This masterclass follows on from the Introduction to XLAs masterclass and is a hands-on practical session designed to help you understand the right experience measures for your business and how you can follow a 9-step approach to build your experience level agreements.
Join us as part of the Armed Forces Community of Practice (COP) — whether you're an existing member or new to our group — as we look ahead to what 2025 has in store.
Join us for an insightful webinar on PeopleCert’s Accredited Tool Vendor (ATV) Programme, designed to provide businesses with a list of accredited tool vendors that create and implement ITSM tools aligned with ITIL best practices. This programme offers authoritative confirmation by PeopleCert that vendors’ teams and tools adhere to ITIL standards, instilling trust and confidence in end customers.
We are delighted to welcome Lucy Grimwade and David Barrow to our next Women in ITSM Lunch and Learn, where they will share insights from their acclaimed book, Allyship Actually – Why it’s we and not me.
Designed for apprentices, graduates and those moving into ITSM for the first time, attendees will be able to understand best practice for key areas in ITSM, how they work together, and most importantly what each practice needs to do for them all to work cohesively to provide ultimate value for the customer.
This SM Forum offers a very practical view of ITAM, with two case studies that demonstrate the essentials of asset management at different levels of maturity. The event also considers the current state of ITAM within the broader service management environment, and looks at the latest developments in ITAM tooling.
To effectively manage the bridge communications and actions, you will learn why it’s important to separate 4 thinking processes into separate conversations and experience how to manage the visualisation of them in a 4-colour dashboard.
Reflecting on a decade of progress and challenges in Problem Management, we recognise significant strides that have been made, along with some obstacles that have been encountered. As we look ahead, we identify future directions that will shape the evolution of Problem Management.
We use cookies to optimise our website and our service.
Functional cookies
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.