POPULARITY
Service Management Leadership Podcast with Jeffrey Tefertiller
In this episode, Jeffrey continues his series on the CMDB, discussing ongoing governanceEach week, Jeffrey will be sharing his knowledge on Service Delivery (Mondays) and Service Management (Thursdays). Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,500 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Send us a textA single Windows shortcut can open the door to espionage—and that's exactly where we begin. We break down a fresh LNK exploit campaign to show how hidden command execution and DLL sideloading slip past busy teams, then pivot into the core defense most organizations underuse: disciplined configuration management. From baselines and version control to change boards and rapid rollback, we map the habits and tools that turn chaos into control.We walk through building secure, realistic baselines with CIS Benchmarks and NIST 800‑128, and why “simple and enforceable” beats “perfect and ignored.” You'll hear how least privilege for change stops shadow tweaks, how EDR and application firewalls catch command and control, and how automation with Ansible, SCCM, and Terraform keeps fleets consistent. We spotlight the CMDB as a living source of truth—only valuable if you maintain ownership, automate updates, and report on drift so leadership and risk teams can act.Change governance becomes your stabilizer. A change control board aligns IT, security, operations, risk, and compliance before big moves, while an emergency change advisory board authorizes fast action for zero‑days and incidents with a strict post‑implementation review. We break down the full change lifecycle—request, impact analysis, staging, implementation, verification, CMDB updates—and the common pitfalls to avoid, including undocumented changes, brittle rollbacks, and ignoring post‑change scan results. Expect practical guidance on when to auto‑patch Windows, how to iterate quarterly without overengineering, and what metrics prove progress.If you're aiming to master CISSP Domain 7 or just want fewer outages and faster recovery, this conversation gives you a clear blueprint to reduce attack surface and increase stability. If it helps, share it with a teammate, subscribe for more deep dives, and leave a quick review so we can keep improving for you.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Service Management Leadership Podcast with Jeffrey Tefertiller
In this episode, Jeffrey continues his series on the CMDB, gaining stakeholder adoptionEach week, Jeffrey will be sharing his knowledge on Service Delivery (Mondays) and Service Management (Thursdays). Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,500 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
In this episode, Jeffrey continues his series on the CMDB, discussing scope and governanceEach week, Jeffrey will be sharing his knowledge on Service Delivery (Mondays) and Service Management (Thursdays). Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,500 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
In this episode, Jeffrey begins a series on the CMDB, emphasizing the relationships between Change and Config (CMDB)Each week, Jeffrey will be sharing his knowledge on Service Delivery (Mondays) and Service Management (Thursdays). Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,500 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Dave Herrald, Global Head of Cybersecurity GTM at Databricks, tells Jack about transforming security operations through modern data lake architectures and strategic AI implementation. He discusses the practical benefits of separating storage from compute, giving security teams direct control over data retention while maintaining operational flexibility. The conversation explores how organizations can move beyond traditional SIEM limitations by leveraging cost-effective data lake storage with advanced analytics capabilities. They touch on AI agents in security, where Dave advocates for focused agents over broad analyst replacement approaches. He also addresses common concerns about hallucinations, framing them as engineering challenges rather than insurmountable obstacles, and shares real-world examples of successful agent implementations. Topics discussed: Moving from traditional SIEM architectures to modern data lake approaches for cost-effective security analytics and data control. Implementing focused AI agents for specific security tasks like context gathering rather than attempting broad analyst replacement. Leveraging graph analytics for security operations including CMDB visualization, breach scoping, and vulnerability prioritization across enterprise environments. Addressing AI hallucinations through prompt engineering and proper context management rather than avoiding AI implementation entirely. Building detection capabilities using SQL and Python for analytics that provide supersets of traditional SIEM query languages. Creating normalization frameworks using standards like OCSF to enable consistent data analytics across diverse security data sources. Developing career resilience in security through mission-focused thinking, continuous AI learning, and building practical skills. Comparing modern AI agents to traditional SOAR platforms for automation effectiveness and maintenance requirements. Establishing data governance and access controls in security data lakes while maintaining operational flexibility and cost effectiveness. Listen to more episodes: Apple Spotify YouTube Website
Service Management Leadership Podcast with Jeffrey Tefertiller
In this episode, Jeffrey discusses the unspoken ways to improve your CMDB.Each week, Jeffrey will be sharing his knowledge on Service Delivery (Mondays) and Service Management (Thursdays).Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,500 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Join Brett Karl, Vice President of Solutions & Alliances, and Jake Hershkowitz, Regional Sales Executive, as they discuss GlideFast's expertise in providing innovative solutions to the energy sector. Dive into how GlideFast partners with businesses in industries like utilities, construction, healthcare, and more to optimize their IT operations, CMDB, ITOM, and security solutions, all using ServiceNow. Hear insights into the latest trends impacting energy companies and how GlideFast supports digital transformation efforts with tailored, efficient, and secure solutions.
