CSI: A Practical Perspective

Manta Consulting - Derrick Hazel
Have you been using ITIL for years and want to understand how to optimize your practices? Or are you just beginning with ITIL and want to know more about CSI?

Register now to join Manta Director, Derrick Hazel, as he takes at look at ways to leverage CSI to drive operational efficiency, sustainment and customer satisfaction.

Continual Service Improvement (CSI) supports changing business objectives by providing a consistently-applied set of processes, procedures and tools to measure, analyze and report on improvement opportunities ensuring maximum benefit and minimum risk to the business.

In this 45 minute webinar we will explore how to integrate CSI into your organization to:
- Improve business operations and staff productivity
- Improve customer satisfaction and relationships
- Optimize costs and industry best practices
Jul 24 2012
45 mins
CSI: A Practical Perspective
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3304)
  • Upcoming (60)
  • Date
  • Rating
  • Views
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Organizations are having to cover more ground than ever when it comes to security. Yet businesses often lack the in-house skills and resources, so security leaders are turning to MSSPs to help bear the burden to ensure every area of risk is adequately attended to.

    Join us for an interactive discussion with guest speaker, Forrester Research VP and Principal Analyst, Ed Ferrara, to learn how MSS is changing the conversation for businesses to achieve security goals. Help drive the conversation by submitting a question for Ed in advance so we can tackle your biggest security concerns such as:

    • Overcoming the skills shortage
    • Where to focus the budget – spending trends across industries
    • The value of security – pitching it as an investment not a cost to business leaders
    • Improving business outcomes – leveraging MSSPs as a tactical arm to optimize IT security, efficiency and value
  • A recent analyst study found that 88% of organizations are “doing Project and Portfolio Management (PPM).” This finding could lead many to believe all is well with this critical business process so essential to strategic success. This is hardly the case as studies also show PPM is still generally immature in enterprises today. The lack of maturity is largely due to the fact that most organizations are addressing only a subset of PPM capabilities. So though almost every organization can lay claim to doing PPM, few are actually doing PPM for all its worth. Many of these organizations will continue to miss out on the incredible possibility and promise of this essential business capability until they grasp and appreciate the full scope and potential of PPM.

    One of the greatest barriers to realizing the full potential of PPM is an enterprise-wide awareness of the span of PPM and the likely gap that must be overcome to achieve it. There is a plethora of great PPM insight contained in the numerous books, methodologies, and frameworks available today, but using this volume of information to get everyone on the same page is a daunting challenge. The key is to use a simple approach and model to quickly establish a common understanding of this critical business discipline and to easily foster the conversations and discussions to drive the endeavor to raise PPM proficiency.

    This brief webcast will present a PPM model that is easy to remember, easy to communicate, and proven to quickly illuminate the gap between existing immature PPM processes and the full scope and potential of comprehensive Project and Portfolio Management.
  • Portfolio planning activities have struggled to gain respect in most businesses. Lack of enterprise-wide orchestration arises from a lack of effective involvement and intimate business knowledge – not simply of operations and processes, but of business imperatives, obstacles and desired outcomes. And the information systems aspects continue to be planned in splendid isolation from the business, causing IT people to mistakenly celebrate victory when a new IT system goes live. However a project only really starts when the IT goes live, and so the planning needs to be fully integrated. This can only be accomplished first by building strong relationships with business peers that will result in measurable value creation. The next step is to implement a sophisticated PPM system that can handle the extreme complexity of orchestrating all the business and related technology portfolio of initiatives, capable of optimizing the plans (and the outcomes) as the business environment changes.

    To achieve this, a new PPM model needs to be created to look at portfolio management in a holistic way, enterprise-wide. Planners need a capability that will generate multiple scenarios and real-time decision support. This dimensionality and complexity is well beyond the capacity of the human brain. By implementing such a tool, IT would be positioned as a critical partner with the business – not just in implementing mainstream information systems, but also in helping the business with a much better way to plan and manage all of its key initiatives effectively

    This session focuses on how enterprise leaders and divisional leaders and IT leaders should be working in harmony to orchestrate great business outcomes, rather than looking after their parochial interests.
  • Channel
  • Channel profile
  • CobiT 4.1 to CobiT 5 - How Has It Changed? Recorded: Sep 27 2012 44 mins
    Are you currently using CobiT 4.1 and want to determine whether to adopt CobiT 5?

