journal of IT/Business Alignment
and Governance (IJITBAG), 7(2), 49-69.
Ding, Y. (2015). Service Delivery Standards (ITIL, COBIT, ETOM, ISO/IEC 20000,
Etc.). Wiley Encyclopedia of Management, 1-4.
Merhout, J., & O’Toole, J. (2015). Enhancing the Control Objectives for Information
and Related Technologies (COBIT 5) Framework for Sustainable IT Governance.
Journal of the Midwest Association for Information Systems, 2, 5-13.
Greyling, M. (2015). Governing the strategic alignment of big data with the use of
the COBIT 5 control framework (Doctoral dissertation, Stellenbosch:
Stellenbosch University).
Ozkan, N. (2015, December). Risks, challenges and issues in a possible SCRUM and
COBIT marriage. In 2015 Asia-Pacific Software Engineering Conference (APSEC)
(pp. 111-118). IEEE.
Prado, E. P., Barata, A. M., Mancini, M., & Sun, V. (2016, May). IT Governance in
Healthcare Industry Organizations: A Case Study of COBIT Implementation. In
Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian
Symposium on Information Systems: Information Systems in the Cloud
Computing Era-Volume 1 (p. 1). Brazilian Computer Society.
Susanti, R. Y., & Sucahyo, Y. G. (2016, May). Information technology governance
evaluation and processes improvement prioritization based on COBIT 5
framework at secretariat general of the Indonesian house of representatives. In
2016 4th International Conference on Information and Communication
Technology (ICoICT) (pp. 1-6). IEEE.
Iqbal, A., Widyawan, & Mustika, I. W. (2016, June). COBIT 5 domain delivery, service
and support mapping for business continuity plan. In AIP Conference
Proceedings (Vol. 1746, No. 1, p. 020045). AIP Publishing.
Noor, U., & Ghazanfar, A. (2016, September). A survey revealing path towards
service life cycle management in COBIT 5. In 2016 Eleventh International
Conference on Digital Information Management (ICDIM) (pp. 68-73). IEEE.
Pereira, C., Ferreira, C., & Amaral, L. (2017, June). Shape a Business Case Process:
An IT Governance and IT Value Management Practices Viewpoint with COBIT
5.0. In Atas da Conferência da Associação Portuguesa de Sistemas de Informação
(Vol. 17, No. 17, pp. 60-75).
Pereira, C., Ferreira, C., & Amaral, L. (2017, September). IT Value Management
Capability Enabled with COBIT 5 Framework. In European, Mediterranean, and
Middle Eastern Conference on Information Systems (pp. 431-446). Springer,
Cham.
Anza, F. A., Sensuse, D. I., & Ramadhan, A. (2017, September). Developing E-
government maturity framework based on COBIT 5 and implementing in city
level: Case study Depok city and South Tangerang city. In 2017 4th International
Conference on Electrical Engineering, Computer Science and Informatics
(EECSI) (pp. 1-6). IEEE.
Darmawan, D. Z. (2017, November). IT governance evaluation on educational
institutions based on COBIT 5.0 framework. In 2017 4th International
Conference on New Media Studies (CONMEDIA) (pp. 50-55). IEEE.
19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Wijaya, A. F. (2017, November). Analysis of information technology governance e-
KTP using COBIT 5 framework. In 2017 International Conference on Innovative
and Creative Information Technology (ICITech) (pp. 1-6). IEEE.
Tello, I., Ruiz, C., & Yoo, S. G. (2018, April). Analysis of COBIT 5 Process “DSS02-
Manage Service Requests and Incidents” for the Service Desk Using Process
Mining. In 2018 International Conference on eDemocracy & eGovernment
(ICEDEG) (pp. 304-310). IEEE.
Listiani, R. N., & Aziz, R. A. (2018, October). AUDIT OF INFORMATION SYSTEM
USING COBIT 5.0 AND ITIL V3 FOR INFORMATION SYSTEM OF ACADEMIC. In
Prosiding International conference on Information Technology and Business
(ICITB) (pp. 160-170).
Mulyanto, A. (2018, November). Audit Sistem Informasi dengan Menggunakan Cobit
4.1 untuk Evaluasi Manajemen Teknologi Informasi. In Prosiding Seminar
Nasional Darmajaya (Vol. 1, No. 1, pp. 407-417).
Wijaya, S. S. H. (2019, February). Audit Sistem Informasi Pada Lampung Post
Menggunakan Metode Framework Cobit 5. In Seminar Nasional Teknologi
Komputer & Sains (SAINTEKS) (Vol. 1, No. 1).
20 Insert your name and S# here
Document Page
Understanding COBIT 2019
15. Appendices:
Task Name Duratio
n
Start Finish Predecessor
s
Making Communication
plan
2 days Mon
4/1/19
Tue 4/2/19
Developing
Sponsorship roadmap
4 days Wed
4/3/19
Mon 4/8/19 1
Creating a Coaching
Plan
1 day Tue 4/9/19 Tue 4/9/19 2
Developing of the
resistance management
plan
4 days Wed
4/10/19
Mon 4/15/19 3
Making a training plan 2 days Tue
4/16/19
Wed 4/17/19 4
Figure 6: “Time schedule for the current activity”
(Source: Created by Author)
21
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]