In this episode, Monica Hidalgo, Founding Partner of Volteo Digital, shares her insights on empowering businesses through digital transformation and the strategic partnership with ServiceNow. With over a decade of experience, Monica has played a pivotal role in establishing Volteo’s Global Delivery Center in Mexico, which evolved into a Center of Excellence, driving innovation and operational excellence across industries. Beyond her professional achievements, Monica is the founder of Women Who Transform, an initiative aimed at uplifting women in technology through mentorship, workshops, and networking. The Customer Connection Podcast helps you explore the implementation and adoption of the ServiceNow platform. This show is led by Customer Experience Expert and Director of Customer Creator and Workflows-Leading Practices, Jerry Campbell, and Portfolio Manager Shanna Grier. Key highlights of the episode: 3:40 - Monica shares her childhood passion for traveling and how it shaped her curiosity about different cultures and human connections. 9:50 - Insights into Volteo’s NextGen Program, which trains individuals with no prior ServiceNow experience to address the talent scarcity in the ecosystem. 11:11 - How ServiceNow’s Impact Accelerators helped improve a customer’s CMDB health and guided another customer through a smooth platform upgrade. 13:31 - Monica discusses the rising importance of AI in digital transformation and how Volteo is leveraging it to automate processes and drive productivity. 15:30 - The Volteo-ServiceNow partnership: how it combines vertical expertise and platform innovations to deliver value and optimize customer outcomes. To learn more about the implementation and adoption of the ServiceNow Platform, subscribe to the Customer Connection Podcast on Apple Podcasts or wherever you listen to podcasts. For feedback, please send an email to customerconnection@servicenow.com See omnystudio.com/listener for privacy information.
In this episode, Monica Hidalgo, Founding Partner of Volteo Digital, shares her insights on empowering businesses through digital transformation and the strategic partnership with ServiceNow. With over a decade of experience, Monica has played a pivotal role in establishing Volteo’s Global Delivery Center in Mexico, which evolved into a Center of Excellence, driving innovation and operational excellence across industries. Beyond her professional achievements, Monica is the founder of Women Who Transform, an initiative aimed at uplifting women in technology through mentorship, workshops, and networking. The Customer Connection Podcast helps you explore the implementation and adoption of the ServiceNow platform. This show is led by Customer Experience Expert and Director of Customer Creator and Workflows-Leading Practices, Jerry Campbell, and Portfolio Manager Shanna Grier. Key highlights of the episode: 3:40 - Monica shares her childhood passion for traveling and how it shaped her curiosity about different cultures and human connections. 9:50 - Insights into Volteo’s NextGen Program, which trains individuals with no prior ServiceNow experience to address the talent scarcity in the ecosystem. 11:11 - How ServiceNow’s Impact Accelerators helped improve a customer’s CMDB health and guided another customer through a smooth platform upgrade. 13:31 - Monica discusses the rising importance of AI in digital transformation and how Volteo is leveraging it to automate processes and drive productivity. 15:30 - The Volteo-ServiceNow partnership: how it combines vertical expertise and platform innovations to deliver value and optimize customer outcomes. To learn more about the implementation and adoption of the ServiceNow Platform, subscribe to the Customer Connection Podcast on Apple Podcasts or wherever you listen to podcasts. For feedback, please send an email to customerconnection@servicenow.com See omnystudio.com/listener for privacy information.
