Blog
Published 02 Jun 2016
Is your organization ready for the biggest shake-up of data protection laws in 20 years? The European Union’s General Data Protection Regulation will take effect from this year with the aim of giving EU citizens greater control of what happens to their data and containing t...
Cyber resilience|Data protection|RESILIA|Risk management|Sensitive data|Skills
Blog
Published 25 May 2016
Just because you can connect a device to the internet doesn't mean you should. While connected devices (commonly called the “Internet of Things”) can deliver new services, there needs to be security, privacy and clear ownership of data. The endgame for the Internet of ...
Behaviour|Cyber resilience|Data protection|Processes|RESILIA|Sensitive data|Vulnerability
Blog
Published 09 Aug 2018
And just like that, we’re done with Day 3 of Agile 2018 ! I’m hoping that by now any readers are aware of the previous two posts about days 1 and 2, but if not...here they are: Day 1 Day 2 The last hurrah - final thoughts from Agile 2018 The focus of the po...
Agile|Benefits realization|Big Data|Business information management|Customer Engagement|Customer needs|Learning
Blog
Published 11 Nov 2016
I remember the divide in the industry when we published Service Strategy in the summer of 2007. Whilst a minority said it was inspirational, the majority questioned what right IT had in trying to shape business strategy. Zoom forward more than a decade, where the Fourth...
Capabilities|Collaboration|IT services|ITIL|Skills|Strategy execution|Value
Blog
Published 18 Jan 2016
How much do Small and Medium Sized Enterprises ( SMEs ) have to fear from cyber-attack? The high profile cyber attacks of the past year have involved much bigger commercial fish than companies in the SME market. But that doesn’t render them immune – far from it. 74% of s...
Cyber resilience|Cyber-attack|Data Protection|RESILIA|Risk management|Vulnerability
Blog
Published 09 Jan 2019
Automation today, and certainly in the future, can do many things equally if not better than humans, providing efficiency and cost savings. Ideally this also allows people to do more interesting work. The opportunity is clear that – as artificial intelligence becomes yet m...
Benefits realization|Big Data|IT service management (ITSM)|ITIL|Knowledge management|Processes|Service management
Blog
Published 20 Nov 2018
As part of the CBI Cyber Security Conference 2018 , experts hosted a future looking session to “examine the latest threat intelligence and emerging risks for businesses in the cyber security landscape”. The panel considered what threat and risk issues boards need to be addr...
Best practice|Cyber resilience|Cyber security|Cyber-attack|GDPR|Threats
Blog
Published 23 Feb 2018
Scott Harberd shares his experience of implementing PPM software during a period of transformation and change for one of the UK’s largest airlines. Following a period of rapid growth and promotion to the FTSE 100, the organization was outwardly successful but highly i...
Benefits realization|Change management|Communication|IT transformation|Maturity models|Project and Programme Management (PPM)
Blog
Published 30 Aug 2016
No matter how sophisticated an organization’s technical controls, there is always a risk of attack. In this day and age, with the great speed at which technology is advancing, the constant evolution of threats makes it impossible for any business to be 100% protected; what th...
Cyber resilience|Cyber-attack|Processes|RESILIA|Threats|Vulnerability
Blog
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value