ITIL and the DoD RMF – Part 3 of 3 – Practical Example

Part 1 of this series was an overview of the Department of Defense (DoD) Risk Management Framework (RMF).  In Part 2, we looked at how process consultants may find within the RMF opportunities to positively influence the security practices of their clients.  In this final entry in the series, I provide an example from my…

0

ITIL and the DoD RMF – Part 2 of 3 – Security Controls

In Part 1, a basic overview of the United States Department of Defense (DoD) Risk Management Framework (RMF) may be found.  Now we turn to the “so what” – this entry examines how process consultants may apply their knowledge and skills to assist organizations’ efforts to realize the desired outcome of the RMF.  It is…

0

ITIL and the DoD RMF – Part 1 of 3 – Introduction to the RMF

It’s October, and that means it’s National Cyber Security Awareness month, and that is the theme for this month’s entry. The second Punic War, whose primary antagonists were the republic of Rome and her arch rival for supremacy of the Mediterranean, Carthage, provides an interesting anecdote.  The war was fought on multiple fronts, including Spain,…

0

Monitoring tools and the path of least resistance

At a client recently, an example arose of a well-designed technical solution falling partially short of achieving its desired outcome due to an unanticipated people factor.  Adjusting the technical approach to account for this factor will hopefully resolve the issue – time will tell! Here is an example inspired by this client.  Wishing to move…

0

Welcome!

Thank you for visiting.  I am an ITSM consultant.  Prior to coming to Microsoft, I spent 10 years working in and managing IT operations for a medium-sized organization.  Additionally, I was responsible for some Transition tasks (such as change management). This blog is intended to be an outlet to share my previous and ongoing experiences…

0