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: ThreatLocker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/landing-page/the-annual-saas-security-survey-report-2025-ciso-plans-and-priorities/ This segment is sponsored by Adaptive Shield. Visit https://securityweekly.com/adaptiveshieldbh to download the Annual SaaS Security Survey Report! Cybersecurity professionals are often confronted with ethical dilemmas that need to be carefully navigated. In 25 years of teaching incident handling and penetration testing, Ed has often been asked by his students for help in ethical decision-making. Ed will share some of their questions and his recommended approaches for addressing them. Ed also has a new book out, The Code of Honor, about cybersecurity ethics. All proceeds go to scholarships for college students. Segment Resources: 1) Ed's book, published June 18, 2024: https://www.amazon.com/Code-Honor-Embracing-Ethics-Cybersecurity/dp/1394275862/ref=sr11?crid=1DSHPCXDIQ1VT&dib=eyJ2IjoiMSJ9.rmZX2-3mj1nI74iKkjbKkQSNKCuRjjn-QQ8qrzVy21tMRAXuKu5Qr5rPgtszkVd7zJMV7oVTuImUZIxMQfecnaRlNRfAVI5G7azyWi8lY.WHOujvlsQXPTJaHuEafwRC2WVKZe474eVXHn46kLiEY&dib_tag=se&keywords=skoudis&qid=1722767581&sprefix=skoudis%2Caps%2C90&sr=8-1 2) Holiday Hack Challenge - sans.org/holidayhack Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-374
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: ThreatLocker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/landing-page/the-annual-saas-security-survey-report-2025-ciso-plans-and-priorities/ This segment is sponsored by Adaptive Shield. Visit https://securityweekly.com/adaptiveshieldbh to download the Annual SaaS Security Survey Report! Cybersecurity professionals are often confronted with ethical dilemmas that need to be carefully navigated. In 25 years of teaching incident handling and penetration testing, Ed has often been asked by his students for help in ethical decision-making. Ed will share some of their questions and his recommended approaches for addressing them. Ed also has a new book out, The Code of Honor, about cybersecurity ethics. All proceeds go to scholarships for college students. Segment Resources: 1) Ed's book, published June 18, 2024: https://www.amazon.com/Code-Honor-Embracing-Ethics-Cybersecurity/dp/1394275862/ref=sr11?crid=1DSHPCXDIQ1VT&dib=eyJ2IjoiMSJ9.rmZX2-3mj1nI74iKkjbKkQSNKCuRjjn-QQ8qrzVy21tMRAXuKu5Qr5rPgtszkVd7zJMV7oVTuImUZIxMQfecnaRlNRfAVI5G7azyWi8lY.WHOujvlsQXPTJaHuEafwRC2WVKZe474eVXHn46kLiEY&dib_tag=se&keywords=skoudis&qid=1722767581&sprefix=skoudis%2Caps%2C90&sr=8-1 2) Holiday Hack Challenge - sans.org/holidayhack Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-374
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page Show Notes: https://securityweekly.com/esw-374
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page Show Notes: https://securityweekly.com/esw-374
Erweitere dein Wissen über IT-Asset Management mit "Cybersecurity ist Chefsache".In der neuesten Episode begrüßt Nico Werner Alexander van der Steeg, CTO bei EntekSystems GmbH. In dieser spannenden Folge beleuchten sie, wie CMDB über eine einfache Inventarverwaltung hinausgehen und maßgeblich zur IT-Sicherheit beitragen kann.Ein zentrales Thema dieser Folge ist das flexible Datenmodell von CMDB und warum es für jedes IT-Asset Management unverzichtbar ist. Alexander erklärt, wie Unternehmen durch ein flexibles und erweiterbares Datenmodell ihre Datenhoheit und Risikomanagement verbessern können.Ein weiteres wichtiges Thema ist die Datenqualität und die Rolle von KI bei der Verbesserung und Automatisierung der Datenerfassung. Die Diskussion dreht sich um die Herausforderungen und Lösungen, die eine fortlaufende Datenqualität gewährleisten.Erfahrt in dieser Episode, warum CMDB als Prozess und nicht als einmaliges Projekt betrachtet werden sollte. Alexander teilt Praxisbeispiele erfolgreicher Implementierungen und Best Practices aus seiner umfangreichen Erfahrung.Hört rein und lernt, wie ihr euer IT-Asset Management auf das nächste Level heben könnt.
