The ITSM Practice: Elevating ITSM and IT Security Knowledge copertina

The ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

Di: Luigi Ferri
Ascolta gratuitamente

A proposito di questo titolo

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.comLuigi Ferri
  • Who Owns Cloud Security?
    May 5 2026

    A single question can expose a major cloud risk: who is responsible? This episode breaks down the cloud shared responsibility model, revealing how unclear ownership, misconfigurations, and weak governance lead to data breaches, and how ISO/IEC 27017 helps close the gaps.


    In this episode, we answer to:

    Who is really accountable for cloud security failures?

    Why do misconfigurations cause most cloud data breaches?

    How does ISO/IEC 27017 strengthen cloud security governance?


    Resources Mentioned in this Episode:

    ISO Standards website, standard ISO/IEC 27017:2015, link https://www.iso.org/standard/43757.html


    Vanta website, article "The ultimate guide to ISO 27017", link https://www.vanta.com/collection/iso-27001/guide-to-iso-27017


    Microsoft website, article "ISO/IEC 27017:2015", link https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-iso-27017

    Safeshield website, article "Why should SaaS companies comply with the ISO/IEC 27017 security standard for cloud service providers (CSP)", link https://www.safeshield.cloud/why-should-saas-companies-comply-with-the-iso-27017-security-standard-for-cloud-service-providers-csp

    NordLayer website, article "ISO 27017: cloud protection essentials", link https://nordlayer.com/learn/iso/iso-27017/


    Connect with me on:

    LinkedIn: https://www.linkedin.com/in/theitsmpractice/

    Website: http://www.theitsmpractice.com

    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


    Credits:

    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


    Graphics by Yulia Kolodyazhnaya

    Mostra di più Mostra meno
    9 min
  • CISO Strategy: Where Product Security Fails at Scale
    Apr 28 2026

    Most organisations manage only build and operate, ignoring growth, where security risk explodes. Luigi Ferri reveals how CISOs miss the most critical phase, where scaling, DevOps, and rapid decisions create hidden security debt. This episode challenges leaders to shift from reactive controls to full product lifecycle governance before risk turns into incidents.


    In this episode, we answer to:

    Why is product growth the most dangerous phase for cybersecurity risk?

    Are CISOs governing product lifecycle or just reacting to failures?

    How does DevOps accelerate delivery but weaken security accountability?


    Resources Mentioned in this Episode:

    Advisera website, article "ISO 27001 control 8.25 Secure development life cycle", link https://advisera.com/iso27001/control-8-25-secure-development-life-cycle/


    Ikarus website, article "Security by Design", link https://www.ikarussecurity.com/en/security-news-en/security-by-design-cybersecurity-throughout-the-product-life-cycle/


    Netguru website, article "SaaS Development Life Cycle: Key Stages & Best Practices", link https://www.netguru.com/blog/saas-development-life-cycle


    DevOps by Techstrong Group website, article "DevSecOps: Integrating Security Into the DevOps Lifecycle", link https://devops.com/devsecops-integrating-security-into-the-devops-lifecycle/


    Connect with me on:

    LinkedIn: https://www.linkedin.com/in/theitsmpractice/

    Website: http://www.theitsmpractice.com

    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


    Credits:

    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


    Graphics by Yulia Kolodyazhnaya

    Mostra di più Mostra meno
    8 min
  • ITIL 5 Exposed: Accountability Without Authority
    Apr 21 2026

    ITIL 5 exposes a critical ITSM flaw: Service Owners held accountable without authority. Discover how broken governance, security vs delivery conflicts, and unclear decision rights undermine outcomes. Learn why real accountability starts before operations, and how to redesign Enterprise Service Management for true leadership.


    In this episode, we answer to:

    Why are Service Owners accountable but not empowered in ITIL 5?

    How does the security vs delivery tension reveal weak ITSM governance?


    Resources Mentioned in this Episode:

    PeopleCert website, article "Understanding the evolution of ITIL", link https://www.peoplecert.org/news-and-announcements/itil-version-5-explained


    Learning Tree International website, article "ITIL® (Version 5) Has Arrived", link https://www.learningtree.com/blog/itil-5-launch-what-you-need-to-know/


    Agile PM Hub website, article "ITIL® 5 Is Here: What’s New and Why It Matters", link https://agilepmhub.com/blog/itil-version-5-whats-new-and-why-it-matters


    Connect with me on:

    LinkedIn: https://www.linkedin.com/in/theitsmpractice/

    Website: http://www.theitsmpractice.com

    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


    Credits:

    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


    Graphics by Yulia Kolodyazhnaya

    Mostra di più Mostra meno
    8 min
adbl_web_anon_alc_button_suppression_c
Ancora nessuna recensione