WHITEPAPER - Risk Reduction Through Proactive Problem Management

WHITEPAPER - Risk Reduction Through Proactive Problem Management

Introduction 

I have a suspicion that out of all the ITIL v3 processes it is the Problem Management process that is least understood. In part, I believe this is due to an entrenched view that exists in most IT organisations that problem management is basically the same as, or subordinate to, incident management.  This is wrong, as problem management has a wider role to play. First, it is important to realise that problem management is as equally allied to risk management as it is to incident management.

Where problem management deals with existing problems, risk management deals with identifying future problems.  

Clearly, a synergy exists between the two functions. Why is this important? To answer this question, we must first understand the role of IT risk management.  

What is IT Risk Management? 

Today, more than ever, there exist many high-profile IT risks that if not handled correctly can damage the reputation of the company – I’m referring here to the security risks of cyberattacks.  

If you think this might be an exaggeration, then I can do no better than quote from the 2018 Second Annual Report from the UK National Cyber Centre (NCSC) 1 . It states that:

 “Since it became fully operational in 2016, the NCSC’s cyber security front line has provided support on 1,167 cyber incidents – including 557 in the last 12 months. The report reveals most of the attacks against the UK are carried out by a hostile nation state”.

Note that this statistic refers to a ‘hostile nation state’ – so we are not just talking about criminals deploying ransomware or amateur hackers going phishing (annoying as they are) – these cyberattacks are a magnitude more serious as they target UK government institutions and infrastructure. 

I suspect it is not going to get much better in the future. This raises a further question – are companies prepared to meet these security issues? 

The recent UK Government’s Cyber Governance Health Check2 found that: 

‘Only a third of the UK’s top 350 businesses understand the threat of a cyberattack’ 

And, according to the Minister for the Digital Economy – ‘too many firms are losing money, data and consumer confidence with the vast number of cyberattacks. It’s crucial that businesses are secure and can protect data’.  

So how does this relate to Problem Management? 

As mentioned previously, problem management deals with current problems and risk management addresses future problems; i.e. they both address vulnerabilities – internal and external.  

As the overarching purpose in an IT organisation is the integrity of service delivery it is critical that the key functions of IT risk management, IT security and IT systems architecture are better aligned with the function of problem management. Together, these functions will form the basis of a much stronger ‘core’ to identify and reduce the system vulnerabilities that can result in system downtime.  

To achieve this, problem management must be re-positioned in a more central role in an IT organisation, and I will revisit this re-positioning in more detail later in this paper. 

READ MORE

?

要查看或添加评论,请登录

Chris Hodder的更多文章

  • Olivia's hair is

    Olivia's hair is

    Well it's finally done! My personal hero Olivia Hodder has gone and donated her first haircut to the Little Princess…

    1 条评论
  • DRYiCE AIOps webinar - May 7,2020

    DRYiCE AIOps webinar - May 7,2020

    IT Operations’ professionals are under more pressure today than ever before as IT leaders are being thrusted to provide…

  • CIHS Request Approval Matrix for Cherwell

    CIHS Request Approval Matrix for Cherwell

    CIH Solutions Ltd. clients face a common challenge with ITSM tools out of the box solution for approvals a common…

  • Congratulations to Lookers IT Service Delivery Team

    Congratulations to Lookers IT Service Delivery Team

    CIH Solutions would like to extend our congratulations to all the winners of the Lookers IT Awards held in Manchester…

    1 条评论
  • CIH Solutions sponsors Lookers Team of the Year.

    CIH Solutions sponsors Lookers Team of the Year.

    We’re delighted to announce CIH Solutions will be sponsoring the Team of the Year Award at Lookers Technology Event…

  • CIHS’ 10th Anniversary Recap: Why ITSM is So Hard

    CIHS’ 10th Anniversary Recap: Why ITSM is So Hard

    On Monday 7th August, CIHS turned 10 years old. That’s a whole decade we’ve racked up helping people put together fully…

    1 条评论
  • Top 3 Considerations for Moving ITSM to the Cloud

    Top 3 Considerations for Moving ITSM to the Cloud

    Unless you’ve been living under a rock for the past several years, you’ll already know traditional IT services have…

  • Asset vs. CI: What's the difference?

    Asset vs. CI: What's the difference?

    One of the most common misunderstandings about ITSM is the difference between an asset and a configuration item (CI)…

    2 条评论
  • The 3 Biggest Shared Service Environment Headaches

    The 3 Biggest Shared Service Environment Headaches

    Shared service environments are a conundrum. On the one hand, cost savings can be tremendous… but on the other, pulling…

  • CMDB & Service Catalogue Design Workshop

    CMDB & Service Catalogue Design Workshop

    CIHS are hosting a series of CMDB design workshops in Central London, Leeds and Dublin. The main aim of the workshops…

社区洞察

其他会员也浏览了