Published 11 Mar 2016
Behaviour is a critical success factor in any organization and yet – traditionally – many frameworks such as ITIL ® , SCRUM or LEAN, fail to address behaviour change. The issue is that many senior leaders and managers use negative consequences to encourage the desired b...
Behaviour|Change management|Frameworks|IT Service Management (ITSM)|Leadership|Service desk
Published 09 Nov 2015
In the AXELOS White Paper "The impact of behaviour on project delivery", independent consultant Ann Cheung says that behaviour impacts "every aspect" of project delivery. She recommends project and programme management practitioners getting to grips with behavioural scien...
Behaviour|Best Practice|Processes|Programme management|Project and programme delivery|Project and Programme Management (PPM)|Project management
Published 15 Dec 2015
A summary of a presentation given to the Digital Leaders Conference on 9 December 2015 Here are two short, true stories: In the spring of 2013 the CEO of a global energy organization was finalizing the details of a significant commercial bid with his board colleagues. On...
Behaviour|Best Practice|Cyber Resilience|Cyber-Attack|Learning
Published 31 May 2016
At first glance you might not think AXELOS’ latest best practice certifications – PRINCE2 Agile ® , RESILIA ™ and ITIL ® Practitioner – have very much in common. However, there is a shared thread running through each that can have a real impact on organizational...
Published 16 Oct 2017
We should “stop talking nonsense” about people being the weakest link in our cyber security, according to the head of the UK’s National Cyber Security Centre . Ciaran Martin, the organization’s CEO – speaking at the CBI’s Cyber Security Conference 2017 in London on 13 Sep...
Behaviour|Cyber security|Data protection|Leadership|Threats|Training
Published 03 Dec 2015
How much can companies rely on their people to not be a source of vulnerability in the face of increasing attacks on corporate information? Consider the recent “social experiment” conducted by US-based computer trade association CompTIA , involving apparently discarded US...
Behaviour|Best Practice|Business Solutions|Cyber Resilience|Cyber-Attack|Processes|Risk Management|Vulnerability
Published 07 Dec 2017
In recent days, there’s been a lot of comment (in news stories , by pundit s , on social media, and in online forums) about how appalling it is that MPs are sharing passwords with their staff. Amid all that chatter, on a forum that I follow, John Custy ( @ITSMNinja ) mad...
Behaviour|Cyber security|End-user experience|IT services
Published 07 Mar 2016
How well-prepared is the UK’s workforce for a cyber attack on the companies they work for? What generally dictates the capability and performance of anyone, working anywhere is the relevance and effectiveness of the training and learning they’re given and the behaviours they...
Published 28 Feb 2018
The banking and personal savings sector is a prime target for hackers, which is no surprise when that's where the money is! Hackers use social engineering and phishing techniques to target both staff and customers to gain access to an organization's information, data and mo...
Behaviour|Cyber security|Cyber-attack|Sensitive data|Training
Published 24 Aug 2017
Phishing , Trojan Horses, Malware, Whaling , Denial of Service – these are all terms that have become common currency in the world of cyber security. With increasing public exposure of global organizations’ cyber security vulnerabilities , the language of cyber threats a...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|Threats|Vulnerability