What are the benefits of using cobit as opposed

Assignment Help Basic Computer Science
Reference no: EM132976332 , Length: 4

William Montgomery Gardner III (WG) is the owner of Gardner Novelties, Inc., a large family business that designs and manufactures specialty items for sale at roadside restaurants around the country. The company has over 2,500 employees in 13 locations around the world. They have recently begun to outsource a lot of their manufacturing to China, Mexico and India. In spite of a bad economy, WG has been able to consistently grow the company's revenues at a rate of over 10% per year over the last ten years. As a result, WG has decided to take the company public. The Initial Public Offering (IPO) is scheduled to take place next month.

  • WG calls you, Joseph K. Barnes (JB) into his office. You have been in charge of all Information Technology services for the company for the past 17 years. You have a staff of 12 direct reports in your department, of which 6 are located in the company headquarters office with you. Since the items being manufactured are not technical in nature, there has never been a lot of emphasis placed on protecting proprietary data in the corporate network. Most of your time is spent dealing with service calls and Internet disruptions, maintaining the firewall, and uploading software patches.
  • WG tells you of the plans for the company. You try to act surprised, but the rumor has been floating around the company for months now so it is anything but a surprise. You are a little alarmed by the fact that the IPO is planned for next month, however.
  • WG explains that once the IPO takes place, they will need to have everything in place to be in compliance with Sarbanes-Oxley. WG asks if you are familiar with Section 404 of SOX.
  • You struggle to find the right words. You've heard of Section 404 from friends and colleagues who have had to deal with it for years now, but you never though it was something you needed to know. You mention that you know Section 404 deals with management's assessment of internal controls, and that the IT network will need to have some controls put in place.
  • WG tells you he needs a plan from you in one week on how to get the IT system in compliance with SOX. You will need to make a presentation to the Executive Committee (ExCom) on your plan. The ExCom will consist of, among others, WG, the COO, VP of Human Resources, and the CFO of the company. WG warns you not to let him down...there is a lot riding on this IPO and the investors and analysts want to know that the company will be in compliance with SOX.
  • JB walks out of the meeting and his head is spinning. He has one week to develop a plan to bring the company's entire IT system into compliance with SOX. How is he supposed to do that? He decides that the first course of action will be to call a friend, Robert Rodes (RR), who works for a publicly-traded company. Maybe he can help point JB in the right direction.

Read the scenario and decide on a response. Your goal is to identify the critical issues in the scenario and determine how you would resolve. Write a 3 to 4 page paper that addresses the following issues:

Question 1: Explain your plan for implementing COBIT for Gardner Novelties. Your plan should include a discussion of the following elements:

Question 2: What will Gardner Novelties be required to do with IT to remain in compliance with SOX?

Question 3: What is COBIT and how can it help keep Gardner Novelties in compliance with SOX?

Question 4: What are the benefits of using COBIT as opposed to other control frameworks?

Question 5: What questions would you expect to receive from the Executive Committee of Gardner Novelties? Identify two questions that you could be asked and address how you would answer them.

Reference no: EM132976332

Questions Cloud

Perform a quantitative risk analysis for a company network : Perform a quantitative risk analysis for a company's network. Please use your imagination and feel free to specify any vulnerabilities and threats
What are challenges to mobile forensics : What is the percentage of attacks on networks that come from mobile devices? Should the analysis be different on iOS vs Android?
Series of statements intended to prove some conclusion : -Make sure that you identify a situation in which you were convinced or had your mind changed on the basis of good evidence.
Essay - reflect on key issue : Essay where you reflect on ONE key issue selected from among those covered in the lectures (creativity, gender, cultural minority ideology, postcolonialism
What are the benefits of using cobit as opposed : What are the benefits of using COBIT as opposed to other control frameworks? William Montgomery Gardner III (WG) is the owner of Gardner Novelties
Which organizations can make the data centers green : Which organizations can make their data centers "green". In your discussion, find an example of an organization that has already implemented
Describe understanding of big data : Describe your understanding of big data and give an example of how you've seen big data used either personally or professionally.
Explain major components of a data warehouse architecture : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data
What is responsible leadership : Using TWO examples from business, explain how leading responsibly in business can lead to positive social change.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd