Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
The 3 Risk Models Every IT and Business Leader Must Understand
|
May 27, 2025 |
Why ISO 27001 Certification Is Essential for Fintech Success in 2025
|
May 20, 2025 |
What is an ITIL 4 Master — And Why It Matters for Your ITSM Career
|
May 13, 2025 |
Is BIAN the Cure for Banking’s Integration Chaos or a Framework Too Late?
|
May 06, 2025 |
How to Make Change Stick: 6 Proven Steps to Lead with Purpose and Impact
|
Apr 29, 2025 |
ITIL CMDB Best Practices: Scale Smart with Real Business Value in 7 Steps
|
Apr 22, 2025 |
ISO 27001 Clause 8 Explained: Turning ISMS Plans into Real Security Operations
|
Apr 15, 2025 |
ITIL 4 Principles: Key to Organizational Excellence
|
Apr 08, 2025 |
Strategic Enablement through IT Service Management for CIOs
|
Apr 01, 2025 |
Digital Identity Evolution: Past, Risks, and Future Insights
|
Mar 25, 2025 |
Persistent Challenges in Project Management: Why They Endure
|
Mar 18, 2025 |
ITIL 4 in Action: Crafting Standard Service Models for Success
|
Mar 11, 2025 |
3 Years of IBM Breach Reports: Key Business Protections
|
Mar 04, 2025 |
Halt Repeat Issues: Easy Problem Management
|
Feb 25, 2025 |
OT Security Simplified: 6 Key Principles for Critical Systems Protection
|
Feb 18, 2025 |
Protect Your Data How FIM and DLP Work Together to Secure Information
|
Feb 11, 2025 |
Customer First: Boosting Quality and Profits
|
Feb 04, 2025 |
Transforming IT Operations: How Observability Improves Security and Performance
|
Jan 28, 2025 |
Secure System Design: Building Resilient IT Infrastructure
|
Jan 21, 2025 |
The Evolving Roles of Project Managers and Process Owners
|
Jan 14, 2025 |
Cloud or On-Premises? Decoding Costs and Strategy
|
Jan 07, 2025 |
Optimizing ITSM with ITIL 4: Understanding Business and Operating Models
|
Dec 31, 2024 |
Mastering ITIL Feedback: Transform Your Team's Performance
|
Dec 27, 2024 |
Top 5 Gaps in Strategy Execution
|
Dec 24, 2024 |
ITIL Swarming Techniques: Revolutionizing Problem Resolution
|
Dec 20, 2024 |
Enterprise Security 2030: Innovations for a Resilient Framework
|
Dec 17, 2024 |
ITIL's Take on Motivation: Boosting Workplace Performance
|
Dec 13, 2024 |
Vendor Consolidation vs. Defense in Depth
|
Dec 10, 2024 |
Enhancing Efficiency with ITIL Value Streams
|
Dec 09, 2024 |
The Future of Service Desks: How AI Transforms Customer Support
|
Dec 03, 2024 |
Security-First IT Projects: Essential Steps for Emerging Organizations
|
Nov 26, 2024 |
Tarun Ramesh Explores Scattered Spider Cloud Attacks
|
Nov 22, 2024 |
Top-Down vs. Bottom-Up Approach for Designing ITIL Processes: Which One Fits Your Business?
|
Nov 19, 2024 |
Future-Proofing Cybersecurity with Kyle Ryan’s AI Expertise
|
Nov 15, 2024 |
The Business Value of ITIL Service Design: Why It’s Essential for Selling IT Services
|
Nov 12, 2024 |
From Risk to Resilience: Casey Zduniak on Cyber Defense
|
Nov 08, 2024 |
What is an MSP Today and What Does the Future Hold?
|
Nov 05, 2024 |
The Importance of Software Transparency in SaaS: Why You Need an SBOM
|
Oct 29, 2024 |
Centralized vs. Decentralized ITSM: Finding the Right Balance for Global Organizations
|
Oct 22, 2024 |
ITIL Insights: Who Does What in World-Class Service Management?
|
Oct 15, 2024 |
Integrating Security and Service: The Convergence of DevSecOps and ITIL® 4
|
Oct 08, 2024 |
What Is AIOps? Understanding Its Transformative Potential and Inherent Risks
|
Oct 01, 2024 |
Navigating the Complex Landscape of Security Governance: Regulations, Compliance, and Cloud Security
|
Sep 24, 2024 |
Expert Insights: Mastering the Art of Selling ITIL Consultancy
|
Sep 17, 2024 |
Navigating SDLC Release Management Models in Highly Regulated Industries
|
Sep 10, 2024 |
ITIL 4 Explained: How SMO and VMO Transform Service Management
|
Sep 03, 2024 |
Essential Strategies for Selling ITIL 4 Value to Key Business Stakeholders
|
Aug 27, 2024 |
Are We Endangering Security by Over-Reliance on Cybersecurity Vendors?
