Is the IT service in your organization satisfactory, delivering value in a reliable and transparent way?.

It is an integral part of Good Corporate Governance and consists of Leadership, Processes and Organizational Structures that ensure that the strategies and objectives of the organization are adequately supported and extended in the field of Information Technology.
 
Based on the CobiT 4.1 and Cobit 5 frameworks, it must be achieved that technological risks are mitigated, business value is delivered and resources are used in an effective and efficient way.
We help you determine which IT technology and organizational structure may be best suited to your internal and external context.
It includes gap diagnosis, improvement support and monitoring. Indicators are developed to demonstrate the value generated.

COBIT (Control Objectives for Information and related Technology)

It is the model for IT Governance developed by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). Regardless of the technological reality of each specific case, COBIT determines, with the support of the main international technical standards, a set of best practices for security, quality, effectiveness and efficiency in IT that are necessary to align IT with the business, identify risks, deliver value to the business, manage resources and measure performance, goal fulfillment and the level of maturity of the organization's processes.

Training

  • Strategic alignment of IT with the business
  • Seminar - IT Governance implementation
  • IT value analysis workshop
  • Workshop on the use of Meycor Cobit at user level
  • Cobit-based IT Audit course
  • IT Dashboard for IT

Consultancy

By Certified professionals in: 

  • CPA (Certified Public Accountant)
  • CISA (Certified Information Systems Auditor)
  • CISSP(Certified Information Systems Security Professionals)
  • CISM (Certified Information Security Manager)
  • CGEIT (Certified in the Governance of Enterprise IT)
  • CRISC (Certified in Risk and Information Systems Control)