Companies Home Search Profile

ITAM / Cyber Security Workshop with NIST - CIS - ITAM Map

Focused View

Keith Rupnik,Regina Rupnik

1:15:39

23 View
  • 1. Welcome to the Workshop!.mp4
    05:25
  • 2. Terms of Use.html
  • 3. Terms of Use.html
  • 4.1 Workshop-Mapping-Presentation.pdf
  • 4.2 Workshop-Mapping-Textbook.pdf
  • 4. Course Materials.html
  • 1. Introduction.mp4
    07:14
  • 1. The ITAM Program and Scope.mp4
    07:38
  • 1. ITAM Tools.mp4
    06:02
  • 1. Policies.mp4
    04:39
  • 1. IT Users.mp4
    06:12
  • 1. Vendor Management.mp4
    03:07
  • 1. Acquire and Receive Processes.mp4
    05:39
  • 1. Deploy, In-Use, Recover.mp4
    05:58
  • 1. Dispose.mp4
    03:54
  • 1. Moving the ITAM Program Forward.mp4
    02:19
  • 1. Conclusion.mp4
    02:20
  • 1.1 Workshop-Mapping-Spreadsheet.xlsx
  • 1. How to Get the Most from the Mapping.mp4
    12:23
  • 1. The End. Or Is It.mp4
    02:49
  • 1. Quiz.html
  • 1. Workshop Survey.html
  • Description


    Learn how IT Asset Management supports cybersecurity in over 750 ways! Includes NIST - CIS - ITAM mapping!

    What You'll Learn?


    • How the relationship between ITAM and IT security makes IT security’s objectives attainable.
    • The mapping of ITAM components to both CIS’s and NIST's cybersecurity frameworks.
    • How to use the mapping to assess the ITAM program’s support for IT security.
    • How to move the ITAM program forward with IT security.
    • The reason for managing the IT asset’s lifecycle.
    • The critical components of the ITAM program.
    • The value of each lifecycle phase to IT security as well as other departments.

    Who is this for?


  • IT Asset Managers, Hardware Asset Managers, Software Asset Managers, Cloud Asset Managers: Learn how critical ITAM is to IT security according to two leading cyber security frameworks from NIST and CIS. You will receive the tools necessary to advance your ITAM Program and increase its visibility!
  • IT Security Managers and Professionals: NIST and CIS require an accurate IT asset inventory but do not explain how to achieve one. Learn what is needed to implement an ITAM Program to meet this objective and how you can interface with your ITAM team!
  • IT Managers, IT Professionals: The pressure is on to help secure your organization’s data, and you have a critical role in this. Learn how many IT processes contribute data to ITAM and significantly impact your organization’s security program based on NIST’s and CIS’s cybersecurity frameworks!
  • IT Cloud Managers: Cloud security is on everyone’s mind, and you can’t assume it’s your cloud service provider’s problem. Learn how ITAM, IT, and IT security work together to secure your organization’s data and what your cloud service providers should be doing!
  • What You Need to Know?


  • Some experience in one or more of the following: ITAM, IT, IT security, or a basic understanding of how IT is used in business.
  • More details


    Description

    As an organization, your network's attack surface is the primary vulnerability that attackers exploit to cause harm. To effectively manage your attack surface, keeping an accurate inventory of all assets, including those owned by the corporation, employees, and vendors, is crucial. You can monitor real-time changes by employing IMACD (install, move, add, change, dispose). However, this relies on upstream processes, policies, and standards that begin before acquisition and continue after end-of-life. It is important to limit exceptions and ensure that executive management supports these processes, policies, and standards.

    In this workshop, you will learn how ITAM supports cybersecurity in over 750 ways so that you can protect your organization's data, which are its crown jewels. You will also receive the mapping between ITAM's 37 key components to NIST's and CIS's security controls. Utilizing the mapping, you can confidently apply the knowledge gained from the workshop to benchmark and advance your IT, ITAM, and IT security programs. This will expand your educational experience beyond the workshop. You will also learn how ITAM benefits departments other than IT security. Funding ITAM initiatives is one of the best investments for your organization, and executives will love it!

    This workshop will teach you about ITAM's impact on IT security and the entire organization. You will receive a tool that, when appropriately used, will accelerate your ITAM, IT, and IT security programs by assessing your current ITAM Program's performance and then developing a roadmap for improvement.

    Who this course is for:

    • IT Asset Managers, Hardware Asset Managers, Software Asset Managers, Cloud Asset Managers: Learn how critical ITAM is to IT security according to two leading cyber security frameworks from NIST and CIS. You will receive the tools necessary to advance your ITAM Program and increase its visibility!
    • IT Security Managers and Professionals: NIST and CIS require an accurate IT asset inventory but do not explain how to achieve one. Learn what is needed to implement an ITAM Program to meet this objective and how you can interface with your ITAM team!
    • IT Managers, IT Professionals: The pressure is on to help secure your organization’s data, and you have a critical role in this. Learn how many IT processes contribute data to ITAM and significantly impact your organization’s security program based on NIST’s and CIS’s cybersecurity frameworks!
    • IT Cloud Managers: Cloud security is on everyone’s mind, and you can’t assume it’s your cloud service provider’s problem. Learn how ITAM, IT, and IT security work together to secure your organization’s data and what your cloud service providers should be doing!

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Rupnik
    Keith Rupnik
    Instructor's Courses
    Keith Rupnik started in the technology profession in the early 1980s as a software engineer. For his first 20 years, Keith was a software developer, manager of software development teams and a software product manager. While Keith loved developing software, he found his next love in 2006, IT asset management teaching and consulting. Keith has worked with all types and sizes of organizations worldwide, helping IT asset managers and IT professionals become better at managing their organization's IT assets and communicating the value of ITAM. His knowledge spans all disciplines of ITAM, including ITAM program management, software asset management, hardware asset management, cloud asset management, and mobile asset management.Furthermore, Keith's breadth of experience allows him to understand and communicate the need to implement ITAM as a core competency involving all the primary departments within an organization. He has presented to thousands on the subject of ITAM and has developed course content. Finally, Keith believes in the need for continuous education. For Keith, learning is the equivalent of air – everyone needs to breathe in knowledge and exhale well-formed thoughts.
    Regina Rupnik
    Regina Rupnik
    Instructor's Courses
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 14
    • duration 1:15:39
    • Release Date 2023/09/04

    Courses related to Cyber Security

    Subtitle
    NIST Cyber Security Framework
    Udemy Michael Goedeker
    Michael Goedeker
    NIST Cyber Security Framework
    2:58:29
    English subtitles
    11/19/2022
    Subtitle
    Advanced Cyber Threat Intelligence

    Courses related to Cyber Security Awareness