Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 07 May 2015
Configuration management systems (CMS) are the bedrock of IT service management (ITSM); they provide the tools and databases to hold and manage all the necessary information about the assets used to deliver IT services – hardware, software, network equipment, processes, servi...
Information Management|ITIL|Management|Requirements|Service Desk|Service Management|Value
Published 24 Feb 2016
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of IT and security create such a strategy? There are a number of critical questions, driving factors and strategic considerations ...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management
Published 14 May 2018
Personal information is an asset that can create more value for customers, hence people want to share their data with organizations. However, the EU General Data Protection Regulation (GDPR) says we have to manage their data properly. From 25 May 2018, this applies insi...
Best practice|Cyber Resilience|Cyber-Attack|GDPR|Incident management|ITIL|Value
Published 14 Dec 2018
Julie L. Mohr, renowned author and international keynote speaker, shares with AXELOS her thoughts on why consumers are embracing companies such as Uber, Amazon and Netflix and why IT organizations can either learn lessons from the disruption economy, or risk extinction: ...
Digital transformation|IT components|IT services|IT transformation|ITIL
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
Published 30 Apr 2019
Value for Stakeholders, PESTLE and the Four Dimensions This is Part 2 . You can read part 1 here . Welcome back! This post is the second in a series in which I connect key concepts of ITIL 4. In the last article, we briefly discussed the concept of value co-creation, a...
Customer engagement|Customer experience|IT service management (ITSM)|ITIL|ITIL 4|Service management
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 10 Dec 2014
"How can we be sure if our programmes and projects are delivering successful results? What's the best way of pinpointing our strengths and weaknesses?" Maturity is about recognizing the strengths and weaknesses in an organization’s existing portfolio, programmes and proje...
Maturity Models|P3M3|Portfolio Management|Programme Management|Project Management
Published 21 Oct 2016
I n recent years Romania and, more broadly, South East Europe have become a hotbed for international IT services. Due to the region’s Internet of Everything approach, the IT market is booming and facilities like Security Operations Centres (SOCs) and Network Operation Centres...
Communication|Continual Service Improvement (CSI)|IT services|ITIL|Processes|Resource management