Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Technology
Health & Fitness
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/2f/d0/65/2fd065cb-5a07-ed13-2bef-5f20237835d8/mza_16436592847458646362.jpg/600x600bb.jpg
The ITSM Practice: Elevating ITSM and IT Security Knowledge
Luigi Ferri
114 episodes
3 days ago
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com
Show more...
Technology
RSS
All content for The ITSM Practice: Elevating ITSM and IT Security Knowledge is the property of Luigi Ferri and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com
Show more...
Technology
Episodes (20/114)
The ITSM Practice: Elevating ITSM and IT Security Knowledge
ITIL 4 and Value Stream Mapping: A Smarter Way to Deliver ITSM Value

Discover why shifting from traditional process maps to value stream mapping transforms ITSM. Luigi Ferri explains how VSM breaks silos, aligns IT with business value, and improves service visibility. Learn how to expose waste, measure impact, and build flow-focused culture in modern organizations.


In this episode, we answer to:

What is the difference between process maps and value stream mapping in ITSM?

How does value stream thinking align IT services with business outcomes?

What challenges do organizations face when adopting VSM, and how can they overcome them?


Resources Mentioned in this Episode:

Digicomp website, article "What is Value Stream Mapping?", link https://digicomp.ch/blog/2020/02/25/value-stream-mapping-in-itil-4


Luigi Ferri, article "Embracing the Shift: How Value Stream Mapping Enhances ITIL's Lifecycle Approach", link https://www.linkedin.com/pulse/embracing-shift-how-value-stream-mapping-enhances-itils-luigi-ferri


Serview website, article "Breaking down silos: Value Streams in ITIL® 4", link https://en.serview.de/blog/blast-silos-value-troughs-in-itilr-4


Digital AI website, article "SAFe® Value Stream Mapping Software", link https://digital.ai/solutions/safe-scaled-agile-framework/


Lean Enterprise Institute, article "Value Stream Mapping", link https://www.lean.org/lexicon-terms/value-stream-mapping/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
4 days ago
9 minutes 50 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Preparing for Post-Quantum Security

Discover why post-quantum cryptography is urgent for regulated industries. Learn how to protect long-term data, start cryptographic inventory, and align with evolving national strategies. This episode offers a clear, actionable roadmap for future-proofing your digital identity and systems.


In this episode, we answer to:

How can organizations start preparing for post-quantum cryptography migration?

What risks are already present due to “Harvest Now, Decrypt Later” tactics?

Why must regulated industries prioritize public key infrastructure upgrades now?


Resources Mentioned in this Episode:

Quintessence Labs website, article "Global Risk Institute Quantum Threat Timeline Report 2024", link https://info.quintessencelabs.com/hubfs/PDFs/Global-Risk-Institute-Quantum-Threat-Timeline-Report-2024.pdf


Appviewx website, article "The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration", link https://www.appviewx.com/blogs/the-uks-national-cyber-security-centre-presents-timeline-and-roadmap-for-pqc-migration/


CISA website, article "CISA Insight Post Quantum Cryptography", link https://www.cisa.gov/sites/default/files/publications/cisa_insight_post_quantum_cryptography_508.pdf


Pqshield website, article "NCSC guidance on planning your PQC migration", link https://pqshield.com/ncsc-guidance-on-planning-your-pqc-migration/


Crypto Vision Website, article "EVIDEN PQC Migration Guide", link https://www.cryptovision.com/wp-content/uploads/2023/05/EVIDEN-PQC-Migration-Guide.pdf


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
1 week ago
8 minutes 51 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Security Strategy vs Strategic Plan: What’s the Difference?

Confusing a security strategy with a strategic plan leads to failure. In this episode, Luigi Ferri breaks down the core differences, revealing seven pillars of a winning security strategy, from governance and threat intelligence to resilience. Learn how to shift from vague intentions to real impact.


In this episode, we answer to:

What is the difference between a security strategy and a strategic plan?

What are the seven essential elements of a credible security strategy?

How do you move from vision to measurable execution in cybersecurity?


Resources Mentioned in this Episode:

iSHIFT website, article "Cybersecurity 101: A Plan is Not a Strategy, and a Strategy is Not a Plan", link https://www.ishift.net/cybersecurity-strategy-and-plan/


Diceus website, article "IT security strategy: Essentials you should know to create an effective plan", link https://diceus.com/it-security-strategy-plan/


Atriade website, article "The 7 Elements of an Effective Security Plan", link https://atriade.com/seven-elements-of-physical-security-plan/


QTech website, article "The 7 Key Components of a Robust Cybersecurity Strategy", link https://www.q-tech.org/the-7-key-components-of-a-robust-cybersecurity-strategy/


Pathlock website, article "Continuous Monitoring: What You Need to Know and How to Start in 5 Steps", link https://pathlock.com/learn/continuous-monitoring/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 weeks ago
9 minutes 18 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Agentic AI: The Future of ITSM

Agentic AI is redefining IT Service Management with autonomous decision-making, intelligent workflow orchestration, and continuous learning. In this episode, we explore how AI transforms service desks into predictive ecosystems, boosts performance, and challenges organizational readiness, ethics, and governance.


In this episode, we answer to:

What makes Agentic AI different from traditional automation in ITSM?

How can organizations govern AI decisions in service management?

Are your ITSM processes ready to be trusted by autonomous systems?


Resources Mentioned in this Episode:

Forrester website, article "Let The Service Management Agentic AI Race Begin", link https://www.forrester.com/blogs/let-the-service-management-agentic-ai-race-begin/


Aisera website, article "Agentic AI in IT Service Management (ITSM)", link https://aisera.com/blog/agentic-ai-itsm/


Rezolve.ai website, article "Why Agentic AI Tools Are the Future of Incident and Service Requests?", link https://www.rezolve.ai/blog/agentic-ai-incident-and-service-requests


Sprinklr website, article "The AI-first unified platform for front-office teams", link https://www.sprinklr.com/blog/agentic-ai/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
3 weeks ago
10 minutes 30 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Outsourcing Code, Keeping Control – ISO/IEC 27001 A.8.30

Outsourced development is growing, but ISO 27001 Annex A 8.30 ensures you don’t outsource control. In this episode, we explain how to secure external software development, from vendor audits to contract clauses and compliance risks. Learn practical steps to protect your business.


In this episode, we answer to:

How can ISO 27001 Annex A 8.30 secure outsourced development?

What security questions should you ask every software vendor?

How do you turn contracts into enforceable cybersecurity controls?


Resources Mentioned in this Episode:

HighTable, article "ISO 27001 Annex A 8.30 Outsourced Development", link https://hightable.io/iso27001-annex-a-8-30-outsourced-development/


ISMS.online website, article "ISO 27001:2022 Annex A 8.30 – Outsourced Development", link https://www.isms.online/iso-27001/annex-a/8-30-outsourced-development-2022/


ISMS.online website, article "ISO 27002:2022 – Control 8.30 – Outsourced Development", link https://www.isms.online/iso-27002/control-8-30-outsourced-development/


GRC Mana website, article "ISO 27001 Annex A 8.30: A Step-by-Step Guide", link https://www.grcmana.io/blog/iso-27001-annex-a-8-30-outsourced-development


Advisera website, article "Big guide to ISO 27001 clauses — How is this standard structured?", link https://advisera.com/iso27001/control-8-30-outsourced-development/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
1 month ago
9 minutes 12 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
How Enterprise Architecture Transforms Hospital IT and Patient Safety

Discover how Enterprise Architecture in healthcare helps government hospitals improve patient safety, system resilience, and operational efficiency. Learn the five EA pillars driving digital transformation, compliance, and innovation—critical for Managed Service Providers too.


In this episode, we answer to:

How can Enterprise Architecture reduce IT outages in hospitals?

What risks do Managed Service Providers face without solid architecture?

How does EA help align IT with national healthcare goals?


Resources Mentioned in this Episode:

Sparx Systems website, article "The Case for Enterprise Architecture in the Government", link https://trerado.sparxsystems.com/resources/eaglobalsummit-2024/the-case-for-enterprise-architecture-in-the-government/


SCW website, article "How Enterprise Architecture plays a vital role in navigating the NHS’s future", link https://scwcsu.nhs.uk/news-and-views/blog/how-enterprise-architecture-plays-a-vital-role-in-navigating-the-nhs-s-future


iTrobes website, article "ERP For Hospitals – A Complete Guide", link https://www.itrobes.com/hospital-management-erp-software/


SAP website, article "Enterprise Architecture Maturity Models & Assessment", link https://www.leanix.net/en/wiki/ea/enterprise-architecture-maturity-stages-and-assessment


Confiz website, article "Building service excellence: 6 pillars of Managed Services Framework", link https://www.confiz.com/blog/building-service-excellence-6-pillars-of-managed-services-framework/


