Powered by RND
PodcastsTechnologyThe ITSM Practice: Elevating ITSM and IT Security Knowledge
Listen to The ITSM Practice: Elevating ITSM and IT Security Knowledge in the App
Listen to The ITSM Practice: Elevating ITSM and IT Security Knowledge in the App
(7,438)(250,057)
Save favourites
Alarm
Sleep timer

The ITSM Practice: Elevating ITSM and IT Security Knowledge

Podcast The ITSM Practice: Elevating ITSM and IT Security Knowledge
Luigi Ferri
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations ...

Available Episodes

5 of 85
  • ITIL 4 in Action: Crafting Standard Service Models for Success
    Join Luigi Ferri on The ITSM Practice as we dissect the creation of a Standard Service Model (SSM) using ITIL 4, ensuring IT services are proactive, consistent, and aligned with business objectives. This episode delves into the strategic blueprint for measurable value and minimized risks in service delivery, providing a step-by-step guide to crafting a model that leverages ITIL 4’s flexibility and customer-centric focus for enduring success.In this episode, we answer to:What are the core components of a Standard Service Model?How does ITIL 4 enhance the development of a Standard Service Model?What steps are involved in building an SSM using ITIL 4?Resources Mentioned in this Episode:ITSM Tools website, article "Service Model Development Using ITIL 4 for Service Delivery", link https://itsm.tools/developing-a-standard-service-model-using-the-itil-4-guiding-principles/Knowledge Hut website, article "ITIL 4 Models - A New Operating Model in ITIL 4", link https://www.knowledgehut.com/blog/it-service-management/itil-modelConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    8:50
  • 3 Years of IBM Breach Reports: Key Business Protections
    Join Luigi Ferri on "The ITSM Practice" as we delve into the escalating costs and complexities of data breaches from 2022 to 2024, highlighting a record rise to $4.88 million per incident. This episode unpacks the multifaceted impacts of breaches on businesses, examining the balance between automation and visibility in cybersecurity. Discover actionable steps to safeguard your organization, enhance resilience, and optimize cost efficiency through strategic automation combined with vigilant human oversight.In this episode, we answer to:What are the financial and operational impacts of data breaches on businesses?How can automation in cybersecurity be both a benefit and a risk?What actionable steps can organizations take to balance automation with human oversight in their security strategies?Resources Mentioned in this Episode:IBM, research "Cost of a Data Breach Report 2022 / 2023 / 2024", link https://www.ibm.com/reports/data-breachConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    8:52
  • Halt Repeat Issues: Easy Problem Management
    In today's episode of The ITSM Practice, Luigi Ferri delves into Problem Management, a proactive approach aimed at identifying and eradicating the root causes of recurring IT incidents. We explore practical strategies, from root cause analysis using tools like fishbone diagrams to implementing permanent solutions. Discover the transformative impact of Problem Management on service quality, operational efficiency, and cost savings, along with a handy checklist to jumpstart your organization’s shift from reactive fixes to proactive problem-solving.In this episode, we answer to:What distinguishes Problem Management from Incident Management?How can Problem Management improve operational efficiency and reduce costs?What are practical steps for integrating Problem Management within an organization?Resources Mentioned in this Episode:IBM, article "What is problem management?", link https://www.ibm.com/think/topics/problem-managementPeopleCert, article "Problem management - Major Incidents and Service Managers", link https://www.peoplecert.org/Connect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    9:26
  • OT Security Simplified: 6 Key Principles for Critical Systems Protection
    In today's episode of "The ITSM Practice," Luigi Ferri delves into Operational Technology (OT) Cybersecurity, crucial for protecting vital infrastructure like energy, water, and healthcare. We discuss six actionable principles essential for safeguarding these systems against cyber threats, emphasizing the importance of safety, business knowledge, data protection, network segmentation, supply chain security, and human factors in creating a resilient cybersecurity strategy.In this episode, we answer to:How can your organization enhance the safety of OT systems during cyber incidents?What strategies can help protect sensitive OT data from cyber threats?How does network segmentation contribute to securing OT environments?Resources Mentioned in this Episode:Australian Government, whitepaper "Principles of Operational Technology Cyber Security", link https://industrialcyber.co/features/acscs-ot-cyber-security-principles-call-to-action-for-critical-infrastructure-providers-to-boost-cyber-resilience/Dark Reading, article "NSA Releases 6 Principles of OT Cybersecurity", link https://www.darkreading.com/ics-ot-security/nsa-releases-6-principles-ot-cybersecurityConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
    --------  
    9:42
  • Protect Your Data How FIM and DLP Work Together to Secure Information
    In today's episode of "The ITSM Practice," hosted by Luigi Ferri, we explore crucial data protection technologies: File Integrity Monitoring (FIM) and Data Loss Prevention (DLP). Discover how FIM acts as a vigilant monitor of file changes, ensuring system integrity, while DLP secures sensitive content, preventing unauthorized data leaks. Together, they form a robust security framework vital for any organization aiming to fortify its defenses against both internal and external threats. In this episode, we answer to: What are File Integrity Monitoring (FIM) and Data Loss Prevention (DLP), and how do they enhance organizational security? How does the integration of FIM and DLP contribute to a comprehensive security infrastructure? Why is it crucial to have both FIM and DLP in place for effective risk management and data protection? Resources Mentioned in this Episode: Microsoft, article "File Integrity Monitoring in Microsoft Defender for Cloud", link https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview Tripware, article "What Is the Difference between FIM and DLP", link https://www.tripwire.com/state-of-security/what-difference-between-fim-and-dlp Connect with me on: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaya
    --------  
    6:19

More Technology podcasts

About The ITSM Practice: Elevating ITSM and IT Security Knowledge

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com
Podcast website

Listen to The ITSM Practice: Elevating ITSM and IT Security Knowledge, Possible and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.11.0 | © 2007-2025 radio.de GmbH
Generated: 3/13/2025 - 8:58:02 PM