    Register now to join Manta Consultant, Peter Kingsman, as he takes at look at the changes and improvements in CobiT and how this affects Manta's approach to governance assessments.

    In this 45 minute webinar you will learn about the following key aspects of CobiT 5:
    - Understand the significant changes in CobiT 5
    - Obtain some idea whether using CobiT 5 would be advantageous, depending on your role and your organization
    - See how Manta will utilize CobiT 5
  • CSI: A Practical Perspective Recorded: Jul 24 2012 45 mins
    Have you been using ITIL for years and want to understand how to optimize your practices? Or are you just beginning with ITIL and want to know more about CSI?

    Register now to join Manta Director, Derrick Hazel, as he takes at look at ways to leverage CSI to drive operational efficiency, sustainment and customer satisfaction.

    Continual Service Improvement (CSI) supports changing business objectives by providing a consistently-applied set of processes, procedures and tools to measure, analyze and report on improvement opportunities ensuring maximum benefit and minimum risk to the business.

    In this 45 minute webinar we will explore how to integrate CSI into your organization to:
    - Improve business operations and staff productivity
    - Improve customer satisfaction and relationships
    - Optimize costs and industry best practices
  • Making Best Practice Learning Easy Recorded: Jun 26 2012 44 mins
    When it comes to certified training, the Manta Group focuses on certain best practices - Service Management, Governance, Project Management and Emerging Technologies.

    Attend this webinar to find out why we focus on these best practice areas, and the different training delivery methods available - with a particular focus on why self-paced eLearning is a great learning option.

    As a special bonus, you will get a sneak peak into what the new CobiT 5 training will include.
  • Optimizing Delivery in Project & Program Management Recorded: May 22 2012 34 mins
    Everything you've always wanted to know about improving efficiencies and throughput with your PMO, but were afraid to ask.

    Using a Lean Six Sigma Project approach, Manta Director Gary Grandin provides insight to identify the gaps and increase efficiencies by using IT best practices.

    Attend this webinar to:
    - Learn about techniques used to drive efficiences, decrease cost and increase throughput
    - Increase the effectiveness of your team through the use of analysis tools
    - Develop the appropriate process controls, risk management and ensure the right people are in the right roles
  • Maximizing Your ITIL Investment Using CobiT, Lean Six Sigma or ISO Recorded: Apr 17 2012 45 mins
    Do you find your IT organization in one of the following situations?
    - “I tried to implement ITIL, but it’s fallen apart every time”
    - “I thought implementing ITIL would solve all of my problems”
    - “ITIL solved some of my problems, where do I go from here?”

    Register now to join Manta Consultants Peter Kingsman, Eden Roberts and Craig Dewey as they present three key approaches to ensure your investment in ITIL and SM initiatives are addressing your key problems.

    In this 45 minute webcast you will learn how to incorporate 3 key approaches to maximize ITIL:
    - Risk based approach
    - Management system approach
    - Process optimization approach
  • The Sponsor Perspective: Project Strategies for Success Recorded: Mar 20 2012 46 mins
    Project managers have long faced the triple constraints of scope, schedule and cost. Yet too often when these hurdles have been overcome, the project might STILL be deemed a failure. Or the project might not add to the project manager'€™s reputation. Why not?

    Project managers deal with delivery, procurement, and people puzzles, to name a few. While real, these are not necessarily aligned with the pain points of a Project Sponsor. The project is merely the cross section where the project manager's and sponsor'€™s interests are temporarily aligned.

    We will explore the perspectives of the Project Sponsor, and assist project managers with strategies for working with sponsors of varying aptitude. This sometimes unwritten world may well hold the keys to project success, and the real results the PM is expected to deliver.

    In this 45 minute webcast you will learn:
    • The traits of a good Sponsor
    • Types of Sponsors and how to work with each
    • What Project Managers can do to line up Sponsor success

    Attendees can also collect a PMI PDU credit for attending this webcast through a Category B entry. Contact info@mantagroup.com for more information.
  • Optimize Your Service Desk Recorded: Feb 15 2012 44 mins
    Join Russ Conwath, Manta Consultant and Will O'Brien, CEO of The Manta Group, as they discuss the best way to create an efficient and effective service desk.

