Did you know?
Cyber security demands an accurate inventory of IT assets. As the saying goes, you can’t secure what you don’t know you have!
But achieving an accurate inventory is rarely accomplished, and the results can be devastating.
These issues are solved by understanding the value the ITAM program delivers and how ITAM supports CIS’s and NIST’s cybersecurity frameworks.
IT asset inventory management is not a simple counting function but rather a complex orchestration of departments’ operations and data.
By understanding the complex relationship between the ITAM program components and cyber security controls, disparate systems and processes can be aligned to deliver what is required to secure the organization’s crown jewels, its data.
There is a significant disconnect between cyber security frameworks and ITAM. The content in this workshop provides the knowledge necessary to bridge this gap.
Upon successful completion of this course and exam, students will earn the achievement:
ITAM / Cyber Security Workshop Certificate of Completion
Exam Details
Duration: 15 minutes
Format: Multiple Choice
# of Questions: 18
Passing Score: 70%
Attempts: Unlimited
The workshop is designed for anyone involved in protecting their organization's data. This includes:
The Waterfall Model is Not Dead!
What is an ITAM Process
Security Controls and ITAM
IT Asset Management Program
About ITAM Processes
IT Asset Lifecycle Phases and Processes
Mapping Controls to ITAM
The Mapping Spreadsheet
None
The student will learn how the relationship between ITAM and IT security makes IT security’s objectives attainable.
Upon completion of the workshop, the student will understand:
*In-person or virtual on-site instruction available upon request
ITAM IQ believes training courses should be vendor neutral, clear, concise, complete, and, most of all, practical. Whether you seek to validate what you do, enhance or confirm what you know, or be exposed to best practices used worldwide, BTU’s IT Asset Management (ITAM) training and certifications promise to deliver!
Our courses go beyond the traditional lecture to allow time for answering your questions and providing consultation. And having worked with thousands of ITAM programs around the world over the past 20 years, Co-founder and your instructor, Keith Rupnik, excels at helping individuals learn how to improve their ITAM programs. Through real-world examples, assessments, mappings and how-to knowledge, our courses focus on empowering the IT asset management program while giving practitioners the tools they need to build internal buy-in at the executive level and throughout the various business functions.
Keith Rupnik started in the technology profession in the early 1980s as a software engineer. For his first 20 years, Keith was a software developer, manager of software development teams, and a software product manager. While Keith loved developing software, he found his next love in 2006, IT asset management teaching and consulting. Keith has worked with all types and sizes of organizations worldwide, helping IT asset managers and IT professionals become better at managing their organization's IT assets and communicating the value of ITAM. His knowledge spans all disciplines of ITAM, including ITAM program management, software asset management, hardware asset management, cloud asset management, and mobile asset management.
Furthermore, Keith's breadth of experiences allows for him to understand and communicate the need to implement ITAM as a core competency involving all the primary departments within an organization. He has presented to thousands on the subject of ITAM and has developed course content. Finally, Keith believes in the need for continuous education. For Keith, learning is the equivalent of air – everyone needs to breathe in knowledge and exhale well-formed thoughts.
Look to his ITAM IQ Library posts with that mission in mind.
With the business world moving to the cloud, our one-day Certified Cloud Asset Manager course is a must-attend for anyone in or near the IT Asset Management arena. This course takes an in-depth look at cloud assets. It defines how to manage these assets using best practical practices for the primary cloud architectures Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). The course addresses the entire cloud asset's lifecycle, including acquisition, receiving, deployment, in-use, re-deployment, and disposal.
If your cloud program is primarily focused on SaaS, our half-day Certified SaaS Asset Manager course is the gateway to successful SaaS asset management. A light version of the Certified Cloud Asset Manager course, this course takes an in-depth look at how to manage the entire SaaS asset lifecycle using practical best practices.
To supplement your IT asset management knowledge journey and aid in enhancing your ITAM Program, ITAM IQ's Library is your free source of relevant articles, courses, webinars and white papers full of real-world best practices, guidance and thought-provoking conversation starters.
"I believe this training workshop has given me the confidence to better communicate the ITAM/ITSEC relationship within our organization."
"Finally, a tool I can use to communicate with my IT security department!"
"The workshop provided the tools I need to assess how my ITAM and IT security programs work together. The spreadsheet's format made this very easy to do."
"I thought the self-paced workshop was great and will be using the knowledge and tools provided to support future discussions within my team/dept."
"The additional documentation that you provide through the portal is awesome."
There is a saying, “you can’t secure what you don’t know you have.” The IT asset inventory requires an accurate inventory. An accurate inventory can only be achieved by managing the asset’s lifecycle, which is attack surface management in cyber security.
Because of the threats, cyber security has the attention of executive management. This also means they have a growing budget. ITAM should be partially funded by cyber security because of the framework requirements of an accurate inventory.
The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that offer a "must-do, do-first" starting point for every enterprise seeking to improve its cyber defense.
NIST's Cybersecurity Framework is a safeguard or countermeasure prescribed for an information system or organization designed to protect its information's confidentiality, integrity, and availability and meet a set of defined security requirements.
If you are an cyber security or IT professional, understanding how ITAM is the foundation for cyber security will help you accelerate the maturity of your organization’s cyber security initiative. The workshop will be an excellent addition to your cyber security certifications and IT certifications.
This workshop provides you with the knowledge to help advance the relationship between ITAM and cyber security (more visibility for you) and help you advance your career. An IT asset manager needs to be a well-rounded individual who understands finance, legal, contracts, technology, compliance, and IT security.
The textbook, a presentation (narrated in the workshop), the spreadsheet, and a certificate of completion. The spreadsheet includes the mapping between ITAM and CIS’s security controls, the mapping between ITAM and NIST's security controls, ITAM program components grouped by each set of security controls, and each set of security controls grouped by ITAM program components, with the ability to assess your current organization.
Copyright ©2021-23 ITAM IQ | Akron, Ohio USA | All Rights Reserved