The ITSM Practice: Elevating ITSM and IT Security Knowledge
Luigi Ferri
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations ...
OT Security Simplified: 6 Key Principles for Critical Systems Protection
In today's episode of "The ITSM Practice," Luigi Ferri delves into Operational Technology (OT) Cybersecurity, crucial for protecting vital infrastructure like energy, water, and healthcare. We discuss six actionable principles essential for safeguarding these systems against cyber threats, emphasizing the importance of safety, business knowledge, data protection, network segmentation, supply chain security, and human factors in creating a resilient cybersecurity strategy.In this episode, we answer to:How can your organization enhance the safety of OT systems during cyber incidents?What strategies can help protect sensitive OT data from cyber threats?How does network segmentation contribute to securing OT environments?Resources Mentioned in this Episode:Australian Government, whitepaper "Principles of Operational Technology Cyber Security", link https://industrialcyber.co/features/acscs-ot-cyber-security-principles-call-to-action-for-critical-infrastructure-providers-to-boost-cyber-resilience/Dark Reading, article "NSA Releases 6 Principles of OT Cybersecurity", link https://www.darkreading.com/ics-ot-security/nsa-releases-6-principles-ot-cybersecurityConnect with me on:LinkedIn: https://www.linkedin.com/in/theitsmpractice/Website: http://www.theitsmpractice.comAnd if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.Credits:Sound engineering by Alan Southgate - http://alsouthgate.co.uk/Graphics by Yulia Kolodyazhnaya
--------
9:42
Protect Your Data How FIM and DLP Work Together to Secure Information
In today's episode of "The ITSM Practice," hosted by Luigi Ferri, we explore crucial data protection technologies: File Integrity Monitoring (FIM) and Data Loss Prevention (DLP). Discover how FIM acts as a vigilant monitor of file changes, ensuring system integrity, while DLP secures sensitive content, preventing unauthorized data leaks. Together, they form a robust security framework vital for any organization aiming to fortify its defenses against both internal and external threats.
In this episode, we answer to:
What are File Integrity Monitoring (FIM) and Data Loss Prevention (DLP), and how do they enhance organizational security?
How does the integration of FIM and DLP contribute to a comprehensive security infrastructure?
Why is it crucial to have both FIM and DLP in place for effective risk management and data protection?
Resources Mentioned in this Episode:
Microsoft, article "File Integrity Monitoring in Microsoft Defender for Cloud", link https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview
Tripware, article "What Is the Difference between FIM and DLP", link https://www.tripwire.com/state-of-security/what-difference-between-fim-and-dlp
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya
--------
6:19
Customer First: Boosting Quality and Profits
In this episode of The ITSM Practice, Luigi Ferri delves into the transformative power of prioritizing customers over products, exploring its profound impact on quality, profitability, and business growth. By shifting focus from product-centric to customer-centric strategies, companies like Apple and Tesla have not only enhanced their offerings but also fostered customer loyalty and operational excellence. Luigi emphasizes the importance of actively listening to and integrating customer feedback, which not only drives innovation but also solidifies a company's competitive edge.
In this episode, we answer to:
What steps can you take to make customer insights central to your product development?
How does your organization measure quality today, and is it aligned with customer expectations?
Are you investing enough in relationships to turn customers into long-term advocates?
Resources Mentioned in this Episode:
Kaizo, article "The real meaning behind “customer first", link https://kaizo.com/blog/customer-first/
Zendesk, article "Customer First: What it really means to put the customer first", link https://www.zendesk.de/blog/customer-first/
Praemie Direkt, article "Customer First – The customer comes first", link https://www.praemie-direkt.de/wissen/customer-first-der-kunde-an-erster-stelle/
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya
--------
6:27
Transforming IT Operations: How Observability Improves Security and Performance
In this episode of "The ITSM Practice," Luigi Ferri delves into the transformative power of observability in IT management and security. Discover how leveraging contextual data and dynamic thresholds enhances system performance, security measures, and anomaly detection, promoting a proactive and strategic approach to IT security.
In this episode, we answer to:
How can collecting contextual data and setting dynamic thresholds improve our system performance and security measures?
How do dynamic thresholds revolutionize the way we handle system alerts and anomalies?
What does a layered security approach entail, and how does it enhance our security strategy?
Resources Mentioned in this Episode:
Contrast Security, article "Security Observability: Intelligent security assessment = seeing what others can’t", link https://www.contrastsecurity.com/security-influencers/what-is-security-observability-contrast-security
Cloud Zenix, article "Strategies for DevOps Teams to Enhance Observability and Overcome Monitoring Challenges", link https://cloudzenix.com/strategies-for-devops-teams-to-enhance-observability-and-overcome-monitoring-challenges/
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya
--------
5:16
Secure System Design: Building Resilient IT Infrastructure
In this episode of "The ITSM Practice," Luigi Ferri delves into constructing IT systems that are inherently secure, robust, and prepared for future cybersecurity challenges. He highlights the importance of integrating security at every development phase, managing software quality, and the necessity of continuous security improvements, drawing from key NIST publications. These guidelines ensure IT systems are secure from the start and remain resilient against evolving threats.
In this episode, we answer to:
How can we integrate security from the start of system development?
How can we manage software quality and supply chain risks effectively?
What are the benefits of committing to continuous security improvement?
Resources Mentioned in this Episode:
NIST Special Publication 800-160 Volume 1, link https://csrc.nist.gov/pubs/sp/800/160/v1/r1/final
NIST Cybersecurity Framework, link https://www.nist.gov/cyberframework
NIST Special Publication 800-137 on Continuous Monitoring for Federal Information Systems and Organizations, link https://csrc.nist.gov/pubs/sp/800/137/final
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya
Acerca de The ITSM Practice: Elevating ITSM and IT Security Knowledge
Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals!
Stay Connected:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Youtube: https://www.youtube.com/@theitsmpractice
Website: http://www.theitsmpractice.com
Escucha The ITSM Practice: Elevating ITSM and IT Security Knowledge, Top Noticias Tech y muchos más podcasts de todo el mundo con la aplicación de radio.net