Couverture de The ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

De : Luigi Ferri
Écouter gratuitement

3 mois pour 0,99 €/mois

Après 3 mois, 9.95 €/mois. Offre soumise à conditions.

À propos de ce contenu audio

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.comLuigi Ferri
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Payment Security by Design with PCI P2PE
      Jan 27 2026

      In this episode of The ITSM Practice Podcast, Luigi Ferri explains why PCI P2PE is not just encryption but a security-by-design discipline. Learn how point-to-point encryption eliminates clear-text card data, reduces breach impact, simplifies PCI compliance, and integrates with ITIL governance to protect trust from the first millisecond of payment.


      In this episode, we answer to:

      What is PCI P2PE and why is it critical for modern payment security and PCI DSS compliance?

      How does P2PE reduce breach exposure and change merchant compliance obligations?

      Why are governance, the PIM, and ITIL practices essential to keeping P2PE effective over time?


      Resources Mentioned in this Episode:

      PCI website, white paper "P2PE At a Glance", link https://www.pcisecuritystandards.org/documents/P2PE_At_a_Glance_v3.pdf


      PCI website, white paper "Point-to-Point Encryption", link https://www.pci-dss.gr/media/1934/p2pe_hybrid_v111.pdf


      Payway website, article "Protect Cardholder Data with P2PE", link https://www.payway.com/blog/how-to-keep-yourself-out-of-the-news-with-p2pe


      Bluefin website, article "What is Point-to-Point Encryption (P2PE)?", link https://www.bluefin.com/payment-security/pci-p2pe-faq/


      Ingenico website, article "3 Things to Know About P2PE v3.0", link https://ingenico.com/de/node/818


      Connect with me on:

      LinkedIn: https://www.linkedin.com/in/theitsmpractice/

      Website: http://www.theitsmpractice.com

      And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


      Credits:

      Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


      Graphics by Yulia Kolodyazhnaya

      Afficher plus Afficher moins
      10 min
    • ITIL v3 as the Backbone of eSIM Security
      Jan 20 2026

      In this episode of The ITSM Practice Podcast, Luigi Ferri explains how ITIL v3 processes enable compliance with GSMA SAS-SM for secure eSIM provisioning. Discover how governance, service design, change, and continual improvement turn security from theory into an auditable, operational discipline in modern telecom environments.


      In this episode, we answer to:

      How can ITIL v3 processes support GSMA SAS-SM certification for eSIM management?

      What operational evidence is required to prove secure remote SIM provisioning?

      How do governance and continual improvement help maintain long-term SAS-SM compliance?


      Resources Mentioned in this Episode:

      GSMA website, article "Security Accreditation Scheme (SAS)", link https://www.gsma.com/solutions-and-impact/industry-services/assurance-services/security-accreditation-scheme-sas/


      GSMA website, article "eSIM Compliance", link https://www.gsma.com/solutions-and-impact/technologies/esim/compliance/


      IT Process Maps website, article "IT Security Management", link https://wiki.en.it-processmaps.com/index.php/IT_Security_Management?


      Connect with me on:

      LinkedIn: https://www.linkedin.com/in/theitsmpractice/

      Website: http://www.theitsmpractice.com

      And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


      Credits:

      Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


      Graphics by Yulia Kolodyazhnaya

      Afficher plus Afficher moins
      12 min
    • Why Mature ITSM Programs Fail?
      Jan 13 2026

      Why do mature ITSM programs still fail? This episode explores the hidden risks behind ITSM stagnation, loss of executive sponsorship, outdated KPIs, rigid processes, and misaligned culture. Learn how to sustain ITSM maturity through continual improvement, business-aligned metrics, leadership engagement, and evolution in the age of automation and AI.


      In this episode, we answer to:

      Why do mature ITSM programs fail despite successful ITIL adoption?

      How does loss of executive sponsorship undermine IT Service Management sustainability?

      How can ITSM processes and KPIs evolve to support automation, AI, and business agility?


      Resources Mentioned in this Episode:

      Keith D. Sutherland, Lawrence J. "Butch" Sheets, book "A Practical Guide to Service Management: Insights from industry experts for uncovering, implementing, and improving service management practices", link https://www.amazon.de/-/en/Keith-D-Sutherland/dp/1804612502


      TOPdesk website, article "5 ITSM implementation pitfalls to avoid", link https://www.topdesk.com/en/blog/itsm-implementation-pitfalls/

      Sunrise website, article "Why ITSM implementations often fail?", link https://www.sunrisesoftware.com/blog/why-itsm-implementations-often-fail


      ITSM Tools website, article "10 Common ITSM Mistakes and How to Avoid Them", link https://itsm.tools/10-common-itsm-mistakes-and-how-to-avoid-them/


      Connect with me on:

      LinkedIn: https://www.linkedin.com/in/theitsmpractice/

      Website: http://www.theitsmpractice.com

      And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.


      Credits:

      Sound engineering by Alan Southgate - http://alsouthgate.co.uk/


      Graphics by Yulia Kolodyazhnaya

      Afficher plus Afficher moins
      9 min
    Aucun commentaire pour le moment