Time
3 hours 43 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
there are seven phases and cope its implementation approach.
00:05
In this video, we're going to talk about an overview of Kobe, its implementation approach, the seven phases and the elements of each phase
00:13
so cope. It defines an implementation approach that consists of seven phases.
00:19
Let's make use of an organization that wants to manage security and optimize risk.
00:24
The first phase recognizes a Need TOE act to implement an I T governance program in relation to managing security and minimizing risk.
00:33
The second phase is to assess the current state of the enterprise in relation to its security and risk.
00:39
The third phase is to define the target state.
00:43
Where does the organization want to be?
00:45
What are the acceptable risk levels and security levels?
00:49
The fourth phase is to build the improvements that take the organization toe where it wants to be.
00:55
The fifth phase is to implement the improvements.
00:58
The sixth is to operate and measure those improvements and how well they support the management and governance objectives off managing security and optimizing risk.
01:07
The seventh phase is to monitor and evaluate the implemented program and how well it supports the governance and management objectives.
01:17
Let's build on the seven phases we just talked about.
01:19
The first phase is to establish the desire to change.
01:23
The second phase is to form the implementation team.
01:27
The third phase is to communicate the outcome.
01:30
The fourth will be to identify the role players who play a role in the implementation.
01:37
The fifth is to operate and use the team and role players to implement a program.
01:42
The sixth is to embed new approaches.
01:45
The seventh phase is to sustain the changes that were made during the implementation phase.
01:53
Let's further build on the seven phases we just talked about
01:56
In phase one. We initiate the program
01:57
face to we define problems and opportunities.
02:01
Phase three. You defined the roadmap
02:04
face for you. Plan the program face five. You execute the plan
02:08
face six You realize the benefits of that plan in implementation
02:14
and then finally, in face seven, you review its effectiveness
02:21
in each phase. We're going to ask ourselves a key question.
02:23
What are the drivers for this IittIe governance program? Is it to manage security or is it for risk optimization? Or is it for both?
02:32
Where are we now? What is the current state of I T Governance.
02:37
What is the current state of manage security or risk awareness?
02:40
And then where do we want to be?
02:43
What is the future goal of managing security or risk optimization for the organization?
02:47
What needs to be done? What do we need to do and what do we need to implement to get to where we want to be? What processes organizational structures, policies and procedures, work, culture, etcetera needs to be adjusted and implemented in order to achieve the aforementioned goal.
03:05
And then how do we get there? Besides what needs to be done, what else needs to be in place to get to our goal?
03:10
And then did we get there? Assess the current state of the I T governance program to determine how security is managed or how risk is optimized to determine if it is at the level set by the governance board.
03:23
Then how do we keep the mo mentum going?
03:25
How can we keep moving forward toe, look for new strategic directions or continue managing security and risks?
03:32
Do you see how the components of each of these seven phases relate to one another
03:38
and quick quiz?
03:39
In what phase are we evaluating the current state of things.
03:45
If you set face to you are right
03:49
In this video we talked about the seven phases of the implementation approach and the four principles of each of these stages.

Up Next

COBIT Foundations

In this course, we discover a success story of how COBIT was enacted to support the specific organization’s IT infrastructure. We will explore how COBIT can support organizational goals and objectives.

Instructed By

Instructor Profile Image
Shaila Rana
Founder & Security Instructor at CyberSecure
Instructor