What are the benefits of using cobit as opposed

Assignment Help Basic Computer Science
Reference no: EM132976332 , Length: 4

William Montgomery Gardner III (WG) is the owner of Gardner Novelties, Inc., a large family business that designs and manufactures specialty items for sale at roadside restaurants around the country. The company has over 2,500 employees in 13 locations around the world. They have recently begun to outsource a lot of their manufacturing to China, Mexico and India. In spite of a bad economy, WG has been able to consistently grow the company's revenues at a rate of over 10% per year over the last ten years. As a result, WG has decided to take the company public. The Initial Public Offering (IPO) is scheduled to take place next month.

  • WG calls you, Joseph K. Barnes (JB) into his office. You have been in charge of all Information Technology services for the company for the past 17 years. You have a staff of 12 direct reports in your department, of which 6 are located in the company headquarters office with you. Since the items being manufactured are not technical in nature, there has never been a lot of emphasis placed on protecting proprietary data in the corporate network. Most of your time is spent dealing with service calls and Internet disruptions, maintaining the firewall, and uploading software patches.
  • WG tells you of the plans for the company. You try to act surprised, but the rumor has been floating around the company for months now so it is anything but a surprise. You are a little alarmed by the fact that the IPO is planned for next month, however.
  • WG explains that once the IPO takes place, they will need to have everything in place to be in compliance with Sarbanes-Oxley. WG asks if you are familiar with Section 404 of SOX.
  • You struggle to find the right words. You've heard of Section 404 from friends and colleagues who have had to deal with it for years now, but you never though it was something you needed to know. You mention that you know Section 404 deals with management's assessment of internal controls, and that the IT network will need to have some controls put in place.
  • WG tells you he needs a plan from you in one week on how to get the IT system in compliance with SOX. You will need to make a presentation to the Executive Committee (ExCom) on your plan. The ExCom will consist of, among others, WG, the COO, VP of Human Resources, and the CFO of the company. WG warns you not to let him down...there is a lot riding on this IPO and the investors and analysts want to know that the company will be in compliance with SOX.
  • JB walks out of the meeting and his head is spinning. He has one week to develop a plan to bring the company's entire IT system into compliance with SOX. How is he supposed to do that? He decides that the first course of action will be to call a friend, Robert Rodes (RR), who works for a publicly-traded company. Maybe he can help point JB in the right direction.

Read the scenario and decide on a response. Your goal is to identify the critical issues in the scenario and determine how you would resolve. Write a 3 to 4 page paper that addresses the following issues:

Question 1: Explain your plan for implementing COBIT for Gardner Novelties. Your plan should include a discussion of the following elements:

Question 2: What will Gardner Novelties be required to do with IT to remain in compliance with SOX?

Question 3: What is COBIT and how can it help keep Gardner Novelties in compliance with SOX?

Question 4: What are the benefits of using COBIT as opposed to other control frameworks?

Question 5: What questions would you expect to receive from the Executive Committee of Gardner Novelties? Identify two questions that you could be asked and address how you would answer them.

Reference no: EM132976332

Questions Cloud

Perform a quantitative risk analysis for a company network : Perform a quantitative risk analysis for a company's network. Please use your imagination and feel free to specify any vulnerabilities and threats
What are challenges to mobile forensics : What is the percentage of attacks on networks that come from mobile devices? Should the analysis be different on iOS vs Android?
Series of statements intended to prove some conclusion : -Make sure that you identify a situation in which you were convinced or had your mind changed on the basis of good evidence.
Essay - reflect on key issue : Essay where you reflect on ONE key issue selected from among those covered in the lectures (creativity, gender, cultural minority ideology, postcolonialism
What are the benefits of using cobit as opposed : What are the benefits of using COBIT as opposed to other control frameworks? William Montgomery Gardner III (WG) is the owner of Gardner Novelties
Which organizations can make the data centers green : Which organizations can make their data centers "green". In your discussion, find an example of an organization that has already implemented
Describe understanding of big data : Describe your understanding of big data and give an example of how you've seen big data used either personally or professionally.
Explain major components of a data warehouse architecture : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data
What is responsible leadership : Using TWO examples from business, explain how leading responsibly in business can lead to positive social change.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the number of spanning trees

Assume we have 20 hosts in a small AS. There are only four groups in this AS.

  Purpose of counting occurrances

Consider only letters of the English alphabet (that is, 'a' through 'z').

  Discuss the negative exponential distribution

Rework the simulation so that the clock is represented as a double, the time between dial-in attempts is modeled with a negative exponential distribution.

  What evolutionary process should universities be looking

Who is managing the customer of the University?

  Find marginal cost-average total cost

Find marginal cost, average total cost and average variable cost. Explain whether the cost function represents a long or short run time frame.

  Evaluating inductive or deductive arguments

Are you more effective evaluating inductive or deductive arguments and why?

  Payments in the context of the cost of debt

Explain the benefit of tax deduction of interest payments in the context of the cost of debt.

  Prepare for the dissertation process

This assignment will be one of several throughout your program that we use to help you prepare for the dissertation process.

  How a hacker can use it to get sensitive information

Describe a type of email threat and how a hacker can use it to get sensitive information.

  Write a program to test your function

Write a recursive function, sumDigits, that takes an integer as a parameter and returns the sum of the digits of the integer. Also, write a program to test your function. Turn in your source code.

  Strong educational programs

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in disciplines and communities

  Find the number of days the company should operate

Production the James MacGregor Mining Company owns three mines: I, II, and III. Three grades of ore, A, B, and C, are mined at these mines.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd