Cybersecurity is all about IT assets.  When companies are hacked, it is through their IT assets; their networks, hardware, and software are the points of entry for cyber attackers.

Start with the basics. You can’t defend what you don’t know you have. And this goes beyond those easily identifiable PC’s. An enterprise is made up of desktop devices, servers, mobile devices, networks, possibly in different geographic locations operated by different people. Do you have an end-to-end view of your total IT asset management environment? And do you have business processes in place help you control what is on those devices and what levels of authority are permitted for different classes of users?

IT Asset Management is often underfunded and undermanaged within organizations, usually because responsibility is shared between disparate departments and frankly, because it is just isn’t considered all that exciting. But few things can create as much vulnerability to cyber-attack as a poorly designed, if not ad hoc, IT asset management program.

Our speaker for this webinar is Mr Greg Witte. Greg is a senior cybersecurity engineer, supporting commercial and government clients for G2, Inc., a security firm committed to solving the most complex cyber challenges.

Greg served as a core member of the 2013 team to create the Framework to Improve Critical Infrastructure Cybersecurity, a publication developed by the National Institute for Standards and Technology (NIST) in response to Presidential Executive Order 13636 to provide a common language for communicating, assessing, and reporting cybersecurity risk management objectives. He continues to help update and implement that Framework internationally.

Greg is a co-author of “Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP” published by McGraw Hill, and “Implementing the NIST Cybersecurity Framework” published by ISACA.