Published 07 May 2015
Configuration management systems (CMS) are the bedrock of IT service management (ITSM); they provide the tools and databases to hold and manage all the necessary information about the assets used to deliver IT services – hardware, software, network equipment, processes, servi...
Information Management|ITIL|Management|Requirements|Service Desk|Service Management|Value
Published 09 Aug 2016
The issue with Delta Air Lines’ computer system on 8 August 2016 created chaos for travellers around the world. The official reason for the systems crash was a power outage, initially described as something outside of Delta’s control, a claim that has not been backed up by t...
Information systems|IT Service Management (ITSM)|IT Services|Processes|Vulnerability
Published 25 Sep 2017
AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience How often do we hear stories of how multi-national corporations have been hacked via third-party s...
Cyber security|Cyber-attack|Information systems|Processes|Threats|Vulnerability
Published 14 Dec 2016
Why is IT Service Management (ITSM) important to organizations? Executives, of course, want to measure systems, data and people and how the IT infrastructure and the provided services are helping end-users to accomplish their business goal more efficiently. In the past, onl...
IT Service Management (ITSM)|IT Services|ITIL|Problem management|Processes|Requirements
Published 24 Feb 2016
Good information security and cyber resilience begins with creating a solid security strategy. So, how do organizations and their CISOs or Heads of IT and security create such a strategy? There are a number of critical questions, driving factors and strategic considerations ...
Cyber resilience|Cyber-attack|Information management|Processes|RESILIA|Risk management
Published 19 Mar 2015
I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connect...
Best Practice|Confidentiality|Cyber Resilience|Data protection|Frameworks|Risk management
Published 12 May 2016
CIOs have overall responsibility for IT strategy within a business and are accountable for the governance and management of IT resources. In most organizations, the CIO is someone with a broad knowledge of IT and is able to provide vision and leadership in all aspects of IT...
Communication|IT services|Leadership|Resource management|Skills
Published 30 Aug 2018
With system breaches at universities doubling over the past two years, cyber-resilience is an increasing concern. In the first of two blog posts Kuldip Sandhu, Higher and Further Education Consultant, Innovative Quality Solutions looks at the challenges and considers soluti...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|Learning|RESILIA|Training
Published 23 Dec 2015
A recent poll of City of London bosses by the Financial Times called on companies to hire a “younger generation of boardroom directors to head off the systemic threat that cyber risk poses to the financial system”.¹ I welcome business leaders openly discussing the signi...
Cyber Resilience|Cyber-attack|Information systems|Processes|Risk management|Skills|Vulnerability
Published 24 Mar 2016
This is the first in a series of conversations with Nick Wilding and leading cyber resilience commentators and practitioners from around the world. Who should countries and companies learn from when thinking about cyber resilience? Estonia has been described in tech pub...