Ardoq website, article "What Is Enterprise Security Architecture? The Complete Guide to More Holistic Risk Management", link https://www.ardoq.com/knowledge-hub/enterprise-security-architecture


ValueBlue website, article "Top 10 Benefits of Enterprise Architecture for Your Business", link https://www.valueblue.com/blog/top-10-benefits-of-enterprise-architecture-for-your-business


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
1 month ago
11 minutes 11 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
PCI DSS Explained: Turning Compliance into a Security Strategy

Discover how PCI DSS can become more than just a compliance checklist. This episode explores PCI DSS as a strategic tool to build digital trust, prevent fraud, and unify your security approach. Learn why treating it as a living framework, not a box-ticking task—can transform your security posture.


In this episode, we answer to:

What are the core PCI DSS requirements most organizations fail to meet?

Why should PCI DSS be treated as a continuous strategy, not a one-time audit?

Who is actually in scope for PCI DSS, and why does size not exempt you?


Resources Mentioned in this Episode:

TechTarget website, article "What is PCI DSS (Payment Card Industry Data Security Standard)?", link https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard


Stripe website, article "What is PCI DSS compliance?", link https://stripe.com/guides/pci-compliance


Bridewell website, article "Who Needs to Be PCI DSS Compliant?" link https://www.bridewell.com/insights/blogs/detail/who-needs-to-be-pci-dss-compliant


AuditBoard website, article "The 12 PCI DSS Compliance Requirements: What You Need to Know", link https://www.auditboard.com/blog/pci-dss-requirements/


Exabeam website, article "What Is PCI Compliance? The 12 Requirements", link https://www.exabeam.com/explainers/pci-compliance/pci-compliance-a-quick-guide/


Sprinto website, article "Who Must Comply with PCI DSS? Payment Security Explained", link https://sprinto.com/blog/to-whom-does-pci-dss-apply/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
1 month ago
8 minutes 20 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
FinTech CIOs: From Projects to Products – Lead the Shift to Product-Centric IT

Discover how FinTechs can shift from project-driven IT to a product-centric model that enables continuous value delivery. Learn key strategies for CIOs to build agile, cross-functional teams and redesign governance. Are your teams truly product-led or just rebranded project squads?


In this episode, we answer to:

How can FinTech CIOs enable a shift from projects to products?

What does a product-led operating model look like in FinTech?

How can teams self-assess their product-readiness?


Resources Mentioned in this Episode:

CIO.com website, article "Making the shift to product-based IT", link https://www.cio.com/article/219649/making-the-shift-to-product-based-it.html


Ernst & Young website, article "How a product-driven IT operating model can help reimagine banking", link https://www.ey.com/en_us/insights/banking-capital-markets/how-a-product-driven-it-model-can-reimagine-banking


Gartner website, article "IT Organization Design Roadmap: How to Shift from Project to Product", link https://www.gartner.com/en/publications/it-org-design-project-to-product-roadmap


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
1 month ago
6 minutes 4 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
ISO/IEC 42001 Explained: How to Govern AI Ethically and Securely

Explore how ISO/IEC 42001 sets the standard for responsible, ethical, and secure AI use. Learn how it aligns AI governance with business strategy, mitigates risks, and fosters innovation through transparency and trust.


In this episode, we answer to:

Why do organizations need a specific standard for AI governance?

What are the core components of ISO/IEC 42001 and how do they work in practice?

How does aligning with ISO 42001 impact innovation and business trust?


Resources Mentioned in this Episode:

ISMS.online website, article "Understanding ISO 42001 and Demonstrating Compliance", link https://www.isms.online/iso-42001/


Schellman website, article "How to Assess and Treat AI Risks and Impacts with ISO/IEC 42001:2023", link https://www.schellman.com/blog/iso-certifications/how-to-assess-and-treat-ai-risks-and-impacts-with-iso42001


Scytale website, article "Exploring the Role of ISO/IEC 42001 in Ethical AI Frameworks", link https://scytale.ai/resources/exploring-the-role-of-iso-iec-42001-in-ethical-ai-frameworks/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 months ago
10 minutes 2 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
ISO 20022 Explained: Global Payments, Compliance Risks & Transformation Strategies

ISO 20022 is reshaping global payments with rich, structured data, offering enhanced compliance, operational efficiency, and new revenue possibilities. As the 2025 deadline nears, financial institutions must modernize systems, reduce risks, and unlock powerful analytics. Ready or not, change is here.