Erweitere dein Wissen über IT-Asset Management mit "Cybersecurity ist Chefsache".In der neuesten Episode begrüßt Nico Werner Alexander van der Steeg, CTO bei EntekSystems GmbH. In dieser spannenden Folge beleuchten sie, wie CMDB über eine einfache Inventarverwaltung hinausgehen und maßgeblich zur IT-Sicherheit beitragen kann.Ein zentrales Thema dieser Folge ist das flexible Datenmodell von CMDB und warum es für jedes IT-Asset Management unverzichtbar ist. Alexander erklärt, wie Unternehmen durch ein flexibles und erweiterbares Datenmodell ihre Datenhoheit und Risikomanagement verbessern können.Ein weiteres wichtiges Thema ist die Datenqualität und die Rolle von KI bei der Verbesserung und Automatisierung der Datenerfassung. Die Diskussion dreht sich um die Herausforderungen und Lösungen, die eine fortlaufende Datenqualität gewährleisten.Erfahrt in dieser Episode, warum CMDB als Prozess und nicht als einmaliges Projekt betrachtet werden sollte. Alexander teilt Praxisbeispiele erfolgreicher Implementierungen und Best Practices aus seiner umfangreichen Erfahrung.Hört rein und lernt, wie ihr euer IT-Asset Management auf das nächste Level heben könnt.
Erweitere dein Wissen über IT-Asset Management mit "Cybersecurity ist Chefsache".In der neuesten Episode begrüßt Nico Werner Alexander van der Steeg, CTO bei EntekSystems GmbH. In dieser spannenden Folge beleuchten sie, wie CMDB über eine einfache Inventarverwaltung hinausgehen und maßgeblich zur IT-Sicherheit beitragen kann.Ein zentrales Thema dieser Folge ist das flexible Datenmodell von CMDB und warum es für jedes IT-Asset Management unverzichtbar ist. Alexander erklärt, wie Unternehmen durch ein flexibles und erweiterbares Datenmodell ihre Datenhoheit und Risikomanagement verbessern können.Ein weiteres wichtiges Thema ist die Datenqualität und die Rolle von KI bei der Verbesserung und Automatisierung der Datenerfassung. Die Diskussion dreht sich um die Herausforderungen und Lösungen, die eine fortlaufende Datenqualität gewährleisten.Erfahrt in dieser Episode, warum CMDB als Prozess und nicht als einmaliges Projekt betrachtet werden sollte. Alexander teilt Praxisbeispiele erfolgreicher Implementierungen und Best Practices aus seiner umfangreichen Erfahrung.Hört rein und lernt, wie ihr euer IT-Asset Management auf das nächste Level heben könnt.
Mark Bodman, ServiceNow's Sr. Product Manager for CSDM & CMDB joins us to demystify the CSDM.Mentioned in this episode- The Invisibility Problem- ServiceNow Community Youtube CSDM ContentThanks to our sponsors, - Clear Skye the optimized identity governance & security solution built natively on ServiceNow.- Magic Mind the world's first mental performance shot. Get you up to 48% off your 1st subscription or 20% off one time purchases with code CJANDTHEDUKE20 at checkout. Claim it at: https://www.magicmind.com/cjandthedukeABOUT USCory and Robert are vendor agnostic freelance ServiceNow architects.Cory is the founder of TekVoyant.Robert is the founder of The Duke Digital MediaSponsor Us!
CMA & magician Chris Schuh joins us to discuss ServiceNow event management, ITOM, CMDB. We go deep on why its so difficult to get right, and how to cope.Thanks to our sponsors, Clear Skye the optimized identity governance & security solution built natively on ServiceNow.Magic Mind the world's first mental performance shot. Get you up to 48% off your 1st subscription or 20% off one time purchases with code CJANDTHEDUKE20 at checkout. Claim it at: https://www.magicmind.com/cjandthedukeABOUT USCory and Robert are vendor agnostic freelance ServiceNow architects.Cory is the founder of TekVoyant.Robert is the founder of The Duke Digital MediaSponsor Us!
