ITAM Cyber Security Workshop

ITAM / Cyber Security Workshop

Protect Your Crown Jewels, the Data, and Discover How IT Asset Management Supports Cyber Security Initiatives in 750+ Ways


1.25 Hours

Self-paced

Exam Included

200 USD

Did you know?

IT Asset Management (ITAM) is the Foundation for Cyber Security

  • The Challenge: Cyber Security Requires ITAM to be Successful

    Cyber security demands an accurate inventory of IT assets. As the saying goes, you can’t secure what you don’t know you have! 


    But achieving an accurate inventory is rarely accomplished, and the results can be devastating. 

    • Incomplete or missing patches are a leading cause of security breaches. Furthermore, patch management needs to know the impact of the patch on operations.
    • Assets come on and off the network for various reasons making IT security’s efforts significantly more difficult
    • Cybersecurity frameworks reduce ITAM to an inventory function or just counting things
    • Executive management support for ITAM should be stronger

    These issues are solved by understanding the value the ITAM program delivers and how ITAM supports CIS’s and NIST’s cybersecurity frameworks.


    IT asset inventory management is not a simple counting function but rather a complex orchestration of departments’ operations and data.


    By understanding the complex relationship between the ITAM program components and cyber security controls, disparate systems and processes can be aligned to deliver what is required to secure the organization’s crown jewels, its data.

  • Course Benefits

    There is a significant disconnect between cyber security frameworks and ITAM. The content in this workshop provides the knowledge necessary to bridge this gap.

    • Bridge the gap between ITAM and cyber security with the knowledge provided in the workshop
    • Discover the value your organization can realize from an ITAM program
    • Gain insight into cyber security’s objectives
    • Strengthen your organization’s cyber defense by maintaining an inventory that accurately represents the attack surface cyber security is attempting to manage
  • Certification & Achievement

    Upon successful completion of this course and  exam, students will earn the achievement: 


    ITAM / Cyber Security Workshop Certificate of Completion


    Exam Details

    Duration: 15 minutes

    Format: Multiple Choice

    # of Questions: 18

    Passing Score: 70%

    Attempts: Unlimited

  • Who Should Attend

    The workshop is designed for anyone involved in protecting their organization's data. This includes:

    • IT Asset Managers
    • Hardware Asset Managers
    • Software Asset Managers
    • Cloud Asset Managers
    • IT Security Managers
    • IT Managers 
    • IT Security Professionals
    • IT Professionals
    • IT Cloud Managers
  • Course Outline

    The Waterfall Model is Not Dead!

    • Failing to Follow the Lifecycle Process
    •  Examples
    • The Goal

    What is an ITAM Process

    Security Controls and ITAM

    • CIS's Definition
    • NIST's Definition

    IT Asset Management Program

    • ITAM Lifecycle Management
    • Data Retention Requirement
    • Create and Maintain IT Standards
    • Discovery / Reconciliation Process
    • Tools
    • Policies
    • End-User Roles
    • On / Off Boarding Process
    • Vendor Management

    About ITAM Processes

    IT Asset Lifecycle Phases and Processes

    Mapping Controls to ITAM

    The Mapping Spreadsheet

  • Prerequisites

    None

  • Learning Outcomes

    The student will learn how the relationship between ITAM and IT security makes IT security’s objectives attainable.


    Upon completion of the workshop, the student will understand:

    • The reason for managing the IT asset’s lifecycle
    • The critical components of the ITAM program
    • The value of each lifecycle phase to IT security as well as other departments
    • How to move the ITAM program forward with IT security
    • The mapping of ITAM components to both CIS’s and NIST's security controls
    • How to use the mapping to assess the ITAM program’s support for IT security
  • Materials and Instruction

    • Narrated presentation
    • Narrated “how to get the most out of the ITAM / IT security controls mapping”
    • Comprehensive manual
    • Presentation slides
    • Mapping of:
    • 428 ways IT / ITAM supports CIS's 19 Controls and 161 Safeguards, and 
    • 328 ways IT / ITAM supports NIST's 23 Functions and 108 Categories
    • Exam
    • Certificate of completion

    *In-person or virtual on-site instruction available upon request

  • Why ITAM IQ Training?

    ITAM IQ believes training courses should be vendor neutral, clear, concise, complete, and, most of all, practical. Whether you seek to validate what you do, enhance or confirm what you know, or be exposed to best practices used worldwide, BTU’s IT Asset Management (ITAM) training and certifications promise to deliver!


