Blog
Published 10 Dec 2019
Managing IT assets has been a natural part of business for decades: where is the asset? What are you paying for it and from whose budget? From the service management perspective of “ providing value through technology services ” we rely on the assets to deliver the technolog...
Benefits realization|IT service management (ITSM)|IT services|ITIL 4|Service catalogue|Service management|Value
Blog
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Blog
Published 24 Feb 2016
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of IT and security create such a strategy? There are a number of critical questions, driving factors and strategic considerations ...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management
Blog
Published 31 Oct 2019
It is October 2019. We are in the middle of the ITIL 4 refresh programme, having launched ITIL 4 Foundation in February and ITIL 4 Managing Professional Transition module at the beginning of this month. We are also about to launch two more Managing Professional books and ...
Certification|Customer experience|End-User Experience|Examinations|ITIL 4|Roles|Value
Blog
Published 14 May 2018
Personal information is an asset that can create more value for customers, hence people want to share their data with organizations. However, the EU General Data Protection Regulation (GDPR) says we have to manage their data properly. From 25 May 2018, this applies insi...
Best practice|Cyber Resilience|Cyber-Attack|GDPR|Incident management|ITIL|Value
Blog
Published 14 Dec 2018
Julie L. Mohr, renowned author and international keynote speaker, shares with AXELOS her thoughts on why consumers are embracing companies such as Uber, Amazon and Netflix and why IT organizations can either learn lessons from the disruption economy, or risk extinction: ...
Digital transformation|IT components|IT services|IT transformation|ITIL
Blog
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
Blog
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Anti-virus software|Certification|Cyber-attack|Examinations|RESILIA|Threats
Blog
Published 30 Apr 2019
Value for Stakeholders, PESTLE and the Four Dimensions Welcome back! This post is the second in a series in which I connect key concepts of ITIL 4. In the last article, we briefly discussed the concept of value co-creation, and I’d like to expand on that here. While value ...
Customer engagement|Customer experience|IT service management (ITSM)|ITIL|ITIL 4|Service management
Blog
Published 21 Oct 2016
I n recent years Romania and, more broadly, South East Europe have become a hotbed for international IT services. Due to the region’s Internet of Everything approach, the IT market is booming and facilities like Security Operations Centres (SOCs) and Network Operation Centres...
Communication|Continual Service Improvement (CSI)|IT services|ITIL|Processes|Resource management