All Episodes
The ITSM Practice: Elevating ITSM and IT Security Knowledge — 146 episodes
FINOS vs ISO 42001: What to Choose
Who Owns Cloud Security?
CISO Strategy: Where Product Security Fails at Scale
ITIL 5 Exposed: Accountability Without Authority
PSD3 Explained: Payments Security & Fraud
AI Governance Illusion: Hidden Risks & Accountability in ITSM
DevSecOps: Responsibility Without Authority
ISO 31000 vs MoR: Closing the Risk Management Gap
ITIL 5: Stop Explaining Failures. Start Owning System Decisions
ITIL 5, SCF and the Compliance Illusion
ITIL 5 for CIOs: Governing AI-Driven Digital Systems at Scale
Why IT Maturity Is the Hidden Risk in IT Carve-Outs
Why ITIL 4 Is Critical for HITRUST Success
FISMA in the Cloud: What Midsize Security Teams Need to Know
ISO 27001 & ISO 42001: Governing AI Risk
Payment Security by Design with PCI P2PE
ITIL v3 as the Backbone of eSIM Security
Why Mature ITSM Programs Fail?
From Readiness to Action: Building Your AI Roadmap
Are We Really Ready for AI?
How to Build a GRC Framework for Fintech Startups
BSI Grundschutz: Inside the Technical Measures – Part 2
BSI Grundschutz: The Hidden Gatekeeper - Part 1
Without a Service Management Office, ITSM Is Just Theatre
From Cost to Value: Financial Modelling for ITIL Services
Trust vs Tech: Why Regional Banks Are Falling Behind
BSI C5 vs NIST 800-53: Smart Compliance for Banks
What Is the AICM Framework for AI Compliance?
Process Mining in ITSM: Hidden Workflows Revealed
How to Build IT Accountability with SoD (ISO 27001 Control 5.3)
The VMO in ITIL 4: Aligning Work with Strategy and Value
ISO 31000: Building Risk-Aware Culture Through Smarter Decisions
Align BIAN and ITIL 4 for Capability-Based IT Governance
No IT Security without Service Management: Integration Strategies for Resilience
IT Security Needs Service Management: Exploring the Interdependence
How to Measure Cybersecurity Effectiveness: KPIs, KRIs, and Business Impact
Securing Agentic AI: Maturity-Based Cybersecurity Strategies
How to Reduce Call Center Costs Without Losing Customer Trust
Who Really Defines Project Success? It’s Not the Metrics
ITIL 4 and Value Stream Mapping: A Smarter Way to Deliver ITSM Value
Preparing for Post-Quantum Security
Security Strategy vs Strategic Plan: What’s the Difference?
Agentic AI: The Future of ITSM
Outsourcing Code, Keeping Control – ISO/IEC 27001 A.8.30
How Enterprise Architecture Transforms Hospital IT and Patient Safety
PCI DSS Explained: Turning Compliance into a Security Strategy
FinTech CIOs: From Projects to Products – Lead the Shift to Product-Centric IT
ISO/IEC 42001 Explained: How to Govern AI Ethically and Securely
ISO 20022 Explained: Global Payments, Compliance Risks & Transformation Strategies
AI Is Replacing Project Managers — Only the Smart Will Survive
The 3 Risk Models Every IT and Business Leader Must Understand
Why ISO 27001 Certification Is Essential for Fintech Success in 2025
What is an ITIL 4 Master — And Why It Matters for Your ITSM Career
Is BIAN the Cure for Banking’s Integration Chaos or a Framework Too Late?
How to Make Change Stick: 6 Proven Steps to Lead with Purpose and Impact
ITIL CMDB Best Practices: Scale Smart with Real Business Value in 7 Steps
ISO 27001 Clause 8 Explained: Turning ISMS Plans into Real Security Operations
ITIL 4 Principles: Key to Organizational Excellence
Strategic Enablement through IT Service Management for CIOs
Digital Identity Evolution: Past, Risks, and Future Insights
Persistent Challenges in Project Management: Why They Endure
ITIL 4 in Action: Crafting Standard Service Models for Success
3 Years of IBM Breach Reports: Key Business Protections
Halt Repeat Issues: Easy Problem Management
OT Security Simplified: 6 Key Principles for Critical Systems Protection
Protect Your Data How FIM and DLP Work Together to Secure Information
Customer First: Boosting Quality and Profits
Transforming IT Operations: How Observability Improves Security and Performance
Secure System Design: Building Resilient IT Infrastructure
The Evolving Roles of Project Managers and Process Owners
Cloud or On-Premises? Decoding Costs and Strategy
Optimizing ITSM with ITIL 4: Understanding Business and Operating Models
Mastering ITIL Feedback: Transform Your Team's Performance
Top 5 Gaps in Strategy Execution
ITIL Swarming Techniques: Revolutionizing Problem Resolution
Enterprise Security 2030: Innovations for a Resilient Framework
ITIL's Take on Motivation: Boosting Workplace Performance
Vendor Consolidation vs. Defense in Depth
Enhancing Efficiency with ITIL Value Streams
The Future of Service Desks: How AI Transforms Customer Support
Security-First IT Projects: Essential Steps for Emerging Organizations
Tarun Ramesh Explores Scattered Spider Cloud Attacks
Top-Down vs. Bottom-Up Approach for Designing ITIL Processes: Which One Fits Your Business?
Future-Proofing Cybersecurity with Kyle Ryan’s AI Expertise
The Business Value of ITIL Service Design: Why It’s Essential for Selling IT Services
From Risk to Resilience: Casey Zduniak on Cyber Defense
What is an MSP Today and What Does the Future Hold?
The Importance of Software Transparency in SaaS: Why You Need an SBOM
Centralized vs. Decentralized ITSM: Finding the Right Balance for Global Organizations
ITIL Insights: Who Does What in World-Class Service Management?
Integrating Security and Service: The Convergence of DevSecOps and ITIL® 4
What Is AIOps? Understanding Its Transformative Potential and Inherent Risks
Navigating the Complex Landscape of Security Governance: Regulations, Compliance, and Cloud Security
Expert Insights: Mastering the Art of Selling ITIL Consultancy
Navigating SDLC Release Management Models in Highly Regulated Industries
ITIL 4 Explained: How SMO and VMO Transform Service Management
Essential Strategies for Selling ITIL 4 Value to Key Business Stakeholders
Are We Endangering Security by Over-Reliance on Cybersecurity Vendors?
What is Service Integration and Management?
Streamlining IT Processes: Stefan Kempter’s Guide to YaSM Service Management
Top 5 Non-Conformities with ISO 27001 and How to Overcome Them
Breaking Barriers: Why There Are Only A Few Women in ITSM?
Overcoming Obstacles in ITSM Adoption: 5 Key Challenges and How to Solve Them
Enhancing ITIL Service-Level Agreements: The Adrian Bunea Perspective on Minimizing the Watermelon Effect
Why Are CISOs Seen as 'Scapegoats'?
Navigating TOGAF: Pros, Cons, and Strategic Considerations
Exploring Social Engineering Threats: How Companies Increase Their Vulnerability
ITIL Meets NIS2: Enhancing Cybersecurity and Service Management Together
How Communities Enhance Service Quality
Is ITIL 4 Problem Management an optional luxury or a critical lifeline for your IT operations?
Building Trust with Strategic Communication in IT Service Management
How Can Combining ITIL 4 and Agile Lead to Better Projects?
The Future of ITSM: Why Removing 'IT' Could Broaden Its Impact
Synergy in Transition: Uniting ITIL 4 and Organizational Change Management for Effective Change Management
IT for Competitive Advantage: A Leadership Perspective
Securing Software Development: From SSDLC to Third-Party Risks
How can ITIL practices streamline your Major Incident Management process?
Enhancing Self-Service: The Role of Knowledge Management in Chatbot Success
How Can ISO 27001 Onboarding and Offboarding Tactics Secure Your Organization?
Strategic Leadership: Balancing Urgent Tasks with Long-Term Vision
What Drives Enterprise Asset Management Success?
Harnessing AI and Automation for Superior Service Delivery
What is DORA?
Driving Excellence in IT Service Delivery: Strategies and Solutions
What is the ROI of ITIL in a small and medium-sized business?
Understanding Threat Modeling in IT Security
Risk Appetite vs. Risk Tolerance: What is the Difference?
What are common IT Security program issues with suppliers?
How challenging is it for SMEs to implement ITIL Configuration Management Systems and CMDB?
How do you select the right ITSM tools for your organization?
Do you need Disaster Recovery?
AI in IT Security: Risk or Opportunity?
What is Business Relationship Management?
What is a Service Catalogue?
What does 'Security by Design' really mean?
How Do You Determine the Type of IT Security Policy You Need?
Does my Business Need an ITIL Change Management Process?
How Do Management Consultants Adopt ITIL?
The Essentials of Service Provision in ITIL 4: Opportunities and Challenges
Optimizing ITIL's Value Streams and Processes: A Balanced Approach
Enhancing ITSM with Strategic Partnerships: The 'Partners and Suppliers' Dimension
Balancing Tech and Touch in ITSM: The ITIL 4 'Information and Technology' Dimension
Navigating ITIL 4's 'Organizations and People' Dimension
Mastering ITIL 4's Four Dimensions: A Guide for ITSM and IT Security
Ten Common ITIL Implementation Mistakes to Avoid at All Costs
ITIL Evolution in the Digital Era