p-Index From 2019 - 2024
0.408
P-Index
This Author published in this journals
All Journal Journal La Multiapp
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal La Multiapp

Evaluation of Information Technology Governance Maturity Using COBIT 2019: A Case Study on the IT Security Industry Hidayat, Rachmad Syarul; Indrajit , Richardus Eko; Dazki , Erick
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i4.1514

Abstract

This study aims to evaluate the maturity of IT governance in the IT security industry using COBIT 2019. The assessment covered 13 COBIT 2019 domains, namely APO03—Managed Enterprise Architecture, APO07—Managed Human Resources, APO12—Managed Risk, APO13—Managed Security, APO14—Managed Data, BAI02—Managed Requirements Definition, BAI03—Managed Solutions Identification & Build, BAI05—Managed Organizational Change, BAI06—Managed IT Changes, BAI07—Managed IT Change Acceptance and Transitioning, BAI09—Managed Assets, BAI10—Managed Configuration, and BAI11—Managed Projects. The research methodology included observation, domain-based question formulation, RACI interviews, data collection, and question validation testing, with maturity calculation performed using appropriate formulas. Results indicate that most domains are at Level 2 (Managed), with significant contributions to maturity at Levels 3 and 4. Significant gaps were found between the current state and the desired maturity targets for many domains, such as APO03 and BAI03. The percentage contribution from Level 2 is the highest, while contributions from Levels 3 and 4 vary, with very low contributions from Level 5. The total maturity score is 2.49, with percentage contributions from Levels 2, 3, 4, and 5 being 74%, 26%, 11%, and 3%, respectively. Recommendations include improving processes to achieve Levels 3 and 4 across more domains and investing in training and development for relevant teams.
TOGAF's Approach in Developing an Enterprise Architecture for the Information Technology Security Industry Hidayat, Rachmad Syarul; Indrajit , Richardus Eko; Dazki, Erick
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1524

Abstract

The information technology security industry, encompassing various activities such as risk identification and assessment, policy development, and solution implementation, plays a crucial role in maintaining the integrity and security of information systems. This study aims to develop and implement an efficient and effective enterprise architecture within the information security sector, focusing on three key core processes identified as the major revenue contributors: risk identification and assessment, security policy development, and security solution implementation. Utilizing the TOGAF-based Enterprise Architecture framework, this research identifies and designs architecture that integrates various systems, applications, and business processes, facilitating better alignment within the organization. The architecture design process involves a thorough analysis of operational needs and business strategies, leading to the development of a model that enhances efficiency and reduces the risk of failure in technology implementation. The outcomes of this study are intended to provide practical guidance for information security companies to optimize operations, simplify system complexities, and achieve strategic goals more effectively. It is anticipated that the application of the designed architecture will have a significant positive impact on the company's ability to address challenges and dynamic needs within the information security industry.