Masterclass with Andy Taylor & Andrew Fitzmaurice
Friday the 19th of June our flagship event, AMPG- International showcase, ran for its 13th consecutive year however this was the first time the event had a comprehensive cyber security programme. I spent the day following the cyber security crowd.
The first cyber security focused element on the agenda was a joint masterclass with Andy Taylor, CEO of Aquila Business Services Ltd and Andrew Fitzmaurice and Chief Executive of Templar Executives. The masterclass focused on achieving positive change in your organization’s cyber security maturity. Continued…
Posted in Cyber Security, Events.
– July 1, 2015
No matter how much we try to automate, service management cannot work without people. ISO/IEC 20000-1 contains many references to ‘authorities and responsibilities’. It also has a specific sub-clause about human resources. This blog aims to clarify these requirements and answer some common questions about how to provide evidence of fulfillment of the requirements.
Authorities and responsibilities
In ISO/IEC 20000-1, authorities and responsibilities are required in many clauses to be defined, maintained, and assigned. The service management plan needs to contain a ‘framework of authorities, responsibilities and process roles’.
Process roles will typically include process owners, process managers, and process practitioners. There may also be other roles in service management such as service owners, business relationship managers, supplier managers, management representatives etc.
Each of these roles needs to have defined responsibilities e.g. a process manager will typically have responsibility to for the effective operation of the process. In addition the authorities of the role need to be defined e.g. who can declare a major incident, who can invoke service continuity, who has the authority, perhaps at different levels, for approving changes, accountable for the process.
A common way of showing responsibilities and authorities is using a RACI matrix showing activities for a process with a matrix of roles responsible, accountable, consulted and informed.
Posted in Accreditation, Exams, ISO Schemes, Qualifications.
– June 29, 2015
Mark Smalley’s roundtable at APMG Showcase 2015
The quote is from a participant in one of my two sessions at the APMG Showcase in London in June 2015. These highly participative sessions were set up to help people improve the often troubled relationship between business and IT, and the quote illustrated this frustration. With a better relationship, both ‘parties’ will perceive that they are getting more value from IT and are working towards common goals for the organization.
The participants considered two perspectives: what kind of behavior business people would like to see from IT people, and what kind of behavior IT people would like to see from business people. It takes two to tango, so both parties should be equally proficient in their respective roles.
So what does the business want to see from IT?:
- Don’t over-promise – it only leads to disappointment and worsens the relationship
- Come off the fence and share your uncertainties – business people are realistic and realizes the complexities
- Service ethos – all too often IT people don’t have a clue how to provide decent service
- Early engagement – the earlier IT is involved in IT investments, the better they are able to contribute
- Use the clues that the business gives you – make proposals that are related to current and future business issues
Posted in Events, IT Service Mgmt, Mindful ITSM.
– June 25, 2015
Major General Stephen Day & Martin Huddleston at the Australian Cyber Security Centre Conference
UK based APMG-International shared their new Cyber Defence Capability Assessment Tool (CDCAT®) with the Australasian market. Developed in conjunction with the Defence Science and Technology Laboratory (Dstl) and its technology transfer company Ploughshare Innovations Ltd, CDCAT® can help businesses to assess their own cyber defense preparedness, identify any gaps in defense capability that may exist and determine what mitigations can be applied. Continued…
Posted in Events.
– June 23, 2015
We’ve worked with organizations and UK Government bodies, including AXELOS, CESG and the Defence Science and Technology Laboratory, to create world-class cyber security certification schemes and products. So we thought we needed a new world-class website to showcase this growing portfolio, www.apmg-cyber.com. We hope you like it.
Posted in Cloud, Cyber Security, Events.
– June 16, 2015
UK’s most interactive event for organizational and professional improvement
APMG International is to host the UK Showcase 2015 on Friday, 19th June 2015. Now in its 13th year, the Showcase has proven itself to be a highly effective event for learning and sharing experiences in programme, project, cyber security, risk and IT service management.
Showcase 2015 will be the biggest and most comprehensive Showcase yet focusing on a wide range of products and using new technologies to improve your delegate experience on the day.
This is a one day free to attend event giving the attendees an opportunity to network, share success stories, learn from their experiences and make new contacts for the future. Showcase has always been a very open and friendly event, dedicated to bringing members of the community together.
On the day there will be 4 masterclass sessions, 5 keynotes, 21 exhibitors, 90+ round table sessions and over 400 delegates expected to attend from within the industry. This is an opportunity to:
Learn from industry experts, fellow managers and other organizations while you share your own experiences at this networking event.
Posted in Accreditation, Change Management, Cyber Security, Events, Exams, IT Service Mgmt, Project Mgmt, Qualifications.
– June 15, 2015
Showcasing our new CDCAT cyber-security tool at infosecurity’s APMG stand
Like thousands of others in the industry I piled into the Olympia, London, for the infosecurity Europe conference this week. A highlight for me was the keynote speeches and one discussion in particular struck a chord – the focus of IT has shifted from technology, towards company culture.
The level of interest in the panel discussion, ‘Establishing an Enterprise-Wide Cybersecurity Culture’, was evidenced by the lengthy queue to get in. The moderator justly called it an esteemed panel, with the panellists including David Jones, Head of Information Security, for the BBC; Andrew Rose, CISO and Head of Cyber Security for NATS and Lee Barney, the Head of Information Security, for the Home Retail Group (which encompasses retail brands like Argos, Homebase and Habitat). Continued…
Posted in Cyber Security, Events.
– June 5, 2015
*This is a guest blog post written by one of our Accredited Training Organizations, CUPE – provider of many professional qualifications including PRINCE2® and Agile PM®. Special thanks to CUPE’s Sheila Roberts for her contribution.*
CUPE International has a PRINCE2 Professional date in the diary, June 3rd to 5th. It’s very exciting and as special offer we’re offering £200 off our standard price for this date!
This assessment centre demonstrates your ability to DO projects. More PRINCE2 Professional Centres have been organized and run by CUPE than any other organization, but it is still not common. So why is this exciting? It is because it is an excellent opportunity to test your ability to apply PRINCE2 knowledge and be different from others. Many thousands of people already have PRINCE2 Practitioner status, but not many are PRINCE2 Professionals. It demonstrates that you deliver, not simply that you know how to deliver it.
Posted in Accreditation, Events, Qualifications.
– April 20, 2015
ISO/IEC 20000-9, Guidance on the application of ISO/IEC 20000-1 to cloud services was published in March 2015. This is a valuable addition to the ISO/IEC 20000 series confirming that ISO/IEC 20000 is applicable in many and varied scenarios including for cloud services.
What is Part 9?
As indicated, Part 9 must be used with Part 1 of ISO/IEC 20000. This document provides ‘guidance on the use of ISO/IEC 20000-1:2011 for service providers delivering cloud services. It is applicable to different categories of cloud service, including, but not limited to, the following:
- a) infrastructure as a service (IaaS);
- b) platform as a service (PaaS);
- c) software as a service (SaaS).
It is also applicable to public, private, community, and hybrid cloud deployment models. The applicability of ISO/IEC 20000-1 is independent of the type of technology or service model used to deliver the services. All requirements in ISO/IEC 20000-1 can be applicable to cloud service providers.’
Posted in Accreditation, ISO Schemes, Qualifications.
– March 19, 2015
Business Relationship Management stimulates, surfaces and shapes business demand for a provider’s products and services and ensures that the potential business value from those products and services is captured, optimized and recognized.
The concept of Business Relationship Management (BRM) is related to and employs the techniques and disciplines of Customer Relationship Management (CRM). However, while CRM most often refers to a company’s external customers, the BRM typically deals with a company’s internal business partners and an internal provider’s products and/or services.
Posted in Accreditation, BRMP (R), Qualifications.
– March 11, 2015