Published 09 Aug 2016
The issue with Delta Air Lines’ computer system on 8 August 2016 created chaos for travellers around the world. The official reason for the systems crash was a power outage, initially described as something outside of Delta’s control, a claim that has not been backed up by t...
Information systems|IT Service Management (ITSM)|IT Services|Processes|Vulnerability
Published 24 Feb 2016
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of IT and security create such a strategy? There are a number of critical questions, driving factors and strategic considerations ...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management
Published 25 Sep 2017
AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience How often do we hear stories of how multi-national corporations have been hacked via third-party s...
Cyber security|Cyber-attack|Information systems|Processes|Threats|Vulnerability
Published 24 Mar 2016
This is the first in a series of conversations with Nick Wilding and leading cyber resilience commentators and practitioners from around the world. Who should countries and companies learn from when thinking about cyber resilience? Estonia has been described in tech pub...
Published 14 Dec 2016
Why is IT Service Management (ITSM) important to organizations? Executives, of course, want to measure systems, data and people and how the IT infrastructure and the provided services are helping end-users to accomplish their business goal more efficiently. In the past, onl...
IT Service Management (ITSM)|IT Services|ITIL|Problem management|Processes|Requirements
Published 07 Dec 2017
In recent days, there’s been a lot of comment (in news stories , by pundit s , on social media, and in online forums) about how appalling it is that MPs are sharing passwords with their staff. Amid all that chatter, on a forum that I follow, John Custy ( @ITSMNinja ) mad...
Behaviour|Cyber security|End-user experience|IT services
Published 12 May 2016
CIOs have overall responsibility for IT strategy within a business and are accountable for the governance and management of IT resources. In most organizations, the CIO is someone with a broad knowledge of IT and is able to provide vision and leadership in all aspects of IT...
Communication|IT services|Leadership|Resource management|Skills
Published 30 Aug 2018
With system breaches at universities doubling over the past two years, cyber-resilience is an increasing concern. In the first of two blog posts Kuldip Sandhu, Higher and Further Education Consultant, Innovative Quality Solutions looks at the challenges and considers soluti...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|Learning|RESILIA|Training
Published 04 Apr 2019
With so much hype today about artificial intelligence, IT service providers need to weed out the facts from the fiction to develop as successful strategy . The most promising area of study and research in artificial intelligence for ITSM is in machine learning or teaching co...
IT service management (ITSM)|IT services|Service management|Strategic objectives|Value
Published 17 May 2017
We’re used to seeing headlines like those we woke up to on 13 May 2017. ‘Huge ransomware attack hits hospitals’. ‘Unprecedented global ransomware attack’. ‘Global cyber-crime hits a new high’. TV and media reporting has continued the hyperbole since the news was first reporte...
Anti-Virus Software|Confidentiality|Cyber Resilience|Cyber-Attack|Data Protection|RESILIA|Risk Management|Sensitive data|Threats|Vulnerability