Change Impact Analysis and CMDBs

David Cuthbertson, Robert Cowham
This webcast covers different ways to communicate complex risk and dependencies using impact forms and Visio visualisation amongst others. A key reason to implement a CMDB is to support improved impact and risk analysis for changes and incidents. In practice, many people find that lots of asset data doesn't help and a more focused CMDB and set of outputs is required.
Jul 27 2012
42 mins
Change Impact Analysis and CMDBs
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live 1 and recorded (3278)
  • Upcoming (105)
  • Date
  • Rating
  • Views
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Décrouvrez les solutions Networking Dell, Convergence, 10Gb et administration centralisée
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Dell Présente lors du CRIP une approche concrète des PRA/PCA en 90 secondes
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Best Practices In Delivering Physical Layer Services Recorded: Oct 18 2013 46 mins
    A well planned IT infrastructure is often compromised as soon as equipment in installed and connected up. Wiring looks like tangled spaghetti, performance is affected by damage, it takes ages to make changes and the only person who knows has left. But if you implemented best practice it could all be different! Bob Camerino from ITS is our guest speaker on what those best practices are. and how you move forward with a legacy infrastructure
  • IT documentation requirements in pharmaceutical / life science GMP environments Recorded: Sep 6 2013 44 mins
    The regulatory needs of GMP (Good Manufacturing Process) require documentation covering all aspects of manufacturing – including IT systems and infrastructure such as networks, servers, software, etc. Accurate, maintained IT documentation is a common weak point because of the complexity, but auditors don’t care when it comes to signing off compliance. In this webcast Bob Camerino of ITS will cover the typical scope and types of information covered by CDM (Compliance Documentation Management) and efficient methods of maintenance.
  • Mapping Networks For Day 3 Management Recorded: Jul 17 2013 47 mins
    Management techniques and processes are still lagging behind the technology, while network infrastructure is constantly evolving to meet increasing data volumes and mission criticality. It is no surprise that many companies see inconsistent performance, unplanned disruption and increasing project lead times – as increasing complexity often means longer planning cycles.

    For efficient day 3 operational management, the practical steps we will cover on infrastructure mapping techniques will help ensure there are no weak links (or wet string) in the data path from user to application.
  • Network and Applications - Understanding the Infrastructure Dependencies Recorded: Jan 17 2013 47 mins
    As networks, servers and applications all increase in complexity, how do you make it simpler and less costly to manage changes and improve performance? We’ll cover practical steps needed to develop the knowledge sets needed to support major transformation projects, as well as improving end to end IT management processes. Ideal for anyone who has found that mapping their IT infrastructure dependencies needs more than one white board!
  • Reducing Costs and Improving Service Delivery For the Physical Layer Recorded: Nov 30 2012 47 mins
    Nadeem Mohammed (Deffinity) and David Cuthbertson (Square Mile) will cover how a combination of workflow management and infrastructure documentation systems can dramatically impact the costs of managing changes at the physical layer. If you find the management of cabling and hardware changes requires an excessive amount of administration effort, site surveys and last minute coordination then you’ll find our webcast very useful. We’ll cover issues like supplier/outsource/team interfaces, project and services workflow, capacity management and improving agility to business changes. For data centres, offices, campus, branches, etc.
  • CCRM Techniques for Data Centres and Networks Recorded: Nov 14 2012 47 mins
    End user experience of IT systems depends on good change, configuration and release management (CCRM) techniques to be in place. But data centers, networks and physical infrastructure have CCRM issues just like application software development so what overlap is there? And how can new techniques like DevOps be applied beyond software development? Robert Cowham and David Cuthbertson will explain all.
  • How To Document Campus Infrastructure - Offices, Hospitals, Universities Recorded: Oct 19 2012 48 mins
    This webinar shows how you can efficiently document IT infrastructure spanning multiple buildings - such as hospitals, universities, offices, airports, factories, ports, etc. We will cover the initial data capture process and then the ongoing maintenance of cabling, rack, network and other documentation presentation formats. Ideal for those who recognise that accurate IT documentation reduces project times, change costs and service disruption.
  • Making Data Center Migration and Consolidation Projects Easier To Manage Recorded: Oct 2 2012 46 mins
    Reducing the data center footprint and cost efficiently implementing such projects is not simple, especially when dealing with the most critical IT components. Andre Belisle has planned and managed such projects in Canada with telco, finance and utilities and will highlight good practices that he has found work well. David Cuthbertson will cover how to get a baseline from which to manage the change activities.
  • Transforming Management Practices To Keep Pace With Data Center Technology Recorded: Aug 16 2012 42 mins
    IT technologies are changing faster than the process and practices – so expectations of improved services and cost reductions are often not realized. This presentation will cover some of the most common problems faced by organizations (both supplier and end user) and how to overcome them.
  • Change Impact Analysis and CMDBs Recorded: Jul 27 2012 42 mins
    This webcast covers different ways to communicate complex risk and dependencies using impact forms and Visio visualisation amongst others. A key reason to implement a CMDB is to support improved impact and risk analysis for changes and incidents. In practice, many people find that lots of asset data doesn't help and a more focused CMDB and set of outputs is required.
  • Improving Your Data Centre Management Techniques Recorded: Apr 26 2012 48 mins
    Without changing the way you manage the data centre, you won’t get the benefit of DCIM toolsets. So which comes first? tools, process changes or the people changes? This talk covers the issues that affect the efficient running of data centres beyond DCIM toolsets.
  • Automating Visio Diagrams For Enterprise Infrastructures Recorded: Dec 16 2011 44 mins
    Maintaining large numbers of Visio diagrams of complex IT environments is now possible using new automation techniques. We'll cover how to have overnight updates of racks, floor plans, networks, applciation service maps, etc. from an infrastructure configuration database.

