ITAM Best Practices as the Foundation of a Successful Cybersecurity Program By Jose Carrillo Implementing a cybersecurity program is essential for any organization. With the increasing number of data breaches, new methods of attacks, and even the use of AI and improved phishing techniques, it is imperative for organizations to create a
Building a SAM program: Update existing or "rip & replace"? By Frank Venezia “Update, or, rip and replace?” We have all heard this phrase. In fact, it is likely that most adults have said this phrase at some point in their life. The phrase is commonly used when discussing or thinking about
The Role of Policy in the ITAM Maturity Process By Rodney Penny No one can dispute that IT assets and the information that they process, store and transmit present a huge risk to organizations. Every organization has the responsibility to protect their data from hackers and phishers, and that means that it
The Importance of BYOD Policies - Lessons from Capitol Hill By IAITAM BYOD is a commonly understood abbreviation for a business practice known by most organizations around the world. Even in an organization where the practice has not been implemented, BYOD costs and benefits have been compared to determine if the practice
Policy Creation: Understanding the Why By IAITAM Policies have a widespread impact on an organization, documenting the rules for employees and reflecting the culture of the organization. Functional areas have a responsibility to incorporate policy language into execution of the responsibilities within their departments. Management in each of these areas is also
What Happens When IT No Longer Governs ITAM? - Policy Management By IAITAM Policies are a critical success factor for the IT Asset Management program, providing controls to behavior, influence during periods of change and support for asset education and enforcement. To achieve these results, policies must be clearly defined, understandable, and
Policies for Pad Computing Mobility - Going Mobile? - First Get a Roadmap By Ed Cartier, xAssets Ltd. Anyone who really believes that pad-computers (hereafter “pads” to save some ink and paper) won’t invade just about everyone’s IT infrastructure in the next year or so is woefully naïve. Strong words? Not really.
Review Your Policies - QSP: Defining the Policy Review Process By Dr. Barbara Rembiesa Your organization probably has more policies in place than one could count. These policies can range from organizational activities and procedures to behavioral requirements while at work. These policies are important to daily function, but sometimes overlap occurs