Discover how to create a flexible major incident process that restores service as quickly as possible; what you need to be doing in order to avoid stress and chaos, and effectively deal with any major incident that arises; plus much more in our dedicated Major Incident Management masterclass.
Join us for an introduction to Knowledge-Centred Service (KCS®) - an emerging best practice for knowledge management that integrates the creation and maintenance of knowledge into the problem solving process.
IT Asset Management has evolved from an administrative function to a key strategic initiative for the delivery of IT services. From efficient use of IT budgets and meeting compliance obligations to providing a solid foundation for Information Security, IT Asset Management is an essential element of IT Management.
As ITSM practitioners how can we get started in identifying and progressing Continual Improvement opportunities and how best do we ensure we can demonstrate the business benefits delivered? Find out how here.
This webinar offers an in-depth look into renewing ITIL certifications. As ITIL represents the globally recognised Best Practice framework for IT Service Management, it's essential for IT professionals to keep their certifications current.
This AI readiness workshop will help to ensure you are in the best possible position to maximise the Return On Investment from your AI implementation, whether that be a chatbot or ITSM tool functionality.
This masterclass follows on from the Introduction to XLAs masterclass and is a hands-on practical session designed to help you understand the right experience measures for your business and how you can follow a 9-step approach to build your experience level agreements.
Everything is Problem Management - or should be! Problem Managers have frequently been the poor relations in ITSM, given an impossible task and few resources to work with. This masterclass will show you how to add value in the most difficult of circumstances!
Richard Horton is Service Management Lead at NIHR CRNCC. He implemented an ISO27001 Information Security Management System in 2017 and has been improving it ever since. People outside IT sing its praises, hence running this session. Richard will present and have supporting input from people outside IT on what it feels like to be on the receiving end.
We use cookies to optimise our website and our service.
Functional cookies
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.