Hi [[ session.user.profile.firstName ]]

IT Chronicles Media

  • Date
  • Rating
  • Views
  • The Business Value of Intelligent IT Automation
    The Business Value of Intelligent IT Automation
    IT Chronicles with industry leaders Michael Dortch, Robert Roberts and Mike Bombard Recorded: Jan 29 2019 61 mins
    Automation brings several obvious benefits to any IT estate. These include more consistent performance of critical and mundane tasks and compliance with business processes. But when intelligently applied, IT automation can deliver significant additional benefits and business value.

    • Free up skills for more complex, higher-value tasks
    • Ensure timely updates of CMDB data as changes occur across the environment
    • Better cyber security through more consistent, more timely patch and update deployment

    You need a clearly defined set of goals and a solid plan to achieve intelligent automation. And you need to ensure your IT management solutions are up to the tasks required.

    Join industry experts Mike Bombard, Robert Roberts, Director of IT Operations and Support at Segra and Michael Dortch for an informative, thought-provoking discussion of the benefits and challenges of intelligent IT automation. You’ll learn things you can do now and things you should be thinking about to achieve and extend intelligent automation across your IT estate.
  • ITSM and SecOps: A Critical Intersection
    ITSM and SecOps: A Critical Intersection
    Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts Recorded: Nov 13 2018 56 mins
    IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.

    How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?

    At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.

    Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
  • ITSM and SecOps: A Critical Intersection
    ITSM and SecOps: A Critical Intersection
    Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts Recorded: Nov 13 2018 49 mins
    IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.

    How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?

    At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.

    Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
  • Be ready for the 3am call - 5 ways Major Incident Management can be improved
    Be ready for the 3am call - 5 ways Major Incident Management can be improved
    ITSM process expert Ryan Schmierer & IT Service Management technology expert Mike Bombard Recorded: May 15 2018 46 mins
    Continual Service Improvements and minimizing the impact of Major Incident Management are critical to keeping your business running smoothly and out of the nightly news headlines.

    This webinar, presented by ITSM process expert Ryan Schmierer and IT Service Management technology expert Mike Bombard will explore the role technology capabilities and process improvement can play to improve outcomes.

    Ryan and Mike will discuss lessons learned from a major healthcare company case study and the challenges this company faced in managing major incidents. They will provide 5 things you can do today to improve major incident management and will discuss how by leveraging capabilities from discovery and infrastructure visualization tools will help your staff gain the insights they need to resolve issues quickly and continually make better-informed decisions.
  • Why EA should be a part of every ITSM practice
    Why EA should be a part of every ITSM practice
    Ryan D. Schmierer, Principal, RS Consulting NW Recorded: Jan 18 2018 23 mins
    The modern digital enterprise depends on EA, ITSM and IT project teams working together and sharing information as a cohesive unit. In this session, we will share some tips on how to make that a reality. In many organizations, Enterprise Architecture and Service Management & Operations are separate functions that rarely interact with each other and business users are the ones paying the price. This session will look at how architects can use operational insights to design better technology solutions; how operations staff can use architecture models along with other configuration data to better assess impacts, risks and diagnose issues; and how these functions together can enable a more agile business environment.

    E-mail: rsconsultingnw@outlook.com

    Connect with Ryan on LinkedIn

    Catch up on the latest IT trends at IT Chronicles

    Other BrightTALK Presentations by this presenter
  • Automating detection & response to security threats - Tim Roddy
    Automating detection & response to security threats - Tim Roddy
    IT Chronicles Media Recorded: Jan 5 2018 11 mins
    Minimizing the time taken to identify a security breach enables a company to mitigate the problem and limit the potential damage to its data and reputation.
    Deploying an automated detection and response tool gives security practitioners the insight they need to respond to cyber-security attacks.
  • Artificial Intelligence & Machine Learning where is it going? - Marcel Shaw
    Artificial Intelligence & Machine Learning where is it going? - Marcel Shaw
    IT Chronicles Media Recorded: Jan 5 2018 15 mins
    While still in its infancy, Artificial Intelligence and Machine learning technologies have the ability to recognize trends in data patterns, analyse and learn from them.The advances promise to bring huge value to business that can leverage this information.
  • Achieving "World class ITSM" Kevin J. Smith
    Achieving "World class ITSM" Kevin J. Smith
    IT Chronicles Media Recorded: Jan 5 2018 15 mins
    Kevin talks about his book "World Class ITSM" which focuses on the journey of the Helpdesk to Service Management, where it has been proven to work and what is aspirational for the future of ITSM to do things better.
  • Security breaches are inevitable. Chris Goettl ( @ChrisGoettl )
    Security breaches are inevitable. Chris Goettl ( @ChrisGoettl )
    IT Chronicles Media Recorded: Dec 27 2017 13 mins
    There are many aspects to security, whether it be mitigating personal risk from an unsecured wifi connection, to managing risk for an enterprise. Security is about trust and being able to identify all areas of risk, then mitigate them. Its also about being adequately prepared to handle a breach should the worse happen.
  • Optimizing End User Computing. Jed Ayres
    Optimizing End User Computing. Jed Ayres
    IT Chronicles Media Recorded: Dec 21 2017 11 mins
    Jed talks about End User Computing (EUC) and how IGEL (@igel_technology) has revolutionized endpoint management software by standardizing the user experience with their Universal Management Suite.

Embed in website or blog