Navigating the Intersection: IT Governance, Data Governance, and the Evolving Role of DBAs

This post offers an exploration of the theoretical underpinnings and practical applications of IT and data governance. It examines governance frameworks, data management strategies, and database administration techniques within contemporary business contexts. The article presents actionable insights and recommendations for implementing robust IT and data governance practices across diverse organizational landscapes. Emphasis is placed on enhancing data security, ensuring compliance, […]

Adoption of IT governance strategies for multi-product DevOps teams

Organizational alignment, product performance expectation, and support from experienced DevOps executives, encourage key stakeholders to sponsor IT Governance (ITG) adoption. ITG maturity facilitates the adoption and utilization of ITG processes, thereby reducing effort, which results in improved DevOps maturity, reflected in better alignment, self-management, and delivery of products. Introduction As organizations are adopting DevOps practices within their environments, 40% of […]

The hard reality of Information Systems

Introduction In 2020, 46% of businesses in the UK had cyber security breaches or attacks (Department for Digital, Culture, Media & Sport, 2020). Information security is based on three fundamental characteristics specifically the confidentiality, integrity, and availability – known as the CIA triad (Chapple, 2018). IT leaders need to keep abreast with the latest technologies and practices to ensure that […]

Data collection for the adoption of IT governance strategies for multi-product DevOps teams

Call for participants Introduction IT leaders may be unaware of the interdependence of the factors that influence the adoption of IT governance strategies, such as COBIT5, ITIL, TOGAF, ZACHMAN, and ISO27001. The researcher is inviting IT leaders from multi-product DevOps teams who have implemented IT governance strategies to participate in a survey to determine the relationships between performance expectation, effort expectancy, social influence, […]

Evaluating AGILE adoption in software delivery organizations

Introduction Software development methodologies play an important role in the organizations’ ability to respond to new stimuli originating from new requirements, features, vulnerabilities and bugs.  AGILE methodologies are widely used, based on the premise of fast reaction and minimal expenditure in responding to these stimuli.  Research in the field of AGILE is evaluated against (a) culture transformation (Gregory & Taylor, […]

Information Security Policies

Rationale As organizations are adapting to new security measures, a revision of the internal IS security policies is necessary. The activities to undertake such an initiative can be summarized in 8 tasks as per table below. Task Activity Comments 1 Review existing security policy and identify gaps Ensure if readability of the policy is adequate for all stakeholders. 2 Research […]

Securing the data centre

Introduction When devising a proper risk management for security, it is essential to identify the different threats which are being addressed.  In the case of physical security threats, these can be either environmental or human in nature.  Environmental threats cause extensive damage to the IT resources in case of fire, unstable electric power, humidity and excessive heat.  On the other, […]

Data Governance

The need of Data Governance IT governance is a segment within organizational management focused specifically on the IT function.  Hence, IT governance is responsible for the administration and execution of the IT strategy, the underlying IT projects and the operations of all IT systems.  IT governance methodology differs from one organisation to another depending on the traits and requirements of […]