Cybersecurity Starts with ITAM
A good cyber-security solution requires reliable discovery & inventory systems. These are the foundations of a good ITAM solution.
A good cyber-security solution requires reliable discovery & inventory systems. These are the foundations of a good ITAM solution.
The Center for Internet Security has defined 20 top controls that are critical for IT security. These are classified into
The Basic CIS Controls identify two that relate to IT Asset Management
The Organisation CIS Controls identifies one that relates to Incident Response & so closely related to IT Asset Management.
(you can check up the list of controls at https://www.cisecurity.org/controls/cis-controls-list/ )
The three CIS Controls that are related to IT Asset Management are