Browse Definitions :
Definition

Certified in the Governance of Enterprise IT (CGEIT)

Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance. The CGEIT credential is designed to provide certification for those who direct, manage or otherwise support the governance of IT in large organizations. ISACA, an international non-profit organization previously known as the Information Systems Audit and Control Association, developed and runs CGEIT, which is accredited by the American National Standards Institute (ANSI).

Information technology governance in large organizations continues to grow in importance due to an ever-increasing reliance on IT to deliver services, along with the rising need to comply with complex laws and regulations concerning financial accountability, data security and protection, and privacy. As a result, the need arises for governance credentials, such as Certified in the Governance of Enterprise IT (CGEIT), as well as others such as ITIL Expert, run by Axelos, Certified in IT Governance, Risk Management, and Compliance (CRISC)  from ISACA and PMI Risk Management Professional from the Project Management Institute.

Since the introduction of CGEIT in 2007, more than 7,000 individuals have achieved the certification, with a large percentage holding senior positions as IT directors, audit directors, CIOs, CISOs and CEOs. According to ISACA, “CGEITs who successfully comply with the continuing professional education policy will be better equipped to support the Board of Directors and executive management.”

Having CGEIT credentials can give IT pros a leg up at their current firms as well as during recruiting and hiring. Additionally, CGEIT is among the highest-paying IT certifications, with an average salary of US $121,363, according to the 2018 IT Skills and Salary Report conducted by Global Knowledge.

CGEIT Qualifications: Education and Experience

To receive the certification, candidates must pass a four-hour exam, which includes 150 questions and covers five areas: Framework for the Governance of Enterprise IT, Strategic Management, Benefits Realization, Risk Optimization and Resource Optimization. CGEIT-certified professionals also must have at least five years of cumulative work experience in IT enterprise governance, including at least one year defining, implementing and managing a governance framework. (Individuals may take the CGEIT exam before meeting the experience requirements, which must be met before the CGEIT designation is awarded.)

Additionally, CGEIT holders are expected to comply with the ISACA Code of Professional Ethics as well as the CGEIT Continuing Education Policy, attaining an annual minimum of 20 continuing professional education (CPE) hours in related coursework to reach a minimum of 120 CPE hours for a three-year reporting period.

This was last updated in June 2018

Continue Reading About Certified in the Governance of Enterprise IT (CGEIT)

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close