You can’t secure what you don’t know you have! A documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security. I will discuss some of IAITAM’s 12 KPAs (Key Process Areas) of a mature ITAM process and how hardware management impacts data breach, brand protection, value recovery and environmental risks. We will lay some groundwork for defining policies and procedures for managing asset inventory while in your possession. As well as policies for managing your risks as assets move out of our control. I will also review disposition vendor credentials, best practices for documentation and processing and awareness of some end-of-life risks.