Discover your certification today Browse
Open page navigation
IT Governance & Service

Does an IT Asset Management program improve your cybersecurity posture?

IT Asset Management and Cybersecurity

Cybersecurity is all about IT assets.  When companies are hacked, it is through their IT assets; their networks, hardware, and software are the points of entry for cyber attackers.

Start with the basics. You can’t defend what you don’t know you have. And this goes beyond those easily identifiable PC’s. An enterprise is made up of desktop devices, servers, mobile devices, networks, possibly in different geographic locations operated by different people. Do you have an end-to-end view of your total IT asset management environment? And do you have business processes in place help you control what is on those devices and what levels of authority are permitted for different classes of users?

IT Asset Management is often underfunded and undermanaged within organizations, usually because responsibility is shared between disparate departments and frankly, because it is just isn’t considered all that exciting. But few things can create as much vulnerability to cyber-attack as a poorly designed, if not ad hoc, IT asset management program.

Our speaker for this webinar is Mr Greg Witte. Greg is a senior cybersecurity engineer, supporting commercial and government clients for G2, Inc., a security firm committed to solving the most complex cyber challenges.

Greg served as a core member of the 2013 team to create the Framework to Improve Critical Infrastructure Cybersecurity, a publication developed by the National Institute for Standards and Technology (NIST) in response to Presidential Executive Order 13636 to provide a common language for communicating, assessing, and reporting cybersecurity risk management objectives. He continues to help update and implement that Framework internationally.

Greg is a co-author of “Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP” published by McGraw Hill, and “Implementing the NIST Cybersecurity Framework” published by ISACA.

IT Asset Management and Cybersecurity

RELATED PRODUCTS

Sound board tuning

Configuration Management DataBase (CMDB)

Fine-tune your organization's services and infrastructure

View more
Person stood on a cliff edge looking upon clouds rolling through mountains

The Cloud Industry Forum (CIF) Code of Practice

Ensure your cloud services are a beauty to behold

View more
Hot air balloons ascending into the clouds

Cloud Computing

Smooth ascension into the cloud

View more