Three Additional Aspects of a CSI Register

My last post described a CSI Register as defined by the ITIL Continual Service Improvement book. In this post, I will dig deeper into some additional aspects of a CSI Register. I will discuss three important factors to creating a successful and useful CSI Register: accountability, the link to service level management, and prioritization.

Read more

What You Need To Know About Threat Management

When designing and deploying security solutions, a thorough understanding of what you have to protect is important as well as understanding the vulnerabilities within and around your assets and infrastructure. A threat analysis considers the range of currently known threats and the potential and likelihood that an attack will be attempted against your organization to help define what’s coming at you.

Read more

The 5 Benefits of Learning Your MBTI Personality Type

Each of us has our own rich story. Our sameness weaves us together while our differences can, if approached without appreciation or understanding, divide and conquer. Have you ever wondered how you can look at the same picture or watch the same movie and yet see and describe it completely differently to someone else? Many of these differences and misunderstandings can be explained by the normal, but different way people take in and process information, as the two mental processes identified by the Myers Briggs Type Indicator (MBTI) demonstrates. Eton Institute’s white paper explores the five distinct benefits of understanding your Personality Preference as defined by the MBTI, and provides a greater insight into how to improve communication.

Read more