|
Aug 20, 2024 |
What is Service Integration and Management?
|
Aug 13, 2024 |
Streamlining IT Processes: Stefan Kempter’s Guide to YaSM Service Management
|
Aug 09, 2024 |
Top 5 Non-Conformities with ISO 27001 and How to Overcome Them
|
Aug 06, 2024 |
Breaking Barriers: Why There Are Only A Few Women in ITSM?
|
Aug 02, 2024 |
Overcoming Obstacles in ITSM Adoption: 5 Key Challenges and How to Solve Them
|
Jul 30, 2024 |
Enhancing ITIL Service-Level Agreements: The Adrian Bunea Perspective on Minimizing the Watermelon Effect
|
Jul 26, 2024 |
Why Are CISOs Seen as 'Scapegoats'?
|
Jul 23, 2024 |
Navigating TOGAF: Pros, Cons, and Strategic Considerations
|
Jul 16, 2024 |
Exploring Social Engineering Threats: How Companies Increase Their Vulnerability
|
Jul 09, 2024 |
ITIL Meets NIS2: Enhancing Cybersecurity and Service Management Together
|
Jul 02, 2024 |
How Communities Enhance Service Quality
|
Jun 28, 2024 |
Is ITIL 4 Problem Management an optional luxury or a critical lifeline for your IT operations?
|
Jun 25, 2024 |
Building Trust with Strategic Communication in IT Service Management
|
Jun 21, 2024 |
How Can Combining ITIL 4 and Agile Lead to Better Projects?
|
Jun 18, 2024 |
The Future of ITSM: Why Removing 'IT' Could Broaden Its Impact
|
Jun 14, 2024 |
Synergy in Transition: Uniting ITIL 4 and Organizational Change Management for Effective Change Management
|
Jun 11, 2024 |
IT for Competitive Advantage: A Leadership Perspective
|
Jun 07, 2024 |
Securing Software Development: From SSDLC to Third-Party Risks
|
Jun 04, 2024 |
How can ITIL practices streamline your Major Incident Management process?
|
May 28, 2024 |
Enhancing Self-Service: The Role of Knowledge Management in Chatbot Success
|
May 24, 2024 |
How Can ISO 27001 Onboarding and Offboarding Tactics Secure Your Organization?
|
May 21, 2024 |
Strategic Leadership: Balancing Urgent Tasks with Long-Term Vision
|
May 17, 2024 |
What Drives Enterprise Asset Management Success?
|
May 14, 2024 |
Harnessing AI and Automation for Superior Service Delivery
|
May 10, 2024 |
What is DORA?
|
May 07, 2024 |
Driving Excellence in IT Service Delivery: Strategies and Solutions
|
May 03, 2024 |
What is the ROI of ITIL in a small and medium-sized business?
|
Apr 30, 2024 |
Understanding Threat Modeling in IT Security
|
Apr 23, 2024 |
Risk Appetite vs. Risk Tolerance: What is the Difference?
|
Apr 16, 2024 |
What are common IT Security program issues with suppliers?
|
Apr 09, 2024 |
How challenging is it for SMEs to implement ITIL Configuration Management Systems and CMDB?
|
Apr 02, 2024 |
How do you select the right ITSM tools for your organization?
|
Mar 26, 2024 |
Do you need Disaster Recovery?
|
Mar 19, 2024 |
AI in IT Security: Risk or Opportunity?
|
Mar 12, 2024 |
What is Business Relationship Management?
|
Mar 05, 2024 |
What is a Service Catalogue?
|
Feb 27, 2024 |
What does 'Security by Design' really mean?
|
Feb 20, 2024 |
How Do You Determine the Type of IT Security Policy You Need?
|
Feb 13, 2024 |
Does my Business Need an ITIL Change Management Process?
|
Feb 06, 2024 |
How Do Management Consultants Adopt ITIL?
|
Jan 30, 2024 |
The Essentials of Service Provision in ITIL 4: Opportunities and Challenges
|
Jan 22, 2024 |
Optimizing ITIL's Value Streams and Processes: A Balanced Approach
|
Jan 16, 2024 |
Enhancing ITSM with Strategic Partnerships: The 'Partners and Suppliers' Dimension
|
Jan 09, 2024 |
Balancing Tech and Touch in ITSM: The ITIL 4 'Information and Technology' Dimension
|
Jan 02, 2024 |
Navigating ITIL 4's 'Organizations and People' Dimension
|
Dec 26, 2023 |
Mastering ITIL 4's Four Dimensions: A Guide for ITSM and IT Security
|
Dec 19, 2023 |
Ten Common ITIL Implementation Mistakes to Avoid at All Costs
|
Dec 14, 2023 |
ITIL Evolution in the Digital Era
|
Dec 12, 2023 |