    Maintaining an infrastructure documentation portal has suddenly become easier for mutli-site, enterprise environments.
  • Practical Implementation of Software Asset Management (SAM) Recorded: Dec 6 2011 47 mins
    Join this software asset management (SAM) and service management webinar presented by the BCS Configuration Management Specialist Group. This session will cover the following key topics:

    •An understanding of the principles of SAM
    •How does SAM fit into Service Management
    •How to assess the starting point in your company.
    •How to move forward

    Your Presenters:
    Ian Preskett has many years of experience in IT. In the last 10 years Ian has specialized in SAM Process consultancy and, until recently, he was the SAM Process and Maturity Practice Manager for a large reseller of software. Ian’s philosophy is to ensure that SAM processes integrate with the service management processes to deliver highly effective SAM and reduce risk by maintaining software license compliance. Ian is keen to promote the value of SAM to the market place, and is a committee member of the BCS CMSG (Configuration Management Specialist Group).

    David Cuthbertson is Managing Director at Square Mile Systems. David has been focused for many years on developing and applying configuration management techniques to technical and service infrastructure. More recently he has been developing techniques and toolsets that link service management CMDBs to data centers, networks, storage and other environments. He is a regular speaker for both the BCS and ITSMF covering all aspects of configuration management from strategic to tactical implementations.
  • Core Infrastructure Build and Configuration Management Recorded: Jan 14 2011 46 mins
    This webcast looks at practical techniques to document complex host and network devices such as blades, Unix, network switches, etc. Automated deployment tools can help with the logical configuration, but much of the hardware build and planning is still done in spreadsheets, powerpoint and Visio.
  • Infrastructure Configuration Management - An Introduction Recorded: Dec 17 2010 47 mins
    As infrastructure complexity continues to increase, the risks and potential for disruption increase. This webcast looks at the emerging discipline of infrastructure configuration management.
  • Reducing Spreadsheet Chaos in Infrastructure Documentation Recorded: Sep 13 2010 46 mins
    Excel will always be used by IT teams to document their systems and environments, but it's flexibility also causes maintenance chaos. In this webcast we assess the benefits and drawbacks when compared to specialist infrastructure documentation toolsets.
  • Documenting Power Connectivity and Capacity In Data Centres Recorded: Aug 6 2010 47 mins
    Understanding power distribution in the data centre is becoming more difficult with the increasing complexity of server feeds. We will look at techniques needed for mission critical computing, that cover capacity and connectivity from the external feeds down to every IT component .
  • The Easy Way To Build a CMDB Recorded: Jun 7 2010 47 mins
    How to build a CMDB quickly from defining CIs, capturing data and then communicating dependencies to users. Examples covering business to IT component mapping, virtualisation and creation of Visio diagrams.
  • Integrating Excel, Visio with Data Center Management Toolsets Recorded: Apr 26 2010 48 mins
    How to link specialist data center management toolsets with Excel and Visio. Combining the flexibility of MS office tools with the accuracy and depth of data center management systems.
  • Data Center Capacity Management Recorded: Mar 26 2010 48 mins
    Techniques to manage and optimise data center resources, with examples of process and presentation. Covering space, power, cabling, connectivity and resource management.
IT Infrastructure Management and Documentation Techniques
How to implement improved practices and systems for enterprise environments covering data centres, networks, services etc.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Change Impact Analysis and CMDBs
  • Live at: Jul 27 2012 1:00 pm
  • Presented by: David Cuthbertson, Robert Cowham
  • From:
Your email has been sent.
or close
You must be logged in to email this