COBIT 2019 INFORMATION SECURITY FOCUS AREA IMPLEMENTATION FOR REINSURCO DIGITAL TRANSFORMATION
نویسندگان
چکیده
As information technology (IT) advancement evolves in Indonesia's insurance sector, organizations like ReinsurCo must accelerate their digital transformation (DT) to remain competitively viable. Although DT paves the way for new business models and operational improvements, implementation often fails due poor IT governance. Under supervision of State-Owned Enterprises Agency (SOE) Financial Services Authority (FSA), comply with regulations stating that SOEs independently assess maturity ensure security. This research utilizes five stages Design Science Research (DSR): problem explication, requirement specification, design development, demonstration, evaluation. Data was collected through semi-structured interviews both internal external document triangulation. The data were then analyzed using COBIT 2019 Information Security framework, implementing factors prioritizing governance management (ITGM) objectives: APO13 Managed Security, DSS05 Services, BAI06 Changes. Further analysis identification conducted discover gaps against seven component capabilities. These identified mapped into people, process, aspects, which led creation essential improvement recommendations. recommendations compiled an roadmap can serve as a priority guide ReinsurCo. is expected provide knowledge base security supporting by framework. In practical context, it aids controlling its strategic plans face challenges. Furthermore, this study also offers extensive benefits industry.
منابع مشابه
Isfam: the Information Security Focus Area Maturity Model
Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...
متن کاملInformation Security governance: COBIT or ISO 17799 or both?
This paper investigates the coexistence of and complementary use of COBIT and ISO 17799 as reference frameworks for Information Security governance. The investigation is based on a mapping between COBIT and ISO 17799 which became available in 2004, and provides a level of 'synchronization' between these two frameworks.
متن کاملGoverning Information Security in Conjunction with COBIT and ISO 27001
In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS
متن کاملInformation Security Implementation Methodologies
Information used by organisations is a valuable asset and has to be protected from the loss of integrity, confidentiality and availability. Information protection can be achieved through effective management, with meaningful board oversight. In an attempt to identify a generic methodology for the implementation of an information security management system, existing methodologies were investigat...
متن کاملSecurity Architectures for Controlled Digital Information Dissemination
Besides securing transmission of digital information at lower layers, several application-level security solutions for controlled dissemination of digital information have been developed using cryptographic, watermarking or use-control technologies. These dissemination control solutions have been designed for different business purposes. Little research, if any, identifies security architecture...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JIKO (Jurnal Informatika dan Komputer)
سال: 2023
ISSN: ['2656-1948', '2614-8897']
DOI: https://doi.org/10.33387/jiko.v6i2.6366