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the CMDB Each week, Jeffrey will be sharing his knowledge on Service Management (Mondays) and Asset Management (Thursdays). Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, Asset Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey has been in the industry for 30 years and brings a practical perspective to the discussions. He is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Today's guest is Sven Richter, Senior Consultant ServiceNow, Product Line Lead SecOps & IRM at agineo GmbH in Germany. Specializing in Enterprise Service Management (ESM) solutions, agineo collaborates with clients on innovative projects aimed at enhancing the company's success. With over 30 years of experience, agineo has been digitally transforming and optimizing clients' business processes to be agile and forward-thinking. As a distinguished ServiceNow partner, agineo relies on established platforms like ServiceNow cloud technology to streamline processes and simplify intricate workflows for their service projects. This approach ensures the swift and efficient success of projects. It is through this proven methodology that agineo has solidified its position as the largest ServiceNow Elite Partner in the German-speaking region. In this episode, Sven discusses: An overview of his six years working with ServiceNow, His role as Product line lead for security operations and IRM, Why cybersecurity is important for business, Offering an integrated system with CMDB & third-party tools, Examples of the impact their SecOps offerings bring to customers, His key advice for your ServiceNow career
Today's guest is Gordon Hazzard, GRC Practice Lead at Wholepoint Systems. Founded in 2014, Wholepoint Systems, a ServiceNow premier partner, is new type of value added reseller to the tech industry. They are passionate about assisting customers in identifying the best new technologies for their environments and sticking with their customers throughout the entire life cycle of their investments. This means not just selling customers technology, but providing long term solutions to assist their customers in staying ahead of the rapidly changing tech landscape. Gordon brings nearly a decade of extensive experience in the consulting and implementation space, specializing in Governance, Risk and Compliance (GRC) solutions. With a track record of delivering tailored GRC solutions that not only meet but exceed client expectations, Gordon is forming an elite ServiceNow implementation team built on the dual pillars of domain expertise and technical mastery. It is their goal is to empower clients with scalable, sustainable and intuitive solutions that optimize business processes, increase transparency and reduce costs. In this episode, Gordon talks about: His journey from GRC consulting to ServiceNow Practice Lead, Wholepoint Systems' diverse ServiceNow solutions, Guiding federal agencies in ServiceNow CAM, GRC and support, How ServiceNow centralizes processes, integrates CMDB & automates for efficiency, Investing in AI to enhance GRC automation for efficiency, Hiring and growing exciting talent, and the company culture, Being a premier ServiceNow partner with holistic, client-centric solutions
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the CBDB Each week, Jeffrey will either be sharing his knowledge or interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as tomorrow's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page. Branding by Balaji - Follow him at @bwithbranding on Instagram #ITSM #ITIL #AssetManagement #ServiceManagement #IT #BusinessContinuity #Transformation
Building upon his years of experience with Configuration Management, Allen Dixon gets practical and dives deep into how to build a successful CMDB. He provides insights on what to prioritize through the building process, shining a light on the importance of clean and valuable data, communication with customers, the difference between a CMDB and an inventory, and the significance it has for Change Management. He finally puts together opportunities and gaps for future improvements to look out for. Allen Dixon is an ITIL-trained professional with over two decades of IT experience across industries such as healthcare and automotive. For the past nine years, he has been dedicated to IT Service Management and ITIL process implementation. He is a valued contributor to the book "VeriSM: Unwrapped and Applied" and has recently been named as DB Shanker's, Head of Regional Service and Operations Management for the Americans.
Service Management Leadership Podcast with Jeffrey Tefertiller
Luigi Ferri takes the mic to talk CMDB in his second episode for the Service Management Leadership Podcast. Here is Luigi's LinkedIn profile: https://it.linkedin.com/in/ukbestpractices Each week, Jeffrey will either be sharing his knowledge or interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as tomorrow's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page. Branding by Balaji - Follow him at @bwithbranding on Instagram #ITSM #ITIL #AssetManagement #ServiceManagement #IT #BusinessContinuity #Transformation
Tier44 EM/8® provides maps, floor plans, rack views, real-time access to IT and Facilities metrics, with full historic analysis. Built directly on the ServiceNow platform, EM/8 uses the CMDB details, configuration information, images and relationships to render rack content, either individually, with or without monitoring details or as a complete row of racks. There is no second CMDB, no synchronization and no ambiguity on the location of the content. In this episode of Solution Spotlight, hosted by Instor CEO Jack Vonich, we're joined by Clemens Pfeiffer, CEO of Tier44, to learn more about their powerful software.
