On Monday, 21 Oct we are carrying out essential maintenance. The site may be offline for up to 12 hours, from 4pm BST.  We apologise for any inconvenience this may cause you.

Latest blogs from AXELOS

ITIL Practitioner: the new stand-out certification

  • 29 February 2016
  • Capabilities, Certification, Continual Service Improvement (CSI), IT Service Management (ITSM), ITIL, Skills
Among the various certifications and courses I deliver training for, ITIL Practitioner stands out.

Standardize your project processes with checklists

  • 26 February 2016
  • Best practice, PRINCE2, Processes, Project and programme management (PPM), Project checklists, Project management
The principle objective for a project – delivering a specific output – can often be relegated to a focus on standardization.

What does good cyber resilience look like?: building a solid information security strategy

  • 24 February 2016
  • Cyber resilience, Cyber-attack, Information management, Processes, RESILIA, Risk management
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of...

ITIL Practitioner: Communication and IT Change Management

  • 22 February 2016
  • Change management, Communication, IT Service Management (ITSM), ITIL, Processes, Requirements, Skills
Being able to break through jargon is vital for effective communication, particularly when dealing with people who have little or no technical...

Qualifications – something for the CV or a long-term career plan?

  • 19 February 2016
  • Career planning, Certification, CPD, Project and Programme Management (PPM), Qualifications, Skills, Training
A best practice qualification might be treated like a shiny, new toy. However, it will lose its sparkle unless there’s more to it than just...

What does good information security and cyber resilience look like?

  • 17 February 2016
  • Best practice, Cyber resilience, Cyber-attack, Information management, RESILIA, Threats
What does good look like for organizations trying to keep their sensitive information secure?

Making the Guiding Principles live! - Designing for User experience?

  • 15 February 2016
  • Adopt and adapt, Behaviour, Customer experience, IT transformation, ITIL, Value
To my mind, one of the most useful additions to ITIL® Practitioner is the Guiding Principles (GP). The Guiding Principles help focus on the...

Understanding why your projects aren’t working

  • 10 February 2016
  • Maturity models, P3M3, Programme management, Project and programme delivery, Project management, Stakeholder management
Does your organization have a problem with delivering projects and are you wrestling with the question: “how do we start to improve our...

Preparing your organization for an agile project

  • 08 February 2016
  • Agile, PRINCE2 Agile, Project and programme management (PPM), Project management, Requirements, Stakeholder engagement

The risks of promoting Project Managers to Programme Managers

  • 04 February 2016
  • Best Practice, MSP, PRINCE2, Programme management, Project and programme management (PPM), Project management, Requirements, Skills
The transition from project to programme management means being able to adapt and to draw upon a set of different skills as programme management is...
1 2 >