ITIL and the DoD RMF – Part 1 of 2 – Introduction to the RMF

It’s October, and that means it’s National Cyber Security Awareness month, and that is the theme for this month’s entry. The second Punic War, whose primary antagonists were the republic of Rome and her arch rival for supremacy of the Mediterranean, Carthage, provides an interesting anecdote.  The war was fought on multiple fronts, including Spain,…

0

Monitoring tools and the path of least resistance

At a client recently, an example arose of a well-designed technical solution falling partially short of achieving its desired outcome due to an unanticipated people factor.  Adjusting the technical approach to account for this factor will hopefully resolve the issue – time will tell! Here is an example inspired by this client.  Wishing to move…

0

Welcome!

Thank you for visiting.  I am an ITSM consultant.  Prior to coming to Microsoft, I spent 10 years working in and managing IT operations for a medium-sized organization.  Additionally, I was responsible for some Transition tasks (such as change management). This blog is intended to be an outlet to share my previous and ongoing experiences…

0