The ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

Podcast by Luigi Ferri

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering in...

Start 7 days free trial

After trial, only 79,00 kr. / month.Cancel anytime.

Start for free

All episodes

69 episodes
episode Vendor Consolidation vs. Defense in Depth artwork
Vendor Consolidation vs. Defense in Depth

In this episode of "The ITSM Practice," Luigi Ferri dives into the integration of vendor consolidation with defense in depth in cybersecurity. We explore how consolidating vendors can streamline operations and reduce costs, yet maintain robust security through a multi-layered approach. We also discuss the role of cloud platforms like AWS and Microsoft Azure in simplifying security management, and the balance needed between operational efficiency and risk management. This episode unpacks whether merging these strategies is the future of resilient cybersecurity. In this episode, we answer to: Can operational efficiency and robust security coexist with vendor consolidation and defense in depth? How are cloud platforms changing security consolidation strategies? What are the potential risks and benefits of integrating vendor consolidation with defense in depth? Resources Mentioned in this Episode: Gartner, podcast "Can Vendor Consolidation and Defense in Depth Coexist?", link https://www.gartner.com/en/documents/5731983 Rapid7 Blog, article "Three Security Vendor Consolidation Myths Debunked", link https://www.rapid7.com/blog/post/2023/08/23/3-security-vendor-consolidation-myths/ Akamai Blog, article "6 Tips for a Successful Security Vendor Consolidation", link https://www.akamai.com/blog/security/6-tips-successful-security-vendor-consolidation Connect with me on: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaya

Yesterday - 6 min
episode Enhancing Efficiency with ITIL Value Streams artwork
Enhancing Efficiency with ITIL Value Streams

In today's episode of The ITSM Practice Podcast, Stefano, a certified ITIL Master and Prince2 Practitioner, delves into the transformative potential of process design within IT and Enterprise Service Management. He introduces the value-stream approach, a method derived from Lean philosophy, emphasizing its capability to minimize waste and enhance organizational efficiency. This methodology not only simplifies processes but also aligns with strategic objectives to maximize value creation across all operations. In this episode, we answer to: What defines a process in IT and Enterprise Service Management? How can the value-stream approach transform process efficiency? What are the practical benefits of mapping processes to value streams? Resources Mentioned in this Episode: Process Design, Value-Stream Mapping, Lean Philosophy, IT Service Management. Connect with us on: LinkedIn: https://www.linkedin.com/in/stefanobellelli/ Website: https://greenmill.it/ LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaza

09. dec. 2024 - 8 min
episode The Future of Service Desks: How AI Transforms Customer Support artwork
The Future of Service Desks: How AI Transforms Customer Support

In this insightful episode of "The ITSM Practice," Luigi Ferri delves into the transformative potential of AI in service desks. Discover how AI is redefining the roles of human agents, enhancing efficiency, accuracy, and personalization, and tackling complex challenges in service management. AI not only automates mundane tasks but also predicts and prevents issues, reshaping customer service landscapes and enhancing workflows with its 24/7 capabilities. In this episode, we answer to: How will AI transform service desk operations and customer interactions? What does the future of human-AI collaboration in service desks look like? What are the challenges and ethical considerations in adopting AI within service management? Resources Mentioned in this Episode: CAI Blog, article "Service Desk 2025: What we can expect", link https://www.cai.io/resources/thought-leadership/service-desk-2025-what-we-can-expect#:~:text=Over%20the%20next%20few%20years,better%20user%2Dfacing%20knowledge%20bases. Microgenesis Blog, article "The Future of Service Desks: Powered by AI and Automation", link https://mgtechsoft.com/blog/future-of-service-desks/ IBM website, article "What is a service desk?", link https://www.ibm.com/topics/service-desk#:~:text=Service%20desks%20are%20the%20%E2%80%9Cface,resets%20or%20database%20access%20requests. Connect with me on: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaya

03. dec. 2024 - 7 min
episode Security-First IT Projects: Essential Steps for Emerging Organizations artwork
Security-First IT Projects: Essential Steps for Emerging Organizations

In today's episode of "The ITSM Practice," Luigi Ferri delves into the critical need for integrating security into IT project management from the start. Highlighting the risks for organizations with immature security practices, Luigi provides practical steps for embedding robust security measures, inspired by ISO 27001 standards. He emphasizes the importance of foundational training, regular security reviews, and strategic technology implementation to foster a security-conscious culture within the organization. In this episode, we answer to: Why is it crucial to embed security right from the project's start, especially in organizations still maturing in their security practices? How often should security reviews be conducted to ensure ongoing protection throughout the project lifecycle? What initial security technologies should organizations consider to maximize benefits without overwhelming their team? Resources Mentioned in this Episode: Tripwire Blog, article "Where Security Starts in Your Security Projects?", link https://www.tripwire.com/state-of-security/where-security-starts-your-security-projects NIST CSF website, link https://www.nist.gov/cyberframework Connect with me on: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaya

26. nov. 2024 - 6 min
episode Tarun Ramesh Explores Scattered Spider Cloud Attacks artwork
Tarun Ramesh Explores Scattered Spider Cloud Attacks

Hello and welcome to The ITSM Practice Podcast! I'm Luigi Ferri, your host. Today, I’m handing over the reins to Tarun Ramesh, a cloud security expert and Software Developer at Dune Security. Have you ever wondered how sophisticated cyber-attacks unfold in the cloud? Tarun is here to shed light on that. He’ll touch on the challenges of securing cloud environments and offer insights on enhancing incident response strategies. Curious about how to better protect your digital assets? Stay tuned as Tarun guides us through the essentials of cybersecurity in cloud computing. Now, let’s get started with Tarun and uncover some critical cybersecurity insights! Connect with us on: LinkedIn: Tarun Ramesh link https://www.linkedin.com/in/tarunaravind2000/ Website: https://dune.security/ LinkedIn: Luigi Ferri link https://www.linkedin.com/in/theitsmpractice/ Website: http://www.theitsmpractice.com Resources Mentioned in this Episode: Tarun Ramesh, Cloud Security, Social Engineering Tactics, Incident Response Strategies Multi-Factor Authentication (MFA), Dune Security, Cloud Security Posture Management Add this call to action: And if you want more tips and guidance, follow me on LinkedIn I am sharing daily posts regarding Enterprise Service Management, IT Service Management and IT Security. Credits: Sound engineering by Alan Southgate - http://alsouthgate.co.uk/ Graphics by Yulia Kolodyazhnaya

22. nov. 2024 - 7 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Available everywhere

Listen to Podimo on your phone, tablet, computer or car!

A universe of audio entertainment

Thousands of audiobooks and exclusive podcasts

No ads

Don't waste time listening to ad breaks when listening to Podimo's content.

Start 7 days free trial

After trial, only 79,00 kr. / month.Cancel anytime.

Exclusive podcasts

Ad free

Non-Podimo podcasts

Audiobooks

20 hours / month

Start for free

Other exclusive shows

Popular audiobooks