Skip to content
  • Member services
    • Membership Benefits
      • Membership Overview
      • Membership Levels and FAQs
    • Content and Member Resources
    • Maturity Assessment
    • Mentorship Programme
    • PeopleCert CPD Points
    • Professional Skills Management Framework
    • Bookstore
  • Events
    • Events Overview
    • Events Calendar
    • Event Recordings
    • 2025 Signature Events
      • AI in ITSM
      • Digital Transformation Business Simulation (London)
      • Digital Transformation Business Simulation (Newcastle)
      • ITIL Case Study Day 2025
      • ITSM25 Conference & Awards
      • SM Forum: Health & Wellbeing at Work
      • SM Forum: SIAM Future Directions
      • Women in ITSM
      • XLA25
    • Annual Conference and Awards
      • ITSM25 Conference & Awards
      • PSMA25: award nominations are open
      • PSMA24 Awards
    • Communities of Practice
      • Armed Forces
      • Service Design
      • Women in ITSM
    • Introduction to ITSM
    • Leadership Council
    • Masterclasses
    • Member Meet-ups
    • Simulations
    • SM Forums
    • Webinars
  • News & Content
    • Blogs and Whitepapers
    • Latest News
    • Monthly Round-up
    • ServiceTalk
    • Content & Member Resources
  • About Us
    • Who We Are
    • Board and Governance
    • Meet the Team
    • Contact Us
    • Terms & Conditions
    • Accessibility
    • Privacy
  • Join Now
  • Member’s Area
  • Member services
    • Membership Benefits
      • Membership Overview
      • Membership Levels and FAQs
    • Content and Member Resources
    • Maturity Assessment
    • Mentorship Programme
    • PeopleCert CPD Points
    • Professional Skills Management Framework
    • Bookstore
  • Events
    • Events Overview
    • Events Calendar
    • Event Recordings
    • 2025 Signature Events
      • AI in ITSM
      • Digital Transformation Business Simulation (London)
      • Digital Transformation Business Simulation (Newcastle)
      • ITIL Case Study Day 2025
      • ITSM25 Conference & Awards
      • SM Forum: Health & Wellbeing at Work
      • SM Forum: SIAM Future Directions
      • Women in ITSM
      • XLA25
    • Annual Conference and Awards
      • ITSM25 Conference & Awards
      • PSMA25: award nominations are open
      • PSMA24 Awards
    • Communities of Practice
      • Armed Forces
      • Service Design
      • Women in ITSM
    • Introduction to ITSM
    • Leadership Council
    • Masterclasses
    • Member Meet-ups
    • Simulations
    • SM Forums
    • Webinars
  • News & Content
    • Blogs and Whitepapers
    • Latest News
    • Monthly Round-up
    • ServiceTalk
    • Content & Member Resources
  • About Us
    • Who We Are
    • Board and Governance
    • Meet the Team
    • Contact Us
    • Terms & Conditions
    • Accessibility
    • Privacy
  • Join Now
  • Member’s Area
Member's Area
  • Member services
    • Membership Benefits
      • Membership Overview
      • Membership Levels and FAQs
    • Content and Member Resources
    • Maturity Assessment
    • Mentorship Programme
    • PeopleCert CPD Points
    • Professional Skills Management Framework
    • Bookstore
  • Events
    • Events Overview
    • Events Calendar
    • Event Recordings
    • 2025 Signature Events
      • AI in ITSM
      • Digital Transformation Business Simulation (London)
      • Digital Transformation Business Simulation (Newcastle)
      • ITIL Case Study Day 2025
      • ITSM25 Conference & Awards
      • SM Forum: Health & Wellbeing at Work
      • SM Forum: SIAM Future Directions
      • Women in ITSM
      • XLA25
    • Annual Conference and Awards
      • ITSM25 Conference & Awards
      • PSMA25: award nominations are open
      • PSMA24 Awards
    • Communities of Practice
      • Armed Forces
      • Service Design
      • Women in ITSM
    • Introduction to ITSM
    • Leadership Council
    • Masterclasses
    • Member Meet-ups
    • Simulations
    • SM Forums
    • Webinars
  • News & Content
    • Blogs and Whitepapers
    • Latest News
    • Monthly Round-up
    • ServiceTalk
    • Content & Member Resources
  • About Us
    • Who We Are
    • Board and Governance
    • Meet the Team
    • Contact Us
    • Terms & Conditions
    • Accessibility
    • Privacy
  • Join Now
  • Member’s Area
  • Member services
    • Membership Benefits
      • Membership Overview
      • Membership Levels and FAQs
    • Content and Member Resources
    • Maturity Assessment
    • Mentorship Programme
    • PeopleCert CPD Points
    • Professional Skills Management Framework
    • Bookstore
  • Events
    • Events Overview
    • Events Calendar
    • Event Recordings
    • 2025 Signature Events
      • AI in ITSM
      • Digital Transformation Business Simulation (London)
      • Digital Transformation Business Simulation (Newcastle)
      • ITIL Case Study Day 2025
      • ITSM25 Conference & Awards
      • SM Forum: Health & Wellbeing at Work
      • SM Forum: SIAM Future Directions
      • Women in ITSM
      • XLA25
    • Annual Conference and Awards
      • ITSM25 Conference & Awards
      • PSMA25: award nominations are open
      • PSMA24 Awards
    • Communities of Practice
      • Armed Forces
      • Service Design
      • Women in ITSM
    • Introduction to ITSM
    • Leadership Council
    • Masterclasses
    • Member Meet-ups
    • Simulations
    • SM Forums
    • Webinars
  • News & Content
    • Blogs and Whitepapers
    • Latest News
    • Monthly Round-up
    • ServiceTalk
    • Content & Member Resources
  • About Us
    • Who We Are
    • Board and Governance
    • Meet the Team
    • Contact Us
    • Terms & Conditions
    • Accessibility
    • Privacy
  • Join Now
  • Member’s Area

No Service Management No Cyber Security

  • By Martin Huddleston
  • November 13, 2018

Cyber security is no different from any other management activity, the theory is straight forward and well known, and execution is very difficult. Research carried out by a joint NATO / industry research team where the UK identified that one key element of high-quality cyber security is world-class service management as the majority of controls used to secure a system lie within the service management realm.