Jason Edelman (@jedelman8, Founder/CTO @networktocode) talks about the challenges of managing complex networks in a world of DevOps and automation.SHOW: 717CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwNEW TO CLOUD? CHECK OUT - "CLOUDCAST BASICS"SHOW SPONSORS:Datadog Monitoring: Modern Monitoring and AnalyticsStart monitoring your infrastructure, applications, logs and security in one place with a free 14 day Datadog trial. Listeners of The Cloudcast will also receive a free Datadog T-shirt.CloudZero – Cloud Cost Visibility and SavingsCloudZero provides immediate and ongoing savings with 100% visibility into your total cloud spendSHOW NOTES:Network to Code (homepage)Nautobot (homepage)The Cloudcast Eps.114 - Evolving to SDN DevOpsThe Cloudcast Eps.150 - Evolving from Plumbers to CodersTopic 1 - Welcome back to the show Jason. Tell us a little bit about your journey with Network to Code, and your focus these days.Topic 2 - Let's talk about network automation and how it's evolved over the years. Give a sense of the scope of complexity that companies are facing these days. Topic 3 - How has the concept of a CMDB for the network, or Network Source of Truth emerged to provide a more centralized view of all aspects of the network? Topic 4 - How does the Nautobot framework work? What type of team or skill sets typically build and maintain it? Topic 5 - What are some of the typical problems that Nautobot is able to solve for companies? Topic 6 - How does Network to Code engage with companies to get their Nautobot environments running? FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnet
Author of The Service Desk Handbook, Sanjay Nair talks to us about his book, where he compiled and organized the main elements of a well functioning Service Management tool. He points out the importance of having a good team, with the right people, and building a strong foundation for your help desk from the start. Then, he refers to his current work and emphasizes on the value of certifications, an accurate CMDB, and the challenges of implementing new work processes. Sanjay Nair is an ITIL and COBIT certified Service Management professional with over 26 years of experience in the field. He's also the author of The Service Desk Handbook. Currently, he is the Manager of IT Operations at Knet. Sanjay has also previously served as Help Desk Manager at Automated System Company and he ran the Network Operations Center and Service Desk at the National Bank of Kuwait.
Mayuresh Ektare, an expert in risk management and SVP of Product Management at Brinqa, joins Sean Martin for a quick dive into the world of centralizing risk management frameworks. Ektare explains that the magic sauce isn't just bringing the data together, but stitching it together to create a unified understanding of an organization's attack surface. By overlaying business context, customers can prioritize and act upon the right set of findings in a timely fashion. Martin and Ektare discuss the challenges faced by customers in finding a centralized repository for business context, with many relying on tribal knowledge or CMDB records.Ektare introduces the concept of a Risk Operations Center (ROC), which allows organizations to orchestrate the risk lifecycle and proactively reduce exposure. Comparing it to a Security Operations Center (SOC), he highlights the importance of extending vulnerability management programs to encompass cloud infrastructure and application security posture management. The conversation also touches on the challenges of managing false positives and distilling a vast amount of findings into actionable items. By overlaying business context and understanding the impact of vulnerabilities on their organization, customers can fine-tune security scores, prioritize effectively, and respond accordingly.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Mayuresh Ektare, SVP of Product Management at Brinqa [@brinqa]On Linkedin | https://www.linkedin.com/in/mektare/ResourcesLearn more about Brinqa and their offering: https://itspm.ag/brinqa-pmdpFor more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Mayuresh Ektare, an expert in risk management and SVP of Product Management at Brinqa, joins Sean Martin for a quick dive into the world of centralizing risk management frameworks. Ektare explains that the magic sauce isn't just bringing the data together, but stitching it together to create a unified understanding of an organization's attack surface. By overlaying business context, customers can prioritize and act upon the right set of findings in a timely fashion. Martin and Ektare discuss the challenges faced by customers in finding a centralized repository for business context, with many relying on tribal knowledge or CMDB records.Ektare introduces the concept of a Risk Operations Center (ROC), which allows organizations to orchestrate the risk lifecycle and proactively reduce exposure. Comparing it to a Security Operations Center (SOC), he highlights the importance of extending vulnerability management programs to encompass cloud infrastructure and application security posture management. The conversation also touches on the challenges of managing false positives and distilling a vast amount of findings into actionable items. By overlaying business context and understanding the impact of vulnerabilities on their organization, customers can fine-tune security scores, prioritize effectively, and respond accordingly.