    Manta's assessment methodology is centered around four lenses: Services, Organization, Process and Technology. You will see proof of this methodology in the results from a case study where a service desk was improved at a financial institution.

    In this 45 minute webcast you will take away:
    • Why it is important to look at more than just people, process, tools - The four lenses approach to assessment
    • Common areas to look for service desk optimization opportunities
    • Case study examples of service desk optimizations

    “Optimize Your Service Desk” is co-sponsored by The Manta Group (www.mantagroup.com) and MSI Inc (www.msysintegration.com).
  • Lean Thinking and Principles: Turning Waste into Work Recorded: Jan 24 2012 36 mins
    Are you looking for ways to improve the efficiency of IT services in your organization? Attend this webinar to see an example of Lean principles and how it can help your organization become more efficient and effective.

    This webcast provides an example of how Lean Thinking and Lean Principles were not only used to reduce waste and improve efficiency, but also as an approach to effective organizational change within a financial services company.
  • Achieving Green Data Centres Through Better Process Recorded: Dec 13 2011 44 mins
    As the amount of power consumed by IT continues to rise, the associated cost and environmental impact is becoming increasingly alarming. Power is already the single biggest operating expense in the data centre. However, much of this power is wasted, resulting in unnecessary heat, expense, and upstream carbon emissions.

    In this 45 minute webcast, learn about specific steps you can take to help combat this problem. Learn why having efficient equipment and facilities is not enough and why a holistic program which also encompasses good processes and governance produces the best results. Attendees will review:
    - The problem of power consumption in the data centre, and why a holistic approach is important for achieving the best results
    - Some key elements of process and governance critical to a successful Green IT program and how they impact power consumption
    - Specific steps you can take to help start a Green IT program or advance an existing one
  • Clouds are Fluffy & Safe? Get Better Cloud Governance Recorded: Nov 22 2011 39 mins
    More and more companies are turning to the Cloud to host their confidential data, but are they taking the time to ensure the correct level of governance is in place?

    In this 45 minute presentation, learn about Cloud governance for success and risk reduction. In addition to any questions raised by participants, you will take away the following:
    Market trends and Model shifts
    Know what SAS 70 really means when selecting a cloud provider
    The need for effective cloud governance
    How to build an effective governance framework using ITIL or COBIT

    Get answers to your questions about Cloud governance in this interactive webcast.

    "Clouds are Fluffy and Safe?" is co-sponsored by The Manta Group and MSI.
  • The Best Practice Ecosystem: How to Leverage Best Practices for Optimal Results Recorded: Oct 18 2011 43 mins
    A best practice is a method or technique used to maintain quality as an alternative to mandatory legislated standards, and can be based on self-assessment or benchmarking. In the IT industry ITIL, COBIT, Lean, 6 Sigma, ISO and PMBoK are frequently implemented.

    For best practices to thrive, an environment must be created where best practices complement each other and the system of practices is in balance - The Best Practice Ecosystem.

    In 45 minutes, learn how to get the most out of your investment in IT best practices. In addition to any questions raised by participants, you will take away the following:
    - For best practices to thrive, an environment must be created where best practices complement each other and the system of practices is in balance - The Best Practice Ecosystem.
    - Organizations that invested in best practices recognize significant growth and profit results compared to their competitors who did not invest in best practices.
    - Observe a case study of how a financial organization used the Best Practice Ecosystem to transform their IT organization.

    Service Management, Project Management, Risk Management and other operational disciplines will be examined.
Series focused on optimizing & transforming your IT organization
The Manta Group's free monthly webinar series is a valuable way to discover how to improve the efficiency and effectiveness of your IT organization. By watching our webcasts, you qualify for 1 CPD credit (per webcast) claim directly to priSM.

Over the course of this series we will present insights on topics based in IT Business Performance, IT Management, Governance, Risk & Compliance and Enterprise Architecture.

The Manta Group has been a trusted management consulting partner since 2003. Today our focus is on optimizing business operations, managing transformation and measuring performance over time. We look forward to realizing what's possible for you.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CSI: A Practical Perspective
  • Live at: Jul 24 2012 4:00 pm
  • Presented by: Manta Consulting - Derrick Hazel
  • From:
Your email has been sent.
or close
You must be logged in to email this