PodcastsTechnologieThe ITSM Practice: Elevating ITSM and IT Security Knowledge

The ITSM Practice: Elevating ITSM and IT Security Knowledge

Luigi Ferri
The ITSM Practice: Elevating ITSM and IT Security Knowledge
Nieuwste aflevering

134 afleveringen

  • The ITSM Practice: Elevating ITSM and IT Security Knowledge

    Why ITIL 4 Is Critical for HITRUST Success

    17-2-2026 | 8 Min.
    HITRUST certification is not a shortcut to trust. In this episode of The ITSM Practice Podcast, Luigi Ferri explains why real success with HITRUST depends on operational maturity, disciplined processes, and ITIL 4 practices. Learn how process consistency, evidence, and repeatability are the true foundations of sustainable compliance and security.

    In this episode, we answer to:
    Why do many mid-size organizations fail HITRUST despite strong technical controls?
    How do ITIL 4 practices enable sustainable HITRUST certification?
    Which process maturity gaps block HITRUST readiness the most?

    Resources Mentioned in this Episode:
    HITRUST Alliance website, article "HITRUST CSF Framework overview", link https://hitrustalliance.net/hitrust-framework

    HITRUST Alliance website, article "HITRUST CSF Control Maturity Evaluation Guide", link https://hitrustalliance.net/hubfs/Download%20Center%20%2B%20Partner%20Content/Evaluating-Control-Maturity-Using-the-HITRUST-Approach.pdf

    Schneider Downs website, article "Complete Guide to HITRUST Certification", link https://schneiderdowns.com/guide-to-hitrust-certification/

    Tevora website, article "HITRUST Certification Top Strategies for Effective Evidence Collection", link https://www.tevora.com/resource/hitrust-certification-top-strategies-for-effective-evidence-collection/

    Connect with me on:
    LinkedIn: https://www.linkedin.com/in/theitsmpractice/
    Website: http://www.theitsmpractice.com
    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.

    Credits:
    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/

    Graphics by Yulia Kolodyazhnaya
  • The ITSM Practice: Elevating ITSM and IT Security Knowledge

    FISMA in the Cloud: What Midsize Security Teams Need to Know

    10-2-2026 | 8 Min.
    In this episode of The ITSM Practice Podcast, we explore what FISMA really means for midsize, cloud-native security teams. Using real-world scenarios, we explain why FISMA was built for federal systems, where it clashes with cloud responsibility models, and how a risk-based adoption strengthens governance without falling into compliance theatre.

    In this episode, we answer to:
    Do FISMA controls apply to cloud-native and SaaS-based environments?
    How can midsize companies use FISMA without full federal-style compliance?
    Why is risk-based adoption more effective than checklist compliance in the cloud?

    Resources Mentioned in this Episode:
    CISA website, Federal Information Security Modernization Act page, link https://www.cisa.gov/topics/cyber-threats-and-advisories/federal-information-security-modernization-act

    NIST website, NIST Special Publication 800-53, link https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

    Secureframe website, article "FISMA Compliance: What It Is and How to Achieve It", link https://secureframe.com/hub/nist-800-53/fisma-compliance

    Security Compass website, article "ISO 27001 vs NIST 800-53", link https://www.securitycompass.com/blog/iso-27001-vs-nist-800-53/

    Connect with me on:
    LinkedIn: https://www.linkedin.com/in/theitsmpractice/
    Website: http://www.theitsmpractice.com
    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.

    Credits:
    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/

    Graphics by Yulia Kolodyazhnaya
  • The ITSM Practice: Elevating ITSM and IT Security Knowledge

    ISO 27001 & ISO 42001: Governing AI Risk

    03-2-2026 | 9 Min.
    As AI expands the security perimeter, CISOs face new questions about data, trust, and accountability. This episode explains how combining ISO/IEC 27001 and ISO/IEC 42001 creates a unified governance engine for information security and AI governance. Learn how mid-size organizations can turn AI risk, transparency, and compliance into a strategic advantage.

    In this episode, we answer to:
    How does AI change the traditional security perimeter defined by ISO 27001?
    Why is ISO 42001 essential to govern AI risk, fairness, and explainability?
    How can CISOs clearly explain to customers where AI uses and sends their data?

