Whose Problem is it Anyway?

Jon Ryman, VP ITSM Solutions, North America, EasyVista
Problem and incident management are fundamental processes within any service management organization. This session will cover aligning ITIL best practices with problem and incident management implementations to meet quality, cost and other critical service metrics. The real value however is in leveraging a holistic approach to IT service levels, integrating problem and incident management with other IT functions in the IT lifecycle, including IT Asset Management, IT Financial Management and IT Project Management. By tracking and managing problems and incidents across the IT lifecycle, organizations can truly track and measure the real benefits, costs and return on investment of their service management initiatives.
Mar 21 2012
46 mins
Whose Problem is it Anyway?
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2855)
  • Upcoming (88)
  • Date
  • Rating
  • Views
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Channel
  • Channel profile
Up Down
  • Meet SUI – the new Service User Interface! May 15 2014 2:00 pm UTC 45 mins
    Learn how progressive IT organisations have responded to end-users and customers that demand more from IT. These organisations have delivered a familiar consumerised experience and are delivering services through an IT Store and more. Wizards and widgets are used in a codeless design environment to deliver services as apps – Service catalog, stylised business value dashboards and more.

    The rebirth of the User Interface will be the catalyst through which IT finally bridge the gap with the business; Services delivered will optimise budgets and maximise output and performance. The services delivered will be used by a workflow that is increasingly mobile, the presentation layer (or user interface) will encourage acceptance and in turn the services delivered will drive productivity.
  • Blurred Boundaries - The Consumerization of IT Recorded: Mar 5 2013 41 mins
    The “consumerization of IT” is upon us. Technology has caused a natural paradigm shift that is blurring the boundaries between business and private lives. Fear about security breaches is no longer justification for enforcing rigid technology barriers. IT is being forced to implement policies in order to guide employees while still allowing them the freedom to be creative.

    Are you ready to shift into a new paradigm of IT? Join Benoit Tessier, the Leader of IT Service Management at Domtar, as he discusses their journey to create a collaborative, efficient and responsive environment to support the demands of their progressive and mobile community.
  • Are you Tired of Fighting Fires? Recorded: Mar 4 2013 12 mins
    Are you tired of reactive service management? Join this webinar to find out how to begin the journey toward proactive service management with process integration.
  • ITIL Simplified Recorded: Jan 15 2013 56 mins
    Senior IT executives are being held accountable to better manage the quality and reliability of IT under the pressures of increasing customer demands, technology expansion and regulatory requirements. Standards, such as ITIL, play a very useful role, but do you find yourself asking questions about how to make ITIL successful and sustainable for your organization?

    Join ITIL Expert and ISO/IEC 20000 Manager certified, Russell Stopek, as he shares his knowledge, insight and experience to help clarify the confusion behind the ITIL framework. Russell will help you understand the ITIL framework and guide you to the right ITIL approach to avoid wasted effort. Leave this webinar with an understanding of ITIL implementation best practices and how you can best apply ITIL processes to your organization, avoiding common pitfalls.
  • Improve Business Continuity with EasyVista Configuration Management Recorded: Dec 18 2012 45 mins
    Driven by technology advancements, industry best practices and customer demands, the ever-changing technology landscape make the IT infrastructure increasingly complex to manage. Configuration Management removes the guess work from IT decision making. Without a configuration management database the implication of change is unknown. If you don’t know what your information technology assets are and how they are related to one another, how can you manage, improve and support them? Attend this webinar to find out how EasyVista’s Configuration Management can help you make informed decisions regarding your IT infrastructure.
  • Remove the Guesswork with Streamlined ITSM Data Analysis Recorded: Nov 13 2012 51 mins
    Running your IT organization shouldn’t require guesswork. Informed IT decision-making begins with clean and accurate data. Usable data coupled with reporting, analytics and true business intelligence technology provides the flexibility to explore, manipulate, simulate and analyze trends and patterns, identifying potential risks and liabilities. Join EasyVista and explore how definitive decision-making based on intelligent data will help you streamline operations, improve efficiencies, increase profitability and continually improve your service delivery.
  • ITSM in the Cloud – What You Don’t Know Will Hurt You Recorded: Oct 17 2012 46 mins
    Cloud consumers are becoming savvier by the day, and it’s not just about cost savings anymore. SaaS is about so much more than the basics, it’s about rapid deployment, agility, data privacy, it’s about secure integrations, and it’s about the SERVICE. Whether you need out-of-the- box KPI dashboards and monitoring, true Business Intelligence for simulation and multi-dimension analysis, the ability to benchmark your efficiencies against industry standards or integration with ERP systems like SAP or other mission critical applications, this webinar will discuss the key considerations when evaluating ITSM cloud vendors.
  • Replacing your legacy helpdesk tool - What you need to know Recorded: Sep 18 2012 60 mins
    Are you facing support and maintenance challenges with your legacy helpdesk tool? The rapid evolution of technology coupled with poor service delivery from your current vendor, an expired maintenance contract, a retired solution, expensive and resource intensive upgrades or not seeing your current vendors vision for the future means that it might be time for a change. Stop worrying about your embarrassingly dated or complex solution and focus on your future IT success. Attend this webinar to learn about the latest IT Service Management trends and what you can do to offer more cost effective, reliable and focused service delivery.
  • Empowering End Users with a Modern Customer Experience Recorded: Aug 7 2012 59 mins
    The “impersonal” world of self-service has taken over. It has become the preferred method of interaction. At the very minimum an organization must provide equivalent service across all touch-points – telephone, email and web self-service. In fact, it has gone one step further to a demand for cross-touchpoint service. The IT organization must move from a multi-channel approach to an agile approach – regardless of where the request begins, it may finish in another channel.
  • Whose Problem is it Anyway? Recorded: Mar 21 2012 46 mins
    Problem and incident management are fundamental processes within any service management organization. This session will cover aligning ITIL best practices with problem and incident management implementations to meet quality, cost and other critical service metrics. The real value however is in leveraging a holistic approach to IT service levels, integrating problem and incident management with other IT functions in the IT lifecycle, including IT Asset Management, IT Financial Management and IT Project Management. By tracking and managing problems and incidents across the IT lifecycle, organizations can truly track and measure the real benefits, costs and return on investment of their service management initiatives.
EasyVista
Codeless ITSM and ITAM SaaS solutions for global enterprises.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Whose Problem is it Anyway?
  • Live at: Mar 21 2012 4:00 pm
  • Presented by: Jon Ryman, VP ITSM Solutions, North America, EasyVista
  • From:
Your email has been sent.
or close
You must be logged in to email this