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Mayuresh Ektare, SVP of Product Management at Brinqa [@brinqa]On Linkedin | https://www.linkedin.com/in/mektare/ResourcesLearn more about Brinqa and their offering: https://itspm.ag/brinqa-pmdpFor more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this episode I get to talk with Daniel Post about data classification and data governance. Dan is a Senior Sales Engineer for Varonis. He has been in the industry for a while and has knowledge that we break down into 'bite sized' chunks to make it easier for your staff to consume.Talking Points:Where does a company first start their Data Classification and Governance journey?What are some of the challenges that a company can expect when it comes to data classification?What are you seeing in the field right now that makes it hard for companies in their data governance program?Now that data lives in the 'Hybrid' world, how does data governance work when you have data on network drives like Isilon and cloud drives like Microsoft or Box?Does it integrate with a CMDB/ticketing system like Service Now or Service Desk, so your GRC team can take 'action' on it?Podcast Sponsor: The sponsor for this episode is Varonis. Varonis is a cybersecurity solutions company that is very mature in the Data Classification and Governance space. They are based out of good ole' New York City! Proceeds from this sponsorship will be going to the Autism Support of Kent County Michigan. Pam and her team help parents with finding support idea/solutions for their children with Autism. More information here - https://www.autismsupportofkentcounty.org/
Today's guest is Pedro Soto, ServiceNow CMDB/ITOM & Performance Analytics Consulting Practice Lead, Country Manager US at The Cloud People. Founded in 2019, The Cloud People help and guide organizations to transform their business to the cloud, to gain and utilize the competitive advantages from the best cloud platform solutions on the market including ServiceNow. By utilizing their Smart Resourcing concept, customers get top quality resources for a reasonable price in a simplified and transparent way. Pedro is a 20+ year-veteran leading teams of high-achievers in consulting, sales, project management and customer success helping companies leverage technology investments to reduce costs and improve customer experience. Currently, he leads the Americas team who are dedicated to helping technology leaders using ServiceNow to accelerate their digitization strategies by enabling their CMDB to support the adoption of the CSDM framework. In the episode, Pedro will discuss: The interesting work he does with The Cloud People, Macro-trends driving Digital Transformation in the sector, Why ServiceNow is the platform of choice, Examples of how they are using ServiceNow to benefit customers, Advice to CIO's embarking on a Digital Transformation journey and What excites him for the future of the ServiceNow platform
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about CMDB Scope Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Cybersecurity Risk Management - Physical DevicesThe risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are: Frame riskAssess riskRespond to risk once determinedMonitor risk on an ongoing basisHowever, before getting here, other fundamental steps must be in place, and one that I have discussed here in the past has been asset management. Today I want to give you a bit more detail on this process. First, inventory every physical device and system you have and keep an inventory of them; this is one of the most important yet least practiced cybersecurity tasks conducted worldwide. Small and mid-sized businesses can start with a simple Excel or Google spreadsheet, while larger organizations can leverage a configuration management database (CMDB). The approach can be as simple as brainstorming with your team a list of system types, such as:End-user devices: laptops and phonesServers: virtuals and physical serversCloud platforms: SaaS, PaaS, and IaaSYou should tie the software inventory into the hardware asset inventory where possible. Make sure to include critical information, such as:Network addressHardware addressMachine nameData asset ownerDepartmentAlong with the traditional IT devices, consider as part of your team brainstorming devices such as VoIP phones, printers, HVAC systems, and any IoT devices connected to the network that could become an attack vector. Detection of new authorized and unauthorized devices is critical for the program; therefore, some automation is necessary, which will vary depending on the size of your organization. It can be as simple as monitoring the DHCP server for IP assigning or systems that can scan the network and monitor it on a 24/7 basis or at periodic intervals determined by your organization. ========* FREE GUIDE *https://www.execcybered.com/asset-man...Blog: https://www.execcybered.com/blogTraining: https://www.execcybered.com/iso27001f...Linkedin: https://www.linkedin.com/company/exce...Twitter:
Cybersecurity Risk Management - Physical DevicesThe risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are: Frame riskAssess riskRespond to risk once determinedMonitor risk on an ongoing basisHowever, before getting here, other fundamental steps must be in place, and one that I have discussed here in the past has been asset management. Today I want to give you a bit more detail on this process. First, inventory every physical device and system you have and keep an inventory of them; this is one of the most important yet least practiced cybersecurity tasks conducted worldwide. Small and mid-sized businesses can start with a simple Excel or Google spreadsheet, while larger organizations can leverage a configuration management database (CMDB). The approach can be as simple as brainstorming with your team a list of system types, such as:End-user devices: laptops and phonesServers: virtuals and physical serversCloud platforms: SaaS, PaaS, and IaaSYou should tie the software inventory into the hardware asset inventory where possible. Make sure to include critical information, such as:Network addressHardware addressMachine nameData asset ownerDepartmentAlong with the traditional IT devices, consider as part of your team brainstorming devices such as VoIP phones, printers, HVAC systems, and any IoT devices connected to the network that could become an attack vector. Detection of new authorized and unauthorized devices is critical for the program; therefore, some automation is necessary, which will vary depending on the size of your organization. It can be as simple as monitoring the DHCP server for IP assigning or systems that can scan the network and monitor it on a 24/7 basis or at periodic intervals determined by your organization. ========* FREE GUIDE *https://www.execcybered.com/asset-man...Blog: https://www.execcybered.com/blogTraining: https://www.execcybered.com/iso27001f...Linkedin: https://www.linkedin.com/company/exce...Twitter:
