Powered by RND
PodcastsTechnologiesThe ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

Luigi Ferri
The ITSM Practice: Elevating ITSM and IT Security Knowledge
Dernier épisode

Épisodes disponibles

5 sur 91
  • ITIL CMDB Best Practices: Scale Smart with Real Business Value in 7 Steps
    Discover how to scale your CMDB from a static list to a powerful tool that drives business value. In this episode, we unpack seven practical steps to create a clean, scalable, and business-aligned CMDB that supports ITSM success and compliance goals.In this episode, we answer to:How can I align my CMDB with business outcomes and KPIs? What are the best practices to keep CMDB data clean and reliable? How do I automate and govern my CMDB without losing control?Resources Mentioned in this Episode: ServiceNow whitepaper, “Deliver a CMDB with true business value: 6 essential steps”, link https://www.servicenow.com/blogs/category/product-newsDevice42 website, article “CMDB Architecture Best Practices: Aligning Design with IT Objectives”, link https://www.device42.com/cmdb-best-practices/cmdb-architecture/Aspire Systems website, article “Navigating and Overcoming CMDB Health Challenges in Enterprises”, link https://blog.aspiresys.com/business-applications/servicenow/navigating-and-overcoming-cmdb-health-challenges-in-enterprises/Starhive website, article “10 CMDB best practices for an actually successful implementation”, link https://starhive.com/blog/10-cmdb-best-practicesConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    6:50
  • ISO 27001 Clause 8 Explained: Turning ISMS Plans into Real Security Operations
    In this episode of The ITSM Practice Podcast, Luigi Ferri dives into Clause 8 of ISO 27001, where your Information Security Management System (ISMS) shifts from paper to practice. Discover how operational planning, risk assessments, and treatment plans come alive through evidence, control, and continuous improvement.In this episode, we answer to:What is the real purpose of Clause 8 in ISO 27001, and why is it essential for ISMS success?How should risks be assessed and documented in a structured, auditable way?What actions must be taken to treat identified security risks effectively and continuously?Resources Mentioned in this Episode:ISMS.online, article “ISO 27001 Requirement 8.1 – Operational Planning & Control”, link https://www.isms.online/iso-27001/operational-planning-control/Stuart Barker, video “How to implement ISO 27001 Clause 8 Operation" by Stuart Barker”, link https://www.youtube.com/watch?v=LdGYW3MPZPgAdvisera, article “Big guide to ISO 27001 clauses — How is this standard structured?”, link https://advisera.com/iso27001/clause-8-operation/Standard ISO/IEC 27001:2022Connect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    8:01
  • ITIL 4 Principles: Key to Organizational Excellence
    Explore the transformative power of ITIL 4 Guiding Principles in this episode of The ITSM Practice. Luigi Ferri delves into how these principles can drive organizational value, offering practical exercises to assess and enhance your ITIL 4 maturity. Engage with essential strategies for simplification, automation, and collaboration, all aimed at optimizing operational excellence.In this episode, we answer to:How can organizations ensure every action adds value to stakeholders?What strategies can help leverage existing resources without starting from scratch?How does collaboration enhance visibility and drive innovation?Resources Mentioned in this Episode: ITIL Guiding Principles, Organizational Value, Operational Excellence, ITIL Maturity Assessment, Continuous Improvement, Stakeholder Value, Process Optimization, IT Service Management, ITSM Best Practices, Collaborative Innovation, Simplifying Processes, Automation in ITSM, ITIL Implementation, Value Creation, Organizational Efficiency, ITIL Training, Enterprise Service Management, ITIL Strategy, IT Governance, ITIL Principles ExerciseConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    8:00
  • Strategic Enablement through IT Service Management for CIOs
    In this episode of The ITSM Practice, Luigi Ferri explores how service management can be a strategic enabler for businesses. We delve into aligning IT Service Management (ITSM) with corporate goals to drive growth and value. This guide covers practical steps for CIOs, from assessing current operations to embedding service management deeply into business strategy, ensuring IT is not just a support function but a core part of business success.In this episode, we answer to:How can service management align directly with an organization's strategic goals?What practical steps can CIOs take to integrate service management with business objectives?How does embedding pragmatic service management practices help overcome common business challenges?Resources Mentioned in this Episode: ITSM Tools website, article “ESM – It’s Not Just About ITSM Processes”, link https://itsm.tools/esm-not-just-about-itsm-processes/Think HDI, article “How to Transform Service Management Beyond IT”, link https://www.thinkhdi.com/library/supportworld/2021/transform-service-management-beyond-itCACM website, article “An Overview of IT Service Management”, linked https://cacm.acm.org/research/an-overview-of-it-service-management/Connect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    9:39
  • Digital Identity Evolution: Past, Risks, and Future Insights
    In this episode of "The ITSM Practice," Luigi Ferri explores the transformative journey of digital identity from basic usernames and passwords to advanced biometric systems and decentralized blockchain solutions. We discuss how digital identity has evolved to enhance security, user convenience, and data integrity, alongside the challenges of privacy, surveillance, and data breaches. Learn about the potential of Web 3.0 and self-sovereign identities in shaping a more secure and user-centric digital world.In this episode, we answer to:How has the role of digital identities evolved from simple logins to complex biometric systems?What are the key risks and vulnerabilities associated with current digital identity systems?How can decentralized technologies like blockchain improve the security and autonomy of digital identities?Resources Mentioned in this Episode: CDN Prod website, article "The Evolution of Digital Identity", link https://cdn.prod.website-files.com/660433347fef5f6938800768/6604346408b181838d132807_The%20Evolution%20of%20Digital%20Identity%20-%20By%20Vidos.pdfBusiness Reporter website, article "The history of digital identity", link https://www.business-reporter.co.uk/technology/the-history-of-digital-identityBiometric Update website, article "The evolution of digital identity: From databases to blockchain", link https://www.biometricupdate.com/202408/the-evolution-of-digital-identity-from-databases-to-blockchainG+D Spotlight Newsletter, article "The reinvention of identity for the digital age", link https://www.gi-de.com/en/spotlight/digital-security/the-reinvention-of-identity-for-the-digital-ageConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    9:42

Plus de podcasts Technologies

À propos de The ITSM Practice: Elevating ITSM and IT Security Knowledge

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com
Site web du podcast

Écoutez The ITSM Practice: Elevating ITSM and IT Security Knowledge, De quoi jme mail ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités
Applications
Réseaux sociaux
v7.16.2 | © 2007-2025 radio.de GmbH
Generated: 4/26/2025 - 1:43:36 PM