Expert says ITIL plays well with others Cape Town, South Africa-based Gary Hardy is coauthor of “Aligning Cobit, ITIL and ISO 17799 for Business Benefit: A Management Summary,” which was jointly published by the IT Governance Institute and the U.K. Office of Government Commerce (the “owners” of ITIL). Hardy is an adviser to both the IT Governance Institute and the Information Systems Audit and Control Association (ISACA), having been a member of the latter for more than 25 years.CSO: How do Cobit and ITIL differ?Gary Hardy: Cobit [control objectives for information and related technology], which as of November 2005 is now in its fourth release, is a high-level set of objectives with management and assurance tools for overall IT governance. People call it a standard, but it isn’t: It’s a framework—and, like ITIL, a set of best practices. ITIL, on the other hand, is mostly focused on service delivery and service management, and on the delivery of IT services in terms of the processes that should be followed. In plain English, people say that Cobit is what you should do, and ITIL is how you should go about doing it—accepting that ITIL has a narrower scope.How would you describe ITIL’s approach to security issues? ITIL talks about security, but mostly in the context of service delivery. Frankly, security isn’t really what ITIL is focused on, it’s not its core strength, and it’s not what people go to ITIL for.And Cobit? Cobit has always been security-oriented, and at a high level sets out what should be done about security—the things that security should focus on, in other words. It provides a set of objectives and guiding principles. More recently, a “Cobit security baseline” has supplemented this—it’s an assessment tool, freely downloadable from ISACA (www.isaca.org). Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe