Published 10 Dec 2019
Managing IT assets has been a natural part of business for decades: where is the asset? What are you paying for it and from whose budget? From the service management perspective of “ providing value through technology services ” we rely on the assets to deliver the technolog...
Benefits realization|IT service management (ITSM)|IT services|ITIL 4|Service catalogue|Service management|Value
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 24 Feb 2016
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of IT and security create such a strategy? There are a number of critical questions, driving factors and strategic considerations ...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management
Published 31 Oct 2019
Update January 2020 Hi everyone, I thought it worth providing a quick update. Most of the changes mentioned below have been made. However, there were 3 changes or clarifications that I wanted to share now: The new definition of Problem appears in the glossary only. The ma...
Certification|Customer experience|End-User Experience|Examinations|ITIL 4|Roles|Value
Published 01 Apr 2020
Companies worldwide are now realizing that cyber resilience is not just a “good to have”, but a necessity. It’s no longer a question of if but when risks will emerge and when vulnerabilities are exploited with threats relating to information assets such as data, syst...
Published 14 May 2018
Personal information is an asset that can create more value for customers, hence people want to share their data with organizations. However, the EU General Data Protection Regulation (GDPR) says we have to manage their data properly. From 25 May 2018, this applies insi...
Best practice|Cyber Resilience|Cyber-Attack|GDPR|Incident management|ITIL|Value
Published 14 Dec 2018
Julie L. Mohr, renowned author and international keynote speaker, shares with AXELOS her thoughts on why consumers are embracing companies such as Uber, Amazon and Netflix and why IT organizations can either learn lessons from the disruption economy, or risk extinction: ...
Digital transformation|IT components|IT services|IT transformation|ITIL
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
Published 08 Sep 2020
In what way will project management – and project managers – be important to help organizations emerge in the "new normal"? This is, I believe, the chance for the discipline and its practitioners to shine. There will be myriad changes to working environments which will neve...
Certification|PRINCE2|Programme management|Project management
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...