    Resources Mentioned in this Episode:
    De.iterate website, article "ISO 42001 Certification: Benefits, Challenges, and Real-World Applications", link https://deiterate.com/2025/02/26/iso-42001-certification-benefits-challenges-and-real-world-applications/

    Cherry Bekaert website, article "ISO 42001 vs. ISO 27001: Data Protection for Scaling Your Professional Services Firm", link https://www.cbh.com/insights/articles/data-protection-for-professional-services-firms/

    Mitratech website, article "ISO 42001 & AI Risk: Strengthen Third-Party Compliance", link https://mitratech.com/resource-hub/blog/iso-42001-ai-risk-strengthen-third-party-compliance/

    Walter Haydock blog, article "How we implement ISO 42001 control A.10.3 and help clients do the same to manage AI vendor risk", link https://blog.stackaware.com/p/iso-42001-annex-a-control-10-3-supplier-risk-management

    Connect with me on:
    LinkedIn: https://www.linkedin.com/in/theitsmpractice/
    Website: http://www.theitsmpractice.com
    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.

    Credits:
    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/

    Graphics by Yulia Kolodyazhnaya
  • The ITSM Practice: Elevating ITSM and IT Security Knowledge

    Payment Security by Design with PCI P2PE

    27-1-2026 | 9 Min.
    In this episode of The ITSM Practice Podcast, Luigi Ferri explains why PCI P2PE is not just encryption but a security-by-design discipline. Learn how point-to-point encryption eliminates clear-text card data, reduces breach impact, simplifies PCI compliance, and integrates with ITIL governance to protect trust from the first millisecond of payment.

    In this episode, we answer to:
    What is PCI P2PE and why is it critical for modern payment security and PCI DSS compliance?
    How does P2PE reduce breach exposure and change merchant compliance obligations?
    Why are governance, the PIM, and ITIL practices essential to keeping P2PE effective over time?

    Resources Mentioned in this Episode:
    PCI website, white paper "P2PE At a Glance", link https://www.pcisecuritystandards.org/documents/P2PE_At_a_Glance_v3.pdf

    PCI website, white paper "Point-to-Point Encryption", link https://www.pci-dss.gr/media/1934/p2pe_hybrid_v111.pdf

    Payway website, article "Protect Cardholder Data with P2PE", link https://www.payway.com/blog/how-to-keep-yourself-out-of-the-news-with-p2pe

    Bluefin website, article "What is Point-to-Point Encryption (P2PE)?", link https://www.bluefin.com/payment-security/pci-p2pe-faq/

    Ingenico website, article "3 Things to Know About P2PE v3.0", link https://ingenico.com/de/node/818

    Connect with me on:
    LinkedIn: https://www.linkedin.com/in/theitsmpractice/
    Website: http://www.theitsmpractice.com
    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.

    Credits:
    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/

    Graphics by Yulia Kolodyazhnaya
  • The ITSM Practice: Elevating ITSM and IT Security Knowledge

    ITIL v3 as the Backbone of eSIM Security

    20-1-2026 | 11 Min.
    In this episode of The ITSM Practice Podcast, Luigi Ferri explains how ITIL v3 processes enable compliance with GSMA SAS-SM for secure eSIM provisioning. Discover how governance, service design, change, and continual improvement turn security from theory into an auditable, operational discipline in modern telecom environments.

    In this episode, we answer to:
    How can ITIL v3 processes support GSMA SAS-SM certification for eSIM management?
    What operational evidence is required to prove secure remote SIM provisioning?
    How do governance and continual improvement help maintain long-term SAS-SM compliance?

    Resources Mentioned in this Episode:
    GSMA website, article "Security Accreditation Scheme (SAS)", link https://www.gsma.com/solutions-and-impact/industry-services/assurance-services/security-accreditation-scheme-sas/

    GSMA website, article "eSIM Compliance", link https://www.gsma.com/solutions-and-impact/technologies/esim/compliance/

    IT Process Maps website, article "IT Security Management", link https://wiki.en.it-processmaps.com/index.php/IT_Security_Management?

    Connect with me on:
    LinkedIn: https://www.linkedin.com/in/theitsmpractice/
    Website: http://www.theitsmpractice.com
    And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.

    Credits:
    Sound engineering by Alan Southgate - http://alsouthgate.co.uk/

    Graphics by Yulia Kolodyazhnaya

Meer Technologie podcasts

Over The ITSM Practice: Elevating ITSM and IT Security Knowledge

Join Luigi Ferri, an experienced ITSM & IT Security Professional, in 'The ITSM Practice.' Explore IT Service Management and IT Security, uncovering innovations and best practices with insights from leading organizations like Volkswagen Financial Services, Vodafone, and more. Each episode offers practical guides and expert discussions for learning and growth. Ideal for all ITSM and IT Security Professionals! Stay Connected: LinkedIn: https://www.linkedin.com/in/theitsmpractice/ Youtube: https://www.youtube.com/@theitsmpractice Website: http://www.theitsmpractice.com
Podcast website

Luister naar The ITSM Practice: Elevating ITSM and IT Security Knowledge, Tweakers Podcast en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies

The ITSM Practice: Elevating ITSM and IT Security Knowledge: Podcasts in familie