In this episode, we answer to:

What happens if you’re not ISO 20022-compliant by November 2025?

How does ISO 20022 improve payment data quality and analytics?

What are the key phases to successfully transition your systems?


Resources Mentioned in this Episode:

StoneX website, article "STS – ISO 20022: A Global Shift in Cross-Border Payments", link https://www.stonex.com/en/thought-leadership/02-03-2025-sts-iso-20022/


SWIFT website, article "ISO 20022 for Financial Institutions: Focus on Payments Instructions", link https://www.swift.com/standards/iso-20022/iso-20022-financial-institutions-focus-payments-instructions


S&P Global Market Intelligence website, article "ISO 20022 Adoption Poses Challenges and Presents Opportunities", link https://www.spglobal.com/market-intelligence/en/news-insights/research/iso-20022-adoption-poses-challenges-and-presents-opportunities


Ernst & Young website, article "Nine Considerations for ISO 20022 Migration", link https://www.ey.com/en_gl/insights/banking-capital-markets/nine-considerations-for-iso-20022-migration


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 months ago
9 minutes 5 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
AI Is Replacing Project Managers — Only the Smart Will Survive

In today’s episode of The ITSM Practice, we explore the future of project management in an AI-driven world. How can project managers stay relevant when AI plans, flags risks, and analyzes moods? Discover how emotional intelligence, critical thinking, and ethical leadership shape the next generation of project leaders.


In this episode, we answer to:

How should project managers adapt when AI starts shaping decisions?

What skills will make project managers future-proof in an AI-driven environment?

How can we trust AI tools without losing human judgment and leadership?


Resources Mentioned in this Episode:

PMI Blog, article “Preparing Project Managers for an AI-Driven Future”, link https://www.pmi.org/blog/preparing-project-managers-for-an-ai-driven-future


Atlassian website, article “How to utilize AI for project management”, link https://www.atlassian.com/work-management/project-management/ai-project-management


PPM Express website, article “The Future of AI in Project Management: Trends and Innovations”, link https://ppm.express/blog/the-future-of-ai-in-project-management-trends-and-innovations/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 months ago
7 minutes 17 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
The 3 Risk Models Every IT and Business Leader Must Understand

Dive into this essential episode of "The ITSM Practice Podcast" hosted by Luigi Ferri, where we rethink risk management beyond frameworks and dashboards. Discover how hidden vulnerabilities can silently disrupt operations and why evolving from Risk Officer to Continuity Architect is crucial for true resilience.


In this episode, we answer to:

Which risks are we ignoring because they don't fit usual categories?

How can we identify informal, undocumented, or assumed asset dependencies?

What would happen if a quiet, always-working process failed unexpectedly?


Resources Mentioned in this Episode:

Scytale website, article “Asset-Based Risk Assessment”, link https://scytale.ai/glossary/asset-based-risk-assessment/


Aptine website, article “How to conduct Threat-Based Risk Assessment, link https://aptien.com/en/kb/articles/how-to-conduct-threat-based-risk-assessment


BCP Builder website, article “What is the relationship between Business Continuity and Risk Management”, link https://www.bcpbuilder.com/business-continuity-risk-management/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 months ago
8 minutes 16 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Why ISO 27001 Certification Is Essential for Fintech Success in 2025

Discover how ISO 27001 boosts fintech security, simplifies compliance, builds customer trust, drives operational efficiency, attracts investors, and supports scaling. Learn why mid-sized fintechs must treat ISO 27001 as a strategic asset, not just a requirement.


In this episode, we answer to:

How does ISO 27001 improve fintech security and risk management in 2025?

Why is ISO 27001 crucial for customer trust and faster market growth?

How can ISO 27001 certification drive efficiency, investment, and scaling for fintechs?


Resources Mentioned in this Episode:

SecFix website, article “ISO 27001 Benefits for FinTechs”, link https://www.secfix.com/post/iso-27001-benefits-for-fintechs


Neumetric website, article “ISO 27001 Compliance for Fintech” , link https://www.neumetric.com/journal/iso-27001-compliance-for-fintech-1444/


ISMS Online website, article “ISO 27001 for the Fintech Sector”, link https://www.isms.online/sectors/iso-27001-for-the-fintech-sector/


Dataguard website, article “ISO 27001 on the rise: How the certification is driving value for fintech companies”, link https://www.dataguard.com/blog/iso-27001-for-fintech-companies-why-do-you-need-it-dataguard


CertPro website, article “The Importance of ISO 27001 Compliance for Fintech Startups in Canada”, link https://certpro.com/iso-27001-for-fintech-startups/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
2 months ago
9 minutes 12 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
What is an ITIL 4 Master — And Why It Matters for Your ITSM Career

Many IT Professionals collect certifications, but real mastery means transforming theory into outcomes, leadership, and trust. In this episode, we explore what the ITIL 4 Master journey demands beyond exams and frameworks.


In this episode, we answer to:

Am I just qualified, or have I truly mastered IT service management?

Can I speak the language of the boardroom, not just the server room?

How can I design services that align with business needs, not just best practices?


Resources Mentioned in this Episode:

New Horizons, article “Everything You Need to Know About Achieving ITIL Master Certification”, link https://www.newhorizons.com/resources/blog/itil-master


Vinsys, article “How do I become an ITIL 4 Master? Everything You Must Know”, link https://www.vinsys.com/blog/become-itil4-master


ITSM Group, article “ITIL® Master: Everything about the highest certification level in the ITSM methodology”, link https://www.itsmgroup.com/news/detail/itil-master-zertifizierung


Purple Griffon, article “The ITIL® Certification Scheme – Explained”, link https://purplegriffon.com/blog/itil-certification-scheme


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
3 months ago
8 minutes 54 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Is BIAN the Cure for Banking’s Integration Chaos or a Framework Too Late?

Discover how BIAN helps banks escape legacy traps by offering standardized, modular service domains and semantic APIs. This episode reveals why BIAN exists, what problems it solves, and how to assess your alignment with it. A must-listen for IT leaders in financial services aiming for agility and interoperability.


In this episode, we answer to:

What is BIAN and how does it standardize banking architecture?

Why was BIAN created to address integration chaos in banks?

How can you assess your services' alignment with the BIAN framework?


Resources Mentioned in this Episode:

Book “BIAN 2nd Edition – A framework for the financial services industry. Van Haren Publishing.


BIAN Website, article “New Study Reveals Banks Struggle to Achieve Priorities, Meet Customer Expectations Hampered by Technology Modernisation Challenges and Lack of Industry Standards”, link https://bian.org/news-room/banks-struggle-meeting-customer-expectations-technology-challenges/


AWS website, article “Modern AWS Data Strategy and Architecture for banking using BIAN Framework”, link https://aws.amazon.com/blogs/industries/modern-aws-data-strategy-and-architecture-for-banking-using-bian-framework/


IBM website, article “How generative AI and BIAN technology standards are shaping the future of banking”, link https://www.ibm.com/think/insights/genai-bian-standards-shape-banking


Thoughtworks Website, article “How BIAN can help drive coreless banking and improve innovation in the industry”, link https://www.thoughtworks.com/en-de/insights/blog/platforms/bian-coreless-banking


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
3 months ago
8 minutes 56 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
How to Make Change Stick: 6 Proven Steps to Lead with Purpose and Impact

Struggling to make change stick? Discover six proven principles that help turn resistance into results. Learn how purpose, communication, leadership, and reinforcement can boost your change success and team engagement.


In this episode, we answer to:

Why is anchoring change in purpose critical for transformation success?

How can leaders support individual transitions during organizational change?

What makes structured change flexible enough to adapt in real time?


Resources Mentioned in this Episode:

Prosci website, article “12 Change Management Principles and Best Practices”, link https://www.prosci.com/blog/change-management-principles


Personio website, article “Keep These 10 Change Management Principles Top Of Mind”, link https://www.personio.com/hr-lexicon/change-management-principles/


IC Agile website, article “6 Change Management Principles & How to Use Them”, link https://www.icagile.com/resources/6-change-management-principles-and-how-to-use-them


Remesh website, article “7 Organizational Change Management Frameworks That Stick”, link https://www.remesh.ai/resources/7-organizational-change-management-frameworks


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
3 months ago
8 minutes 21 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
ITIL CMDB Best Practices: Scale Smart with Real Business Value in 7 Steps

Discover how to scale your CMDB from a static list to a powerful tool that drives business value. In this episode, we unpack seven practical steps to create a clean, scalable, and business-aligned CMDB that supports ITSM success and compliance goals.


In this episode, we answer to:

How can I align my CMDB with business outcomes and KPIs?

What are the best practices to keep CMDB data clean and reliable?

How do I automate and govern my CMDB without losing control?