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the Forrester research on the CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about scope Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Today's guest is Richard Groff, Senior ServiceNow Program Manager at Latham & Watkins in Berlin, Germany. Latham & Watkins is a global law firm who has internationally recognized practices in a wide spectrum of transactional, litigation, corporate and regulatory areas. Their success is grounded in their devotion to the collaborative process, which reaches across global offices & practices and draws upon their deep subject matter expertise, an abiding commitment to teamwork and a powerful tradition of creative lawyering. Richard is an experienced Program Manager with a demonstrated history of working in the law practice, investment banking and entertainment industries. He is skilled in Operations Management, Personnel Management and Team Building, System Deployment, Agile Project Management and Transformational Change Management. Richard is also a strong program and project management professional with a Bachelor of Arts focused in History from New York University. In the episode, Richard will discuss: How key drivers relate to business outcomes and drive strategy at L&W, The reality of implementing ServiceNow in your business, Challenges to be aware of when putting your strategy into practice, The importance of team building & talent development, Finding talent in a competitive ServiceNow market, How to effectively manage your service models and CMDB, and The future of AI in ServiceNow
Service Management Leadership Podcast with Jeffrey Tefertiller
Each Wednesday, Jeffrey will be discussing topics in the technology, Service Management, or Business Continuity areas. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page. Branding by Balaji - Follow him at @bwithbranding on Instagram
Service Management Leadership Podcast with Jeffrey Tefertiller
Each Wednesday, Jeffrey will be discussing topics in the technology, Service Management, or Business Continuity areas. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page. Branding by Balaji - Follow him at @bwithbranding on Instagram
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about improving your CMDB and Asset Management Database Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with six acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the four aspects of a quality CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with six acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Someone that knew Bill Gates when he was a boy in on the podcast this week, although we only talk about Bill Gates for a moment. He has 30+ years in backup experience and tells us what it's been like to adapt to all of the backup changes over the years. His first backup was to punch cards and punch tape, and he was in the same Boy Scout troop as Bill Gates. Fans of the podcast know his name already, as it comes up randomly on the show as a friend of Curtis. But this is the first time Stuart Liddle has graced us with his presence. Like Mr. Backup, his career starts with a data loss story that actually involved people having to re-enter data. We discuss a lot of configuring and running backups, including deciding on retention periods, treating all backups the same (or not), virtual tape libraries and other dedupe systems, and how important a change management data database (CMDB) is. We also talk about the danger of becoming entrenched in a specialty like backup, knowing only one specialty or product. We talk about how it's not good for you or your company. Finally we talk about the different way people are using the cloud today for IT and backup, and how that affects cost. Curtis and Prasanna use a great analogy that helps it make sense. This week's episode is fully of useful information. Mentioned in this episode: Free eBook version of O'Reilly's Modern Data Protection For a limited time, you can get a free ebook copy of my latest O'Reilly book, Modern Data Protection. Just go to druva.com/podcast and download it!
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with six acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the relationship between Change Management and the CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with six acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.
Service Management Leadership Podcast with Jeffrey Tefertiller
Each Wednesday, Jeffrey will be discussing topics in the technology, Service Management, or Business Continuity areas. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with seven acclaimed books in the subject area and a popular YouTube channel with approximately 1,300 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page. Thank you to Balaji at Sky10 for the graphics
Service Management Leadership Podcast with Jeffrey Tefertiller
A brief discussion about the CMDB Each week, Jeffrey will be interviewing guests from the technology, Service Management, or Business Continuity leadership communities. Stay tuned as next week's show is one you will not want to miss. Jeffrey is the founder of Service Management Leadership, an IT consulting firm specializing in Service Management, CIO Advisory, and Business Continuity services. The firm's website is www.servicemanagement.us. Jeffrey is an accomplished author with six acclaimed books in the subject area and a popular YouTube channel with approximately 1,400 videos on various topics. Also, please follow the Service Management Leadership LinkedIn page.