Hi [[ session.user.profile.firstName ]]

IT Specialist Network

  • Date
  • Rating
  • Views
  • Metrics drive behaviours: How to avoid common IT metric mistakes
    Metrics drive behaviours: How to avoid common IT metric mistakes Steve Morgan, Director, Syniad IT Recorded: May 17 2018 33 mins
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • From Cost Center to Profit Center
    From Cost Center to Profit Center Phyllis Drucker - Consultant, Linium Recorded: May 16 2018 41 mins
    Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
  • Running IT as a Business
    Running IT as a Business Rob Akershoek, Solutions Architect at Shell Recorded: May 16 2018 47 mins
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • How to Demonstrate Value - The CSI Building Blocks
    How to Demonstrate Value - The CSI Building Blocks Ian MacDonald FBCS, CITP, FSM - Independent Consultant, Edenfield IT Consulting Recorded: May 16 2018 46 mins
    Today, simply meeting the service commitments of the business consistently may no longer be considered enough.

    Your business customers will over time have an expectation of increasing ‘value’ from their investment in the IT services you provide.

    Continual Service Improvement (CSI) provides an opportunity to exploit the insight, knowledge and skills of your people to identify and drive improvements to your IT services that add value to the customer and begin to positively influence their perception of getting value for money from their IT service provider.

    However, there is no value in CSI if the improvements provided are not focused on what your customer considers important to them. Equally, if the CSI improvements are not communicated to your customer and explained in a way that demonstrates tangible business value then this is a missed opportunity to demonstrate value and enhance customer satisfaction.

    In this session, we explore the essential ‘CSI Building Blocks’ required to ensure that CSI becomes a core capability for the IT service provider to demonstrate value for money from the IT services provided to their customers.

    This session will provide learning and guidance on:-
    The importance of demonstrating value to ensure commercial success….and the challenge for the IT Service Provider
    Understanding the concepts & characteristics of ‘value ‘
    Understanding how CSI can provide ‘Value Add’ and positively influence customer perception of value for money
    The essential ‘Building Blocks ‘ to enable CSI as an approach demonstrate the value provided from the IT Service providers people and capabilities

    The ‘CSI Building Blocks’ include the need to apply ‘Outside In’ thinking to your ITSM strategy, understanding the importance of purpose and contribution in motivating your people to drive CSI in the workplace, the importance of business measures to convey business value and the importance of a ‘target and tailor’ approach to customer communications.
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches
    Endpoint Security: The Right Balance Between Positive and Negative Approaches Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga Recorded: Apr 26 2018 58 mins
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • The hackers are winning: Deploy your secret weapon
    The hackers are winning: Deploy your secret weapon Rob Shapland, Principal Cyber Security Consultant, First Base Technologies Recorded: Apr 26 2018 46 mins
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • [Panel] Building Effective Cyber Defense
    [Panel] Building Effective Cyber Defense Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall) Recorded: Apr 25 2018 58 mins
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [Webcam Panel] CISO Strategy & the Boardroom
    [Webcam Panel] CISO Strategy & the Boardroom Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN) Recorded: Apr 24 2018 59 mins
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees
    Using Behavioural Economics to Raise Digital Resilience Amongst Employees Robin Smith, Head of IT Security, South Yorks NHS Recorded: Mar 22 2018 22 mins
    This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • GDPR and Security: De-Identifying Personal Data
    GDPR and Security: De-Identifying Personal Data Ashwin Chaudhary, President of Accedere Recorded: Feb 22 2018 29 mins
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.

Embed in website or blog