At this year’s itSMF UK Annual Conference (ITSM18) I’ll outline the background to the research and share the results that identify how service management controls fit within a cyber security life cycle. Then, building on this work I’ll show how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers.

Meanwhile, in this blog, I provide a little background ahead of ITSM18 as to why the two areas of service management and cyber security need to not only communicate, but to collaborate and be seamlessly integrated in all business and IT services.

Bringing Service Management and Cyber Security Together

Cyber security is a general term for the logistics of organising staff and resources for managing the ongoing risk of a cyber-attack. The threat actor motivation is often to gain access to data for the purpose of manipulation, resale or disruption, including extortion, most frequently for financial gain. This is a challenge that the majority of organisations face when moving towards digitising their services, and often arrive at a crossroad between optimising their digital services for efficiency or security.

While the organisation of cyber security defences encompasses a multitude of aspects. The execution of our cyber defence and recovery is underpinned by our service management strategy. For many organisations, cyber security and service management are two different aspects of a business, with different policies, teams, and stakeholders. However, the procedures we implement into our service management strategy directly affect our ability to defend against, and react to, a cyber risk or eventually a breach. This can often be a cause of friction between service management and information security teams, but given the correct execution it can also be an opportunity to optimise for efficiency. Failure to set up and operate both teams in synergy with each other can create an adverse effect, gaining neither efficiency or security.

Why We Need More Than Just Prevention, Detection, and Correction

Managing cyber security is a continual process that must evolve as the complexity and sophistication of our attackers change. Organisations typically pull service management and information security together using best practice approaches such as ISO 9001, ISO/IEC 20000-1, RESILIA, and ITIL. However, there is only so much impact the traditional audit approach for process quality can have on day-to-day business, and when the threat of the risk evolves faster than we’re applying our defences, a new approach is needed. This approach needs to both defend and innovate at pace. It’s no longer the case to mitigate the threat by implementing an effective prevention, detection, and correction strategy. Now all companies need to be forward thinking; staying up to date with the latest threats, communicating with the relevant staff and mitigating the maximum number of threats possible. All the while being expert in operational resilience to respond and recover without (or at minimal) impact to the service stakeholders. The common language of security over the last eight years has shifted from cyber security to operational resilience. Where cyber incidents have become a ‘fait-accompli’ with the frequency, size, and impact of incidents increasing.  In this context at least, this is a driver for change from traditional compliance to more proactive risk management and cyber defence posture.

It’s a fine line between optimum information security and service management, the former is inherently just another characteristic of the service. It’s well understood that some information security controls, while prevent some threats, can have a negative effect on business agility. Therefore, we must find this risk balance by designing and executing a strategy that can find the optimum effectiveness and security risk management based on our own and even an eco-systems risk appetite. No longer can these two areas be satisfied with a ‘tick-box’ compliance-based approach. The approach has to consider operational security effect, nee performance, in delivery of security outcomes, irrespective of process.

Consider a physical analogy – you’re an athlete jumping the high-jump. The frame holding the bar is the traditional standard of compliance. How high the bar is set is dictated by the threat actor ability. The defender needs to jump, to perform, dynamically wherever that bar goes – to really perform in an agile manner. Compliance approaches simply miss this performance dynamic.

Thus, process needs to be measurable and from that controllable and manageable. The two traditional disciplines need not only to communicate, but to collaborate and be seamlessly integrated in services – to act in every way as one operational capability. Only with this can they operate in a way which allows them to be forward thinking, actively improving and focusing on continual service improvement, agile service management, inherent with security.

Martin Huddleston
Martin Huddleston

Martin Huddleston, CISSP, BEng(Hons), MSc, DipM, CEng, MIMechE, MCMI, is the Head of Cyber at APMG International and previously worked for the UK Ministry of Defence, across UK Government and internationally. He has 31 years’ experience in the Government, Defence, telecommunications and the security industry. Martin is the technical and business champion responsible for developing and giving strategic business direction in ICT management, Cyber Security, customer service provision and related research and development. He is an acknowledged expert and speaker on Cyber Security and Intentional Standards.

Ground Floor South
Burford House
Leppington
Bracknell
Berks RG12 7WW

Tel: +44 (0) 118 918 6500

Linkedin-in Youtube

Disclaimer: Our member environment runs on a separate system. As such, when navigating to member areas on this website you may notice that you are redirected to a different environment.

  • Membership Overview
  • Member Area
  • Events Calendar
  • Board and Governance
  • Latest News
  • Contact Us
  • Membership Overview
  • Member Area
  • Events Calendar
  • Board and Governance
  • Latest News
  • Contact Us
Copyright © 2025 itSMF UK. All rights reserved.
Cleantalk Pixel
Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}