    Our courses go beyond the traditional lecture to allow time for answering your questions and providing consultation. And having worked with thousands of ITAM programs around the world over the past 20 years, Co-founder and your instructor, Keith Rupnik, excels at helping individuals learn how to improve their ITAM programs. Through real-world examples, assessments, mappings and how-to knowledge, our courses focus on empowering the IT asset management program while giving practitioners the tools they need to build internal buy-in at the executive level and throughout the various business functions. 

  • About Your Instructor

    Keith Rupnik started in the technology profession in the early 1980s as a software engineer. For his first 20 years, Keith was a software developer, manager of software development teams, and a software product manager. While Keith loved developing software, he found his next love in 2006, IT asset management teaching and consulting. Keith has worked with all types and sizes of organizations worldwide, helping IT asset managers and IT professionals become better at managing their organization's IT assets and communicating the value of ITAM. His knowledge spans all disciplines of ITAM, including ITAM program management, software asset management, hardware asset management, cloud asset management, and mobile asset management.


    Furthermore, Keith's breadth of experiences allows for him to understand and communicate the need to implement ITAM as a core competency involving all the primary departments within an organization. He has presented to thousands on the subject of ITAM and has developed course content. Finally, Keith believes in the need for continuous education. For Keith, learning is the equivalent of air – everyone needs to breathe in knowledge and exhale well-formed thoughts.


    Look to his ITAM IQ Library posts with that mission in mind.

  • What's Next

    With the business world moving to the cloud, our one-day Certified Cloud Asset Manager course is a must-attend for anyone in or near the IT Asset Management arena. This course takes an in-depth look at cloud assets. It defines how to manage these assets using best practical practices for the primary cloud architectures Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). The course addresses the entire cloud asset's lifecycle, including acquisition, receiving, deployment, in-use, re-deployment, and disposal.


    If your cloud program is primarily focused on SaaS, our half-day Certified SaaS Asset Manager course is the gateway to successful SaaS asset management. A light version of the Certified Cloud Asset Manager course, this course takes an in-depth look at how to manage the entire SaaS asset lifecycle using practical best practices.  

  • Additional Information

    To supplement your IT asset management knowledge journey and aid in enhancing your ITAM Program,  ITAM IQ's Library is your free source of relevant articles, courses, webinars and white papers full of real-world best practices, guidance and thought-provoking conversation starters.

Student Reviews


"I believe this training workshop has given me the confidence to better communicate the ITAM/ITSEC relationship within our organization."


"Finally, a tool I can use to communicate with my IT security department!"

"The workshop provided the tools I need to assess how my ITAM and IT security programs work together. The spreadsheet's format made this very easy to do."

"I thought the self-paced workshop was great and will be using the knowledge and tools provided to support future discussions within my team/dept."


"The additional documentation that you provide through the portal is awesome."

Popular Questions


  • Why is ITAM important to cyber security?

    There is a saying, “you can’t secure what you don’t know you have.” The IT asset inventory requires an accurate inventory. An accurate inventory can only be achieved by managing the asset’s lifecycle, which is attack surface management in cyber security.

  • How will working with cyber security help ITAM?

    Because of the threats, cyber security has the attention of executive management. This also means they have a growing budget. ITAM should be partially funded by cyber security because of the framework requirements of an accurate inventory.

  • What are CIS's Critical Security Controls?

    The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that offer a "must-do, do-first" starting point for every enterprise seeking to improve its cyber defense.

  • What is NIST's Cybersecurity Framework?

    NIST's Cybersecurity Framework is a safeguard or countermeasure prescribed for an information system or organization designed to protect its information's confidentiality, integrity, and availability and meet a set of defined security requirements.

  • I am not an IT asset manager; how can this workshop help me?

    If you are an cyber security or IT professional, understanding how ITAM is the foundation for  cyber security will help you accelerate the maturity of your organization’s cyber security initiative. The workshop will be an excellent addition to your cyber security certifications and IT certifications.

  • How can this workshop help me, the IT asset manager?

    This workshop provides you with the knowledge to help advance the relationship between ITAM and cyber security (more visibility for you) and help you advance your career. An IT asset manager needs to be a well-rounded individual who understands finance, legal, contracts, technology, compliance, and IT security.

  • What comes with the workshop?

    The textbook, a presentation (narrated in the workshop), the spreadsheet, and a certificate of completion. The spreadsheet includes the mapping between ITAM and CIS’s security controls, the mapping between ITAM and NIST's security controls, ITAM program components grouped by each set of security controls, and each set of security controls grouped by ITAM program components, with the ability to assess your current organization. 

Because of increasing security threats, cyber security is at the forefront of almost every organization, and ITAM needs to be at the forefront of any cyber security program.

Become the Bridge Between ITAM and Cyber Security Today!

Share by: