Wydawca: IT Governance Publishing

33
Ładowanie...
EBOOK

Service Integration and Management (SIAM(TM)) Foundation Body of Knowledge (BoK). SIAM Frameworks from Ecosystem to Practices for Successful Service Integration

IT Governance Publishing, Claire Agutter

This book offers a detailed exploration of Service Integration and Management (SIAM™), providing insights into its frameworks, structures, and practical applications. It starts by covering the core principles of SIAM™, from its historical context to its role in optimizing service integration across multiple providers. The book then dives into the SIAM roadmap, outlining key stages such as discovery, strategy, planning, and execution, all essential for successful service management.Readers will gain an understanding of different SIAM structures, including externally sourced, internally sourced, and hybrid models, along with their respective advantages and challenges. It also explores how SIAM aligns with other service management practices like ITIL, COBIT, Lean, and Agile, offering a comprehensive approach to managing complex service ecosystems.The book places special emphasis on the roles and responsibilities within a SIAM ecosystem, including those of service providers, integrators, and customers. It also highlights the importance of cultural change, collaboration, and governance for effective SIAM implementation.Finally, readers will learn to identify and address common challenges and risks, equipping them with strategies to overcome obstacles and ensure smooth integration within their organization.

34
Ładowanie...
EBOOK

Service Integration and Management (SIAM(TM)) Professional Body of Knowledge (BoK). A structured approach to implementing and sustaining SIAM across complex service ecosystems

IT Governance Publishing, Claire Agutter

This book outlines a structured progression for implementing Service Integration and Management (SIAM) within complex, multi-vendor environments. It begins by defining SIAM principles, roles, layers, and structural models to establish a shared understanding of its purpose and scope.The roadmap then unfolds in four key stages. The Discovery & Strategy phase focuses on analyzing the current state, setting strategic drivers, and establishing governance foundations. In Plan & Build, the book guides readers through designing the SIAM model, sourcing structures, contracts, and process frameworks. The Implement stage addresses onboarding, transition planning, and applying change management across stakeholder groups. Finally, Run & Improve centers on operating the governance model, managing performance, conducting audits, and enabling continuous service development.Each chapter links practical methods with decision-making considerations, offering a reference for teams planning, launching, or refining a SIAM approach. The content is organized to support structured adoption while allowing flexibility for varied organizational contexts.

35
Ładowanie...
EBOOK

Ten Steps to ITSM Success. A Practitioner's Guide to Enterprise IT Transformation

IT Governance Publishing, Angelo Esposito, Timothy Rogers

This book provides a strategic framework for ITSM implementation, focusing on structured planning, role definition, process standardization, and ongoing performance assessments. With each chapter focusing on a critical aspect of ITSM, readers will gain the tools and knowledge needed to optimize service management practices and achieve long-term success. By the end of the book, IT leaders will understand how to build a robust ITSM program that aligns with business goals and drives continuous improvement.The book begins by setting the stage for ITSM implementation, helping readers assess the current state of services and plan their next steps. As the journey progresses, the book delves deeper into organizational changes, process development, and defining roles, ensuring that all stakeholders are aligned with the ITSM strategy.In the final chapters, the book focuses on deployment, continual improvement, and the importance of using metrics such as the balanced scorecard to ensure the ITSM framework is sustainable and continuously evolving. Readers will also learn how to handle operational sustainment and improve service delivery over time.

36
Ładowanie...
EBOOK

The Art of Cyber Security. A practical guide to winning the war on cyber crime

IT Governance Publishing, Gary Hibberd

This book redefines cyber security through the lens of creativity and classical strategy. It begins by exploring the mindset of the cyber defender as both artist and martial artist, highlighting the importance of intuition, flow, and individual perspective. It challenges rigid educational models and argues for a more adaptive, expressive approach to security thinking.Building on this foundation, the second part interprets Sun Tzu’s The Art of War in a cyber context. Each chapter reframes traditional military concepts—deception, preparation, leadership, and adaptability—through the realities of digital threats. The text emphasizes how timeless strategies apply to the modern information battlefield.By blending philosophy, history, and practical insight, the book offers a unique take on digital defense. It invites readers to reflect on their approach, question assumptions, and embrace both logic and creativity. This is not just a guide to threats and tactics, but a call to rethink what it means to be a cyber security professional today.

37
Ładowanie...
EBOOK

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

This comprehensive guide to the California Privacy Rights Act (CPRA) explores its impact on businesses and consumers within California. The book begins with a clear explanation of CPRA’s territorial and material jurisdiction, providing readers with an understanding of where and how the law applies. It delves into key definitions critical for businesses and individuals alike, covering terms such as personal information, pseudonymization, and consumer rights. One of the focal points of the book is the examination of the rights granted to consumers, including the right to access, delete, and opt-out of data sales. Alongside this, it addresses the business obligations, such as the need for privacy notices and compliance with security requirements. The book also offers an analysis of penalties for non-compliance and breach notification procedures, making it an essential resource for understanding the legal landscape of consumer privacy in California. It concludes with an overview of related laws that further influence how businesses must manage customer data.

38
Ładowanie...
EBOOK

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

This book offers a deep dive into cybersecurity, equipping professionals with tools and frameworks to protect organizations from diverse cyber threats. It covers critical areas such as information security, cyber resilience, and the regulatory and contractual requirements organizations must meet. The book delves into threat anatomy, analyzing technical, human, physical, and third-party vulnerabilities, and includes real-world case studies like the TalkTalk breach and WannaCry ransomware attack.It also emphasizes third-party risk management to ensure robust security practices across all areas. The book introduces the IT Governance Cyber Resilience Framework (CRF), a structured method for managing critical systems, guiding readers through the processes of identification, detection, response, recovery, and continual improvement. Practical strategies in areas like asset management, network security, and staff training are included.The final section offers actionable steps for implementing cybersecurity practices and introduces reference frameworks like NIST and ISO 27001 for compliance and ongoing improvement. With real-world examples and actionable frameworks, this guide is essential for professionals aiming to enhance their organization's cyber resilience.

39
Ładowanie...
EBOOK

The Power of the Agile Business Analyst. 30 surprising ways a business analyst can add value to your Agile development team

IT Governance Publishing, Jamie Lynn Cooke

Agile frameworks have revolutionized the way business analysis is integrated into projects, but the role of the Agile business analyst is still evolving. This book explores how business analysts can thrive within Agile teams, offering insights into both the challenges and opportunities they face. By understanding the power and limitations of Agile, the reader will gain practical tools to not only survive but thrive in an Agile environment. The text outlines why having a dedicated Agile business analyst is crucial and provides actionable advice on how to build the right team and minimize risks. The author goes beyond theory to offer concrete steps that help business analysts add value to Agile projects. The reader will walk away with a deep understanding of the evolving Agile landscape, including the critical role of business analysis and practical tips for improving team dynamics, managing risks, and maximizing value. This book is perfect for professionals looking to integrate Agile business analysis into their teams and projects to achieve better outcomes and continuous improvement.

40
Ładowanie...
EBOOK

The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks

IT Governance Publishing, Alan Calder

The Ransomware Threat Landscape offers an in-depth examination of ransomware, explaining how it works, its modes of access, and the consequences of attacks. The book begins by detailing the mechanisms of ransomware, how cybercriminals exploit vulnerabilities, and the damage it causes to organizations. It further explores the types of ransomware, their infection methods, and how attackers use ransomware for financial gain.The guide provides practical, actionable advice on basic and advanced cybersecurity measures to protect against ransomware. Topics like cybersecurity hygiene, staff awareness, and the importance of creating an anti-ransomware program are covered. The book emphasizes the role of a well-structured risk management framework and its application in preventing attacks and mitigating fallout from infections.For organizations of all sizes, the book offers tailored controls to strengthen defenses. It also explains the steps needed for a comprehensive recovery plan. Advanced prevention strategies for larger enterprises are discussed, making this guide suitable for IT professionals, security experts, and organizational leaders aiming to protect their systems from ransomware threats.