
The 3 Risk Models Every IT and Business Leader Must Understand
Dive into this essential episode of "The ITSM Practice Podcast" hosted by Luigi Ferri, where we rethink risk management beyond frameworks and dashboards. Discover how hidden vulnerabilities can silently disrupt operations and why evolving from Risk Officer to Continuity Architect is crucial for true resilience.
In this episode, we answer to:
Which risks are we ignoring because they don't fit usual categories?
How can we identify informal, undocumented, or assumed asset dependencies?
What would happen if a quiet, always-working process failed unexpectedly?
Resources Mentioned in this Episode:
Scytale website, article “Asset-Based Risk Assessment”, link https://scytale.ai/glossary/asset-based-risk-assessment/
Aptine website, article “How to conduct Threat-Based Risk Assessment, link https://aptien.com/en/kb/articles/how-to-conduct-threat-based-risk-assessment
BCP Builder website, article “What is the relationship between Business Continuity and Risk Management”, link https://www.bcpbuilder.com/business-continuity-risk-management/
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya
Więcej odcinków z kanału "The ITSM Practice: Elevating ITSM and IT Security Knowledge"
Nie przegap odcinka z kanału “The ITSM Practice: Elevating ITSM and IT Security Knowledge”! Subskrybuj bezpłatnie w aplikacji GetPodcast.