How ITAM Intersects with Cybersecurity

You Can’t Secure What Don’t Know You Have! How a documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.

I will discuss some of IAITAM’s 12 KPA’s (Key Process Areas) of a mature ITAM process and how hardware management impacts data breach, brand protection, value recovery and environmental risks. We will lay some groundwork for defining policies and procedures for managing asset inventory while in your possession as well as policies for managing your risks as assets move out of our control.