Resources Mentioned in this Episode:

ServiceNow whitepaper, “Deliver a CMDB with true business value: 6 essential steps”, link https://www.servicenow.com/blogs/category/product-news


Device42 website, article “CMDB Architecture Best Practices: Aligning Design with IT Objectives”, link https://www.device42.com/cmdb-best-practices/cmdb-architecture/


Aspire Systems website, article “Navigating and Overcoming CMDB Health Challenges in Enterprises”, link https://blog.aspiresys.com/business-applications/servicenow/navigating-and-overcoming-cmdb-health-challenges-in-enterprises/


Starhive website, article “10 CMDB best practices for an actually successful implementation”, link https://starhive.com/blog/10-cmdb-best-practices


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
3 months ago
6 minutes 50 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
ISO 27001 Clause 8 Explained: Turning ISMS Plans into Real Security Operations

In this episode of The ITSM Practice Podcast, Luigi Ferri dives into Clause 8 of ISO 27001, where your Information Security Management System (ISMS) shifts from paper to practice. Discover how operational planning, risk assessments, and treatment plans come alive through evidence, control, and continuous improvement.


In this episode, we answer to:

What is the real purpose of Clause 8 in ISO 27001, and why is it essential for ISMS success?

How should risks be assessed and documented in a structured, auditable way?

What actions must be taken to treat identified security risks effectively and continuously?


Resources Mentioned in this Episode:

ISMS.online, article “ISO 27001 Requirement 8.1 – Operational Planning & Control”, link https://www.isms.online/iso-27001/operational-planning-control/


Stuart Barker, video “How to implement ISO 27001 Clause 8 Operation" by Stuart Barker”, link https://www.youtube.com/watch?v=LdGYW3MPZPg


Advisera, article “Big guide to ISO 27001 clauses — How is this standard structured?”, link https://advisera.com/iso27001/clause-8-operation/


Standard ISO/IEC 27001:2022


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
4 months ago
8 minutes 1 second

The ITSM Practice: Elevating ITSM and IT Security Knowledge
ITIL 4 Principles: Key to Organizational Excellence

Explore the transformative power of ITIL 4 Guiding Principles in this episode of The ITSM Practice. Luigi Ferri delves into how these principles can drive organizational value, offering practical exercises to assess and enhance your ITIL 4 maturity. Engage with essential strategies for simplification, automation, and collaboration, all aimed at optimizing operational excellence.


In this episode, we answer to:

How can organizations ensure every action adds value to stakeholders?

What strategies can help leverage existing resources without starting from scratch?

How does collaboration enhance visibility and drive innovation?


Resources Mentioned in this Episode:

ITIL Guiding Principles, Organizational Value, Operational Excellence, ITIL Maturity Assessment, Continuous Improvement, Stakeholder Value, Process Optimization, IT Service Management, ITSM Best Practices, Collaborative Innovation, Simplifying Processes, Automation in ITSM, ITIL Implementation, Value Creation, Organizational Efficiency, ITIL Training, Enterprise Service Management, ITIL Strategy, IT Governance, ITIL Principles Exercise


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
4 months ago
8 minutes

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Strategic Enablement through IT Service Management for CIOs

In this episode of The ITSM Practice, Luigi Ferri explores how service management can be a strategic enabler for businesses. We delve into aligning IT Service Management (ITSM) with corporate goals to drive growth and value. This guide covers practical steps for CIOs, from assessing current operations to embedding service management deeply into business strategy, ensuring IT is not just a support function but a core part of business success.


In this episode, we answer to:

How can service management align directly with an organization's strategic goals?

What practical steps can CIOs take to integrate service management with business objectives?

How does embedding pragmatic service management practices help overcome common business challenges?


Resources Mentioned in this Episode:

ITSM Tools website, article “ESM – It’s Not Just About ITSM Processes”, link https://itsm.tools/esm-not-just-about-itsm-processes/


Think HDI, article “How to Transform Service Management Beyond IT”, link https://www.thinkhdi.com/library/supportworld/2021/transform-service-management-beyond-it


CACM website, article “An Overview of IT Service Management”, linked https://cacm.acm.org/research/an-overview-of-it-service-management/


Connect with me on:

LinkedIn: https://www.linkedin.com/in/theitsmpractice/

Website: http://www.theitsmpractice.com

And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


Credits:

Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


Graphics by Yulia Kolodyazhnaya

Show more...
4 months ago
9 minutes 39 seconds

The ITSM Practice: Elevating ITSM and IT Security Knowledge
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com