Jeff Datkuliak

I am the Director of Ohio Operations at ARCOA Group, a leading provider of IT asset disposition solutions for clients across various industries. I have over 25 years of experience in business development, sales, and marketing, and an MBA from Northwestern University with a focus on business strategy and value creation.
How ITAM Intersects with Cybersecurity

How ITAM Intersects with Cybersecurity

You Can’t Secure What Don’t Know You Have! How a documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.

I will discuss some of IAITAM’s 12 KPA’s (Key Process Areas) of a mature ITAM process and how hardware management impacts data breach, brand protection, value recovery and environmental risks. We will lay some groundwork for defining policies and procedures for managing asset inventory while in your possession as well as policies for managing your risks as assets move out of our control.

It’s Always About the Data!

This article reviews different hard drive configurations and the need for appropriate data destruction methods, such as erasure, degaussing, or shredding, to ensure data security compliance. It stresses the importance of regularly assessing ITAD vendor practices and internal policies to keep pace with evolving storage technologies.

How does Hardware Asset Management Support Cybersecurity?

I have noticed recently the increase in discussions with industry professionals and the awareness of the impact of a documented ITAM process as it relates to Cyber Security Practices….. Duhhhh, About Time!!!!! As Dr. Barb says, you can’t secure what you don’t know you have! Hardware management is a core competency of ITAM.

What to Manage and Where is My Data?

What to Manage and Where is My Data?

Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.